/external/valgrind/drd/tests/ |
annotate_order_1.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
annotate_order_2.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
annotate_order_3.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
annotate_spinlock.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
boost_thread.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
pth_cleanup_handler.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
rwlock_test.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
tc17_sembar.stderr.exp | 5 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
annotate_hb_race.stderr.exp | 8 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
annotate_publish_hg.stderr.exp | 7 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
linuxthreads_det.stderr.exp-linuxthreads | 7 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
tc15_laog_lockdel.stderr.exp | 8 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
/external/valgrind/helgrind/tests/ |
rwlock_test.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
tc17_sembar.stderr.exp | 5 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
/frameworks/base/services/tests/servicestests/src/com/android/server/pm/dex/ |
DexoptUtilsTest.java | 115 String[] contexts = DexoptUtils.getClassLoaderContexts( local 118 assertEquals(9, contexts.length); 119 assertEquals("PCL[a.dex:b.dex]", contexts[0]); 121 contexts[1]); 122 assertEquals("DLC[];PCL[base-4.dex];PCL[a.dex:b.dex:base.dex]", contexts[2]); 123 assertEquals("PCL[];PCL[base-4.dex];PCL[a.dex:b.dex:base.dex]", contexts[3]); 124 assertEquals("PCL[];PCL[a.dex:b.dex:base.dex]", contexts[4]); 125 assertEquals("PCL[];PCL[a.dex:b.dex:base.dex]", contexts[5]); 126 assertEquals("PCL[];PCL[base-5.dex];PCL[a.dex:b.dex:base.dex]", contexts[6]); 127 assertEquals(null, contexts[7]); // config spli 135 String[] contexts = DexoptUtils.getClassLoaderContexts( local 161 String[] contexts = DexoptUtils.getClassLoaderContexts( local 184 String[] contexts = DexoptUtils.getClassLoaderContexts( local 204 String[] contexts = DexoptUtils.getClassLoaderContexts( local 223 String[] contexts = DexoptUtils.getClassLoaderContexts( local 234 String[] contexts = DexoptUtils.getClassLoaderContexts( local 246 String[] contexts = DexoptUtils.getClassLoaderContexts( local 256 String[] contexts = DexoptUtils.getClassLoaderContexts( local 267 String[] contexts = DexoptUtils.getClassLoaderContexts( local 280 String[] contexts = DexoptUtils.getClassLoaderContexts( local 299 String[] contexts = DexoptUtils.getClassLoaderContexts( local [all...] |
/external/selinux/libselinux/man/man5/ |
selabel_file.5 | 6 selabel_file \- userspace SELinux labeling interface and configuration file format for the file contexts backend 25 The file contexts backend maps from pathname/mode combinations into security contexts. It is used to find the appropriate context for each file when relabeling a file system. The returned \fIcontext\fR must be freed using \fBfreecon\fR(3). 27 \fBselabel_lookup\fR(3) describes the function with its return and error codes, however the following \fIerrno\fR is clarified further for the file contexts backend: 31 No context corresponding to the \fIpath\fR and \fImode\fR was found - This will also be returned when the file contexts series of files have a context of \fB<<none>>\fR against the \fIpath\fR (see the \fBFILE FORMAT\fR section). 52 A non-null value for this option specifies a path to a file that will be opened in lieu of the standard file contexts file. This value is also used as the base name for determining the names of local customization files. 55 A non-null value for this option indicates that any local customizations to the file contexts mapping should be ignored. 64 The file context files used to retrieve the default context depends on the \fBSELABEL_OPT_PATH\fR parameter passed to \fBselabel_open\fR(3). If \fINULL\fR, then the \fBSELABEL_OPT_PATH\fR value will default to the active policy file contexts location (as returned by \fBselinux_file_context_path\fR(3)), otherwise the actual \fBSELABEL_OPT_PATH\fR value specified is used. 69 The mandatory file contexts file that is either the fully qualified file name from \fISELABEL_OPT_PATH.value\fR or if \fINULL\fR, then the path returned by \fBselinux_file_context_path\fR(3). 71 The optional local and distribution substitution files that perform path aliasing on the 'in memory' version of the file contexts file [all...] |
selabel_media.5 | 6 selabel_media \- userspace SELinux labeling interface and configuration file format for the media contexts backend 25 The media contexts backend maps from media device names such as "cdrom" or "floppy" into security contexts. It is used to find the appropriate context for establishing context mounts on these devices. The returned \fIcontext\fR must be freed using \fBfreecon\fR(3). 44 A non-null value for this option specifies a path to a file that will be opened in lieu of the standard \fImedia\fR contexts file. 47 The media context file used to retrieve a default context depends on the \fBSELABEL_OPT_PATH\fR parameter passed to \fBselabel_open\FR(3). If \fINULL\fR, then the \fBSELABEL_OPT_PATH\fR value will default to the active policy media contexts location (as returned by \fBselinux_media_context_path\fR(3)), otherwise the actual \fBSELABEL_OPT_PATH\fR value specified is used. 49 The default media contexts file is: 51 .I /etc/selinux/{SELINUXTYPE}/contexts/files/media 78 # contexts/files/media 87 If contexts are to be validated, then the global option \fBSELABEL_OPT_VALIDATE\fR must be set before calling \fBselabel_open\fR(3). If
|
default_contexts.5 | 3 default_contexts \- The SELinux default contexts configuration file 6 The default contexts configuration file \fIdefault_contexts\fR contains entries that allow SELinux-aware login applications such as 28 The default context configuration file path for the active policy is returned by \fBselinux_default_contexts_path\fR(3). The default, default contexts file is: 30 .I /etc/selinux/{SELINUXTYPE}/contexts/default_contexts 54 # ./contexts/default_contexts
|
virtual_domain_context.5 | 8 file contains a list of domain contexts that are available for use by the SELinux-aware virtulization API libvirt (see \fBlibvirtd\fR(8)). 13 .I /etc/selinux/{SELINUXTYPE}/contexts/virtual_domain_context 33 # ./contexts/virtual_domain_context
|
virtual_image_context.5 | 8 file contains a list of image contexts for use by the SELinux-aware virtulization API libvirt (see \fBlibvirtd\fR(8)). 13 .I /etc/selinux/{SELINUXTYPE}/contexts/virtual_image_context 33 # ./contexts/virtual_image_context
|
/external/selinux/libselinux/man/man3/ |
matchmediacon.3 | 12 matches the specified media type with the media contexts configuration and 27 .I /etc/selinux/{POLICYTYPE}/contexts/files/media
|
selinux_file_context_cmp.3 | 3 selinux_file_context_cmp \- Compare two SELinux security contexts excluding the 'user' component 21 This is useful as for most object contexts, the user component is not relevant. 47 The contexts being compared do not specifically need to be file contexts.
|
/external/clang/test/Coverage/ |
ast-printing.c | 4 // RUN: %clang_cc1 -print-decl-contexts %s
|
ast-printing.cpp | 4 // RUN: %clang_cc1 -print-decl-contexts %s
|
/external/valgrind/gdbserver_tests/ |
mcmain_pic.stderr.exp | 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|