| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | lib.c | 350 accum->deny |= addend->deny; in aa_perms_accum_raw() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 359 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 369 accum->deny |= addend->deny; in aa_perms_accum() 370 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 375 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum() 376 accum->cond |= addend->cond & ~accum->allow & ~accum->deny; in aa_perms_accum() 378 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; in aa_perms_accum() [all …]
|
| H A D | net.c | 231 if (profile->secmark[i].deny) in aa_secmark_perm() 232 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
| /OK3568_Linux_fs/kernel/fs/nfsd/ |
| H A D | nfs4acl.c | 239 unsigned short deny; in _posix_to_nfsv4_one() local 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one() 275 deny &= pas.groups | pas.group | pas.other; in _posix_to_nfsv4_one() 276 if (deny) { in _posix_to_nfsv4_one() 279 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 327 deny = ~pas.group & pas.other; in _posix_to_nfsv4_one() [all …]
|
| H A D | nfs4state.c | 585 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument 588 if (deny) { in nfs4_file_check_deny() 590 if (deny & ~NFS4_SHARE_DENY_BOTH) in nfs4_file_check_deny() 593 if ((deny & NFS4_SHARE_DENY_READ) && in nfs4_file_check_deny() 597 if ((deny & NFS4_SHARE_DENY_WRITE) && in nfs4_file_check_deny() 1221 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument 1223 unsigned char mask = 1 << deny; in set_deny() 1225 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny() 1231 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument 1233 unsigned char mask = 1 << deny; in clear_deny() [all …]
|
| /OK3568_Linux_fs/buildroot/package/rpcbind/ |
| H A D | 0001-Remove-yellow-pages-support.patch | 24 goto deny; 32 goto deny; 39 - goto deny;
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 25 devices.deny. For instance:: 32 echo a > /sys/fs/cgroup/1/devices.deny 62 a cgroup's devices.deny file, all its children will have that entry removed 75 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm" 79 # echo "c 116:* r" > A/devices.deny 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
| /OK3568_Linux_fs/buildroot/package/at/ |
| H A D | 0002-Makefile.in-fix-make-install-for-non-root-don-t-stri.patch | 44 …/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -o root -g $(DAEMON_GROUPNAME) -m 6… 46 …ESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -m 640 at.deny $(DE… 75 cd $(DESTDIR)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
|
| H A D | 0001-Makefile.in-replace-IROOT-by-DESTDIR.patch | 48 …r)/at.allow || test -f $(IROOT)$(etcdir)/at.deny || $(INSTALL) -o root -g $(DAEMON_GROUPNAME) -m 6… 73 …/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -o root -g $(DAEMON_GROUPNAME) -m 6… 92 - cd $(IROOT)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5 98 + cd $(DESTDIR)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/p910nd/p910nd/ |
| H A D | fix-var-lock.patch | 13 -/var/run/p9100d.pid, /var/lock/subsys/p9100d, /etc/hosts.allow, /etc/hosts.deny 14 +/var/run/p9100d.pid, /var/lock/p9100d, /etc/hosts.allow, /etc/hosts.deny
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/tcp-wrappers/ |
| H A D | tcp-wrappers_7.6.bb | 87 …oe_runmake 'TABLES=-DHOSTS_DENY=\"${sysconfdir}/hosts.deny\" -DHOSTS_ALLOW=\"${sysconfdir}/hosts.a… 134 touch ${D}${sysconfdir}/hosts.deny 137 FILES:${PN} += "${sysconfdir}/hosts.allow ${sysconfdir}/hosts.deny"
|
| /OK3568_Linux_fs/kernel/security/apparmor/include/ |
| H A D | perms.h | 70 u32 deny; /* explicit deny, or conflict if allow also set */ member 151 u32 request, int type, u32 *deny,
|
| H A D | net.h | 84 u8 deny; member
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
| H A D | 12_makefile_config.patch | 17 # (examples: allow, deny, banners, twist and spawn). 32 @@ -632,6 +634,7 @@ TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\
|
| H A D | 01_man_portability.patch | 32 /etc/hosts.deny: 189 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the 205 Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current 227 \fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/lighttpd/lighttpd/ |
| H A D | lighttpd.conf | 128 url.access-deny = ( "~", ".inc" )
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/dbus-1/system.d/ |
| H A D | obexd.conf | 16 <deny send_destination="org.bluez.obex"/>
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/stable/ |
| H A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/lighttpd/ |
| H A D | lighttpd.conf | 344 url.access-deny = ( "~", ".inc" )
|
| /OK3568_Linux_fs/buildroot/board/rockchip/rk3566_rk3568/fs-overlay/etc/lighttpd/ |
| H A D | lighttpd.conf | 344 url.access-deny = ( "~", ".inc" )
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
| H A D | lxdm-pam-debug | 7 # To deny passwordless login comment next line and uncomment previous line
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/ |
| H A D | other | 12 #secure, deny access to all services by default.
|
| H A D | common-account | 7 # only deny service to users whose accounts are expired in /etc/shadow.
|
| /OK3568_Linux_fs/buildroot/package/usbguard/ |
| H A D | Config.in | 16 Install a custom accept/deny list in /etc/usbguard/rules.conf
|
| /OK3568_Linux_fs/kernel/drivers/staging/wlan-ng/ |
| H A D | prism2sta.c | 1629 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer() 1630 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer() 1631 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer() 1633 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer() 1634 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
|
| /OK3568_Linux_fs/buildroot/package/refpolicy/2.20210908/ |
| H A D | 0001-policy-modules-services-samba.te-make-crack-optional.patch | 9 …/host/usr/lib" /tmp/instance-5/output-1/host/usr/bin/checkpolicy -c 31 -U deny -S -O -E policy.con…
|