/Linux-v4.19/security/selinux/include/ |
D | avc.h | 53 u32 denied; member 70 u32 denied, audited; in avc_audit_required() local 71 denied = requested & ~avd->allowed; in avc_audit_required() 72 if (unlikely(denied)) { in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 93 audited = denied = requested; in avc_audit_required() 96 *deniedp = denied; in avc_audit_required() 102 u32 requested, u32 audited, u32 denied, int result, 134 u32 audited, denied; in avc_audit() local 135 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
/Linux-v4.19/security/apparmor/ |
D | lib.c | 274 if (aad(sa)->denied) { in aa_audit_perms_cb() 276 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 436 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 438 if (likely(!denied)) { in aa_check_perms() 449 if (denied & perms->kill) in aa_check_perms() 451 else if (denied == (denied & perms->complain)) in aa_check_perms() 456 if (denied == (denied & perms->hide)) in aa_check_perms() 459 denied &= ~perms->quiet; in aa_check_perms() 460 if (!sa || !denied) in aa_check_perms() 467 aad(sa)->denied = denied; in aa_check_perms()
|
D | file.c | 69 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 71 audit_file_mask(ab, aad(sa)->denied); in file_audit_cb() 153 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 514 u32 request, u32 denied) in __file_path_perm() argument 526 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 537 if (denied && !error) { in __file_path_perm() 567 u32 request, u32 denied) in __file_sock_perm() argument 575 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 580 if (denied) { in __file_sock_perm() 605 u32 denied; in aa_file_perm() local [all …]
|
D | ipc.c | 57 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 59 audit_ptrace_mask(ab, aad(sa)->denied); in audit_ptrace_cb() 172 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 174 audit_signal_mask(ab, aad(sa)->denied); in audit_signal_cb()
|
D | net.c | 95 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 97 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
|
D | capability.c | 124 !cap_raised(profile->caps.denied, cap)) in profile_capable()
|
/Linux-v4.19/security/selinux/ |
D | avc.c | 462 u32 denied, audited; in avc_xperms_audit_required() local 464 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 465 if (unlikely(denied)) { in avc_xperms_audit_required() 466 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 472 audited = denied = requested; in avc_xperms_audit_required() 481 *deniedp = denied; in avc_xperms_audit_required() 492 u32 audited, denied; in avc_xperms_audit() local 495 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 499 audited, denied, result, ad, 0); in avc_xperms_audit() 739 ad->selinux_audit_data->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
/Linux-v4.19/Documentation/ABI/stable/ |
D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 53 Might return "<denied>" in case of special security settings 102 Might return "<denied>" in case of special security settings
|
/Linux-v4.19/Documentation/ioctl/ |
D | hdio.txt | 159 EACCES Access denied: requires CAP_SYS_ADMIN 197 EACCES Access denied: requires CAP_SYS_ADMIN 297 EACCES Access denied: requires CAP_SYS_ADMIN 385 EACCES Access denied: requires CAP_SYS_ADMIN 465 EACCES Access denied: requires CAP_SYS_ADMIN 485 EACCES Access denied: requires CAP_SYS_RAWIO 510 EACCES Access denied: requires CAP_SYS_ADMIN 765 EACCES Access denied: requires CAP_SYS_RAWIO 826 EACCES Access denied: requires CAP_SYS_RAWIO 859 EACCES Access denied: requires CAP_SYS_ADMIN [all …]
|
/Linux-v4.19/Documentation/cgroup-v1/ |
D | devices.txt | 16 never receive a device access which is denied by its parent. 70 If a device is denied in group A: 75 group whitelist entries denied devices 87 group whitelist entries denied devices 95 group whitelist entries denied devices
|
/Linux-v4.19/security/apparmor/include/ |
D | capability.h | 35 kernel_cap_t denied; member
|
D | audit.h | 119 u32 denied; member
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | sysfs-hypervisor-xen | 42 Might return "<denied>" in case of special security settings
|
D | sysfs-block-device | 33 access is denied with -EOPNOTSUPP.
|
/Linux-v4.19/Documentation/security/ |
D | SELinux-sctp.rst | 31 to determine whether the association should be allowed or denied. 124 the association should be allowed or denied.
|
/Linux-v4.19/Documentation/media/uapi/ |
D | gen-errors.rst | 74 - Permission denied. Can be returned if the device needs write
|
/Linux-v4.19/Documentation/admin-guide/ |
D | mono.rst | 69 If this fails with a permission denied error, check
|
/Linux-v4.19/drivers/isdn/mISDN/ |
D | tei.c | 865 goto denied; in new_tei_req() 867 goto denied; in new_tei_req() 874 goto denied; in new_tei_req() 878 goto denied; in new_tei_req() 882 denied: in new_tei_req()
|
/Linux-v4.19/fs/nfsd/ |
D | xdr4.h | 182 struct nfsd4_lock_denied denied; member 194 #define lk_denied u.denied
|
/Linux-v4.19/drivers/scsi/cxlflash/ |
D | superpipe.c | 215 goto denied; in get_context() 220 goto denied; in get_context() 226 goto denied; in get_context() 237 denied: in get_context()
|
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | Smack.rst | 482 1. Any access requested by a task labeled "*" is denied. 492 7. Any other access is denied. 621 be denied otherwise. CAP_MAC_ADMIN allows a process to change 828 By default, all denied events will be audited. You can change this behavior by 832 1 : log denied (default) 834 3 : log denied & accepted
|
/Linux-v4.19/Documentation/media/uapi/v4l/ |
D | vidioc-enuminput.rst | 195 - Conditional access denied.
|
/Linux-v4.19/Documentation/ |
D | nommu-mmap.txt | 86 support, then the mapping request will be denied. 105 provide any such support, then the mapping request will be denied.
|
/Linux-v4.19/Documentation/laptops/ |
D | disk-shock-protection.txt | 40 /sys). Access to /sys/block/*/device/unload_heads is denied with
|
/Linux-v4.19/Documentation/devicetree/bindings/powerpc/fsl/ |
D | interlaken-lac.txt | 56 where access to the hypervisor node is to be denied.
|