HomeSort by relevance Sort by last modified time
    Searched full:denied (Results 26 - 50 of 938) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/selinux/policycoreutils/audit2allow/
test_audit2allow.py 11 self.assertTrue('Permission denied' in err,
12 '"Permission denied" not found in %r' % err)
  /frameworks/support/v4/tests/java/android/support/v4/content/
ContextCompatTest.java 149 // This is why the following permissions are expected to be denied.
158 assertEquals("Read contacts permission denied", PackageManager.PERMISSION_GRANTED,
161 assertEquals("Write contacts permission denied", PackageManager.PERMISSION_GRANTED,
166 // The following permissions (normal and dangerous) are expected to be denied as they are
168 assertEquals("Access network state permission denied", PackageManager.PERMISSION_DENIED,
171 assertEquals("Bluetooth permission denied", PackageManager.PERMISSION_DENIED,
174 assertEquals("Call phone permission denied", PackageManager.PERMISSION_DENIED,
177 assertEquals("Delete packages permission denied", PackageManager.PERMISSION_DENIED,
  /prebuilts/go/darwin-x86/src/syscall/
errors_plan9.go 38 EPERM = NewError("permission denied")
46 EACCES = NewError("access permission denied")
  /prebuilts/go/linux-x86/src/syscall/
errors_plan9.go 38 EPERM = NewError("permission denied")
46 EACCES = NewError("access permission denied")
  /external/selinux/sepolgen/tests/test_data/
audit.log 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir
17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staf (…)
    [all...]
short.log 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir
  /developers/build/prebuilts/gradle/ScreenCapture/Application/src/main/res/values/
strings.xml 20 <string name="user_cancelled">User denied screen sharing permission</string>
  /developers/samples/android/media/ScreenCapture/Application/src/main/res/values/
strings.xml 20 <string name="user_cancelled">User denied screen sharing permission</string>
  /development/samples/browseable/ScreenCapture/res/values/
strings.xml 20 <string name="user_cancelled">User denied screen sharing permission</string>
  /device/huawei/angler/sepolicy/
perfd.te 26 # since a permission denied indicates the process exists.
  /device/lge/bullhead/sepolicy/
perfd.te 29 # since a permission denied indicates the process exists.
  /external/selinux/libselinux/man/man3/
security_getenforce.3 26 permissions as being allowed, 1 if such queries are denied, and \-1 on error.
avc_has_perm.3 111 If requested permissions are granted, zero is returned. If requested permissions are denied or an error occured, \-1 is returned and
117 unchanged even if permissions were denied.
124 A requested permission was denied.
  /external/valgrind/none/tests/scripts/
shell.stderr.exp-illumos 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
shell.stderr.exp-solaris 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
IdentityScopeTest.java 43 public Permissions denied = new Permissions(); field in class:IdentityScopeTest.MySecurityManager
45 if (denied!=null && denied.implies(permission)) throw new SecurityException();
98 * if permission is denied than SecurityException is thrown
  /prebuilts/go/darwin-x86/src/os/
error.go 14 ErrPermission = errors.New("permission denied")
61 // report that permission is denied. It is satisfied by ErrPermission as well
  /prebuilts/go/linux-x86/src/os/
error.go 14 ErrPermission = errors.New("permission denied")
61 // report that permission is denied. It is satisfied by ErrPermission as well
  /external/libmicrohttpd/src/testcurl/
test_digestauth.c 47 #define DENIED "<html><head><title>libmicrohttpd demo</title></head><body>Access denied</body></html>"
89 response = MHD_create_response_from_buffer(strlen (DENIED),
90 DENIED,
107 response = MHD_create_response_from_buffer(strlen (DENIED),
108 DENIED,
test_digestauth_with_arguments.c 46 #define DENIED "<html><head><title>libmicrohttpd demo</title></head><body>Access denied</body></html>"
88 response = MHD_create_response_from_buffer(strlen (DENIED),
89 DENIED,
106 response = MHD_create_response_from_buffer(strlen (DENIED),
107 DENIED,
  /external/selinux/sepolgen/tests/
test_audit.py 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 (…)
    [all...]
  /external/selinux/libsepol/include/sepol/policydb/
services.h 66 * whether allowed or denied in a buffer. This buffer is allocated by
69 * If the SHOW_GRANTED flag is set it will show granted and denied
70 * constraints. The default is to show only denied constraints.
85 * If the SHOW_GRANTED flag is set it will show granted and denied
86 * mls/validatetrans (the default is to show only those denied).
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
PhoneSubInfoControllerTest.java 95 assertEquals(READ_PHONE_STATE + " denied: getDeviceId", ex.getMessage());
103 assertEquals(READ_PHONE_STATE + " denied: getDeviceId", ex.getMessage());
145 assertEquals(READ_PHONE_STATE + " denied: getNai", ex.getMessage());
153 assertEquals(READ_PHONE_STATE + " denied: getNai", ex.getMessage());
195 assertEquals(READ_PHONE_STATE + " denied: getImei", ex.getMessage());
203 assertEquals(READ_PHONE_STATE + " denied: getImei", ex.getMessage());
245 assertEquals(READ_PHONE_STATE + " denied: getDeviceSvn", ex.getMessage());
253 assertEquals(READ_PHONE_STATE + " denied: getDeviceSvn", ex.getMessage());
298 assertEquals(READ_PHONE_STATE + " denied: getSubscriberId", ex.getMessage());
306 assertEquals(READ_PHONE_STATE + " denied: getSubscriberId", ex.getMessage())
    [all...]
  /system/security/keystore/
test-keystore 80 expect "6 Permission denied"
140 expect "6 Permission denied"
142 expect "6 Permission denied"
144 expect "6 Permission denied"
146 expect "6 Permission denied"
  /external/libchrome/sandbox/linux/syscall_broker/
broker_client.h 28 // allows to predict some of the requests which will be denied
59 // know will be denied to the broker. (Used

Completed in 567 milliseconds

12 3 4 5 6 7 8 91011>>