/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/pam.d/ |
H A D | su | 12 # denying "root" user, unless she's a member of "foo" or explicitly
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/ |
H A D | Certificate.interface.yaml | 54 protects against the signing entity falsely denying
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Certs/CSR/ |
H A D | Create.interface.yaml | 124 denying
|
/openbmc/qemu/qapi/ |
H A D | block-export.json | 26 # to denying access (since 4.0). 61 # to denying access (since 4.0).
|
H A D | char.json | 256 # missing, it will default to denying access (since 4.0)
|
H A D | migration.json | 756 # If missing, it will default to denying access (Since 4.0) 937 # If missing, it will default to denying access (Since 4.0)
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/openbmc/linux/drivers/gpu/drm/i915/ |
H A D | i915_scheduler_types.h | 59 * something waiting on a user semaphore [VkEvent]) from denying service to
|
/openbmc/docs/security/ |
H A D | obmc-security-response-team-guidelines.md | 212 Sample response for denying list membership:
|
/openbmc/phosphor-certificate-manager/ |
H A D | certs_manager.hpp | 168 * the signing entity falsely denying some action.
|
/openbmc/linux/drivers/virt/vboxguest/ |
H A D | vboxguest_core.c | 1318 vbg_err("Denying userspace vmm report guest cap. call facility %#08x\n", in vbg_req_allowed() 1335 vbg_err("Denying userspace vmm call type %#08x\n", in vbg_req_allowed() 1342 vbg_err("Denying userspace vmm call type %#08x through vboxuser device node\n", in vbg_req_allowed()
|
/openbmc/linux/net/mac80211/ |
H A D | agg-rx.c | 291 "Suspend in progress - Denying ADDBA request (%pM tid %d)\n", in ___ieee80211_start_rx_ba_session()
|
H A D | agg-tx.c | 647 "BA sessions blocked - Denying BA session request %pM tid %d\n", in ieee80211_start_tx_ba_session()
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | landlock.rst | 147 denying all other handled accesses for the filesystem. The next step is to
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx4/ |
H A D | port.c | 1324 mlx4_warn(dev, "denying Global Pause change for slave:%d\n", in mlx4_en_set_port_global_pause() 1366 mlx4_warn(dev, "denying SET_PORT for slave:%d\n", in mlx4_common_set_port() 1483 mlx4_warn(dev, "denying SET_PORT Beacon slave:%d\n", slave); in mlx4_common_set_port()
|
/openbmc/ipmi-fru-parser/ |
H A D | LICENSE | 29 To protect your rights, we need to prevent others from denying you
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | GPL-3.0-or-later | 30 To protect your rights, we need to prevent others from denying you these rights
|
H A D | GPL-3.0-only | 16 To protect your rights, we need to prevent others from denying you these rights or asking you to su…
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_main.c | 463 * this point. Eliminate this integrity gap by denying the mprotect
|
/openbmc/linux/Documentation/process/ |
H A D | handling-regressions.rst | 479 The fact that you have apparently been denying the regression now for
|
/openbmc/linux/kernel/ |
H A D | ptrace.c | 295 WARN(1, "denying ptrace access check without PTRACE_MODE_*CREDS\n"); in __ptrace_may_access()
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | usage.rst | 663 for files which are not oplocked instead of denying leases
|
/openbmc/linux/tools/testing/selftests/landlock/ |
H A D | fs_test.c | 1095 * Try to confuse the deny access by denying write (but not in TEST_F_FORK() 2229 * denying access (with MAKE_REG nor REMOVE). 2250 * denying access (with MAKE_REG nor REMOVE).
|
/openbmc/linux/arch/arm/ |
H A D | Kconfig | 789 written polling loops from denying visibility of updates to memory.
|
/openbmc/linux/Documentation/driver-api/ |
H A D | pin-control.rst | 817 peripheral functions. So again the "strict" flag should be set, denying
|