/external/selinux/policycoreutils/audit2allow/ |
test_audit2allow.py | 11 self.assertTrue('Permission denied' in err, 12 '"Permission denied" not found in %r' % err)
|
/frameworks/support/v4/tests/java/android/support/v4/content/ |
ContextCompatTest.java | 149 // This is why the following permissions are expected to be denied. 158 assertEquals("Read contacts permission denied", PackageManager.PERMISSION_GRANTED, 161 assertEquals("Write contacts permission denied", PackageManager.PERMISSION_GRANTED, 166 // The following permissions (normal and dangerous) are expected to be denied as they are 168 assertEquals("Access network state permission denied", PackageManager.PERMISSION_DENIED, 171 assertEquals("Bluetooth permission denied", PackageManager.PERMISSION_DENIED, 174 assertEquals("Call phone permission denied", PackageManager.PERMISSION_DENIED, 177 assertEquals("Delete packages permission denied", PackageManager.PERMISSION_DENIED,
|
/prebuilts/go/darwin-x86/src/syscall/ |
errors_plan9.go | 38 EPERM = NewError("permission denied") 46 EACCES = NewError("access permission denied")
|
/prebuilts/go/linux-x86/src/syscall/ |
errors_plan9.go | 38 EPERM = NewError("permission denied") 46 EACCES = NewError("access permission denied")
|
/external/selinux/sepolgen/tests/test_data/ |
audit.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file 15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir 17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staf (…) [all...] |
short.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file 15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir
|
/developers/build/prebuilts/gradle/ScreenCapture/Application/src/main/res/values/ |
strings.xml | 20 <string name="user_cancelled">User denied screen sharing permission</string>
|
/developers/samples/android/media/ScreenCapture/Application/src/main/res/values/ |
strings.xml | 20 <string name="user_cancelled">User denied screen sharing permission</string>
|
/development/samples/browseable/ScreenCapture/res/values/ |
strings.xml | 20 <string name="user_cancelled">User denied screen sharing permission</string>
|
/device/huawei/angler/sepolicy/ |
perfd.te | 26 # since a permission denied indicates the process exists.
|
/device/lge/bullhead/sepolicy/ |
perfd.te | 29 # since a permission denied indicates the process exists.
|
/external/selinux/libselinux/man/man3/ |
security_getenforce.3 | 26 permissions as being allowed, 1 if such queries are denied, and \-1 on error.
|
avc_has_perm.3 | 111 If requested permissions are granted, zero is returned. If requested permissions are denied or an error occured, \-1 is returned and 117 unchanged even if permissions were denied. 124 A requested permission was denied.
|
/external/valgrind/none/tests/scripts/ |
shell.stderr.exp-illumos | 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
|
shell.stderr.exp-solaris | 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
IdentityScopeTest.java | 43 public Permissions denied = new Permissions(); field in class:IdentityScopeTest.MySecurityManager 45 if (denied!=null && denied.implies(permission)) throw new SecurityException(); 98 * if permission is denied than SecurityException is thrown
|
/prebuilts/go/darwin-x86/src/os/ |
error.go | 14 ErrPermission = errors.New("permission denied") 61 // report that permission is denied. It is satisfied by ErrPermission as well
|
/prebuilts/go/linux-x86/src/os/ |
error.go | 14 ErrPermission = errors.New("permission denied") 61 // report that permission is denied. It is satisfied by ErrPermission as well
|
/external/libmicrohttpd/src/testcurl/ |
test_digestauth.c | 47 #define DENIED "<html><head><title>libmicrohttpd demo</title></head><body>Access denied</body></html>" 89 response = MHD_create_response_from_buffer(strlen (DENIED), 90 DENIED, 107 response = MHD_create_response_from_buffer(strlen (DENIED), 108 DENIED,
|
test_digestauth_with_arguments.c | 46 #define DENIED "<html><head><title>libmicrohttpd demo</title></head><body>Access denied</body></html>" 88 response = MHD_create_response_from_buffer(strlen (DENIED), 89 DENIED, 106 response = MHD_create_response_from_buffer(strlen (DENIED), 107 DENIED,
|
/external/selinux/sepolgen/tests/ |
test_audit.py | 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file""" 28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability""" 30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 (…) [all...] |
/external/selinux/libsepol/include/sepol/policydb/ |
services.h | 66 * whether allowed or denied in a buffer. This buffer is allocated by 69 * If the SHOW_GRANTED flag is set it will show granted and denied 70 * constraints. The default is to show only denied constraints. 85 * If the SHOW_GRANTED flag is set it will show granted and denied 86 * mls/validatetrans (the default is to show only those denied).
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
PhoneSubInfoControllerTest.java | 95 assertEquals(READ_PHONE_STATE + " denied: getDeviceId", ex.getMessage()); 103 assertEquals(READ_PHONE_STATE + " denied: getDeviceId", ex.getMessage()); 145 assertEquals(READ_PHONE_STATE + " denied: getNai", ex.getMessage()); 153 assertEquals(READ_PHONE_STATE + " denied: getNai", ex.getMessage()); 195 assertEquals(READ_PHONE_STATE + " denied: getImei", ex.getMessage()); 203 assertEquals(READ_PHONE_STATE + " denied: getImei", ex.getMessage()); 245 assertEquals(READ_PHONE_STATE + " denied: getDeviceSvn", ex.getMessage()); 253 assertEquals(READ_PHONE_STATE + " denied: getDeviceSvn", ex.getMessage()); 298 assertEquals(READ_PHONE_STATE + " denied: getSubscriberId", ex.getMessage()); 306 assertEquals(READ_PHONE_STATE + " denied: getSubscriberId", ex.getMessage()) [all...] |
/system/security/keystore/ |
test-keystore | 80 expect "6 Permission denied" 140 expect "6 Permission denied" 142 expect "6 Permission denied" 144 expect "6 Permission denied" 146 expect "6 Permission denied"
|
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_client.h | 28 // allows to predict some of the requests which will be denied 59 // know will be denied to the broker. (Used
|