Searched refs:denied (Results 1 – 25 of 75) sorted by relevance
123
1 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …2 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …3 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …4 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …5 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …6 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …7 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …8 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …9 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …10 …id=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for …[all …]
1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…17 type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".g…19 type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gd…21 type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name="…24 type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root"…[all …]
1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…15 type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root…
11 REPLY SIZE 550 access to this file is very much denied12 REPLY APPE 550 I said: access to this file is very much denied13 REPLY STOR 550 I said: access to this file is very much denied23 FTP resume upload but denied access to remote file
17 FTP resume upload but denied access to local file
42 HTTPS with attempted redirect to denied HTTP
2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…11 node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=244…13 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…16 node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for…18 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…20 node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for p…23 node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=…[all …]
1 ./shell: 10: ./x86/: Permission denied2 ./shell: 13: ./shell.vgtest: Permission denied
1 ./shell: 10: ./shell: ./x86/: Permission denied2 ./shell: 13: ./shell: ./shell.vgtest: Permission denied
1 valgrind: ./shell.vgtest: Permission denied
2 ./shell[13]: ./shell.vgtest: cannot execute [Permission denied]
2 ./shell: ./shell.vgtest: Permission denied
4 …tion is allowed to do with the type. If your application type is being denied access to a partic…8 Note if the label of the content that is being denied is owned by another domain, you might have to…
4 … SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was…
698 access_vector_t denied, audited; in avc_audit() local700 denied = requested & ~avd->allowed; in avc_audit()701 if (denied) in avc_audit()702 audited = denied & avd->auditdeny; in avc_audit()704 audited = denied = requested; in avc_audit()716 "%s: %s ", avc_prefix, (denied || !requested) ? "denied" : "granted"); in avc_audit()753 access_vector_t denied; in avc_has_perm_noaudit() local807 denied = requested & ~(ae->avd.allowed); in avc_has_perm_noaudit()809 if (!requested || denied) { in avc_has_perm_noaudit()
1 valgrind: ./cmdline6.vgtest: Permission denied
3 access_extended.c(X_OK) = 13 (Permission denied)
1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…12 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-scr…13 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-…15 type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-scr…[all …]
25 "Permission denied"
75 NEW_ERRORS=`egrep -ic "(err|fail|invalid|cannot|denied)" $LOGFILE`
17 permission from the server listening on /dev/jail-request, or is denied
16 purity shouldn't be denied to Ubuntu users.