OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:denied
(Results
76 - 100
of
1168
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/e2fsprogs/lib/ss/
ss_err.c
18
N_( "Permission
denied
"),
/external/kernel-headers/original/uapi/asm-generic/
errno-base.h
17
#define EACCES 13 /* Permission
denied
*/
/external/libxml2/win32/wince/
wincecompat.c
14
"Exec format error","Bad file number","","","Not enough core","Permission
denied
","","",
/external/ltp/testcases/kernel/syscalls/keyctl/
keyctl08.c
34
tst_res(TPASS, "
Denied
access to .builtin_trusted_keys");
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/pthread_mutex_init/
4-1.c
47
fprintf(stderr, "Permission
denied
\n");
/external/selinux/libselinux/man/man3/
security_getenforce.3
28
permissions as being allowed, 1 if such queries are
denied
, and \-1 on error.
/external/selinux/python/audit2allow/
test.log
2
type=AVC msg=audit(1166045975.667:1129): avc:
denied
{ write } for comm=local dev=dm-0 name=root.lock pid=10581 scontext=system_u:system_r:postfix_local_t:s0 tclass=file tcontext=system_u:object_r:mail_spool_t:s0
5
node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc:
denied
{ execute } for pid=13944 comm="automount" name="auto.net" dev=dm-0 ino=16483485 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:automount_lock_t:s0 tclass=file
7
node=james.example.com type=AVC msg=audit(1165963069.244:851): avc:
denied
{ name_bind } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket
9
node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc:
denied
{ name_connect } for pid=21134 comm="smbd" src=81 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket
11
node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc:
denied
{ search } for pid=24427 comm="vsftpd" name="home" dev=dm-0 ino=9338881 scontext=system_u:system_r:ftpd_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir
13
node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc:
denied
{ name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket
16
node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc:
denied
{ execute_no_trans } for pid=23768 comm="httpd" name="index.html" dev=dm-0 ino=7996439 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file
18
node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc:
denied
{ name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:mysqld_port_t:s0 tclass=tcp_socket
20
node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc:
denied
{ name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket
23
node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc:
denied
{ execute } for pid=23770 comm="httpd" name="cgi-bin" dev=dm-0 ino=7995597 scontext=system_u:sys (…)
[
all
...]
/external/selinux/python/semanage/
semanage-dontaudit.8
11
confined applications to use alternative paths. Dontaudit rules are
denied
but not reported in the logs. Some times dontaudit rules can cause bugs in applications but policy writers will not realize it since the AVC is not audited. Turning off dontaudit rules with this command to see if the kernel is blocking an access.
/external/syslinux/dos/
errno.h
16
#define EACCES 13 /* Permission
denied
*/
/external/syslinux/gnu-efi/gnu-efi-3.0/lib/
error.c
40
{ EFI_ACCESS_DENIED, L"Access
Denied
"},
/external/webrtc/webrtc/base/
firewallsocketserver.cc
33
<< addr.ToSensitiveString() << "
denied
";
77
LOG(LS_VERBOSE) << "FirewallSocket listen attempt
denied
";
95
<< GetLocalAddress().ToSensitiveString() << "
denied
";
209
LOG(LS_VERBOSE) << "FirewallSocketServer socket creation
denied
";
/frameworks/base/media/mca/filterfw/java/android/filterfw/core/
ProgramPort.java
55
"Access to program field '" + mField.getName() + "' was
denied
!");
/hardware/interfaces/gnss/1.0/
IGnssNi.hal
38
* accepted,
denied
or not responded to.
/hardware/qcom/display/msm8960/libqservice/
IQService.cpp
99
ALOGE("display.qservice SECURING access
denied
: \
111
ALOGE("display.qservice UNSECURING access
denied
: \
124
ALOGE("display.qservice CONNECT access
denied
: \
137
ALOGE("display.qservice SCREEN_REFRESH access
denied
: \
/libcore/ojluni/src/main/java/java/security/acl/
AclEntry.java
41
* are to be
denied
. Each principal can have at most one positive ACL entry
57
* Specifies the principal for which permissions are granted or
denied
71
* Returns the principal for which permissions are granted or
denied
by
83
* principal (e.g., a user or a group) will be
denied
the permission set
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/
EventLogger.java
29
* Log that a permission was requested/
denied
.
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/asm-generic/
errno-base.h
16
#define EACCES 13 /* Permission
denied
*/
/prebuilts/go/darwin-x86/src/os/
error_plan9.go
17
return checkErrMessageContent(err, "permission
denied
")
/prebuilts/go/linux-x86/src/os/
error_plan9.go
17
return checkErrMessageContent(err, "permission
denied
")
/packages/apps/SecureElement/src/com/android/se/security/
AccessControlEnforcer.java
195
Log.i(mTag, "Problem accessing ARA, Access
DENIED
"
241
mInitialChannelAccess.setApduAccess(ChannelAccess.ACCESS.
DENIED
);
242
mInitialChannelAccess.setNFCEventAccess(ChannelAccess.ACCESS.
DENIED
);
243
mInitialChannelAccess.setAccess(ChannelAccess.ACCESS.
DENIED
, denyMsg);
289
if (mInitialChannelAccess.getAccess() == ChannelAccess.ACCESS.
DENIED
) {
291
mTag + "access
denied
: " + mInitialChannelAccess.getReason());
348
// with all access
denied
.
351
channelAccess.setAccess(ChannelAccess.ACCESS.
DENIED
, "no access rule found!");
352
channelAccess.setApduAccess(ChannelAccess.ACCESS.
DENIED
);
353
channelAccess.setNFCEventAccess(ChannelAccess.ACCESS.
DENIED
);
[
all
...]
/external/selinux/libsepol/include/sepol/policydb/
services.h
68
* whether allowed or
denied
in a buffer. This buffer is allocated by
71
* If the SHOW_GRANTED flag is set it will show granted and
denied
72
* constraints. The default is to show only
denied
constraints.
87
* If the SHOW_GRANTED flag is set it will show granted and
denied
88
* mls/validatetrans (the default is to show only those
denied
).
/frameworks/support/compat/src/androidTest/java/androidx/core/content/
ContextCompatTest.java
221
// The following permissions (normal and dangerous) are expected to be
denied
as they are
223
assertEquals("Access network state permission
denied
", PackageManager.PERMISSION_DENIED,
226
assertEquals("Bluetooth permission
denied
", PackageManager.PERMISSION_DENIED,
229
assertEquals("Call phone permission
denied
", PackageManager.PERMISSION_DENIED,
232
assertEquals("Delete packages permission
denied
", PackageManager.PERMISSION_DENIED,
/packages/apps/SecureElement/src/com/android/se/security/arf/PKCS15/
EFACConditions.java
92
channelAccess.setAccess(ChannelAccess.ACCESS.
DENIED
, "Empty ACCondition");
93
channelAccess.setNFCEventAccess(ChannelAccess.ACCESS.
DENIED
);
94
channelAccess.setApduAccess(ChannelAccess.ACCESS.
DENIED
);
188
: ChannelAccess.ACCESS.
DENIED
);
234
: ChannelAccess.ACCESS.
DENIED
);
/external/ltp/testcases/kernel/fs/acl/
tacl_xattr.sh
179
printf "\nFAILED: [ touch ] Create file must be
denied
by file permission bits\n"
182
printf "\nSUCCESS: Create file
denied
by file permission bits [ Physical directory ]\n"
188
printf "\nFAILED: [ touch ] Create file must be
denied
by file permission bits\n"
191
printf "\nSUCCESS: Create file
denied
by file permission bits [ Symlink directory ]\n"
263
# ELSE access is
denied
.
278
printf "\t but operation
denied
[ Physical Directory ]\n"
288
printf "\t but operation
denied
[ Symlink Directory ]\n"
302
printf "\t operation must be
denied
[ Physical Directory ]\n"
314
printf "\t operation must be
denied
[ Symlink Directory ]\n"
334
# else access is
denied
[
all
...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/
FrameParser.java
623
return "Reassociation
denied
; could not confirm association exists";
625
return "Association
denied
for reasons outside standard";
635
return "Association
denied
; too many STAs";
637
return "Association
denied
; must support BSSBasicRateSet";
639
return "Association
denied
; must support short preamble";
641
return "Association
denied
; must support PBCC";
643
return "Association
denied
; must support channel agility";
651
return "Association
denied
; must support short slot time";
653
return "Association
denied
; must support DSSS-OFDM";
655
return "Association
denied
; must support HT"
[
all
...]
Completed in 1844 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>