Home
last modified time | relevance | path

Searched full:denied (Results 1 – 25 of 236) sorted by relevance

12345678910

/linux-6.14.4/security/selinux/include/
Davc.h54 u32 denied; member
67 u32 denied, audited; in avc_audit_required() local
68 denied = requested & ~avd->allowed; in avc_audit_required()
69 if (unlikely(denied)) { in avc_audit_required()
70 audited = denied & avd->auditdeny; in avc_audit_required()
76 * actual permissions that were denied. As an example lets in avc_audit_required()
79 * denied == READ in avc_audit_required()
83 * We will NOT audit the denial even though the denied in avc_audit_required()
90 audited = denied = requested; in avc_audit_required()
93 *deniedp = denied; in avc_audit_required()
[all …]
/linux-6.14.4/include/trace/events/
Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/linux-6.14.4/security/apparmor/
Dlib.c309 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
311 if (likely(!denied)) { in aa_check_perms()
322 if (denied & perms->kill) in aa_check_perms()
324 else if (denied == (denied & perms->complain)) in aa_check_perms()
329 if (denied == (denied & perms->hide)) in aa_check_perms()
332 denied &= ~perms->quiet; in aa_check_perms()
333 if (!ad || !denied) in aa_check_perms()
340 ad->denied = denied; in aa_check_perms()
Dfile.c56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
126 /* only report permissions that were denied */ in aa_audit_file()
143 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
267 * Returns: %0 else error if access denied or other error
474 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument
488 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm()
502 if (denied && !error) { in __file_path_perm()
535 u32 request, u32 denied) in __file_sock_perm() argument
543 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm()
[all …]
Dtask.c214 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
216 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb()
287 * Returns: %0 else error code if permission denied or error
312 if (ad->denied & AA_USERNS_CREATE) in audit_ns_cb()
313 audit_log_format(ab, " denied=\"userns_create\""); in audit_ns_cb()
Dipc.c60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb()
62 audit_signal_mask(ad->denied)); in audit_signal_cb()
Dnet.c95 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb()
97 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
/linux-6.14.4/security/selinux/
Davc.c390 u32 denied, audited; in avc_xperms_audit_required() local
392 denied = requested & ~avd->allowed; in avc_xperms_audit_required()
393 if (unlikely(denied)) { in avc_xperms_audit_required()
394 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
400 audited = denied = requested; in avc_xperms_audit_required()
409 *deniedp = denied; in avc_xperms_audit_required()
419 u32 audited, denied; in avc_xperms_audit() local
422 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
426 audited, denied, result, ad); in avc_xperms_audit()
659 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback()
[all …]
/linux-6.14.4/security/apparmor/include/
Dcapability.h23 * @denied: caps that are explicitly denied
31 kernel_cap_t denied; member
Daudit.h27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */
121 u32 denied; member
/linux-6.14.4/Documentation/ABI/stable/
Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
105 Might return "<denied>" in case of special security settings
/linux-6.14.4/Documentation/admin-guide/cgroup-v1/
Ddevices.rst19 never receive a device access which is denied by its parent.
77 If a device is denied in group A::
84 group whitelist entries denied devices
97 group whitelist entries denied devices
107 group whitelist entries denied devices
/linux-6.14.4/security/landlock/
Daccess.h21 * All access rights that are denied by default whether they are handled or not
63 /* Upgrades with all initially denied by default access rights. */
68 * All access rights that are denied by default whether they are in landlock_upgrade_handled_access_masks()
Dtask.c87 * the same rules. Else denied.
90 * granted, -errno if denied.
105 * or more rules. Else denied.
108 * process, returning 0 if permission is granted, -errno if denied.
/linux-6.14.4/tools/testing/selftests/exec/
Dcheck-exec-tests.sh155 # Direct execution of non-executable script is alwayse denied by the kernel.
165 # With only denied interactive commands: check or monitor script content (e.g. with LSM).
175 # Direct execution of non-executable script is alwayse denied by the kernel.
185 # With both file restriction and denied interactive commands: only allow executable scripts.
195 # Direct execution of non-executable script is alwayse denied by the kernel.
/linux-6.14.4/tools/testing/selftests/kvm/arm64/
Dsmccc_filter.c10 * - Test that the filter actions (DENIED, FWD_TO_USER) work as intended.
70 * Enable in-kernel emulation of PSCI to ensure that calls are denied in setup_vm()
187 /* Denied SMCCC calls have a return code of SMCCC_RET_NOT_SUPPORTED */
/linux-6.14.4/include/uapi/linux/
Dlandlock.h20 * different object types, which should be denied by default when the ruleset is
22 * not going to be denied by this ruleset when it is enacted.
24 * For historical reasons, the %LANDLOCK_ACCESS_FS_REFER right is always denied
191 * This is the only access right which is denied by default by any ruleset,
/linux-6.14.4/include/linux/bus/
Dstm32_firewall_device.h64 * Returns 0 if access is granted, -EACCES if access is denied, -ENODEV if firewall is null or
93 * Returns 0 if access is granted, -EACCES if access is denied, -ENODEV if firewall is null or
/linux-6.14.4/arch/um/os-Linux/
Dexecvp.c92 /* Record the we got a `Permission denied' error. If we end in execvp_noalloc()
94 that we did find one but were denied access. */ in execvp_noalloc()
/linux-6.14.4/security/
Dcommoncap.c139 * information, returning 0 if permission granted, -ve if denied.
158 * Else denied.
161 * granted, -ve if denied.
195 * Else denied.
198 * process, returning 0 if permission is granted, -ve if denied.
1013 * permission is granted, -ve if denied.
1048 * permission is granted, -ve if denied.
1222 * Return: 0 if permission is granted, -ve if denied.
1237 * Return: 0 if permission is granted, -ve if denied.
1252 * Return: 0 if permission is granted, -ve if denied.
/linux-6.14.4/tools/testing/selftests/landlock/
Dfs_test.c540 /* Tests with denied-by-default access right. */ in TEST_F_FORK()
1286 * denied. in TEST_F_FORK()
1325 /* Checks read access is now denied with layer 7. */ in TEST_F_FORK()
1427 * now denied because the new rule mask the rule previously inherited in TEST_F_FORK()
1463 /* Readdir access is denied for dir_s1d2. */ in TEST_F_FORK()
1478 /* Readdir access is still denied for dir_s1d2. */ in TEST_F_FORK()
1631 /* Checks denied access (on a directory). */ in TEST_F_FORK()
1651 /* Checks denied access (on a directory). */ in TEST_F_FORK()
2060 /* Checks before file1_s1d1 being denied. */ in TEST_F_FORK()
2450 * renames and links are denied, thus making the layer handling in refer_denied_by_default()
[all …]
/linux-6.14.4/Documentation/userspace-api/
Dlandlock.rst54 actions and other TCP actions will be denied.
59 to be explicit about the denied-by-default access rights.
147 denied by the ruleset. To add ``/usr`` to the ruleset, we open it with the
481 However, :manpage:`chroot(2)` calls are not denied.
559 File truncation could not be denied before the third Landlock ABI, so it is
576 IOCTL operations could not be denied before the fifth Landlock ABI, so
/linux-6.14.4/samples/check-exec/
Dinc.c161 * Other kind of interactive interpretations should be denied in main()
169 "ERROR: Interactive interpretation denied.\n"); in main()
/linux-6.14.4/include/linux/
Dmemfd.h11 * Check for any existing seals on mmap, return an error if access is denied due
/linux-6.14.4/tools/testing/selftests/damon/
D_chk_dependency.sh49 echo "Permission for reading $DBGFS/$f denied; maybe secureboot enabled?"

12345678910