Home
last modified time | relevance | path

Searched refs:denied (Results 1 – 25 of 104) sorted by relevance

12345

/external/selinux/sepolgen/tests/test_data/
Dhttpd.log1 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
2 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
3 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
4 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
5 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
6 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
7 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
8 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
9 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
10 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …
[all …]
Daudit.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".g…
19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gd…
21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name="…
24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root"…
[all …]
Dshort.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
/external/curl/tests/data/
Dtest23611 REPLY SIZE 550 access to this file is very much denied
12 REPLY APPE 550 I said: access to this file is very much denied
13 REPLY STOR 550 I said: access to this file is very much denied
23 FTP resume upload but denied access to remote file
Dtest28917 FTP resume upload but denied access to local file
Dtest32542 HTTPS with attempted redirect to denied HTTP
/external/selinux/policycoreutils/audit2allow/
Dtest.log2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…
5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…
7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…
9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=244…
13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for…
18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…
20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…
23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=…
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/protorpc/demos/quotas/backend/quotas/
Dservices_test.py204 self.assertFalse(response.denied)
225 self.assertTrue(response.denied)
252 self.assertTrue(response.denied)
278 self.assertTrue(response.denied)
299 self.assertFalse(response.denied)
320 self.assertFalse(response.denied)
347 self.assertTrue(response.denied)
373 self.assertTrue(response.denied)
393 self.assertFalse(response.denied)
409 self.assertTrue(response.denied)
[all …]
Dservices.py149 denied = messages.BooleanField(2, required=True) variable in QuotaResponse
383 response.denied = False
409 response.denied = True
414 response.denied = True
416 if response.denied:
/external/valgrind/none/tests/scripts/
Dshell.stderr.exp-dash1 ./shell: 10: ./x86/: Permission denied
2 ./shell: 13: ./shell.vgtest: Permission denied
Dshell.stderr.exp-dash21 ./shell: 10: ./shell: ./x86/: Permission denied
2 ./shell: 13: ./shell: ./shell.vgtest: Permission denied
Dshell_nonexec.stderr.exp1 valgrind: ./shell.vgtest: Permission denied
Dshell.stderr.exp-solaris-spawn2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
Dshell.stderr.exp2 ./shell: ./shell.vgtest: Permission denied
Dshell.stderr.exp-illumos2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
Dshell.stderr.exp-solaris2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
Dfiles_apps.txt4 …tion is allowed to do with the type. If your application type is being denied access to a partic…
8 Note if the label of the content that is being denied is owned by another domain, you might have to…
Dfiles_write.txt4 …tion is allowed to do with the type. If your application type is being denied access to a partic…
8 Note if the label of the content that is being denied is owned by another domain, you might have to…
Dsystem_current_mode.txt4 … SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was…
/external/libselinux/src/
Davc.c658 access_vector_t denied, audited; in avc_audit() local
660 denied = requested & ~avd->allowed; in avc_audit()
661 if (denied) in avc_audit()
662 audited = denied & avd->auditdeny; in avc_audit()
664 audited = denied = requested; in avc_audit()
676 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit()
688 if (denied || !requested) in avc_audit()
718 access_vector_t denied; in avc_has_perm_noaudit() local
772 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit()
774 if (!requested || denied) { in avc_has_perm_noaudit()
/external/selinux/libselinux/src/
Davc.c698 access_vector_t denied, audited; in avc_audit() local
700 denied = requested & ~avd->allowed; in avc_audit()
701 if (denied) in avc_audit()
702 audited = denied & avd->auditdeny; in avc_audit()
704 audited = denied = requested; in avc_audit()
716 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit()
753 access_vector_t denied; in avc_has_perm_noaudit() local
807 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit()
809 if (!requested || denied) { in avc_has_perm_noaudit()
/external/valgrind/none/tests/
Dcmdline6.stderr.exp1 valgrind: ./cmdline6.vgtest: Permission denied
/external/valgrind/none/tests/darwin/
Daccess_extended.stderr.exp3 access_extended.c(X_OK) = 13 (Permission denied)
/external/selinux/sepolgen/tests/
Daudit.txt1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…
3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…
4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…
6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…
7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…
9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…
10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…
12 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-scr…
13 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-…
15 type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-scr…
[all …]
/external/e2fsprogs/lib/ss/
Dss_err.et25 "Permission denied"

12345