/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | avc.h | 53 u32 denied; member 70 u32 denied, audited; in avc_audit_required() local 71 denied = requested & ~avd->allowed; in avc_audit_required() 72 if (unlikely(denied)) { in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 79 * actual permissions that were denied. As an example lets in avc_audit_required() 82 * denied == READ in avc_audit_required() 86 * We will NOT audit the denial even though the denied in avc_audit_required() 93 audited = denied = requested; in avc_audit_required() 96 *deniedp = denied; in avc_audit_required() 133 u32 audited, denied; avc_audit() local [all...] |
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc.h | 53 u32 denied; member 69 u32 denied, audited; in avc_audit_required() local 70 denied = requested & ~avd->allowed; in avc_audit_required() 71 if (unlikely(denied)) { in avc_audit_required() 72 audited = denied & avd->auditdeny; in avc_audit_required() 78 * actual permissions that were denied. As an example lets in avc_audit_required() 81 * denied == READ in avc_audit_required() 85 * We will NOT audit the denial even though the denied in avc_audit_required() 92 audited = denied = requested; in avc_audit_required() 95 *deniedp = denied; in avc_audit_required() 128 u32 audited, denied; avc_audit() local [all...] |
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | lib.c | 294 if (ad->denied) { in aa_audit_perms_cb() 296 aa_audit_perm_mask(ab, ad->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 395 if (likely(!denied)) { in aa_check_perms() 406 if (denied & perms->kill) in aa_check_perms() 408 else if (denied == (denied & perms->complain)) in aa_check_perms() 413 if (denied == (denied & perms->hide)) in aa_check_perms() 416 denied in aa_check_perms() [all...] |
H A D | file.c | 56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 126 /* only report permissions that were denied */ in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 280 * Returns: %0 else error if access denied or other error 487 u32 request, u32 denied, bool in_atomic) in __file_path_perm() 501 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 515 if (denied && !error) { in __file_path_perm() 548 u32 request, u32 denied) in __file_sock_perm() 556 if (!denied in __file_sock_perm() 484 __file_path_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied, bool in_atomic) __file_path_perm() argument 545 __file_sock_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied) __file_sock_perm() argument 590 u32 denied; aa_file_perm() local [all...] |
H A D | ipc.c | 60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 62 audit_signal_mask(ad->denied)); in audit_signal_cb()
|
H A D | net.c | 95 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb() 97 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
|
H A D | task.c | 217 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 219 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb() 288 * Returns: %0 else error code if permission denied or error
|
H A D | capability.c | 124 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
/kernel/linux/linux-5.10/include/trace/events/ |
H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | lib.c | 272 if (aad(sa)->denied) { in aa_audit_perms_cb() 274 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 434 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 436 if (likely(!denied)) { in aa_check_perms() 447 if (denied & perms->kill) in aa_check_perms() 449 else if (denied == (denied & perms->complain)) in aa_check_perms() 454 if (denied == (denied & perms->hide)) in aa_check_perms() 457 denied in aa_check_perms() [all...] |
H A D | file.c | 53 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 55 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb() 121 /* only report permissions that were denied */ in aa_audit_file() 138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 311 * Returns: %0 else error if access denied or other error 507 u32 request, u32 denied, bool in_atomic) in __file_path_perm() 519 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 532 if (denied && !error) { in __file_path_perm() 562 u32 request, u32 denied) in __file_sock_perm() 570 if (!denied in __file_sock_perm() 505 __file_path_perm(const char *op, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied, bool in_atomic) __file_path_perm() argument 560 __file_sock_perm(const char *op, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied) __file_sock_perm() argument 601 u32 denied; aa_file_perm() local [all...] |
H A D | ipc.c | 51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 53 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb() 116 * Returns: %0 else error code if permission denied or error 169 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 171 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb()
|
H A D | net.c | 94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
|
H A D | capability.c | 120 !cap_raised(profile->caps.denied, cap)) in profile_capable()
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 392 u32 denied, audited; in avc_xperms_audit_required() local 394 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 395 if (unlikely(denied)) { in avc_xperms_audit_required() 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 402 audited = denied = requested; in avc_xperms_audit_required() 411 *deniedp = denied; in avc_xperms_audit_required() 421 u32 audited, denied; in avc_xperms_audit() local 424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 428 audited, denied, result, ad); in avc_xperms_audit() 661 audit_log_format(ab, "avc: %s ", sad->denied in avc_audit_pre_callback() 756 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument 1023 u32 denied; avc_has_extended_perms() local 1111 u32 denied; avc_perm_nonode() local 1147 u32 denied; avc_has_perm_noaudit() local [all...] |
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 394 u32 denied, audited; in avc_xperms_audit_required() local 396 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 397 if (unlikely(denied)) { in avc_xperms_audit_required() 398 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 404 audited = denied = requested; in avc_xperms_audit_required() 413 *deniedp = denied; in avc_xperms_audit_required() 424 u32 audited, denied; in avc_xperms_audit() local 427 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 431 audited, denied, result, ad); in avc_xperms_audit() 672 audit_log_format(ab, "avc: %s ", sad->denied in avc_audit_pre_callback() 763 slow_avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument 1046 u32 denied; avc_has_extended_perms() local 1146 u32 denied; avc_has_perm_noaudit() local [all...] |
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | capability.h | 23 * @denied: caps that are explicitly denied 31 kernel_cap_t denied; member
|
H A D | audit.h | 27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */ 115 u32 denied; member
|
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | capability.h | 23 * @denied: caps that are explicitly denied 31 kernel_cap_t denied; member
|
H A D | audit.h | 27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */ 117 u32 denied; member
|
/kernel/linux/linux-5.10/fs/nfsd/ |
H A D | xdr4.h | 182 struct nfsd4_lock_denied denied; member 194 #define lk_denied u.denied
|
/kernel/linux/linux-6.6/fs/nfsd/ |
H A D | xdr4.h | 177 struct nfsd4_lock_denied denied; member 189 #define lk_denied u.denied
|
/kernel/linux/linux-5.10/drivers/isdn/mISDN/ |
H A D | tei.c | 542 tm->tei_m.printdebug(fi, "identity denied ri %d tei %d", in tei_id_denied() 856 goto denied; in new_tei_req() 858 goto denied; in new_tei_req() 865 goto denied; in new_tei_req() 869 goto denied; in new_tei_req() 873 denied: in new_tei_req()
|
/kernel/linux/linux-6.6/drivers/isdn/mISDN/ |
H A D | tei.c | 542 tm->tei_m.printdebug(fi, "identity denied ri %d tei %d", in tei_id_denied() 856 goto denied; in new_tei_req() 858 goto denied; in new_tei_req() 865 goto denied; in new_tei_req() 869 goto denied; in new_tei_req() 873 denied: in new_tei_req()
|