OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:denied
(Results
1 - 25
of
938
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/valgrind/none/tests/
cmdline6.stderr.exp
1
valgrind: ./cmdline6.vgtest: Permission
denied
/external/valgrind/none/tests/scripts/
shell_nonexec.stderr.exp
1
valgrind: ./shell.vgtest: Permission
denied
shell.stderr.exp-dash
1
./shell: 10: ./x86/: Permission
denied
2
./shell: 13: ./shell.vgtest: Permission
denied
shell.stderr.exp-dash2
1
./shell: 10: ./shell: ./x86/: Permission
denied
2
./shell: 13: ./shell: ./shell.vgtest: Permission
denied
shell.stderr.exp-solaris-spawn
2
./shell[13]: ./shell.vgtest: cannot execute [Permission
denied
]
shell.stderr.exp
2
./shell: ./shell.vgtest: Permission
denied
/external/curl/tests/data/
test236
11
REPLY SIZE 550 access to this file is very much
denied
12
REPLY APPE 550 I said: access to this file is very much
denied
13
REPLY STOR 550 I said: access to this file is very much
denied
23
FTP resume upload but
denied
access to remote file
test289
17
FTP resume upload but
denied
access to local file
/external/valgrind/none/tests/darwin/
access_extended.stderr.exp
3
access_extended.c(X_OK) = 13 (Permission
denied
)
/external/iw/
status.c
8
[11] = "Reassociation
denied
due to inability to confirm that association exists",
9
[12] = "Association
denied
due to reason outside the scope of this standard",
14
[17] = "Association
denied
because AP is unable to handle additional associated STA",
15
[18] = "Association
denied
due to requesting station not supporting all of the data rates in the BSSBasicRateSet parameter",
16
[19] = "Association
denied
due to requesting station not supporting the short preamble option",
17
[20] = "Association
denied
due to requesting station not supporting the PBCC modulation option",
18
[21] = "Association
denied
due to requesting station not supporting the channel agility option",
24
[27] = "Association
denied
due to requesting STA not supporting HT features",
26
[29] = "Association
denied
because the requesting STA does not support the PCO transition required by the AP",
30
[33] = "Association
denied
due to QAP having insufficient bandwidth to handle another QSTA"
[
all
...]
/external/clang/test/CodeGen/
c-unicode.c
3
// RUN: not %clang --target=x86_64--linux-gnu -std=c89 -S %s -o - 2>&1 | FileCheck %s -check-prefix=
DENIED
7
//
DENIED
: warning: universal character names are only valid in C99 or C++; treating as '\' followed by identifier [-Wunicode]
8
//
DENIED
: error: expected identifier or '('
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
files_apps.txt
4
The description should give you a decent description for what the application is allowed to do with the type. If your application type is being
denied
access to a particular file, you might want to change the label of that file.
8
Note if the label of the content that is being
denied
is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access.
files_write.txt
4
The description should give you a decent description for what the application is allowed to do with the type. If your application type is being
denied
access to a particular file, you might want to change the label of that file.
8
Note if the label of the content that is being
denied
is owned by another domain, you might have to write policy or use 'audit2allow -M mypol'
system_current_mode.txt
4
When a machine is in permissive mode, SELinux will continue to log SELinux AVC messages, that would have been
denied
if the machine was in enforcing mode.
/external/e2fsprogs/lib/ss/
ss_err.et
25
"Permission
denied
"
/system/tpm/trunks/
com.android.Trunks.conf
11
<!-- introspection
denied
-->
org.chromium.Trunks.conf
11
<!-- introspection
denied
-->
/external/libmicrohttpd/src/examples/
authorization_example.c
37
#define
DENIED
"<html><head><title>Access
denied
</title></head><body>Access
denied
</body></html>"
73
response = MHD_create_response_from_buffer (strlen (
DENIED
),
74
(void *)
DENIED
,
digest_auth_example.c
31
#define
DENIED
"<html><head><title>libmicrohttpd demo</title></head><body>Access
denied
</body></html>"
52
response = MHD_create_response_from_buffer(strlen (
DENIED
),
53
DENIED
,
70
response = MHD_create_response_from_buffer(strlen (
DENIED
),
71
DENIED
,
/external/selinux/sepolgen/tests/test_data/
httpd.log
1
type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
2
type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
3
type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
4
type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
5
type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
6
type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
7
type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
8
type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
9
type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
10
type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc:
denied
{ send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getP (…)
[
all
...]
/developers/build/prebuilts/gradle/RuntimePermissionsBasic/Application/src/main/res/values/
strings.xml
3
<string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has
denied
access (for example when camera access has been disabled).</string>
/developers/samples/android/system/RuntimePermissionsBasic/Application/src/main/res/values/
strings.xml
3
<string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has
denied
access (for example when camera access has been disabled).</string>
/development/samples/browseable/RuntimePermissionsBasic/res/values/
strings.xml
3
<string name="camera_unavailable"><b>Camera could not be opened.</b>\nThis occurs when the camera is not available (for example it is already in use) or if the system has
denied
access (for example when camera access has been disabled).</string>
/system/tpm/attestation/server/
org.chromium.Attestation.conf
11
<!-- introspection
denied
-->
/system/tpm/tpm_manager/server/
org.chromium.TpmManager.conf
11
<!-- introspection
denied
-->
Completed in 846 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>