Searched refs:denied (Results 1 – 25 of 97) sorted by relevance
1234
1 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …2 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …3 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …4 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …5 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …6 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …7 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …8 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …9 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …10 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …[all …]
1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".g…19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gd…21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name="…24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root"…[all …]
1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=244…13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for…18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=…[all …]
11 REPLY SIZE 550 access to this file is very much denied12 REPLY APPE 550 I said: access to this file is very much denied13 REPLY STOR 550 I said: access to this file is very much denied23 FTP resume upload but denied access to remote file
17 FTP resume upload but denied access to local file
26 HTTP/0.9 GET response denied
23 FTP request and denied to download an older file with -z
42 HTTPS with attempted redirect to denied HTTP
6 NAME = 'policy_DefaultNotificationsSetting.denied'14 Verify setting 'DefaultNotificationsSetting' to 'denied' (2) will disable the20 case='denied')
6 NAME = 'policy_DefaultGeolocationSetting.denied'14 Verify setting 'DefaultGeolocationSetting' to 'denied' (2) will disable the20 case='denied')
4 …: rsyslogd[ 12.037795] audit: type=1400 audit(1515564630.515:5): avc: denied { syslog } for p…13 syzkaller login: [ 19.781382] audit: type=1400 audit(1515564638.259:6): avc: denied { map } for…17 [ 26.145521] audit: type=1400 audit(1515564644.623:7): avc: denied { map } for pid=3502 comm="…18 [ 26.226655] audit: type=1400 audit(1515564644.704:8): avc: denied { map } for pid=3502 comm="…
4 [ 29.710797] audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183…12 [ 29.740690] audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for …
16 [ 62.955431] audit: type=1400 audit(1513230272.694:51): avc: denied { setopt } for pid=11219 c…
4 …tion is allowed to do with the type. If your application type is being denied access to a partic…8 Note if the label of the content that is being denied is owned by another domain, you might have to…
4 … SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was…
698 access_vector_t denied, audited; in avc_audit() local700 denied = requested & ~avd->allowed; in avc_audit()701 if (denied) in avc_audit()702 audited = denied & avd->auditdeny; in avc_audit()704 audited = denied = requested; in avc_audit()716 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit()727 if (denied) in avc_audit()757 access_vector_t denied; in avc_has_perm_noaudit() local811 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit()813 if (!requested || denied) { in avc_has_perm_noaudit()
57 …:38 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied58 …:32 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied59 …:26 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied
4 audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183 comm="syzkalle…12 audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for pid=4183 comm="…
1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…12 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-scr…13 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-…15 type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-scr…[all …]
41 function; if the access is denied an :exc:`AttributeError` exception will be46 if *filter* returns false, the access is denied. The default filter denies
25 "Permission denied"
6 Tells curl to limit what protocols it may use on redirect. Protocols denied by
17 permission from the server listening on /dev/jail-request, or is denied