/openbmc/linux/security/apparmor/include/ |
H A D | perms.h | 68 u32 deny; /* explicit deny, or conflict if allow also set */ member 107 accum->deny |= addend->deny; in aa_perms_accum_raw() 108 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 112 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 113 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 115 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 116 accum->subtree |= addend->subtree & ~addend->deny; in aa_perms_accum_raw() 134 accum->deny |= addend->deny; in aa_perms_accum() 135 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 139 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum() [all …]
|
/openbmc/linux/fs/nfsd/ |
H A D | nfs4acl.c | 239 unsigned short deny; in _posix_to_nfsv4_one() local 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one() 275 deny &= pas.groups | pas.group | pas.other; in _posix_to_nfsv4_one() 276 if (deny) { in _posix_to_nfsv4_one() 279 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 327 deny = ~pas.group & pas.other; in _posix_to_nfsv4_one() [all …]
|
H A D | nfs4state.c | 471 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument 473 unsigned char mask = 1 << deny; in set_deny() 475 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny() 481 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument 483 unsigned char mask = 1 << deny; in clear_deny() 485 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in clear_deny() 491 test_deny(u32 deny, struct nfs4_ol_stateid *stp) in test_deny() argument 493 unsigned char mask = 1 << deny; in test_deny() 809 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument 812 if (deny) { in nfs4_file_check_deny() [all …]
|
/openbmc/qemu/tests/ |
H A D | dbus-vmstate-daemon.sh | 34 <deny own="*"/> 35 <deny send_type="method_call"/> 57 <deny send_destination="org.freedesktop.DBus" 60 <deny send_destination="org.freedesktop.DBus" 62 <deny send_destination="org.freedesktop.DBus"
|
/openbmc/qemu/qapi/ |
H A D | authz.json | 13 # @deny: deny access 21 'data': ['deny', 'allow']} 62 # deny)
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 25 devices.deny. For instance:: 32 echo a > /sys/fs/cgroup/1/devices.deny 62 a cgroup's devices.deny file, all its children will have that entry removed 75 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm" 79 # echo "c 116:* r" > A/devices.deny 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/p910nd/p910nd/ |
H A D | fix-var-lock.patch | 13 -/var/run/p9100d.pid, /var/lock/subsys/p9100d, /etc/hosts.allow, /etc/hosts.deny 14 +/var/run/p9100d.pid, /var/lock/p9100d, /etc/hosts.allow, /etc/hosts.deny
|
/openbmc/linux/security/apparmor/ |
H A D | lib.c | 354 u32 request, int type, u32 *deny, in aa_profile_label_perm() argument 367 *deny |= request & perms.deny; in aa_profile_label_perm() 393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms()
|
H A D | net.c | 241 if (rules->secmark[i].deny) in aa_secmark_perm() 242 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
H A D | policy_unpack.c | 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 653 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm() 1194 if (perm->allow & perm->deny) in verify_perm() 1198 if (perm->cond & (perm->allow | perm->deny)) in verify_perm() 1202 if (perm->complain & (perm->allow | perm->deny)) in verify_perm() 1204 if (perm->prompt & (perm->allow | perm->deny)) in verify_perm()
|
/openbmc/linux/rust/alloc/ |
H A D | lib.rs | 71 test(no_crate_inject, attr(allow(unused_variables), deny(warnings))) 86 #![deny(unsafe_op_in_unsafe_fn)] 87 #![deny(fuzzy_provenance_casts)]
|
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/ |
H A D | tcp-wrappers_7.6.bb | 84 …oe_runmake 'TABLES=-DHOSTS_DENY=\"${sysconfdir}/hosts.deny\" -DHOSTS_ALLOW=\"${sysconfdir}/hosts.a… 131 touch ${D}${sysconfdir}/hosts.deny 134 FILES:${PN} += "${sysconfdir}/hosts.allow ${sysconfdir}/hosts.deny"
|
/openbmc/openbmc/meta-hpe/meta-common/recipes-extended/pam/libpam/ |
H A D | faillock.conf | 1 deny=5
|
/openbmc/openbmc/meta-ampere/meta-common/recipes-extended/pam/libpam/ |
H A D | faillock.conf | 1 deny=5
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/ |
H A D | faillock.conf | 1 deny=0
|
/openbmc/openbmc/poky/meta/recipes-extended/lighttpd/lighttpd/ |
H A D | lighttpd.conf | 120 url.access-deny = ( "~", ".inc" )
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 378 std::string deny; in TEST_F() local 379 EXPECT_EQ(getPamModuleConfValue(tempFaillockConfigFile, "deny", deny), 0); in TEST_F() 380 EXPECT_EQ(deny, "2"); in TEST_F() 398 std::string deny; in TEST_F() local 399 EXPECT_EQ(getPamModuleConfValue(tempFaillockConfigFile, "deny", deny), 0); in TEST_F() 400 EXPECT_EQ(deny, "3"); in TEST_F() 443 std::string deny; in TEST_F() local 444 EXPECT_EQ(getPamModuleConfValue(tempFaillockConfigFile, "deny", deny), -1); in TEST_F() 447 EXPECT_EQ(getPamModuleConfValue(tempFaillockConfigFile, "deny", deny), -1); in TEST_F()
|
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
H A D | 12_makefile_config.patch | 17 # (examples: allow, deny, banners, twist and spawn). 32 @@ -632,6 +634,7 @@ TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\
|
H A D | 01_man_portability.patch | 32 /etc/hosts.deny: 189 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the 205 Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current 227 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
|
/openbmc/linux/Documentation/ABI/stable/ |
H A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/openbmc/linux/Documentation/ABI/obsolete/ |
H A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | lxdm-pam-debug | 7 # To deny passwordless login comment next line and uncomment previous line
|
/openbmc/qemu/docs/system/ |
H A D | authz.rst | 114 { "match": "danb", "policy": "deny", "format": "exact" }, 117 "policy": "deny" 160 { "match": "danb", "policy": "deny", "format": "exact" }, 163 "policy": "deny"
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | other | 12 #secure, deny access to all services by default.
|
H A D | common-account | 7 # only deny service to users whose accounts are expired in /etc/shadow.
|