| /linux/security/selinux/include/ |
| H A D | avc.h | 54 u32 denied; member 67 u32 denied, audited; in avc_audit_required() local 72 denied = requested & ~avd->allowed; in avc_audit_required() 73 if (unlikely(denied)) { in avc_audit_required() 74 audited = denied & avd->auditdeny; in avc_audit_required() 94 audited = denied = requested; in avc_audit_required() 97 *deniedp = denied; in avc_audit_required() 102 u32 denied, int result, struct common_audit_data *a); 127 u32 audited, denied; in avc_audit() local 128 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
| /linux/security/apparmor/ |
| H A D | lib.c | 425 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 427 if (likely(!denied)) { in aa_check_perms() 438 if (denied & perms->kill) in aa_check_perms() 440 else if (denied == (denied & perms->complain)) in aa_check_perms() 445 if (denied == (denied & perms->hide)) in aa_check_perms() 448 denied &= ~perms->quiet; in aa_check_perms() 449 if (!ad || !denied) in aa_check_perms() 456 ad->denied = denied; in aa_check_perms()
|
| H A D | file.c | 57 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 59 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 145 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 486 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 500 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 514 if (denied && !error) { in __file_path_perm() 547 u32 request, u32 denied) in __file_sock_perm() argument 552 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 557 if (denied) { in __file_sock_perm() 625 u32 denied; in aa_file_perm() local [all …]
|
| H A D | ipc.c | 60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 62 audit_signal_mask(ad->denied)); in audit_signal_cb()
|
| H A D | task.c | 215 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 217 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb() 335 if (ad->denied & AA_USERNS_CREATE) in audit_ns_cb()
|
| H A D | net.c | 138 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb() 140 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
|
| H A D | capability.c | 151 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
| /linux/include/trace/events/ |
| H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
| /linux/security/selinux/ |
| H A D | avc.c | 390 u32 denied, audited; in avc_xperms_audit_required() local 392 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 393 if (unlikely(denied)) { in avc_xperms_audit_required() 394 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 400 audited = denied = requested; in avc_xperms_audit_required() 409 *deniedp = denied; in avc_xperms_audit_required() 419 u32 audited, denied; in avc_xperms_audit() local 422 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 426 audited, denied, result, ad); in avc_xperms_audit() 659 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
| /linux/Documentation/ABI/stable/ |
| H A D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 56 Might return "<denied>" in case of special security settings 105 Might return "<denied>" in case of special security settings
|
| /linux/security/landlock/ |
| H A D | domain.c | 204 const access_mask_t denied = masks->access[i] & optional_access; in landlock_get_deny_masks() 205 const unsigned long newly_denied = denied & ~all_denied; in landlock_get_deny_masks() 215 all_denied |= denied; in landlock_get_deny_masks() 202 const access_mask_t denied = masks->access[i] & optional_access; landlock_get_deny_masks() local
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 19 never receive a device access which is denied by its parent. 77 If a device is denied in group A:: 84 group whitelist entries denied devices 97 group whitelist entries denied devices 107 group whitelist entries denied devices
|
| /linux/security/apparmor/include/ |
| H A D | capability.h | 31 kernel_cap_t denied; member
|
| H A D | audit.h | 121 u32 denied; member
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-class-power-wilco | 26 be denied by Wilco EC when Long Life mode is enabled.
|
| H A D | sysfs-hypervisor-xen | 45 Might return "<denied>" in case of special security settings
|
| H A D | sysfs-block-device | 35 access is denied with -EOPNOTSUPP.
|
| /linux/Documentation/userspace-api/gpio/ |
| H A D | error-codes.rst | 55 - Permission denied. Typically returned in response to an attempt
|
| /linux/drivers/isdn/mISDN/ |
| H A D | tei.c | 856 goto denied; in new_tei_req() 858 goto denied; in new_tei_req() 865 goto denied; in new_tei_req() 869 goto denied; in new_tei_req() 873 denied: in new_tei_req()
|
| /linux/Documentation/admin-guide/ |
| H A D | mono.rst | 69 If this fails with a permission denied error, check
|
| /linux/Documentation/userspace-api/media/ |
| H A D | gen-errors.rst | 72 - Permission denied. Can be returned if the device needs write
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 156 output would contain AVC denied records related to perf_event: 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 54 actions and other TCP actions will be denied. 59 to be explicit about the denied-by-default access rights. 152 would then be denied by the ruleset. To add ``/usr`` to the ruleset, we open 577 However, :manpage:`chroot(2)` calls are not denied. 655 File truncation could not be denied before the third Landlock ABI, so it is 672 IOCTL operations could not be denied before the fifth Landlock ABI, so
|
| /linux/Documentation/userspace-api/ioctl/ |
| H A D | hdio.rst | 441 - EACCES Access denied: requires CAP_SYS_RAWIO 510 - EACCES Access denied: requires CAP_SYS_RAWIO 545 - EACCES Access denied: requires CAP_SYS_ADMIN
|
| /linux/Documentation/security/ |
| H A D | SCTP.rst | 217 to determine whether the association should be allowed or denied. 310 the association should be allowed or denied.
|