| /linux/security/apparmor/include/ |
| H A D | perms.h | 71 u32 deny; /* explicit deny, or conflict if allow also set */ member 110 accum->deny |= addend->deny; in aa_perms_accum_raw() 111 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 115 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 116 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 118 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 119 accum->subtree |= addend->subtree & ~addend->deny; in aa_perms_accum_raw() 137 accum->deny |= addend->deny; in aa_perms_accum() 138 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 142 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum() [all …]
|
| H A D | net.h | 80 u8 deny; member
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 25 devices.deny. For instance:: 32 echo a > /sys/fs/cgroup/1/devices.deny 62 a cgroup's devices.deny file, all its children will have that entry removed 75 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm" 79 # echo "c 116:* r" > A/devices.deny 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
| /linux/Documentation/ |
| H A D | Makefile | 40 FONTS_CONF_DENY_VF ?= $(HOME)/deny-vf 62 --builddir="$(BUILDDIR)" --deny-vf=$(FONTS_CONF_DENY_VF) \
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | DENYLIST.riscv64 | 1 # riscv64 deny list for BPF CI and local vmtest
|
| H A D | README.rst | 32 deny list file, located at ``tools/testing/selftests/bpf/DENYLIST.<arch>``, can 55 that deny lists are not automatically honored.
|
| /linux/Documentation/ABI/stable/ |
| H A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
| /linux/Documentation/ABI/obsolete/ |
| H A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | Makefile | 4 TEST_BOTH_AF += connect-deny
|
| /linux/fs/smb/server/ |
| H A D | smbacl.h | 53 u32 deny; member
|
| /linux/Documentation/userspace-api/ |
| H A D | check_exec.rst | 96 should always deny such execution if ``SECBIT_EXEC_DENY_INTERACTIVE`` is set. 127 Always interpret scripts, but deny arbitrary user commands. 136 Deny script interpretation if they are not executable, and also deny
|
| /linux/security/apparmor/ |
| H A D | policy_unpack.c | 586 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 657 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm() 1227 if (perm->allow & perm->deny) in verify_perm() 1231 if (perm->cond & (perm->allow | perm->deny)) in verify_perm() 1235 if (perm->complain & (perm->allow | perm->deny)) in verify_perm() 1237 if (perm->prompt & (perm->allow | perm->deny)) in verify_perm()
|
| H A D | net.c | 378 if (rules->secmark[i].deny) in aa_secmark_perm() 379 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
| H A D | lib.c | 423 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms()
|
| /linux/fs/nfsd/ |
| H A D | nfs4state.c | 474 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument 476 unsigned char mask = 1 << deny; in set_deny() 478 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny() 484 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument 486 unsigned char mask = 1 << deny; in clear_deny() 488 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in clear_deny() 494 test_deny(u32 deny, struct nfs4_ol_stateid *stp) in test_deny() argument 496 unsigned char mask = 1 << deny; in test_deny() 781 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument 784 if (deny) { in nfs4_file_check_deny() [all …]
|
| /linux/security/selinux/ |
| H A D | Kconfig | 34 kernel will start in permissive mode (log everything, deny nothing)
|
| /linux/Documentation/usb/ |
| H A D | authorization.rst | 98 There is a similar approach to allow or deny specific USB interfaces.
|
| /linux/Documentation/bpf/ |
| H A D | prog_cgroup_sysctl.rst | 100 the result to make decision whether to allow or deny access to sysctl.
|
| /linux/rust/syn/ |
| H A D | lib.rs | 256 #![deny(unsafe_op_in_unsafe_fn)]
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | transhuge.rst | 376 ``never``, ``deny``, and ``force``). 458 deny 480 The options 'force' and 'deny' are dropped for the individual sizes, which
|
| /linux/rust/proc-macro2/ |
| H A D | lib.rs | 93 #![deny(unsafe_op_in_unsafe_fn)]
|
| /linux/Documentation/security/ |
| H A D | snp-tdx-threat-model.rst | 183 The host retains full control over the CoCo guest resources, and can deny
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 131 authorization criteria, IPE will deny its execution. Additionally, IPE 350 …e_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2241 comm="ld-linux.so" path="/deny/lib/libc.so.6" dev=…
|
| /linux/LICENSES/deprecated/ |
| H A D | GPL-1.0 | 40 anyone to deny you these rights or to ask you to surrender the rights.
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-fs-f2fs | 767 than watermark, then deny caching compress page. The value should be in 775 If cached page percent exceed threshold, then deny caching compress page.
|