Home
last modified time | relevance | path

Searched refs:denied (Results 1 – 25 of 201) sorted by relevance

123456789

/external/cpuinfo/test/dmesg/
Dxiaomi-mi-5c.log1103 [ 10.096980] type=1400 audit(946685274.543:4): avc: denied { create } for pid=1 comm="init" na…
1193 [ 10.217450] type=1400 audit(946685274.663:5): avc: denied { getattr } for pid=214 comm="e2fsc…
1194 [ 10.217605] type=1400 audit(946685274.663:6): avc: denied { getattr } for pid=214 comm="e2fsc…
1195 [ 10.217686] type=1400 audit(946685274.666:7): avc: denied { read write } for pid=214 comm="e2…
1198 [ 10.218945] e2fsck: /system/bin/e2fsck: Permission denied while trying to open /dev/block/platfo…
1252 [ 10.494891] init: SELinux: Could not set context for /cust: Permission denied
1253 [ 10.495127] type=1400 audit(946685274.943:8): avc: denied { relabelto } for pid=1 comm="init" na…
1254 [ 10.497577] init: SELinux: Could not set context for /cust/app: Permission denied
1255 [ 10.497821] type=1400 audit(946685274.946:9): avc: denied { relabelto } for pid=1 comm="init" na…
1256 [ 10.498990] init: SELinux: Could not set context for /cust/app/customized: Permission denied
[all …]
Dnexus6p.log1256 [ 4.012791] type=1400 audit(2924764.120:4): avc: denied { mounton } for pid=1 comm="init" pat…
1436 [ 5.323039] type=1400 audit(2924765.430:7): avc: denied { unlink } for pid=1 comm="init" name="d…
1560 [ 7.012521] type=1400 audit(2924767.120:9): avc: denied { getattr } for pid=497 comm="e2fsck" pa…
1624 [ 7.236104] type=1400 audit(2924767.343:10): avc: denied { read write } for pid=525 comm="imsqmi…
1625 [ 7.237964] type=1400 audit(2924767.343:11): avc: denied { read write } for pid=525 comm="imsqmi…
1626 [ 7.238046] type=1400 audit(2924767.343:12): avc: denied { read write } for pid=525 comm="imsqmi…
1627 [ 7.238638] type=1400 audit(2924767.343:13): avc: denied { read write } for pid=525 comm="imsqmi…
1629 [ 7.238796] type=1400 audit(2924767.343:14): avc: denied { read write } for pid=525 comm="imsqmi…
1630 [ 7.238872] type=1400 audit(2924767.343:15): avc: denied { read write } for pid=527 comm="oem_qm…
1631 [ 7.239128] type=1400 audit(2924767.343:16): avc: denied { read write } for pid=525 comm="imsqmi…
[all …]
Dmoto-g-gen5.log538 [ 1.664846,1] SELinux: the above unknown classes and permissions will be denied
719 [ 8.235388,6] audit: type=1400 audit(1246462.106:4): avc: denied { mounton } for uid=0 pid=1 …
958 [ 11.306969,1] type=1400 audit(1246465.180:5): avc: denied { read write } for uid=1000 pid=551 co…
1109 [ 20.069037,1] type=1400 audit(1246473.940:6): avc: denied { read write } for uid=1000 pid=720 co…
1115 [ 20.088576,2] type=1400 audit(1246473.960:7): avc: denied { read write } for uid=0 pid=760 comm=…
1119 [ 20.223572,4] type=1400 audit(1485564691.269:8): avc: denied { read write } for uid=1000 pid=830…
1121 [ 20.252694,7] type=1400 audit(1485564691.296:9): avc: denied { read write } for uid=1000 pid=838…
1135 [ 20.364628,7] type=1400 audit(1485564691.403:10): avc: denied { read write } for uid=1000 pid=71…
1143 [ 20.446843,7] type=1400 audit(1485564691.493:11): avc: denied { read write } for uid=1000 pid=71…
1150 [ 20.680185,7] type=1400 audit(1485564691.726:12): avc: denied { read write } for uid=1000 pid=86…
[all …]
Dalcatel-revvl.log94 [ 17.210776] (7)[1:init]init: avc: denied { set } for property=ro.mtk_pq_color_mode pid=468 ui…
95 [ 17.210807] (7)[1:init]init: sys_prop: permission denied uid:1013 name:ro.mtk_pq_color_mode
96 [ 17.211414] (6)[1:init]init: avc: denied { set } for property=persist.sys.pq.mdp.color.dbg pi…
97 [ 17.211443] (6)[1:init]init: sys_prop: permission denied uid:1013 name:persist.sys.pq.mdp.colo…
98 [ 17.211963] (6)[1:init]init: avc: denied { set } for property=debug.pq.shp.en pid=468 uid=101…
99 [ 17.211991] (6)[1:init]init: sys_prop: permission denied uid:1013 name:debug.pq.shp.en
100 [ 17.212426] (4)[1:init]init: avc: denied { set } for property=debug.pq.dshp.en pid=468 uid=10…
101 [ 17.212460] (4)[1:init]init: sys_prop: permission denied uid:1013 name:debug.pq.dshp.en
102 [ 17.213161] (4)[1:init]init: avc: denied { set } for property=persist.sys.pq.mdp.color.idx pi…
103 [ 17.213192] (4)[1:init]init: sys_prop: permission denied uid:1013 name:persist.sys.pq.mdp.colo…
[all …]
/external/selinux/python/sepolgen/tests/test_data/
Dhttpd.log1 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
2 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
3 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
4 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
5 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
6 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
7 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
8 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
9 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
10 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
[all …]
Daudit.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".g…
19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gd…
21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name="…
24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root"…
[all …]
Dshort.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
/external/selinux/python/audit2allow/
Dtest.log2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…
5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…
7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…
9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=244…
13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for…
18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…
20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…
23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=…
[all …]
/external/curl/tests/data/
Dtest23611 REPLY SIZE 550 access to this file is very much denied
12 REPLY APPE 550 I said: access to this file is very much denied
13 REPLY STOR 550 I said: access to this file is very much denied
24 FTP resume upload but denied access to remote file
/external/python/cpython3/Lib/test/support/
Dsocket_helper.py217 denied = support.ResourceDenied("Resource %r is not available" % resource_name)
238 sys.stderr.write(denied.args[0] + "\n")
239 raise denied from err
248 sys.stderr.write(denied.args[0] + "\n")
249 raise denied from err
/external/perfetto/src/traced/probes/ftrace/test/data/android_raven_AOSP.MASTER_5.10.43/events/avc/selinux_audited/
Dformat10 field:u32 denied; offset:12; size:4; signed:0;
17 print fmt: "requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", R…
/external/libcups/templates/ja/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/ru/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/da/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/de/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/es/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/pt_BR/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/libcups/templates/fr/
Dusers.tmpl16 …esting-user-name-denied' ID='requesting-user-name-denied' {requesting_user_name_denied?checked:}><…
/external/apache-commons-lang/src/test/resources/
Djava.policy37 // java.security.AccessControlException: access denied (java.io.FilePermission C:\Users\ggregory\Ap…
52 // java.security.AccessControlException: access denied (java.net.SocketPermission 127.0.0.1:58691 c…
69 // java.security.AccessControlException: access denied (java.io.FilePermission C:\svn\org\apache\co…
82 // java.security.AccessControlException: access denied (java.util.PropertyPermission user.dir write)
95 // java.security.AccessControlException: access denied (java.util.PropertyPermission localRepositor…
107 // java.security.AccessControlException: access denied (java.util.PropertyPermission basedir write)
119 // java.security.AccessControlException: access denied (java.util.PropertyPermission surefire.test.…
142 //Caused by: java.security.AccessControlException: access denied (java.util.PropertyPermission sure…
155 // java.security.AccessControlException: access denied (java.util.PropertyPermission java.class.…
166 // java.security.AccessControlException: access denied (java.util.PropertyPermission java.class.…
[all …]
/external/python/cpython3/Lib/test/
Dtest___all__.py95 denied = False
98 denied = True
101 if denied:
/external/selinux/python/sepolicy/sepolicy/help/
Dfiles_apps.txt4 …tion is allowed to do with the type. If your application type is being denied access to a partic…
8 Note if the label of the content that is being denied is owned by another domain, you might have to…
Dfiles_write.txt4 …tion is allowed to do with the type. If your application type is being denied access to a partic…
8 Note if the label of the content that is being denied is owned by another domain, you might have to…
/external/selinux/libselinux/src/
Davc.c696 access_vector_t denied, audited; in avc_audit() local
698 denied = requested & ~avd->allowed; in avc_audit()
699 if (denied) in avc_audit()
700 audited = denied & avd->auditdeny; in avc_audit()
702 audited = denied = requested; in avc_audit()
714 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit()
725 if (denied) in avc_audit()
753 access_vector_t denied; in avc_has_perm_noaudit() local
807 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit()
809 if (!requested || denied) { in avc_has_perm_noaudit()
/external/bcc/tools/
Dttysnoop_example.txt57 …:38 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied
58 …:32 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied
59 …:26 bgregg-xenial-bpf-i-xxx snmpd[2708]: Cannot statfs /sys/kernel/debug/tracing: Permission denied

123456789