HomeSort by relevance Sort by last modified time
    Searched full:denied (Results 1 - 25 of 938) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/valgrind/none/tests/
cmdline6.stderr.exp 1 valgrind: ./cmdline6.vgtest: Permission denied
  /external/valgrind/none/tests/scripts/
shell_nonexec.stderr.exp 1 valgrind: ./shell.vgtest: Permission denied
shell.stderr.exp-dash 1 ./shell: 10: ./x86/: Permission denied
2 ./shell: 13: ./shell.vgtest: Permission denied
shell.stderr.exp-dash2 1 ./shell: 10: ./shell: ./x86/: Permission denied
2 ./shell: 13: ./shell: ./shell.vgtest: Permission denied
shell.stderr.exp-solaris-spawn 2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
shell.stderr.exp 2 ./shell: ./shell.vgtest: Permission denied
  /external/curl/tests/data/
test236 11 REPLY SIZE 550 access to this file is very much denied
12 REPLY APPE 550 I said: access to this file is very much denied
13 REPLY STOR 550 I said: access to this file is very much denied
23 FTP resume upload but denied access to remote file
test289 17 FTP resume upload but denied access to local file
  /external/valgrind/none/tests/darwin/
access_extended.stderr.exp 3 access_extended.c(X_OK) = 13 (Permission denied)
  /external/iw/
status.c 8 [11] = "Reassociation denied due to inability to confirm that association exists",
9 [12] = "Association denied due to reason outside the scope of this standard",
14 [17] = "Association denied because AP is unable to handle additional associated STA",
15 [18] = "Association denied due to requesting station not supporting all of the data rates in the BSSBasicRateSet parameter",
16 [19] = "Association denied due to requesting station not supporting the short preamble option",
17 [20] = "Association denied due to requesting station not supporting the PBCC modulation option",
18 [21] = "Association denied due to requesting station not supporting the channel agility option",
24 [27] = "Association denied due to requesting STA not supporting HT features",
26 [29] = "Association denied because the requesting STA does not support the PCO transition required by the AP",
30 [33] = "Association denied due to QAP having insufficient bandwidth to handle another QSTA"
    [all...]
  /external/clang/test/CodeGen/
c-unicode.c 3 // RUN: not %clang --target=x86_64--linux-gnu -std=c89 -S %s -o - 2>&1 | FileCheck %s -check-prefix=DENIED
7 // DENIED: warning: universal character names are only valid in C99 or C++; treating as '\' followed by identifier [-Wunicode]
8 // DENIED: error: expected identifier or '('
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
files_apps.txt 4 The description should give you a decent description for what the application is allowed to do with the type. If your application type is being denied access to a particular file, you might want to change the label of that file.
8 Note if the label of the content that is being denied is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access.
files_write.txt 4 The description should give you a decent description for what the application is allowed to do with the type. If your application type is being denied access to a particular file, you might want to change the label of that file.
8 Note if the label of the content that is being denied is owned by another domain, you might have to write policy or use 'audit2allow -M mypol'
system_current_mode.txt 4 When a machine is in permissive mode, SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was in enforcing mode.
  /external/e2fsprogs/lib/ss/
ss_err.et 25 "Permission denied"
  /system/tpm/trunks/
com.android.Trunks.conf 11 <!-- introspection denied -->
org.chromium.Trunks.conf 11 <!-- introspection denied -->
  /external/libmicrohttpd/src/examples/
authorization_example.c 37 #define DENIED "<html><head><title>Access denied</title></head><body>Access denied</body></html>"
73 response = MHD_create_response_from_buffer (strlen (DENIED),
74 (void *) DENIED,
digest_auth_example.c 31 #define DENIED "<html><head><title>libmicrohttpd demo</title></head><body>Access denied</body></html>"
52 response = MHD_create_response_from_buffer(strlen (DENIED),
53 DENIED,
70 response = MHD_create_response_from_buffer(strlen (DENIED),
71 DENIED,
  /external/selinux/sepolgen/tests/test_data/
httpd.log 1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getP (…)
    [all...]
  /developers/build/prebuilts/gradle/RuntimePermissionsBasic/Application/src/main/res/values/
strings.xml 3 <string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has denied access (for example when camera access has been disabled).</string>
  /developers/samples/android/system/RuntimePermissionsBasic/Application/src/main/res/values/
strings.xml 3 <string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has denied access (for example when camera access has been disabled).</string>
  /development/samples/browseable/RuntimePermissionsBasic/res/values/
strings.xml 3 <string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has denied access (for example when camera access has been disabled).</string>
  /system/tpm/attestation/server/
org.chromium.Attestation.conf 11 <!-- introspection denied -->
  /system/tpm/tpm_manager/server/
org.chromium.TpmManager.conf 11 <!-- introspection denied -->

Completed in 738 milliseconds

1 2 3 4 5 6 7 8 91011>>