| /OK3568_Linux_fs/kernel/security/selinux/include/ |
| H A D | avc.h | 53 u32 denied; member 70 u32 denied, audited; in avc_audit_required() local 71 denied = requested & ~avd->allowed; in avc_audit_required() 72 if (unlikely(denied)) { in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 93 audited = denied = requested; in avc_audit_required() 96 *deniedp = denied; in avc_audit_required() 102 u32 requested, u32 audited, u32 denied, int result, 133 u32 audited, denied; in avc_audit() local 134 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | lib.c | 272 if (aad(sa)->denied) { in aa_audit_perms_cb() 274 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 434 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 436 if (likely(!denied)) { in aa_check_perms() 447 if (denied & perms->kill) in aa_check_perms() 449 else if (denied == (denied & perms->complain)) in aa_check_perms() 454 if (denied == (denied & perms->hide)) in aa_check_perms() 457 denied &= ~perms->quiet; in aa_check_perms() 458 if (!sa || !denied) in aa_check_perms() 465 aad(sa)->denied = denied; in aa_check_perms()
|
| H A D | file.c | 53 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 55 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb() 138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 507 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 519 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 532 if (denied && !error) { in __file_path_perm() 562 u32 request, u32 denied) in __file_sock_perm() argument 570 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 575 if (denied) { in __file_sock_perm() 601 u32 denied; in aa_file_perm() local [all …]
|
| H A D | ipc.c | 51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 53 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb() 169 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 171 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb()
|
| H A D | net.c | 94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
|
| H A D | capability.c | 120 !cap_raised(profile->caps.denied, cap)) in profile_capable()
|
| /OK3568_Linux_fs/kernel/include/trace/events/ |
| H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | avc.c | 397 u32 denied, audited; in avc_xperms_audit_required() local 399 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 400 if (unlikely(denied)) { in avc_xperms_audit_required() 401 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 407 audited = denied = requested; in avc_xperms_audit_required() 416 *deniedp = denied; in avc_xperms_audit_required() 427 u32 audited, denied; in avc_xperms_audit() local 430 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 434 audited, denied, result, ad); in avc_xperms_audit() 680 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/keyutils/files/ |
| H A D | keyutils-fix-error-report-by-adding-default-message.patch | 5 "Permission denied" may be the reason of EKEYEXPIRED and EKEYREVOKED. 22 + alt_err="Permission denied" 27 + alt_err="Permission denied"
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/stable/ |
| H A D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 56 Might return "<denied>" in case of special security settings 105 Might return "<denied>" in case of special security settings
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/liblockfile/liblockfile/ |
| H A D | 0001-Makefile.in-add-DESTDIR.patch | 13 | install: cannot create regular file '/usr/lib/nfslock.so.0.1': Permission denied 19 | install: cannot create regular file '/usr/include/lockfile.h': Permission denied 20 | install: cannot create regular file '/usr/include/maillock.h': Permission denied
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/attr/acl/ |
| H A D | 0001-test-patch-out-failing-bits.patch | 29 >~ .*f: Permission denied$ 36 - >~ .*f: Permission denied$ 60 >~ .*f: Permission denied$
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ioctl/ |
| H A D | hdio.rst | 185 - EACCES Access denied: requires CAP_SYS_ADMIN 235 - EACCES Access denied: requires CAP_SYS_ADMIN 359 - EACCES Access denied: requires CAP_SYS_ADMIN 487 - EACCES Access denied: requires CAP_SYS_ADMIN 596 - EACCES Access denied: requires CAP_SYS_ADMIN 622 - EACCES Access denied: requires CAP_SYS_RAWIO 658 - EACCES Access denied: requires CAP_SYS_ADMIN 947 - EACCES Access denied: requires CAP_SYS_RAWIO 1016 - EACCES Access denied: requires CAP_SYS_RAWIO 1059 - EACCES Access denied: requires CAP_SYS_ADMIN [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 19 never receive a device access which is denied by its parent. 77 If a device is denied in group A:: 84 group whitelist entries denied devices 97 group whitelist entries denied devices 107 group whitelist entries denied devices
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/quilt/quilt/ |
| H A D | 0001-tests-Allow-different-output-from-mv.patch | 22 - >~ mv: cannot move [`']?patches/test.diff'? to [`']?patches/test.diff~'?: Permission denied 23 + >~ mv: .*: Permission denied
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/e2fsprogs/e2fsprogs/ |
| H A D | e2fsprogs-fix-missing-check-for-permission-denied.patch | 4 Subject: [PATCH] Fix missing check for permission denied. 6 If the path to "ROOT_SYSCONFDIR/mke2fs.conf" has a permission denied problem,
|
| /OK3568_Linux_fs/buildroot/package/selinux-python/ |
| H A D | Config.in | 27 from logs of denied operations. 30 description of why the access was denied (audit2allow -w)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/wxwidgets/wxwidgets/ |
| H A D | respect-DESTDIR-when-create-link.patch | 4 | CMake Error: failed to create symbolic link '/usr/bin/wx-config': Permission denied 6 | CMake Error: failed to create symbolic link '/usr/bin/wxrc': Permission denied
|
| /OK3568_Linux_fs/kernel/security/apparmor/include/ |
| H A D | capability.h | 31 kernel_cap_t denied; member
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/dbus-1/system.d/ |
| H A D | obexd.conf | 4 <!-- ../system.conf have denied everything, so we just punch some holes -->
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/ |
| H A D | vsftpd.user_list | 6 # for users that are denied.
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/gettext/gettext-0.21/ |
| H A D | 0001-msgmerge-29-Add-executable-file-mode-bits.patch | 9 /bin/bash: line 9: ./msgmerge-29: Permission denied
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
| H A D | man_fromhost.patch | 19 access should be denied.
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/qemu/qemu/ |
| H A D | CVE-2021-3750-3.patch | 60 +#define MEMTX_ACCESS_ERROR (1U << 2) /* access denied */ 89 + * Returns: true if transaction is allowed, false if denied.
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/minicom/minicom/ |
| H A D | 0001-Drop-superfluous-global-variable-definitions.patch | 25 /* Access to ".dialdir" denied? */
|