Home
last modified time | relevance | path

Searched refs:denied (Results 1 - 25 of 36) sorted by relevance

12

/kernel/linux/linux-5.10/security/selinux/include/
H A Davc.h53 u32 denied; member
70 u32 denied, audited; in avc_audit_required() local
71 denied = requested & ~avd->allowed; in avc_audit_required()
72 if (unlikely(denied)) { in avc_audit_required()
73 audited = denied & avd->auditdeny; in avc_audit_required()
79 * actual permissions that were denied. As an example lets in avc_audit_required()
82 * denied == READ in avc_audit_required()
86 * We will NOT audit the denial even though the denied in avc_audit_required()
93 audited = denied = requested; in avc_audit_required()
96 *deniedp = denied; in avc_audit_required()
133 u32 audited, denied; avc_audit() local
[all...]
/kernel/linux/linux-6.6/security/selinux/include/
H A Davc.h53 u32 denied; member
69 u32 denied, audited; in avc_audit_required() local
70 denied = requested & ~avd->allowed; in avc_audit_required()
71 if (unlikely(denied)) { in avc_audit_required()
72 audited = denied & avd->auditdeny; in avc_audit_required()
78 * actual permissions that were denied. As an example lets in avc_audit_required()
81 * denied == READ in avc_audit_required()
85 * We will NOT audit the denial even though the denied in avc_audit_required()
92 audited = denied = requested; in avc_audit_required()
95 *deniedp = denied; in avc_audit_required()
128 u32 audited, denied; avc_audit() local
[all...]
/kernel/linux/linux-6.6/security/apparmor/
H A Dlib.c294 if (ad->denied) { in aa_audit_perms_cb()
296 aa_audit_perm_mask(ab, ad->denied, aa_file_perm_chrs, in aa_audit_perms_cb()
393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
395 if (likely(!denied)) { in aa_check_perms()
406 if (denied & perms->kill) in aa_check_perms()
408 else if (denied == (denied & perms->complain)) in aa_check_perms()
413 if (denied == (denied & perms->hide)) in aa_check_perms()
416 denied in aa_check_perms()
[all...]
H A Dfile.c56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
126 /* only report permissions that were denied */ in aa_audit_file()
143 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
280 * Returns: %0 else error if access denied or other error
487 u32 request, u32 denied, bool in_atomic) in __file_path_perm()
501 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm()
515 if (denied && !error) { in __file_path_perm()
548 u32 request, u32 denied) in __file_sock_perm()
556 if (!denied in __file_sock_perm()
484 __file_path_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied, bool in_atomic) __file_path_perm() argument
545 __file_sock_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied) __file_sock_perm() argument
590 u32 denied; aa_file_perm() local
[all...]
H A Dipc.c60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb()
62 audit_signal_mask(ad->denied)); in audit_signal_cb()
H A Dnet.c95 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb()
97 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
H A Dtask.c217 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
219 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb()
288 * Returns: %0 else error code if permission denied or error
H A Dcapability.c124 !cap_raised(rules->caps.denied, cap)) in profile_capable()
/kernel/linux/linux-5.10/include/trace/events/
H A Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/kernel/linux/linux-6.6/include/trace/events/
H A Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/kernel/linux/linux-5.10/security/apparmor/
H A Dlib.c272 if (aad(sa)->denied) { in aa_audit_perms_cb()
274 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb()
434 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
436 if (likely(!denied)) { in aa_check_perms()
447 if (denied & perms->kill) in aa_check_perms()
449 else if (denied == (denied & perms->complain)) in aa_check_perms()
454 if (denied == (denied & perms->hide)) in aa_check_perms()
457 denied in aa_check_perms()
[all...]
H A Dfile.c53 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
55 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb()
121 /* only report permissions that were denied */ in aa_audit_file()
138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file()
311 * Returns: %0 else error if access denied or other error
507 u32 request, u32 denied, bool in_atomic) in __file_path_perm()
519 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm()
532 if (denied && !error) { in __file_path_perm()
562 u32 request, u32 denied) in __file_sock_perm()
570 if (!denied in __file_sock_perm()
505 __file_path_perm(const char *op, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied, bool in_atomic) __file_path_perm() argument
560 __file_sock_perm(const char *op, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied) __file_sock_perm() argument
601 u32 denied; aa_file_perm() local
[all...]
H A Dipc.c51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
53 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb()
116 * Returns: %0 else error code if permission denied or error
169 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb()
171 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb()
H A Dnet.c94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb()
96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
H A Dcapability.c120 !cap_raised(profile->caps.denied, cap)) in profile_capable()
/kernel/linux/linux-6.6/security/selinux/
H A Davc.c392 u32 denied, audited; in avc_xperms_audit_required() local
394 denied = requested & ~avd->allowed; in avc_xperms_audit_required()
395 if (unlikely(denied)) { in avc_xperms_audit_required()
396 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
402 audited = denied = requested; in avc_xperms_audit_required()
411 *deniedp = denied; in avc_xperms_audit_required()
421 u32 audited, denied; in avc_xperms_audit() local
424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
428 audited, denied, result, ad); in avc_xperms_audit()
661 audit_log_format(ab, "avc: %s ", sad->denied in avc_audit_pre_callback()
756 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument
1023 u32 denied; avc_has_extended_perms() local
1111 u32 denied; avc_perm_nonode() local
1147 u32 denied; avc_has_perm_noaudit() local
[all...]
/kernel/linux/linux-5.10/security/selinux/
H A Davc.c394 u32 denied, audited; in avc_xperms_audit_required() local
396 denied = requested & ~avd->allowed; in avc_xperms_audit_required()
397 if (unlikely(denied)) { in avc_xperms_audit_required()
398 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
404 audited = denied = requested; in avc_xperms_audit_required()
413 *deniedp = denied; in avc_xperms_audit_required()
424 u32 audited, denied; in avc_xperms_audit() local
427 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
431 audited, denied, result, ad); in avc_xperms_audit()
672 audit_log_format(ab, "avc: %s ", sad->denied in avc_audit_pre_callback()
763 slow_avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument
1046 u32 denied; avc_has_extended_perms() local
1146 u32 denied; avc_has_perm_noaudit() local
[all...]
/kernel/linux/linux-5.10/security/apparmor/include/
H A Dcapability.h23 * @denied: caps that are explicitly denied
31 kernel_cap_t denied; member
H A Daudit.h27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */
115 u32 denied; member
/kernel/linux/linux-6.6/security/apparmor/include/
H A Dcapability.h23 * @denied: caps that are explicitly denied
31 kernel_cap_t denied; member
H A Daudit.h27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */
117 u32 denied; member
/kernel/linux/linux-5.10/fs/nfsd/
H A Dxdr4.h182 struct nfsd4_lock_denied denied; member
194 #define lk_denied u.denied
/kernel/linux/linux-6.6/fs/nfsd/
H A Dxdr4.h177 struct nfsd4_lock_denied denied; member
189 #define lk_denied u.denied
/kernel/linux/linux-5.10/drivers/isdn/mISDN/
H A Dtei.c542 tm->tei_m.printdebug(fi, "identity denied ri %d tei %d", in tei_id_denied()
856 goto denied; in new_tei_req()
858 goto denied; in new_tei_req()
865 goto denied; in new_tei_req()
869 goto denied; in new_tei_req()
873 denied: in new_tei_req()
/kernel/linux/linux-6.6/drivers/isdn/mISDN/
H A Dtei.c542 tm->tei_m.printdebug(fi, "identity denied ri %d tei %d", in tei_id_denied()
856 goto denied; in new_tei_req()
858 goto denied; in new_tei_req()
865 goto denied; in new_tei_req()
869 goto denied; in new_tei_req()
873 denied: in new_tei_req()

Completed in 19 milliseconds

12