/linux-master/security/selinux/include/ |
H A D | avc.h | 54 u32 denied; member in struct:selinux_audit_data 67 u32 denied, audited; local 68 denied = requested & ~avd->allowed; 69 if (unlikely(denied)) { 70 audited = denied & avd->auditdeny; 76 * actual permissions that were denied. As an example lets 79 * denied == READ 83 * We will NOT audit the denial even though the denied 90 audited = denied = requested; 93 *deniedp = denied; 123 u32 audited, denied; local [all...] |
/linux-master/include/trace/events/ |
H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/linux-master/security/apparmor/include/ |
H A D | capability.h | 23 * @denied: caps that are explicitly denied 31 kernel_cap_t denied; member in struct:aa_caps
|
H A D | audit.h | 27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */ 121 u32 denied; member in struct:apparmor_audit_data
|
/linux-master/security/apparmor/ |
H A D | lib.c | 294 if (ad->denied) { 296 aa_audit_perm_mask(ab, ad->denied, aa_file_perm_chrs, 393 u32 denied = request & (~perms->allow | perms->deny); local 395 if (likely(!denied)) { 406 if (denied & perms->kill) 408 else if (denied == (denied & perms->complain)) 413 if (denied == (denied & perms->hide)) 416 denied [all...] |
H A D | file.c | 56 if (ad->denied & AA_AUDIT_FILE_MASK) { 58 map_mask_to_chr_mask(ad->denied)); 126 /* only report permissions that were denied */ 143 ad.denied = ad.request & ~perms->allow; 280 * Returns: %0 else error if access denied or other error 487 u32 request, u32 denied, bool in_atomic) 501 if (!denied && aa_label_is_subset(flabel, label)) 515 if (denied && !error) { 548 u32 request, u32 denied) 556 if (!denied 484 __file_path_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied, bool in_atomic) argument 545 __file_sock_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, struct aa_label *flabel, struct file *file, u32 request, u32 denied) argument 590 u32 denied; local [all...] |
H A D | ipc.c | 60 if (ad->denied & AA_SIGNAL_PERM_MASK) { 62 audit_signal_mask(ad->denied));
|
H A D | task.c | 214 if (ad->denied & AA_PTRACE_PERM_MASK) { 216 audit_ptrace_mask(ad->denied)); 287 * Returns: %0 else error code if permission denied or error 312 if (ad->denied & AA_USERNS_CREATE) 313 audit_log_format(ab, " denied=\"userns_create\"");
|
H A D | capability.c | 124 !cap_raised(rules->caps.denied, cap))
|
H A D | net.c | 95 if (ad->denied & NET_PERMS_MASK) { 97 aa_audit_perm_mask(ab, ad->denied, NULL, 0,
|
H A D | lsm.c | 217 * Returns: %0 else error code if error or permission denied 240 * Returns: %0 else error code if error or permission denied 265 * Returns: %0 else error code if error or permission denied 283 * Returns: %0 else error code if error or permission denied 310 * Returns: %0 else error code if error or permission denied 612 if (ad->denied & AA_URING_PERM_MASK) { 613 audit_log_format(ab, " denied=\"%s\"", 614 audit_uring_mask(ad->denied));
|
/linux-master/security/selinux/ |
H A D | avc.c | 392 u32 denied, audited; local 394 denied = requested & ~avd->allowed; 395 if (unlikely(denied)) { 396 audited = denied & avd->auditdeny; 402 audited = denied = requested; 411 *deniedp = denied; 421 u32 audited, denied; local 424 requested, avd, xpd, perm, result, &denied); 428 audited, denied, result, ad); 661 audit_log_format(ab, "avc: %s ", sad->denied 756 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) argument 1023 u32 denied; local 1111 u32 denied; local 1147 u32 denied; local [all...] |
H A D | hooks.c | 2286 * nosuid: Permission denied to file. 3082 u32 perms, u32 audited, u32 denied, 3092 audited, denied, result, &ad); 3105 u32 audited, denied; local 3128 &denied); 3132 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); 3081 audit_inode_permission(struct inode *inode, u32 perms, u32 audited, u32 denied, int result) argument
|
/linux-master/drivers/isdn/mISDN/ |
H A D | tei.c | 542 tm->tei_m.printdebug(fi, "identity denied ri %d tei %d", 856 goto denied; 858 goto denied; 865 goto denied; 869 goto denied; 873 denied:
|
/linux-master/drivers/scsi/cxlflash/ |
H A D | superpipe.c | 211 goto denied; 216 goto denied; 222 goto denied; 233 denied:
|
/linux-master/fs/nfsd/ |
H A D | export.c | 1092 goto denied; 1119 denied:
|
/linux-master/include/linux/ |
H A D | nfs_xdr.h | 600 struct file_lock * denied; /* LOCK, LOCKT failed */ member in struct:nfs_lockt_res
|
/linux-master/fs/nfs/ |
H A D | nfs4xdr.c | 5093 return decode_lock_denied(xdr, res->denied);
|
H A D | nfs4proc.c | 2504 * because ACCESS will return permission denied for 6777 .denied = request,
|