Searched refs:denied (Results 1 – 25 of 97) sorted by relevance
1234
1 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …2 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …3 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …4 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …5 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …6 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …7 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …8 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …9 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …10 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …[all …]
1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".g…19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gd…21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name="…24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root"…[all …]
1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=244…13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for…18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=…[all …]
11 REPLY SIZE 550 access to this file is very much denied12 REPLY APPE 550 I said: access to this file is very much denied13 REPLY STOR 550 I said: access to this file is very much denied23 FTP resume upload but denied access to remote file
17 FTP resume upload but denied access to local file
23 FTP request and denied to download an older file with -z
26 HTTP/0.9 GET response denied
42 HTTPS with attempted redirect to denied HTTP
6 NAME = 'policy_DefaultNotificationsSetting.denied'14 Verify setting 'DefaultNotificationsSetting' to 'denied' (2) will disable the20 case='denied')
6 NAME = 'policy_DefaultGeolocationSetting.denied'14 Verify setting 'DefaultGeolocationSetting' to 'denied' (2) will disable the20 case='denied')
4 …: rsyslogd[ 12.037795] audit: type=1400 audit(1515564630.515:5): avc: denied { syslog } for p…13 syzkaller login: [ 19.781382] audit: type=1400 audit(1515564638.259:6): avc: denied { map } for…17 [ 26.145521] audit: type=1400 audit(1515564644.623:7): avc: denied { map } for pid=3502 comm="…18 [ 26.226655] audit: type=1400 audit(1515564644.704:8): avc: denied { map } for pid=3502 comm="…
4 [ 29.710797] audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183…12 [ 29.740690] audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for …
16 [ 62.955431] audit: type=1400 audit(1513230272.694:51): avc: denied { setopt } for pid=11219 c…
4 …tion is allowed to do with the type. If your application type is being denied access to a partic…8 Note if the label of the content that is being denied is owned by another domain, you might have to…
4 … SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was…
698 access_vector_t denied, audited; in avc_audit() local700 denied = requested & ~avd->allowed; in avc_audit()701 if (denied) in avc_audit()702 audited = denied & avd->auditdeny; in avc_audit()704 audited = denied = requested; in avc_audit()716 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit()727 if (denied) in avc_audit()757 access_vector_t denied; in avc_has_perm_noaudit() local811 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit()813 if (!requested || denied) { in avc_has_perm_noaudit()
57 …:38 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied58 …:32 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied59 …:26 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied
4 audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183 comm="syzkalle…12 audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for pid=4183 comm="…
1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…12 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-scr…13 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-…15 type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-scr…[all …]
41 function; if the access is denied an :exc:`AttributeError` exception will be46 if *filter* returns false, the access is denied. The default filter denies
25 "Permission denied"
6 Tells curl to limit what protocols it may use on redirect. Protocols denied by
17 permission from the server listening on /dev/jail-request, or is denied