Home
last modified time | relevance | path

Searched full:denied (Results 1 – 25 of 351) sorted by relevance

12345678910>>...15

/openbmc/linux/security/selinux/include/
H A Davc.h53 u32 denied; member
69 u32 denied, audited; in avc_audit_required() local
70 denied = requested & ~avd->allowed; in avc_audit_required()
71 if (unlikely(denied)) { in avc_audit_required()
72 audited = denied & avd->auditdeny; in avc_audit_required()
78 * actual permissions that were denied. As an example lets in avc_audit_required()
81 * denied == READ in avc_audit_required()
85 * We will NOT audit the denial even though the denied in avc_audit_required()
92 audited = denied = requested; in avc_audit_required()
95 *deniedp = denied; in avc_audit_required()
[all …]
/openbmc/linux/include/trace/events/
H A Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s",
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/openbmc/qemu/tests/qemu-iotests/tests/
H A Dfuse-allow-other.out26 cat: fuse-export: Permission denied
27 stat: cannot statx 'fuse-export': Permission denied
28 cat: fuse-export: Permission denied
29 stat: cannot statx 'fuse-export': Permission denied
55 cat: fuse-export: Permission denied
82 cat: fuse-export: Permission denied
/openbmc/qemu/tests/qemu-iotests/
H A D232.out24 …FMT,if=none,read-only=off,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
28 …TEST_DIR/t.IMGFMT,if=none,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
52 …-name=node0,read-only=off,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
54 …T_DIR/t.IMGFMT,node-name=node0,read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
56 …/t.IMGFMT,node-name=node0,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
58 …e,filename=TEST_DIR/t.IMGFMT,node-name=node0: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
H A D233.out19 qemu-img: Could not open 'driver=nbd,host=127.0.0.1,port=PORT,tls-creds=tls0': Denied by server for…
21 qemu-nbd: Denied by server for option 5 (starttls)
110 qemu-nbd: option negotiation failed: TLS x509 authz check for DISTINGUISHED-NAME is denied
111 qemu-nbd: option negotiation failed: TLS x509 authz check for DISTINGUISHED-NAME is denied
/openbmc/linux/security/apparmor/
H A Dlib.c294 if (ad->denied) { in aa_audit_perms_cb()
296 aa_audit_perm_mask(ab, ad->denied, aa_file_perm_chrs, in aa_audit_perms_cb()
393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
395 if (likely(!denied)) { in aa_check_perms()
406 if (denied & perms->kill) in aa_check_perms()
408 else if (denied == (denied & perms->complain)) in aa_check_perms()
413 if (denied == (denied & perms->hide)) in aa_check_perms()
416 denied &= ~perms->quiet; in aa_check_perms()
417 if (!ad || !denied) in aa_check_perms()
424 ad->denied = denied; in aa_check_perms()
H A Dfile.c56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
126 /* only report permissions that were denied */ in aa_audit_file()
143 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
280 * Returns: %0 else error if access denied or other error
487 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument
501 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm()
515 if (denied && !error) { in __file_path_perm()
548 u32 request, u32 denied) in __file_sock_perm() argument
556 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm()
[all …]
/openbmc/linux/security/selinux/
H A Davc.c392 u32 denied, audited; in avc_xperms_audit_required() local
394 denied = requested & ~avd->allowed; in avc_xperms_audit_required()
395 if (unlikely(denied)) { in avc_xperms_audit_required()
396 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
402 audited = denied = requested; in avc_xperms_audit_required()
411 *deniedp = denied; in avc_xperms_audit_required()
421 u32 audited, denied; in avc_xperms_audit() local
424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit()
428 audited, denied, result, ad); in avc_xperms_audit()
661 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback()
[all …]
/openbmc/linux/security/apparmor/include/
H A Dcapability.h23 * @denied: caps that are explicitly denied
31 kernel_cap_t denied; member
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/keyutils/files/
H A Dkeyutils-fix-error-report-by-adding-default-message.patch5 "Permission denied" may be the reason of EKEYEXPIRED and EKEYREVOKED.
22 + alt_err="Permission denied"
27 + alt_err="Permission denied"
/openbmc/linux/security/landlock/
H A Dptrace.c83 * the same rules. Else denied.
86 * granted, -errno if denied.
101 * or more rules. Else denied.
104 * process, returning 0 if permission is granted, -errno if denied.
/openbmc/linux/Documentation/ABI/stable/
H A Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
105 Might return "<denied>" in case of special security settings
/openbmc/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst19 never receive a device access which is denied by its parent.
77 If a device is denied in group A::
84 group whitelist entries denied devices
97 group whitelist entries denied devices
107 group whitelist entries denied devices
/openbmc/qemu/hw/ufs/
H A Dtrace-events31 ufs_err_query_flag_not_readable(uint8_t idn) "query flag idn 0x%"PRIx8" is denied to read"
32 ufs_err_query_flag_not_writable(uint8_t idn) "query flag idn 0x%"PRIx8" is denied to write"
33 ufs_err_query_attr_not_readable(uint8_t idn) "query attribute idn 0x%"PRIx8" is denied to read"
34 ufs_err_query_attr_not_writable(uint8_t idn) "query attribute idn 0x%"PRIx8" is denied to write"
/openbmc/openbmc/poky/meta/recipes-support/attr/acl/
H A D0001-test-patch-out-failing-bits.patch29 >~ .*f: Permission denied$
36 - >~ .*f: Permission denied$
60 >~ .*f: Permission denied$
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/liblockfile/liblockfile/
H A D0001-Makefile.in-add-DESTDIR.patch13 | install: cannot create regular file '/usr/lib/nfslock.so.0.1': Permission denied
19 | install: cannot create regular file '/usr/include/lockfile.h': Permission denied
20 | install: cannot create regular file '/usr/include/maillock.h': Permission denied
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DSecurityPolicy.v1_0_2.json
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DSecurityPolicy_v1.xml146 <Property Name="Denied" Type="SecurityPolicy.v1_0_0.SPDMParameterSet" Nullable="false">
223 <Annotation Term="OData.LongDescription" String="This property shall contain the TLS policy settings that are allowed, such as the allowable TLS versions and algorithms. If a value is missing for the same property in the `Allowed` and `Denied` object, the missing value shall behave as if the value is present in the same property under the `Denied` object. If a value conflicts for the same property between the `Allowed` and `Denied` object, the value of the same property in the `Denied` object shall take precedence. A Redfish service can resolve or prevent conflicts at time of request as well."/>
225 <Property Name="Denied" Type="SecurityPolicy.v1_0_0.TLSParameterSet" Nullable="false">
227 <Annotation Term="OData.LongDescription" String="This property shall contain the TLS policy settings that are prohibited, such as the prohibited TLS versions and algorithms. If a value is missing for the same property in the `Allowed` and `Denied` object, the missing value shall behave as if the value is present in the same property under the `Denied` object. If a value conflicts for the same property between the `Allowed` and `Denied` object, the value of the same property in the `Denied` objec
[all...]
/openbmc/openbmc/poky/meta/recipes-devtools/quilt/quilt/
H A D0001-tests-Allow-different-output-from-mv.patch22 - >~ mv: cannot move [`']?patches/test.diff'? to [`']?patches/test.diff~'?: Permission denied
23 + >~ mv: .*: Permission denied
/openbmc/openbmc/poky/meta/recipes-devtools/e2fsprogs/e2fsprogs/
H A De2fsprogs-fix-missing-check-for-permission-denied.patch4 Subject: [PATCH] Fix missing check for permission denied.
6 If the path to "ROOT_SYSCONFDIR/mke2fs.conf" has a permission denied problem,
/openbmc/qemu/hw/nvram/
H A Dxlnx-versal-efuse-ctrl.c446 "%s: Denied setting of efuse<%u, %u, %u>\n", in efuse_pgm_addr_postw()
470 bool denied; in efuse_rd_addr_postw() local
482 bit, &denied); in efuse_rd_addr_postw()
483 if (denied) { in efuse_rd_addr_postw()
487 "%s: Denied reading of efuse<%u, %u>\n", in efuse_rd_addr_postw()
788 uint32_t bit, bool *denied) in type_init()
792 if (!denied) { in type_init()
793 denied = &dummy; in type_init()
797 *denied = true; in type_init()
801 *denied = false; in type_init()
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/
H A Dvsftpd.conf113 # setting to NO, then users will be denied login unless they are explicitly
114 # listed in the file specified by userlist_file. When login is denied, the
120 # will be denied before they are asked for a password. This may be useful in
/openbmc/qemu/include/hw/nvram/
H A Dxlnx-versal-efuse.h63 * @denied: if non-NULL, to receive true if the row is write-only
67 uint32_t xlnx_versal_efuse_read_row(XlnxEFuse *s, uint32_t bit, bool *denied);
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Drun-ptest48 …egrep 'ptrace: Operation not permitted.|procfs:.*Permission denied.|ttrace.*Permission denied.|pro…
/openbmc/openbmc/poky/meta/recipes-devtools/dnf/dnf/
H A D0001-lock.py-fix-Exception-handling.patch7 like "Permission denied: '/var/log/log_lock.pid'", and in this case,
13 do chroot like work. so for the threads don't do chroot, "Permission denied"

12345678910>>...15