| /Linux-v6.6/security/selinux/include/ |
| D | avc.h | 53 u32 denied; member 69 u32 denied, audited; in avc_audit_required() local 70 denied = requested & ~avd->allowed; in avc_audit_required() 71 if (unlikely(denied)) { in avc_audit_required() 72 audited = denied & avd->auditdeny; in avc_audit_required() 92 audited = denied = requested; in avc_audit_required() 95 *deniedp = denied; in avc_audit_required() 100 u32 requested, u32 audited, u32 denied, int result, 128 u32 audited, denied; in avc_audit() local 129 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
| /Linux-v6.6/security/apparmor/ |
| D | lib.c | 291 if (aad(sa)->denied) { in aa_audit_perms_cb() 293 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 392 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 394 if (likely(!denied)) { in aa_check_perms() 405 if (denied & perms->kill) in aa_check_perms() 407 else if (denied == (denied & perms->complain)) in aa_check_perms() 412 if (denied == (denied & perms->hide)) in aa_check_perms() 415 denied &= ~perms->quiet; in aa_check_perms() 416 if (!sa || !denied) in aa_check_perms() 423 aad(sa)->denied = denied; in aa_check_perms()
|
| D | file.c | 55 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 57 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb() 140 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 458 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 472 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 485 if (denied && !error) { in __file_path_perm() 515 u32 request, u32 denied) in __file_sock_perm() argument 523 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 528 if (denied) { in __file_sock_perm() 554 u32 denied; in aa_file_perm() local [all …]
|
| D | ipc.c | 59 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 61 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb()
|
| D | task.c | 216 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 218 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb()
|
| D | net.c | 94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
|
| D | capability.c | 124 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
| /Linux-v6.6/include/trace/events/ |
| D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
| /Linux-v6.6/security/selinux/ |
| D | avc.c | 392 u32 denied, audited; in avc_xperms_audit_required() local 394 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 395 if (unlikely(denied)) { in avc_xperms_audit_required() 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 402 audited = denied = requested; in avc_xperms_audit_required() 411 *deniedp = denied; in avc_xperms_audit_required() 421 u32 audited, denied; in avc_xperms_audit() local 424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 428 audited, denied, result, ad); in avc_xperms_audit() 661 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
| /Linux-v6.6/Documentation/ABI/stable/ |
| D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 56 Might return "<denied>" in case of special security settings 105 Might return "<denied>" in case of special security settings
|
| /Linux-v6.6/Documentation/admin-guide/cgroup-v1/ |
| D | devices.rst | 19 never receive a device access which is denied by its parent. 77 If a device is denied in group A:: 84 group whitelist entries denied devices 97 group whitelist entries denied devices 107 group whitelist entries denied devices
|
| /Linux-v6.6/security/apparmor/include/ |
| D | capability.h | 31 kernel_cap_t denied; member
|
| D | audit.h | 116 u32 denied; member
|
| /Linux-v6.6/Documentation/ABI/testing/ |
| D | sysfs-class-power-wilco | 26 be denied by Wilco EC when Long Life mode is enabled.
|
| D | sysfs-hypervisor-xen | 45 Might return "<denied>" in case of special security settings
|
| D | sysfs-block-device | 35 access is denied with -EOPNOTSUPP.
|
| /Linux-v6.6/Documentation/userspace-api/ |
| D | landlock.rst | 41 actions will be denied. The ruleset then needs to handle both of these kind of 44 the need to be explicit about the denied-by-default access rights. 112 denied by the ruleset. To add ``/usr`` to the ruleset, we open it with the 392 :manpage:`pivot_root(2)`. However, :manpage:`chroot(2)` calls are not denied. 448 File truncation could not be denied before the third Landlock ABI, so it is
|
| /Linux-v6.6/Documentation/networking/ |
| D | mptcp-sysctl.rst | 40 accepted or denied.
|
| /Linux-v6.6/Documentation/admin-guide/ |
| D | mono.rst | 69 If this fails with a permission denied error, check
|
| /Linux-v6.6/Documentation/userspace-api/media/ |
| D | gen-errors.rst | 74 - Permission denied. Can be returned if the device needs write
|
| /Linux-v6.6/drivers/isdn/mISDN/ |
| D | tei.c | 856 goto denied; in new_tei_req() 858 goto denied; in new_tei_req() 865 goto denied; in new_tei_req() 869 goto denied; in new_tei_req() 873 denied: in new_tei_req()
|
| /Linux-v6.6/tools/perf/Documentation/ |
| D | security.txt | 156 output would contain AVC denied records related to perf_event: 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco…
|
| /Linux-v6.6/Documentation/userspace-api/ioctl/ |
| D | hdio.rst | 441 - EACCES Access denied: requires CAP_SYS_RAWIO 510 - EACCES Access denied: requires CAP_SYS_RAWIO 545 - EACCES Access denied: requires CAP_SYS_ADMIN
|
| /Linux-v6.6/fs/nfsd/ |
| D | xdr4.h | 177 struct nfsd4_lock_denied denied; member 189 #define lk_denied u.denied
|
| /Linux-v6.6/Documentation/security/ |
| D | SCTP.rst | 217 to determine whether the association should be allowed or denied. 310 the association should be allowed or denied.
|