/linux/security/selinux/include/ |
H A D | avc.h | 54 u32 denied; member 67 u32 denied, audited; in avc_audit_required() local 68 denied = requested & ~avd->allowed; in avc_audit_required() 69 if (unlikely(denied)) { in avc_audit_required() 70 audited = denied & avd->auditdeny; in avc_audit_required() 90 audited = denied = requested; in avc_audit_required() 93 *deniedp = denied; in avc_audit_required() 98 u32 denied, int result, struct common_audit_data *a); 123 u32 audited, denied; in avc_audit() local 124 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
/linux/include/trace/events/ |
H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/linux/security/apparmor/ |
H A D | file.c | 56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 474 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 488 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 502 if (denied && !error) { in __file_path_perm() 535 u32 request, u32 denied) in __file_sock_perm() argument 543 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 548 if (denied) { in __file_sock_perm() 577 u32 denied; in aa_file_perm() local [all …]
|
H A D | ipc.c | 60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 62 audit_signal_mask(ad->denied)); in audit_signal_cb()
|
H A D | task.c | 214 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 216 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb() 312 if (ad->denied & AA_USERNS_CREATE) in audit_ns_cb()
|
H A D | net.c | 95 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb() 97 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
|
/linux/security/selinux/ |
H A D | avc.c | 390 u32 denied, audited; in avc_xperms_audit_required() local 392 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 393 if (unlikely(denied)) { in avc_xperms_audit_required() 394 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 400 audited = denied = requested; in avc_xperms_audit_required() 409 *deniedp = denied; in avc_xperms_audit_required() 419 u32 audited, denied; in avc_xperms_audit() local 422 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 426 audited, denied, result, ad); in avc_xperms_audit() 659 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
/linux/Documentation/ABI/stable/ |
H A D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 56 Might return "<denied>" in case of special security settings 105 Might return "<denied>" in case of special security settings
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 19 never receive a device access which is denied by its parent. 77 If a device is denied in group A:: 84 group whitelist entries denied devices 97 group whitelist entries denied devices 107 group whitelist entries denied devices
|
/linux/security/apparmor/include/ |
H A D | capability.h | 31 kernel_cap_t denied; member
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-power-wilco | 26 be denied by Wilco EC when Long Life mode is enabled.
|
H A D | sysfs-hypervisor-xen | 45 Might return "<denied>" in case of special security settings
|
H A D | sysfs-block-device | 35 access is denied with -EOPNOTSUPP.
|
/linux/Documentation/userspace-api/gpio/ |
H A D | error-codes.rst | 55 - Permission denied. Typically returned in response to an attempt
|
/linux/drivers/isdn/mISDN/ |
H A D | tei.c | 856 goto denied; in new_tei_req() 858 goto denied; in new_tei_req() 865 goto denied; in new_tei_req() 869 goto denied; in new_tei_req() 873 denied: in new_tei_req()
|
/linux/Documentation/admin-guide/ |
H A D | mono.rst | 69 If this fails with a permission denied error, check
|
/linux/Documentation/userspace-api/media/ |
H A D | gen-errors.rst | 72 - Permission denied. Can be returned if the device needs write
|
/linux/Documentation/userspace-api/ |
H A D | landlock.rst | 54 actions and other TCP actions will be denied. 59 to be explicit about the denied-by-default access rights. 147 denied by the ruleset. To add ``/usr`` to the ruleset, we open it with the 481 However, :manpage:`chroot(2)` calls are not denied. 559 File truncation could not be denied before the third Landlock ABI, so it is 576 IOCTL operations could not be denied before the fifth Landlock ABI, so
|
/linux/tools/perf/Documentation/ |
H A D | security.txt | 156 output would contain AVC denied records related to perf_event: 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
|
/linux/Documentation/userspace-api/ioctl/ |
H A D | hdio.rst | 441 - EACCES Access denied: requires CAP_SYS_RAWIO 510 - EACCES Access denied: requires CAP_SYS_RAWIO 545 - EACCES Access denied: requires CAP_SYS_ADMIN
|
/linux/Documentation/security/ |
H A D | SCTP.rst | 217 to determine whether the association should be allowed or denied. 310 the association should be allowed or denied.
|
/linux/Documentation/networking/ |
H A D | mptcp-sysctl.rst | 24 accepted or denied.
|
/linux/drivers/scsi/cxlflash/ |
H A D | superpipe.c | 211 goto denied; in get_context() 216 goto denied; in get_context() 222 goto denied; in get_context() 233 denied: in get_context()
|
/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 482 1. Any access requested by a task labeled "*" is denied. 492 7. Any other access is denied. 621 be denied otherwise. CAP_MAC_ADMIN allows a process to change 832 By default, all denied events will be audited. You can change this behavior by 836 1 : log denied (default) 838 3 : log denied & accepted
|
/linux/Documentation/userspace-api/media/v4l/ |
H A D | vidioc-enuminput.rst | 191 - Conditional access denied.
|