/external/selinux/libselinux/man/man3/ |
avc_has_perm.3 | 111 If requested permissions are granted, zero is returned. If requested permissions are denied or an error occured, \-1 is returned and 117 unchanged even if permissions were denied. 124 A requested permission was denied.
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignerTest.java | 49 public Permissions denied = new Permissions(); field in class:SignerTest.MySecurityManager 51 if (denied!=null && denied.implies(permission)) throw new SecurityException();
|
/packages/apps/Exchange/src/com/android/exchange/adapter/ |
SettingsParser.java | 28 * time. parse() returns true in the normal case; false if access to the account is denied due 52 // Access denied = 3; others should never be seen
|
/cts/tests/tests/netsecpolicy/usescleartexttraffic-false/ |
AndroidManifest.xml | 29 android:label="Tests for NetworkSecurityPolicy cleartext traffic policy when it is set to denied.">
|
/developers/build/prebuilts/gradle/PermissionRequest/Application/src/main/assets/ |
sample.js | 42 console.error('Error starting camera. Denied.');
|
/developers/samples/android/content/webview/PermissionRequest/Application/src/main/assets/ |
sample.js | 42 console.error('Error starting camera. Denied.');
|
/device/moto/shamu/sepolicy/ |
mpdecision.te | 27 # <12>[ 39.917299] type=1400 audit(1409704476.019:90): avc: denied { write } for pid=328 comm="mpdecision" name="scaling_min_freq" dev="sysfs" ino=13165 scontext=u:r:mpdecision:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
|
/external/e2fsprogs/debian/ |
uuid-dev.README.Debian | 16 purity shouldn't be denied to Ubuntu users.
|
/external/kernel-headers/original/uapi/asm-generic/ |
errno-base.h | 16 #define EACCES 13 /* Permission denied */
|
/external/libxml2/win32/wince/ |
wincecompat.c | 14 "Exec format error","Bad file number","","","Not enough core","Permission denied","","",
|
/external/selinux/policycoreutils/audit2allow/ |
test.log | 2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lock pid=10581 scontext=system_u:system_r:postfix_local_t:s0 tclass=file tcontext=system_u:object_r:mail_spool_t:s0 5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=13944 comm="automount" name="auto.net" dev=dm-0 ino=16483485 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:automount_lock_t:s0 tclass=file 7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket 9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="smbd" src=81 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket 11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=24427 comm="vsftpd" name="home" dev=dm-0 ino=9338881 scontext=system_u:system_r:ftpd_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir 13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket 16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for pid=23768 comm="httpd" name="index.html" dev=dm-0 ino=7996439 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file 18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:mysqld_port_t:s0 tclass=tcp_socket 20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket 23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=23770 comm="httpd" name="cgi-bin" dev=dm-0 ino=7995597 scontext=system_u:sys (…) [all...] |
/external/selinux/policycoreutils/semanage/ |
semanage-dontaudit.8 | 11 confined applications to use alternative paths. Dontaudit rules are denied but not reported in the logs. Some times dontaudit rules can cause bugs in applications but policy writers will not relize it since the AVC is not audited. Turning off dontaudit rules with this command to see if the kernel is blocking an access.
|
/frameworks/base/media/mca/filterfw/java/android/filterfw/core/ |
ProgramPort.java | 55 "Access to program field '" + mField.getName() + "' was denied!");
|
/hardware/qcom/display/msm8960/libqservice/ |
IQService.cpp | 99 ALOGE("display.qservice SECURING access denied: \ 111 ALOGE("display.qservice UNSECURING access denied: \ 124 ALOGE("display.qservice CONNECT access denied: \ 137 ALOGE("display.qservice SCREEN_REFRESH access denied: \
|
/hardware/qcom/display/msm8974/libqservice/ |
IQService.cpp | 99 ALOGE("display.qservice SECURING access denied: \ 111 ALOGE("display.qservice UNSECURING access denied: \ 124 ALOGE("display.qservice CONNECT access denied: \ 137 ALOGE("display.qservice SCREEN_REFRESH access denied: \
|
/packages/apps/Bluetooth/tests/src/com/android/bluetooth/tests/ |
SapSocketTest.java | 102 Validate you do not get a permission denied IOException. 105 type=1400 audit(1404244298.582:25): avc: denied { write } 127 * Validate you do not get a permission denied IOException. 130 * audit(1404244298.582:25): avc: denied { write } for pid=2421
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/asm-generic/ |
errno-base.h | 16 #define EACCES 13 /* Permission denied */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/asm-generic/ |
errno-base.h | 16 #define EACCES 13 /* Permission denied */
|
/packages/apps/PhoneCommon/res/values/ |
strings.xml | 97 <!-- In-call screen: call failure reason (call denied because of current FDN setting) --> 99 <!-- In-call screen: call failure reason (call denied because call barring is on) --> 101 <!-- In-call screen: call failure reason (call denied because domain specific access control is on) --> 103 <!-- In-call screen: call failure reason (Emergency call denied because domain specific access control is on)--> 105 <!-- In-call screen: call failure reason (Normal call denied because domain specific access control is on)-->
|
/external/lldb/test/pexpect-2.4/examples/ |
passmass.py | 33 i = child.expect (['Permission denied', TERMINAL_PROMPT, COMMAND_PROMPT]) 35 print 'Permission denied on host:', host
|
/external/selinux/policycoreutils/sandbox/ |
test_sandbox.py | 7 self.assert_('Permission denied' in err, 8 '"Permission denied" not found in %r' % err)
|
/external/selinux/policycoreutils/sepolicy/ |
test_sepolicy.py | 7 self.assert_('Permission denied' in err, 8 '"Permission denied" not found in %r' % err)
|
/frameworks/wilhelm/src/android/ |
CallbackProtector.cpp | 73 SL_LOGV("Callback protector denied callback entry by thread %p tid %d during destroy" 78 SL_LOGV("Callback protector denied callback entry during destroy");
|
/libcore/luni/src/main/java/java/security/acl/ |
AclEntry.java | 27 * granted (<i>positive</i>) or denied (<i>negative</i>) to a {@link Principal}. 53 * The permissions in this ACL entry will be denied to the principal
|
/packages/apps/Messaging/src/com/android/messaging/ui/ |
PermissionCheckActivity.java | 115 // automatically denied. This can happen if the user had previously denied it
|