Home
last modified time | relevance | path

Searched refs:denied (Results 1 – 25 of 47) sorted by relevance

12

/linux/security/selinux/include/
H A Davc.h54 u32 denied; member
67 u32 denied, audited; in avc_audit_required() local
72 denied = requested & ~avd->allowed; in avc_audit_required()
73 if (unlikely(denied)) { in avc_audit_required()
74 audited = denied & avd->auditdeny; in avc_audit_required()
94 audited = denied = requested; in avc_audit_required()
97 *deniedp = denied; in avc_audit_required()
102 u32 denied, int result, struct common_audit_data *a);
127 u32 audited, denied; in avc_audit() local
128 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit()
[all …]
/linux/security/apparmor/
H A Dlib.c423 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
425 if (likely(!denied)) { in aa_check_perms()
436 if (denied & perms->kill) in aa_check_perms()
438 else if (denied == (denied & perms->complain)) in aa_check_perms()
443 if (denied == (denied & perms->hide)) in aa_check_perms()
446 denied &= ~perms->quiet; in aa_check_perms()
447 if (!ad || !denied) in aa_check_perms()
454 ad->denied = denied; in aa_check_perms()
H A Dfile.c57 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
59 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
144 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
481 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument
495 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm()
509 if (denied && !error) { in __file_path_perm()
542 u32 request, u32 denied) in __file_sock_perm() argument
547 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm()
552 if (denied) { in __file_sock_perm()
610 u32 denied; in aa_file_perm() local
[all …]
H A Dipc.c60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb()
62 audit_signal_mask(ad->denied)); in audit_signal_cb()
H A Dtask.c214 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
216 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb()
311 if (ad->denied & AA_USERNS_CREATE) in audit_ns_cb()
H A Dnet.c138 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb()
140 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
H A Dcapability.c151 !cap_raised(rules->caps.denied, cap)) in profile_capable()
/linux/include/trace/events/
H A Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/linux/security/selinux/
H A Davc.c390 u32 denied, audited; in avc_xperms_audit_required() local
392 denied = requested & ~avd->allowed; in avc_xperms_audit_required()
393 if (unlikely(denied)) { in avc_xperms_audit_required()
394 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
400 audited = denied = requested; in avc_xperms_audit_required()
409 *deniedp = denied; in avc_xperms_audit_required()
419 u32 audited, denied; in avc_xperms_audit() local
422 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
426 audited, denied, result, ad); in avc_xperms_audit()
659 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback()
[all …]
/linux/Documentation/ABI/stable/
H A Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
105 Might return "<denied>" in case of special security settings
/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst19 never receive a device access which is denied by its parent.
77 If a device is denied in group A::
84 group whitelist entries denied devices
97 group whitelist entries denied devices
107 group whitelist entries denied devices
/linux/security/apparmor/include/
H A Dcapability.h31 kernel_cap_t denied; member
H A Daudit.h121 u32 denied; member
/linux/Documentation/ABI/testing/
H A Dsysfs-class-power-wilco26 be denied by Wilco EC when Long Life mode is enabled.
H A Dsysfs-hypervisor-xen45 Might return "<denied>" in case of special security settings
H A Dsysfs-block-device35 access is denied with -EOPNOTSUPP.
/linux/Documentation/userspace-api/gpio/
H A Derror-codes.rst55 - Permission denied. Typically returned in response to an attempt
/linux/drivers/isdn/mISDN/
H A Dtei.c856 goto denied; in new_tei_req()
858 goto denied; in new_tei_req()
865 goto denied; in new_tei_req()
869 goto denied; in new_tei_req()
873 denied: in new_tei_req()
/linux/Documentation/admin-guide/
H A Dmono.rst69 If this fails with a permission denied error, check
/linux/Documentation/userspace-api/media/
H A Dgen-errors.rst72 - Permission denied. Can be returned if the device needs write
/linux/Documentation/userspace-api/
H A Dlandlock.rst54 actions and other TCP actions will be denied.
59 to be explicit about the denied-by-default access rights.
147 denied by the ruleset. To add ``/usr`` to the ruleset, we open it with the
480 However, :manpage:`chroot(2)` calls are not denied.
558 File truncation could not be denied before the third Landlock ABI, so it is
575 IOCTL operations could not be denied before the fifth Landlock ABI, so
/linux/tools/perf/Documentation/
H A Dsecurity.txt156 output would contain AVC denied records related to perf_event:
163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
/linux/Documentation/userspace-api/ioctl/
H A Dhdio.rst441 - EACCES Access denied: requires CAP_SYS_RAWIO
510 - EACCES Access denied: requires CAP_SYS_RAWIO
545 - EACCES Access denied: requires CAP_SYS_ADMIN
/linux/Documentation/security/
H A DSCTP.rst217 to determine whether the association should be allowed or denied.
310 the association should be allowed or denied.
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst482 1. Any access requested by a task labeled "*" is denied.
492 7. Any other access is denied.
626 be denied otherwise. CAP_MAC_ADMIN allows a process to change
842 By default, all denied events will be audited. You can change this behavior by
846 1 : log denied (default)
848 3 : log denied & accepted

12