Home
last modified time | relevance | path

Searched refs:denied (Results 1 – 25 of 95) sorted by relevance

1234

/openbmc/linux/security/selinux/include/
H A Davc.h53 u32 denied; member
69 u32 denied, audited; in avc_audit_required() local
70 denied = requested & ~avd->allowed; in avc_audit_required()
71 if (unlikely(denied)) { in avc_audit_required()
72 audited = denied & avd->auditdeny; in avc_audit_required()
92 audited = denied = requested; in avc_audit_required()
95 *deniedp = denied; in avc_audit_required()
100 u32 requested, u32 audited, u32 denied, int result,
128 u32 audited, denied; in avc_audit() local
129 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit()
[all …]
/openbmc/linux/security/apparmor/
H A Dlib.c294 if (ad->denied) { in aa_audit_perms_cb()
296 aa_audit_perm_mask(ab, ad->denied, aa_file_perm_chrs, in aa_audit_perms_cb()
393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local
395 if (likely(!denied)) { in aa_check_perms()
406 if (denied & perms->kill) in aa_check_perms()
408 else if (denied == (denied & perms->complain)) in aa_check_perms()
413 if (denied == (denied & perms->hide)) in aa_check_perms()
416 denied &= ~perms->quiet; in aa_check_perms()
417 if (!ad || !denied) in aa_check_perms()
424 ad->denied = denied; in aa_check_perms()
H A Dfile.c56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
143 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
487 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument
515 if (denied && !error) { in __file_path_perm()
548 u32 request, u32 denied) in __file_sock_perm() argument
561 if (denied) { in __file_sock_perm()
590 u32 denied; in aa_file_perm() local
609 denied = request & ~fctx->allow; in aa_file_perm()
622 request, denied, in_atomic); in aa_file_perm()
[all …]
H A Dipc.c60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb()
62 audit_signal_mask(ad->denied)); in audit_signal_cb()
H A Dtask.c217 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb()
219 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb()
H A Dnet.c95 if (ad->denied & NET_PERMS_MASK) { in audit_net_cb()
97 aa_audit_perm_mask(ab, ad->denied, NULL, 0, in audit_net_cb()
/openbmc/linux/include/trace/events/
H A Davc.h26 __field(u32, denied)
36 __entry->denied = sad->denied;
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/openbmc/qemu/tests/qemu-iotests/tests/
H A Dfuse-allow-other.out26 cat: fuse-export: Permission denied
27 stat: cannot statx 'fuse-export': Permission denied
28 cat: fuse-export: Permission denied
29 stat: cannot statx 'fuse-export': Permission denied
55 cat: fuse-export: Permission denied
82 cat: fuse-export: Permission denied
/openbmc/linux/security/selinux/
H A Davc.c392 u32 denied, audited; in avc_xperms_audit_required() local
411 *deniedp = denied; in avc_xperms_audit_required()
421 u32 audited, denied; in avc_xperms_audit() local
722 if (sad->denied) in avc_audit_post_callback()
776 sad.denied = denied; in slow_avc_audit()
1023 u32 denied; in avc_has_extended_perms() local
1081 if (unlikely(denied)) in avc_has_extended_perms()
1111 u32 denied; in avc_perm_nonode() local
1116 if (unlikely(denied)) in avc_perm_nonode()
1147 u32 denied; in avc_has_perm_noaudit() local
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D232.out24 …FMT,if=none,read-only=off,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
28 …TEST_DIR/t.IMGFMT,if=none,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
52 …-name=node0,read-only=off,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
54 …T_DIR/t.IMGFMT,node-name=node0,read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
56 …/t.IMGFMT,node-name=node0,auto-read-only=off: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
58 …e,filename=TEST_DIR/t.IMGFMT,node-name=node0: Could not open 'TEST_DIR/t.IMGFMT': Permission denied
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/keyutils/files/
H A Dkeyutils-fix-error-report-by-adding-default-message.patch5 "Permission denied" may be the reason of EKEYEXPIRED and EKEYREVOKED.
22 + alt_err="Permission denied"
27 + alt_err="Permission denied"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/liblockfile/liblockfile/
H A D0001-Makefile.in-add-DESTDIR.patch13 | install: cannot create regular file '/usr/lib/nfslock.so.0.1': Permission denied
19 | install: cannot create regular file '/usr/include/lockfile.h': Permission denied
20 | install: cannot create regular file '/usr/include/maillock.h': Permission denied
/openbmc/openbmc/poky/meta/recipes-support/attr/acl/
H A D0001-test-patch-out-failing-bits.patch29 >~ .*f: Permission denied$
36 - >~ .*f: Permission denied$
60 >~ .*f: Permission denied$
/openbmc/qemu/hw/ufs/
H A Dtrace-events26 ufs_err_query_flag_not_readable(uint8_t idn) "query flag idn 0x%"PRIx8" is denied to read"
27 ufs_err_query_flag_not_writable(uint8_t idn) "query flag idn 0x%"PRIx8" is denied to write"
28 ufs_err_query_attr_not_readable(uint8_t idn) "query attribute idn 0x%"PRIx8" is denied to read"
29 ufs_err_query_attr_not_writable(uint8_t idn) "query attribute idn 0x%"PRIx8" is denied to write"
/openbmc/linux/Documentation/ABI/stable/
H A Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
105 Might return "<denied>" in case of special security settings
/openbmc/openbmc/poky/meta/recipes-devtools/quilt/quilt/
H A D0001-tests-Allow-different-output-from-mv.patch22 - >~ mv: cannot move [`']?patches/test.diff'? to [`']?patches/test.diff~'?: Permission denied
23 + >~ mv: .*: Permission denied
/openbmc/openbmc/poky/meta/recipes-devtools/e2fsprogs/e2fsprogs/
H A De2fsprogs-fix-missing-check-for-permission-denied.patch4 Subject: [PATCH] Fix missing check for permission denied.
6 If the path to "ROOT_SYSCONFDIR/mke2fs.conf" has a permission denied problem,
/openbmc/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst19 never receive a device access which is denied by its parent.
77 If a device is denied in group A::
84 group whitelist entries denied devices
97 group whitelist entries denied devices
107 group whitelist entries denied devices
/openbmc/qemu/hw/nvram/
H A Dxlnx-versal-efuse-ctrl.c470 bool denied; in efuse_rd_addr_postw() local
482 bit, &denied); in efuse_rd_addr_postw()
483 if (denied) { in efuse_rd_addr_postw()
788 uint32_t bit, bool *denied) in type_init()
792 if (!denied) { in type_init()
793 denied = &dummy; in type_init()
797 *denied = true; in type_init()
801 *denied = false; in type_init()
/openbmc/linux/security/apparmor/include/
H A Dcapability.h31 kernel_cap_t denied; member
/openbmc/openbmc/poky/meta/recipes-devtools/dnf/dnf/
H A D0001-lock.py-fix-Exception-handling.patch7 like "Permission denied: '/var/log/log_lock.pid'", and in this case,
13 do chroot like work. so for the threads don't do chroot, "Permission denied"
/openbmc/qemu/include/hw/nvram/
H A Dxlnx-versal-efuse.h66 uint32_t xlnx_versal_efuse_read_row(XlnxEFuse *s, uint32_t bit, bool *denied);
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/
H A Dvsftpd.user_list6 # for users that are denied.
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/
H A Dman_fromhost.patch19 access should be denied.
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-power-wilco26 be denied by Wilco EC when Long Life mode is enabled.

1234