/openbmc/linux/security/selinux/include/ |
H A D | avc.h | 53 u32 denied; member 69 u32 denied, audited; in avc_audit_required() local 70 denied = requested & ~avd->allowed; in avc_audit_required() 71 if (unlikely(denied)) { in avc_audit_required() 72 audited = denied & avd->auditdeny; in avc_audit_required() 78 * actual permissions that were denied. As an example lets in avc_audit_required() 81 * denied == READ in avc_audit_required() 85 * We will NOT audit the denial even though the denied in avc_audit_required() 92 audited = denied = requested; in avc_audit_required() 95 *deniedp = denied; in avc_audit_required() [all …]
|
/openbmc/linux/include/trace/events/ |
H A D | avc.h | 26 __field(u32, denied) 36 __entry->denied = sad->denied; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/openbmc/qemu/tests/qemu-iotests/tests/ |
H A D | fuse-allow-other.out | 26 cat: fuse-export: Permission denied 27 stat: cannot statx 'fuse-export': Permission denied 28 cat: fuse-export: Permission denied 29 stat: cannot statx 'fuse-export': Permission denied 55 cat: fuse-export: Permission denied 82 cat: fuse-export: Permission denied
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 232.out | 24 …FMT,if=none,read-only=off,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied 28 …TEST_DIR/t.IMGFMT,if=none,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied 52 …-name=node0,read-only=off,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied 54 …T_DIR/t.IMGFMT,node-name=node0,read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied 56 …/t.IMGFMT,node-name=node0,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied 58 …e,filename=TEST_DIR/t.IMGFMT,node-name=node0: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
|
H A D | 233.out | 19 qemu-img: Could not open 'driver=nbd,host=127.0.0.1,port=PORT,tls-creds=tls0': Denied by server for… 21 qemu-nbd: Denied by server for option 5 (starttls) 110 qemu-nbd: option negotiation failed: TLS x509 authz check for DISTINGUISHED-NAME is denied 111 qemu-nbd: option negotiation failed: TLS x509 authz check for DISTINGUISHED-NAME is denied
|
/openbmc/linux/security/apparmor/ |
H A D | lib.c | 294 if (ad->denied) { in aa_audit_perms_cb() 296 aa_audit_perm_mask(ab, ad->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 395 if (likely(!denied)) { in aa_check_perms() 406 if (denied & perms->kill) in aa_check_perms() 408 else if (denied == (denied & perms->complain)) in aa_check_perms() 413 if (denied == (denied & perms->hide)) in aa_check_perms() 416 denied &= ~perms->quiet; in aa_check_perms() 417 if (!ad || !denied) in aa_check_perms() 424 ad->denied = denied; in aa_check_perms()
|
H A D | file.c | 56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 126 /* only report permissions that were denied */ in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 280 * Returns: %0 else error if access denied or other error 487 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 501 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 515 if (denied && !error) { in __file_path_perm() 548 u32 request, u32 denied) in __file_sock_perm() argument 556 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() [all …]
|
/openbmc/linux/security/selinux/ |
H A D | avc.c | 392 u32 denied, audited; in avc_xperms_audit_required() local 394 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 395 if (unlikely(denied)) { in avc_xperms_audit_required() 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 402 audited = denied = requested; in avc_xperms_audit_required() 411 *deniedp = denied; in avc_xperms_audit_required() 421 u32 audited, denied; in avc_xperms_audit() local 424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 428 audited, denied, result, ad); in avc_xperms_audit() 661 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
/openbmc/linux/security/apparmor/include/ |
H A D | capability.h | 23 * @denied: caps that are explicitly denied 31 kernel_cap_t denied; member
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/keyutils/files/ |
H A D | keyutils-fix-error-report-by-adding-default-message.patch | 5 "Permission denied" may be the reason of EKEYEXPIRED and EKEYREVOKED. 22 + alt_err="Permission denied" 27 + alt_err="Permission denied"
|
/openbmc/linux/security/landlock/ |
H A D | ptrace.c | 83 * the same rules. Else denied. 86 * granted, -errno if denied. 101 * or more rules. Else denied. 104 * process, returning 0 if permission is granted, -errno if denied.
|
/openbmc/linux/Documentation/ABI/stable/ |
H A D | sysfs-hypervisor-xen | 7 Might return "<denied>" in case of special security settings 16 Might return "<denied>" in case of special security settings 25 Might return "<denied>" in case of special security settings 56 Might return "<denied>" in case of special security settings 105 Might return "<denied>" in case of special security settings
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 19 never receive a device access which is denied by its parent. 77 If a device is denied in group A:: 84 group whitelist entries denied devices 97 group whitelist entries denied devices 107 group whitelist entries denied devices
|
/openbmc/qemu/hw/ufs/ |
H A D | trace-events | 31 ufs_err_query_flag_not_readable(uint8_t idn) "query flag idn 0x%"PRIx8" is denied to read" 32 ufs_err_query_flag_not_writable(uint8_t idn) "query flag idn 0x%"PRIx8" is denied to write" 33 ufs_err_query_attr_not_readable(uint8_t idn) "query attribute idn 0x%"PRIx8" is denied to read" 34 ufs_err_query_attr_not_writable(uint8_t idn) "query attribute idn 0x%"PRIx8" is denied to write"
|
/openbmc/openbmc/poky/meta/recipes-support/attr/acl/ |
H A D | 0001-test-patch-out-failing-bits.patch | 29 >~ .*f: Permission denied$ 36 - >~ .*f: Permission denied$ 60 >~ .*f: Permission denied$
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/liblockfile/liblockfile/ |
H A D | 0001-Makefile.in-add-DESTDIR.patch | 13 | install: cannot create regular file '/usr/lib/nfslock.so.0.1': Permission denied 19 | install: cannot create regular file '/usr/include/lockfile.h': Permission denied 20 | install: cannot create regular file '/usr/include/maillock.h': Permission denied
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | SecurityPolicy.v1_0_2.json |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | SecurityPolicy_v1.xml | 146 <Property Name="Denied" Type="SecurityPolicy.v1_0_0.SPDMParameterSet" Nullable="false"> 223 <Annotation Term="OData.LongDescription" String="This property shall contain the TLS policy settings that are allowed, such as the allowable TLS versions and algorithms. If a value is missing for the same property in the `Allowed` and `Denied` object, the missing value shall behave as if the value is present in the same property under the `Denied` object. If a value conflicts for the same property between the `Allowed` and `Denied` object, the value of the same property in the `Denied` object shall take precedence. A Redfish service can resolve or prevent conflicts at time of request as well."/> 225 <Property Name="Denied" Type="SecurityPolicy.v1_0_0.TLSParameterSet" Nullable="false"> 227 <Annotation Term="OData.LongDescription" String="This property shall contain the TLS policy settings that are prohibited, such as the prohibited TLS versions and algorithms. If a value is missing for the same property in the `Allowed` and `Denied` object, the missing value shall behave as if the value is present in the same property under the `Denied` object. If a value conflicts for the same property between the `Allowed` and `Denied` object, the value of the same property in the `Denied` objec [all...] |
/openbmc/openbmc/poky/meta/recipes-devtools/quilt/quilt/ |
H A D | 0001-tests-Allow-different-output-from-mv.patch | 22 - >~ mv: cannot move [`']?patches/test.diff'? to [`']?patches/test.diff~'?: Permission denied 23 + >~ mv: .*: Permission denied
|
/openbmc/openbmc/poky/meta/recipes-devtools/e2fsprogs/e2fsprogs/ |
H A D | e2fsprogs-fix-missing-check-for-permission-denied.patch | 4 Subject: [PATCH] Fix missing check for permission denied. 6 If the path to "ROOT_SYSCONFDIR/mke2fs.conf" has a permission denied problem,
|
/openbmc/qemu/hw/nvram/ |
H A D | xlnx-versal-efuse-ctrl.c | 446 "%s: Denied setting of efuse<%u, %u, %u>\n", in efuse_pgm_addr_postw() 470 bool denied; in efuse_rd_addr_postw() local 482 bit, &denied); in efuse_rd_addr_postw() 483 if (denied) { in efuse_rd_addr_postw() 487 "%s: Denied reading of efuse<%u, %u>\n", in efuse_rd_addr_postw() 788 uint32_t bit, bool *denied) in type_init() 792 if (!denied) { in type_init() 793 denied = &dummy; in type_init() 797 *denied = true; in type_init() 801 *denied = false; in type_init()
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/ |
H A D | vsftpd.conf | 113 # setting to NO, then users will be denied login unless they are explicitly 114 # listed in the file specified by userlist_file. When login is denied, the 120 # will be denied before they are asked for a password. This may be useful in
|
/openbmc/qemu/include/hw/nvram/ |
H A D | xlnx-versal-efuse.h | 63 * @denied: if non-NULL, to receive true if the row is write-only 67 uint32_t xlnx_versal_efuse_read_row(XlnxEFuse *s, uint32_t bit, bool *denied);
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/ |
H A D | run-ptest | 48 …egrep 'ptrace: Operation not permitted.|procfs:.*Permission denied.|ttrace.*Permission denied.|pro…
|
/openbmc/openbmc/poky/meta/recipes-devtools/dnf/dnf/ |
H A D | 0001-lock.py-fix-Exception-handling.patch | 7 like "Permission denied: '/var/log/log_lock.pid'", and in this case, 13 do chroot like work. so for the threads don't do chroot, "Permission denied"
|