| /linux/security/selinux/include/ |
| H A D | avc.h | 54 u32 denied; member 67 u32 denied, audited; in avc_audit_required() local 72 denied = requested & ~avd->allowed; in avc_audit_required() 73 if (unlikely(denied)) { in avc_audit_required() 74 audited = denied & avd->auditdeny; in avc_audit_required() 94 audited = denied = requested; in avc_audit_required() 97 *deniedp = denied; in avc_audit_required() 102 u32 denied, int result, struct common_audit_data *a); 127 u32 audited, denied; in avc_audit() local 128 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
| /linux/security/apparmor/ |
| H A D | lib.c | 423 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 425 if (likely(!denied)) { in aa_check_perms() 436 if (denied & perms->kill) in aa_check_perms() 438 else if (denied == (denied & perms->complain)) in aa_check_perms() 443 if (denied == (denied & perms->hide)) in aa_check_perms() 446 denied &= ~perms->quiet; in aa_check_perms() 447 if (!ad || !denied) in aa_check_perms() 454 ad->denied = denied; in aa_check_perms()
|
| H A D | file.c | 57 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 59 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 144 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 481 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 495 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 509 if (denied && !error) { in __file_path_perm() 542 u32 request, u32 denied) in __file_sock_perm() argument 547 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 552 if (denied) { in __file_sock_perm() 610 u32 denied; in aa_file_perm() local [all …]
|
| H A D | ipc.c | 60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 62 audit_signal_mask(ad->denied)); in audit_signal_cb()
|
| H A D | task.c | 214 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 216 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb() 311 if (ad->denied & AA_USERNS_CREATE) in audit_ns_cb()
|
| H A D | net.c | 138 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb() 140 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
|
| H A D | capability.c | 151 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
| /linux/include/trace/events/ |
| H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
| /linux/security/selinux/ |
| H A D | avc.c | 390 u32 denied, audited; in avc_xperms_audit_required() local 392 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 393 if (unlikely(denied)) { in avc_xperms_audit_required() 394 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 400 audited = denied = requested; in avc_xperms_audit_required() 409 *deniedp = denied; in avc_xperms_audit_required() 419 u32 audited, denied; in avc_xperms_audit() local 422 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 426 audited, denied, result, ad); in avc_xperms_audit() 659 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
| /linux/Documentation/ABI/stable/ |
| H A D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 56 Might return "<denied>" in case of special security settings 105 Might return "<denied>" in case of special security settings
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 19 never receive a device access which is denied by its parent. 77 If a device is denied in group A:: 84 group whitelist entries denied devices 97 group whitelist entries denied devices 107 group whitelist entries denied devices
|
| /linux/security/apparmor/include/ |
| H A D | capability.h | 31 kernel_cap_t denied; member
|
| H A D | audit.h | 121 u32 denied; member
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-class-power-wilco | 26 be denied by Wilco EC when Long Life mode is enabled.
|
| H A D | sysfs-hypervisor-xen | 45 Might return "<denied>" in case of special security settings
|
| H A D | sysfs-block-device | 35 access is denied with -EOPNOTSUPP.
|
| /linux/Documentation/userspace-api/gpio/ |
| H A D | error-codes.rst | 55 - Permission denied. Typically returned in response to an attempt
|
| /linux/drivers/isdn/mISDN/ |
| H A D | tei.c | 856 goto denied; in new_tei_req() 858 goto denied; in new_tei_req() 865 goto denied; in new_tei_req() 869 goto denied; in new_tei_req() 873 denied: in new_tei_req()
|
| /linux/Documentation/admin-guide/ |
| H A D | mono.rst | 69 If this fails with a permission denied error, check
|
| /linux/Documentation/userspace-api/media/ |
| H A D | gen-errors.rst | 72 - Permission denied. Can be returned if the device needs write
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 54 actions and other TCP actions will be denied. 59 to be explicit about the denied-by-default access rights. 147 denied by the ruleset. To add ``/usr`` to the ruleset, we open it with the 480 However, :manpage:`chroot(2)` calls are not denied. 558 File truncation could not be denied before the third Landlock ABI, so it is 575 IOCTL operations could not be denied before the fifth Landlock ABI, so
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 156 output would contain AVC denied records related to perf_event: 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
|
| /linux/Documentation/userspace-api/ioctl/ |
| H A D | hdio.rst | 441 - EACCES Access denied: requires CAP_SYS_RAWIO 510 - EACCES Access denied: requires CAP_SYS_RAWIO 545 - EACCES Access denied: requires CAP_SYS_ADMIN
|
| /linux/Documentation/security/ |
| H A D | SCTP.rst | 217 to determine whether the association should be allowed or denied. 310 the association should be allowed or denied.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 482 1. Any access requested by a task labeled "*" is denied. 492 7. Any other access is denied. 626 be denied otherwise. CAP_MAC_ADMIN allows a process to change 842 By default, all denied events will be audited. You can change this behavior by 846 1 : log denied (default) 848 3 : log denied & accepted
|