/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | perms.h | 68 u32 deny; /* explicit deny, or conflict if allow also set */ member 71 u32 cond; /* set only when ~allow and ~deny */ 73 u32 kill; /* set only when ~allow | deny */ 74 u32 complain; /* accumulates only used when ~allow & ~deny */ 75 u32 prompt; /* accumulates only used when ~allow & ~deny */ 78 u32 quiet; /* set only when ~allow | deny */ 79 u32 hide; /* set only when ~allow | deny */ 107 accum->deny |= addend->deny; in aa_perms_accum_raw() [all...] |
H A D | net.h | 85 u8 deny; member
|
/kernel/linux/linux-5.10/fs/nfsd/ |
H A D | nfs4acl.c | 145 /* allocate for worst case: one (deny, allow) pair each: */ in nfsd4_get_nfs4_acl() 239 unsigned short deny; in _posix_to_nfsv4_one() local 249 /* We could deny everything not granted by the owner: */ in _posix_to_nfsv4_one() 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 252 * but it is equivalent (and simpler) to deny only what is not in _posix_to_nfsv4_one() 255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one() 275 deny in _posix_to_nfsv4_one() 423 u32 deny; global() member [all...] |
H A D | nfs4state.c | 588 /* Does it conflict with a deny mode already set? */ in nfs4_file_get_access() 596 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument 598 /* Common case is that there is no deny mode. */ in nfs4_file_check_deny() 599 if (deny) { in nfs4_file_check_deny() 600 /* Does this deny mode make sense? */ in nfs4_file_check_deny() 601 if (deny & ~NFS4_SHARE_DENY_BOTH) in nfs4_file_check_deny() 604 if ((deny & NFS4_SHARE_DENY_READ) && in nfs4_file_check_deny() 608 if ((deny & NFS4_SHARE_DENY_WRITE) && in nfs4_file_check_deny() 1173 * st_{access,deny}_bmap field of the stateid, in order to track not 1181 * track of access/deny bi 1232 set_deny(u32 deny, struct nfs4_ol_stateid *stp) set_deny() argument 1242 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) clear_deny() argument 1252 test_deny(u32 deny, struct nfs4_ol_stateid *stp) test_deny() argument 1290 reset_union_bmap_deny(u32 deny, struct nfs4_ol_stateid *stp) reset_union_bmap_deny() argument 2469 unsigned int access, deny; nfs4_show_open() local 6411 nfs4_set_lock_denied(struct file_lock *fl, struct nfsd4_lock_denied *deny) nfs4_set_lock_denied() argument [all...] |
/kernel/linux/linux-6.6/fs/nfsd/ |
H A D | nfs4acl.c | 145 /* allocate for worst case: one (deny, allow) pair each: */ in nfsd4_get_nfs4_acl() 239 unsigned short deny; in _posix_to_nfsv4_one() local 249 /* We could deny everything not granted by the owner: */ in _posix_to_nfsv4_one() 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 252 * but it is equivalent (and simpler) to deny only what is not in _posix_to_nfsv4_one() 255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one() 275 deny in _posix_to_nfsv4_one() 423 u32 deny; global() member [all...] |
H A D | nfs4state.c | 405 * st_{access,deny}_bmap field of the stateid, in order to track not 415 * track of access/deny bit combinations; so, e.g., we allow: 417 * OPEN allow read, deny write 418 * OPEN allow both, deny none 419 * DOWNGRADE allow read, deny none 469 /* set share deny for a given stateid */ 471 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument 473 unsigned char mask = 1 << deny; in set_deny() 475 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny() 479 /* clear share deny fo 481 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) clear_deny() argument 491 test_deny(u32 deny, struct nfs4_ol_stateid *stp) test_deny() argument 809 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) nfs4_file_check_deny() argument 1409 reset_union_bmap_deny(u32 deny, struct nfs4_ol_stateid *stp) reset_union_bmap_deny() argument 2619 unsigned int access, deny; nfs4_show_open() local 7204 nfs4_set_lock_denied(struct file_lock *fl, struct nfsd4_lock_denied *deny) nfs4_set_lock_denied() argument [all...] |
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | lib.c | 350 accum->deny |= addend->deny; in aa_perms_accum_raw() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 359 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 369 accum->deny |= addend->deny; in aa_perms_accum() 370 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 375 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum() 395 aa_profile_label_perm(struct aa_profile *profile, struct aa_profile *target, u32 request, int type, u32 *deny, struct common_audit_data *sa) aa_profile_label_perm() argument [all...] |
H A D | net.c | 231 if (profile->secmark[i].deny) in aa_secmark_perm() 232 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
H A D | policy_unpack.c | 593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark()
|
H A D | apparmorfs.c | 798 perms.allow, perms.deny, perms.audit, perms.quiet); in query_label() 2358 AA_SFS_FILE_STRING("perms", "allow deny audit quiet"),
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | lib.c | 354 u32 request, int type, u32 *deny, in aa_profile_label_perm() 367 *deny |= request & perms.deny; in aa_profile_label_perm() 385 * error code will indicate whether there was an explicit deny 393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() 353 aa_profile_label_perm(struct aa_profile *profile, struct aa_profile *target, u32 request, int type, u32 *deny, struct apparmor_audit_data *ad) aa_profile_label_perm() argument
|
H A D | net.c | 241 if (rules->secmark[i].deny) in aa_secmark_perm() 242 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
H A D | policy_unpack.c | 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 653 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm() 1193 if (perm->allow & perm->deny) in verify_perm() 1197 if (perm->cond & (perm->allow | perm->deny)) in verify_perm() 1201 if (perm->complain & (perm->allow | perm->deny)) in verify_perm() 1203 if (perm->prompt & (perm->allow | perm->deny)) in verify_perm()
|
H A D | apparmorfs.c | 803 perms.allow, perms.deny, perms.audit, perms.quiet); in query_label() 2378 AA_SFS_FILE_STRING("perms", "allow deny audit quiet"),
|
/kernel/linux/linux-6.6/rust/alloc/ |
H A D | lib.rs | 71 test(no_crate_inject, attr(allow(unused_variables), deny(warnings))) 86 #![deny(unsafe_op_in_unsafe_fn)] 87 #![deny(fuzzy_provenance_casts)]
|
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | perms.h | 70 u32 deny; /* explicit deny, or conflict if allow also set */ member 71 u32 quiet; /* set only when ~allow | deny */ 72 u32 kill; /* set only when ~allow | deny */ 73 u32 stop; /* set only when ~allow | deny */ 75 u32 complain; /* accumulates only used when ~allow & ~deny */ 76 u32 cond; /* set only when ~allow and ~deny */ 78 u32 hide; /* set only when ~allow | deny */ 79 u32 prompt; /* accumulates only used when ~allow & ~deny */ 151 u32 request, int type, u32 *deny, [all...] |
H A D | net.h | 84 u8 deny; member
|
/kernel/linux/linux-5.10/drivers/staging/wlan-ng/ |
H A D | prism2sta.c | 1629 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer() 1630 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer() 1631 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer() 1633 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer() 1634 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
|
H A D | hfa384x.h | 1367 struct prism2sta_accesslist deny; /* Denied station list. */ member
|
/kernel/linux/linux-6.6/drivers/staging/wlan-ng/ |
H A D | prism2sta.c | 1610 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer() 1611 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer() 1612 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer() 1614 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer() 1615 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
|
H A D | hfa384x.h | 1162 struct prism2sta_accesslist deny; /* Denied station list. */ member
|
/kernel/linux/linux-6.6/fs/smb/server/ |
H A D | smbacl.h | 162 u32 deny; member 188 struct posix_ace_state mask; /* deny unused in this case */
|