Home
last modified time | relevance | path

Searched full:denied (Results 1 – 25 of 421) sorted by relevance

12345678910>>...17

/OK3568_Linux_fs/kernel/security/selinux/include/
H A Davc.h53 u32 denied; member
70 u32 denied, audited; in avc_audit_required() local
71 denied = requested & ~avd->allowed; in avc_audit_required()
72 if (unlikely(denied)) { in avc_audit_required()
73 audited = denied & avd->auditdeny; in avc_audit_required()
79 * actual permissions that were denied. As an example lets in avc_audit_required()
82 * denied == READ in avc_audit_required()
86 * We will NOT audit the denial even though the denied in avc_audit_required()
93 audited = denied = requested; in avc_audit_required()
96 *deniedp = denied; in avc_audit_required()
[all …]
/OK3568_Linux_fs/kernel/include/trace/events/
H A Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/OK3568_Linux_fs/kernel/security/apparmor/
H A Dlib.c272 if (aad(sa)->denied) { in aa_audit_perms_cb()
274 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb()
434 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
436 if (likely(!denied)) { in aa_check_perms()
447 if (denied & perms->kill) in aa_check_perms()
449 else if (denied == (denied & perms->complain)) in aa_check_perms()
454 if (denied == (denied & perms->hide)) in aa_check_perms()
457 denied &= ~perms->quiet; in aa_check_perms()
458 if (!sa || !denied) in aa_check_perms()
465 aad(sa)->denied = denied; in aa_check_perms()
H A Dfile.c53 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
55 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb()
121 /* only report permissions that were denied */ in aa_audit_file()
138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file()
311 * Returns: %0 else error if access denied or other error
507 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument
519 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm()
532 if (denied && !error) { in __file_path_perm()
562 u32 request, u32 denied) in __file_sock_perm() argument
570 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm()
[all …]
H A Dipc.c51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
53 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb()
116 * Returns: %0 else error code if permission denied or error
169 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb()
171 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb()
/OK3568_Linux_fs/kernel/security/selinux/
H A Davc.c397 u32 denied, audited; in avc_xperms_audit_required() local
399 denied = requested & ~avd->allowed; in avc_xperms_audit_required()
400 if (unlikely(denied)) { in avc_xperms_audit_required()
401 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
407 audited = denied = requested; in avc_xperms_audit_required()
416 *deniedp = denied; in avc_xperms_audit_required()
427 u32 audited, denied; in avc_xperms_audit() local
430 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
434 audited, denied, result, ad); in avc_xperms_audit()
680 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback()
[all …]
/OK3568_Linux_fs/kernel/Documentation/userspace-api/ioctl/
H A Dhdio.rst185 - EACCES Access denied: requires CAP_SYS_ADMIN
235 - EACCES Access denied: requires CAP_SYS_ADMIN
359 - EACCES Access denied: requires CAP_SYS_ADMIN
487 - EACCES Access denied: requires CAP_SYS_ADMIN
596 - EACCES Access denied: requires CAP_SYS_ADMIN
622 - EACCES Access denied: requires CAP_SYS_RAWIO
658 - EACCES Access denied: requires CAP_SYS_ADMIN
947 - EACCES Access denied: requires CAP_SYS_RAWIO
1016 - EACCES Access denied: requires CAP_SYS_RAWIO
1059 - EACCES Access denied: requires CAP_SYS_ADMIN
[all …]
/OK3568_Linux_fs/kernel/Documentation/ABI/stable/
H A Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
105 Might return "<denied>" in case of special security settings
/OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst19 never receive a device access which is denied by its parent.
77 If a device is denied in group A::
84 group whitelist entries denied devices
97 group whitelist entries denied devices
107 group whitelist entries denied devices
/OK3568_Linux_fs/kernel/security/apparmor/include/
H A Dcapability.h23 * @denied: caps that are explicitly denied
31 kernel_cap_t denied; member
H A Daudit.h27 AUDIT_QUIET_DENIED, /* quiet all denied access messages */
115 u32 denied; member
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/keyutils/files/
H A Dkeyutils-fix-error-report-by-adding-default-message.patch5 "Permission denied" may be the reason of EKEYEXPIRED and EKEYREVOKED.
22 + alt_err="Permission denied"
27 + alt_err="Permission denied"
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/attr/acl/
H A D0001-test-patch-out-failing-bits.patch29 >~ .*f: Permission denied$
36 - >~ .*f: Permission denied$
60 >~ .*f: Permission denied$
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/liblockfile/liblockfile/
H A D0001-Makefile.in-add-DESTDIR.patch13 | install: cannot create regular file '/usr/lib/nfslock.so.0.1': Permission denied
19 | install: cannot create regular file '/usr/include/lockfile.h': Permission denied
20 | install: cannot create regular file '/usr/include/maillock.h': Permission denied
/OK3568_Linux_fs/buildroot/package/selinux-python/
H A DConfig.in27 from logs of denied operations.
30 description of why the access was denied (audit2allow -w)
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/quilt/quilt/
H A D0001-tests-Allow-different-output-from-mv.patch22 - >~ mv: cannot move [`']?patches/test.diff'? to [`']?patches/test.diff~'?: Permission denied
23 + >~ mv: .*: Permission denied
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/e2fsprogs/e2fsprogs/
H A De2fsprogs-fix-missing-check-for-permission-denied.patch4 Subject: [PATCH] Fix missing check for permission denied.
6 If the path to "ROOT_SYSCONFDIR/mke2fs.conf" has a permission denied problem,
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/
H A Dvsftpd.conf113 # setting to NO, then users will be denied login unless they are explicitly
114 # listed in the file specified by userlist_file. When login is denied, the
120 # will be denied before they are asked for a password. This may be useful in
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/
H A Drun-ptest33 …egrep 'ptrace: Operation not permitted.|procfs:.*Permission denied.|ttrace.*Permission denied.|pro…
/OK3568_Linux_fs/external/xserver/Xext/
H A Dsecurity.c691 * An audit message is generated if access is denied.
710 SecurityAudit("Security denied client %d keyboard access on request " in SecurityDevice()
779 SecurityAudit("Security: denied client %d access %lx to resource 0x%lx " in SecurityResource()
802 SecurityAudit("Security: denied client %d access to extension " in SecurityExtension()
821 SecurityAudit("Security: denied client %d access to server " in SecurityServer()
840 SecurityAudit("Security: denied client %d access to client %d on " in SecurityClient()
860 SecurityAudit("Security: denied client %d access to property %s " in SecurityProperty()
889 SecurityAudit("Security: denied client %d from sending event " in SecuritySend()
913 SecurityAudit("Security: denied client %d from receiving an event " in SecurityReceive()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/wxwidgets/wxwidgets/
H A Drespect-DESTDIR-when-create-link.patch4 | CMake Error: failed to create symbolic link '/usr/bin/wx-config': Permission denied
6 | CMake Error: failed to create symbolic link '/usr/bin/wxrc': Permission denied
/OK3568_Linux_fs/buildroot/package/softether/
H A D0005-change-GetExeDir-to-GetStateDir-in-Cedar-and-Mayaqua.patch12 Denied: c
15 …type=1400 audit: apparmor="DENIED" operation="mkdir" profile="/usr/sbin/softetherd" name="/usr/sbi…
/OK3568_Linux_fs/kernel/security/
H A Dcommoncap.c109 * information, returning 0 if permission granted, -ve if denied.
128 * Else denied.
131 * granted, -ve if denied.
165 * Else denied.
168 * process, returning 0 if permission is granted, -ve if denied.
931 * permission is granted, -ve if denied.
964 * permission is granted, -ve if denied.
1127 * specified task, returning 0 if permission is granted, -ve if denied.
1140 * task, returning 0 if permission is granted, -ve if denied.
1153 * specified task, returning 0 if permission is granted, -ve if denied.
/OK3568_Linux_fs/kernel/arch/um/os-Linux/
H A Dexecvp.c92 /* Record the we got a `Permission denied' error. If we end in execvp_noalloc()
94 that we did find one but were denied access. */ in execvp_noalloc()
/OK3568_Linux_fs/u-boot/arch/arm/include/asm/mach-imx/
H A Dhab.h47 HAB_INV_ADDRESS = 0x22, /* Invalid address: access denied */
54 HAB_INV_INDEX = 0x0f, /* Invalid index: access denied */

12345678910>>...17