/external/selinux/sepolgen/tests/test_data/ |
D | httpd.log | 1 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 2 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 3 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 4 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 5 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 6 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 7 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 8 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 9 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … 10 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for … [all …]
|
D | audit.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c… 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".… 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m… 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl… 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na… 15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root… 17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".g… 19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gd… 21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name="… 24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root"… [all …]
|
D | short.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c… 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".… 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m… 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl… 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na… 15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
|
/external/curl/tests/data/ |
D | test236 | 11 REPLY SIZE 550 access to this file is very much denied 12 REPLY APPE 550 I said: access to this file is very much denied 13 REPLY STOR 550 I said: access to this file is very much denied 23 FTP resume upload but denied access to remote file
|
D | test289 | 17 FTP resume upload but denied access to local file
|
D | test325 | 42 HTTPS with attempted redirect to denied HTTP
|
/external/selinux/policycoreutils/audit2allow/ |
D | test.log | 2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo… 5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394… 7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid… 9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi… 11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=244… 13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi… 16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for… 18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p… 20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p… 23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=… [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/protorpc/demos/quotas/backend/quotas/ |
D | services_test.py | 204 self.assertFalse(response.denied) 225 self.assertTrue(response.denied) 252 self.assertTrue(response.denied) 278 self.assertTrue(response.denied) 299 self.assertFalse(response.denied) 320 self.assertFalse(response.denied) 347 self.assertTrue(response.denied) 373 self.assertTrue(response.denied) 393 self.assertFalse(response.denied) 409 self.assertTrue(response.denied) [all …]
|
D | services.py | 149 denied = messages.BooleanField(2, required=True) variable in QuotaResponse 383 response.denied = False 409 response.denied = True 414 response.denied = True 416 if response.denied:
|
/external/valgrind/none/tests/scripts/ |
D | shell.stderr.exp-dash | 1 ./shell: 10: ./x86/: Permission denied 2 ./shell: 13: ./shell.vgtest: Permission denied
|
D | shell.stderr.exp-dash2 | 1 ./shell: 10: ./shell: ./x86/: Permission denied 2 ./shell: 13: ./shell: ./shell.vgtest: Permission denied
|
D | shell_nonexec.stderr.exp | 1 valgrind: ./shell.vgtest: Permission denied
|
D | shell.stderr.exp-solaris-spawn | 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
|
D | shell.stderr.exp | 2 ./shell: ./shell.vgtest: Permission denied
|
D | shell.stderr.exp-illumos | 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
|
D | shell.stderr.exp-solaris | 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
|
/external/selinux/policycoreutils/sepolicy/sepolicy/help/ |
D | files_apps.txt | 4 …tion is allowed to do with the type. If your application type is being denied access to a partic… 8 Note if the label of the content that is being denied is owned by another domain, you might have to…
|
D | files_write.txt | 4 …tion is allowed to do with the type. If your application type is being denied access to a partic… 8 Note if the label of the content that is being denied is owned by another domain, you might have to…
|
D | system_current_mode.txt | 4 … SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was…
|
/external/libselinux/src/ |
D | avc.c | 658 access_vector_t denied, audited; in avc_audit() local 660 denied = requested & ~avd->allowed; in avc_audit() 661 if (denied) in avc_audit() 662 audited = denied & avd->auditdeny; in avc_audit() 664 audited = denied = requested; in avc_audit() 676 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit() 688 if (denied || !requested) in avc_audit() 718 access_vector_t denied; in avc_has_perm_noaudit() local 772 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit() 774 if (!requested || denied) { in avc_has_perm_noaudit()
|
/external/selinux/libselinux/src/ |
D | avc.c | 698 access_vector_t denied, audited; in avc_audit() local 700 denied = requested & ~avd->allowed; in avc_audit() 701 if (denied) in avc_audit() 702 audited = denied & avd->auditdeny; in avc_audit() 704 audited = denied = requested; in avc_audit() 716 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit() 753 access_vector_t denied; in avc_has_perm_noaudit() local 807 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit() 809 if (!requested || denied) { in avc_has_perm_noaudit()
|
/external/valgrind/none/tests/ |
D | cmdline6.stderr.exp | 1 valgrind: ./cmdline6.vgtest: Permission denied
|
/external/valgrind/none/tests/darwin/ |
D | access_extended.stderr.exp | 3 access_extended.c(X_OK) = 13 (Permission denied)
|
/external/selinux/sepolgen/tests/ |
D | audit.txt | 1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c… 3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr… 4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-… 6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr… 7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-… 9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa… 10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c… 12 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-scr… 13 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-… 15 type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-scr… [all …]
|
/external/e2fsprogs/lib/ss/ |
D | ss_err.et | 25 "Permission denied"
|