OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:denied
(Results
1 - 25
of
678
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/valgrind/none/tests/
cmdline6.stderr.exp
1
valgrind: ./cmdline6.vgtest: Permission
denied
/external/valgrind/none/tests/scripts/
shell_nonexec.stderr.exp
1
valgrind: ./shell.vgtest: Permission
denied
shell.stderr.exp-dash
1
./shell: 10: ./x86/: Permission
denied
2
./shell: 13: ./shell.vgtest: Permission
denied
shell.stderr.exp-dash2
1
./shell: 10: ./shell: ./x86/: Permission
denied
2
./shell: 13: ./shell: ./shell.vgtest: Permission
denied
shell.stderr.exp
2
./shell: ./shell.vgtest: Permission
denied
/external/valgrind/none/tests/darwin/
access_extended.stderr.exp
3
access_extended.c(X_OK) = 13 (Permission
denied
)
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
files_apps.txt
4
The description should give you a decent description for what the application is allowed to do with the type. If your application type is being
denied
access to a particular file, you might want to change the label of that file.
8
Note if the label of the content that is being
denied
is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access.
files_write.txt
4
The description should give you a decent description for what the application is allowed to do with the type. If your application type is being
denied
access to a particular file, you might want to change the label of that file.
8
Note if the label of the content that is being
denied
is owned by another domain, you might have to write policy or use 'audit2allow -M mypol'
system_current_mode.txt
4
When a machine is in permissive mode, SELinux will continue to log SELinux AVC messages, that would have been
denied
if the machine was in enforcing mode.
/external/e2fsprogs/lib/ss/
ss_err.et
25
"Permission
denied
"
/external/selinux/sepolgen/tests/test_data/
httpd.log
1
type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
2
type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
3
type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
4
type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
5
type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
6
type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
7
type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
8
type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
9
type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
10
type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getP (…)
[
all
...]
audit.log
1
type=AVC msg=audit(1162850331.422:978): avc:
denied
{ ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file
4
type=AVC msg=audit(1162850332.318:979): avc:
denied
{ read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
6
type=AVC msg=audit(1162850333.186:980): avc:
denied
{ read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file
8
type=AVC msg=audit(1162850335.022:981): avc:
denied
{ read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
10
type=AVC msg=audit(1162850335.022:982): avc:
denied
{ lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
15
type=AVC msg=audit(1162850343.419:985): avc:
denied
{ search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir
17
type=AVC msg=audit(1162850343.427:986): avc:
denied
{ write } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
19
type=AVC msg=audit(1162850343.427:987): avc:
denied
{ read } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
21
type=AVC msg=audit(1162850343.427:988): avc:
denied
{ getattr } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
24
type=AVC msg=audit(1162850343.427:989): avc:
denied
{ write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staf (…)
[
all
...]
short.log
1
type=AVC msg=audit(1162850331.422:978): avc:
denied
{ ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file
4
type=AVC msg=audit(1162850332.318:979): avc:
denied
{ read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
6
type=AVC msg=audit(1162850333.186:980): avc:
denied
{ read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file
8
type=AVC msg=audit(1162850335.022:981): avc:
denied
{ read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
10
type=AVC msg=audit(1162850335.022:982): avc:
denied
{ lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
15
type=AVC msg=audit(1162850343.419:985): avc:
denied
{ search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir
/developers/build/prebuilts/gradle/RuntimePermissionsBasic/Application/src/main/res/values/
strings.xml
3
<string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has
denied
access (for example when camera access has been disabled).</string>
/developers/samples/android/system/RuntimePermissionsBasic/Application/src/main/res/values/
strings.xml
3
<string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has
denied
access (for example when camera access has been disabled).</string>
/development/samples/browseable/RuntimePermissionsBasic/res/values/
strings.xml
3
<string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has
denied
access (for example when camera access has been disabled).</string>
/external/selinux/policycoreutils/audit2allow/
test_audit2allow.py
7
self.assert_('Permission
denied
' in err,
8
'"Permission
denied
" not found in %r' % err)
/developers/build/prebuilts/gradle/ScreenCapture/Application/src/main/res/values/
strings.xml
20
<string name="user_cancelled">User
denied
screen sharing permission</string>
/developers/samples/android/media/ScreenCapture/Application/src/main/res/values/
strings.xml
20
<string name="user_cancelled">User
denied
screen sharing permission</string>
/development/samples/browseable/ScreenCapture/res/values/
strings.xml
20
<string name="user_cancelled">User
denied
screen sharing permission</string>
/external/selinux/libselinux/man/man3/
security_getenforce.3
26
permissions as being allowed, 1 if such queries are
denied
, and \-1 on error.
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
IdentityScopeTest.java
43
public Permissions
denied
= new Permissions();
field in class:IdentityScopeTest.MySecurityManager
45
if (
denied
!=null &&
denied
.implies(permission)) throw new SecurityException();
98
* if permission is
denied
than SecurityException is thrown
/external/selinux/sepolgen/tests/
test_audit.py
25
audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc:
denied
{ read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28
audit2 = """type=AVC msg=audit(1158584779.745:708): avc:
denied
{ dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30
log1 = """type=AVC msg=audit(1158584779.745:708): avc:
denied
{ dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
32
type=AVC msg=audit(1158584779.753:709): avc:
denied
{ dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33
type=AVC msg=audit(1158584779.753:709): avc:
denied
{ dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
35
type=AVC msg=audit(1158584779.825:710): avc:
denied
{ dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
36
type=AVC msg=audit(1158584779.825:710): avc:
denied
{ dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
38
type=AVC msg=audit(1158584780.793:711): avc:
denied
{ dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
39
type=AVC msg=audit(1158584780.793:711): avc:
denied
{ dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
41
type=AVC msg=audit(1158584780.797:712): avc:
denied
{ dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 (…)
[
all
...]
/external/selinux/libsepol/include/sepol/policydb/
services.h
66
* whether allowed or
denied
in a buffer. This buffer is allocated by
69
* If the SHOW_GRANTED flag is set it will show granted and
denied
70
* constraints. The default is to show only
denied
constraints.
85
* If the SHOW_GRANTED flag is set it will show granted and
denied
86
* mls/validatetrans (the default is to show only those
denied
).
/system/security/keystore/
test-keystore
80
expect "6 Permission
denied
"
140
expect "6 Permission
denied
"
142
expect "6 Permission
denied
"
144
expect "6 Permission
denied
"
146
expect "6 Permission
denied
"
Completed in 386 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>