HomeSort by relevance Sort by last modified time
    Searched full:contexts (Results 76 - 100 of 2585) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/valgrind/drd/tests/
annotate_order_1.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
annotate_order_2.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
annotate_order_3.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
annotate_spinlock.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
boost_thread.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
pth_cleanup_handler.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
rwlock_test.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
tc17_sembar.stderr.exp 5 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
annotate_hb_race.stderr.exp 8 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
annotate_publish_hg.stderr.exp 7 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
linuxthreads_det.stderr.exp-linuxthreads 7 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
tc15_laog_lockdel.stderr.exp 8 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
  /external/valgrind/helgrind/tests/
rwlock_test.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
tc17_sembar.stderr.exp 5 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
  /frameworks/base/services/tests/servicestests/src/com/android/server/pm/dex/
DexoptUtilsTest.java 115 String[] contexts = DexoptUtils.getClassLoaderContexts( local
118 assertEquals(9, contexts.length);
119 assertEquals("PCL[a.dex:b.dex]", contexts[0]);
121 contexts[1]);
122 assertEquals("DLC[];PCL[base-4.dex];PCL[a.dex:b.dex:base.dex]", contexts[2]);
123 assertEquals("PCL[];PCL[base-4.dex];PCL[a.dex:b.dex:base.dex]", contexts[3]);
124 assertEquals("PCL[];PCL[a.dex:b.dex:base.dex]", contexts[4]);
125 assertEquals("PCL[];PCL[a.dex:b.dex:base.dex]", contexts[5]);
126 assertEquals("PCL[];PCL[base-5.dex];PCL[a.dex:b.dex:base.dex]", contexts[6]);
127 assertEquals(null, contexts[7]); // config spli
135 String[] contexts = DexoptUtils.getClassLoaderContexts( local
161 String[] contexts = DexoptUtils.getClassLoaderContexts( local
184 String[] contexts = DexoptUtils.getClassLoaderContexts( local
204 String[] contexts = DexoptUtils.getClassLoaderContexts( local
223 String[] contexts = DexoptUtils.getClassLoaderContexts( local
234 String[] contexts = DexoptUtils.getClassLoaderContexts( local
246 String[] contexts = DexoptUtils.getClassLoaderContexts( local
256 String[] contexts = DexoptUtils.getClassLoaderContexts( local
267 String[] contexts = DexoptUtils.getClassLoaderContexts( local
280 String[] contexts = DexoptUtils.getClassLoaderContexts( local
299 String[] contexts = DexoptUtils.getClassLoaderContexts( local
    [all...]
  /external/selinux/libselinux/man/man5/
selabel_file.5 6 selabel_file \- userspace SELinux labeling interface and configuration file format for the file contexts backend
25 The file contexts backend maps from pathname/mode combinations into security contexts. It is used to find the appropriate context for each file when relabeling a file system. The returned \fIcontext\fR must be freed using \fBfreecon\fR(3).
27 \fBselabel_lookup\fR(3) describes the function with its return and error codes, however the following \fIerrno\fR is clarified further for the file contexts backend:
31 No context corresponding to the \fIpath\fR and \fImode\fR was found - This will also be returned when the file contexts series of files have a context of \fB<<none>>\fR against the \fIpath\fR (see the \fBFILE FORMAT\fR section).
52 A non-null value for this option specifies a path to a file that will be opened in lieu of the standard file contexts file. This value is also used as the base name for determining the names of local customization files.
55 A non-null value for this option indicates that any local customizations to the file contexts mapping should be ignored.
64 The file context files used to retrieve the default context depends on the \fBSELABEL_OPT_PATH\fR parameter passed to \fBselabel_open\fR(3). If \fINULL\fR, then the \fBSELABEL_OPT_PATH\fR value will default to the active policy file contexts location (as returned by \fBselinux_file_context_path\fR(3)), otherwise the actual \fBSELABEL_OPT_PATH\fR value specified is used.
69 The mandatory file contexts file that is either the fully qualified file name from \fISELABEL_OPT_PATH.value\fR or if \fINULL\fR, then the path returned by \fBselinux_file_context_path\fR(3).
71 The optional local and distribution substitution files that perform path aliasing on the 'in memory' version of the file contexts file
    [all...]
selabel_media.5 6 selabel_media \- userspace SELinux labeling interface and configuration file format for the media contexts backend
25 The media contexts backend maps from media device names such as "cdrom" or "floppy" into security contexts. It is used to find the appropriate context for establishing context mounts on these devices. The returned \fIcontext\fR must be freed using \fBfreecon\fR(3).
44 A non-null value for this option specifies a path to a file that will be opened in lieu of the standard \fImedia\fR contexts file.
47 The media context file used to retrieve a default context depends on the \fBSELABEL_OPT_PATH\fR parameter passed to \fBselabel_open\FR(3). If \fINULL\fR, then the \fBSELABEL_OPT_PATH\fR value will default to the active policy media contexts location (as returned by \fBselinux_media_context_path\fR(3)), otherwise the actual \fBSELABEL_OPT_PATH\fR value specified is used.
49 The default media contexts file is:
51 .I /etc/selinux/{SELINUXTYPE}/contexts/files/media
78 # contexts/files/media
87 If contexts are to be validated, then the global option \fBSELABEL_OPT_VALIDATE\fR must be set before calling \fBselabel_open\fR(3). If
default_contexts.5 3 default_contexts \- The SELinux default contexts configuration file
6 The default contexts configuration file \fIdefault_contexts\fR contains entries that allow SELinux-aware login applications such as
28 The default context configuration file path for the active policy is returned by \fBselinux_default_contexts_path\fR(3). The default, default contexts file is:
30 .I /etc/selinux/{SELINUXTYPE}/contexts/default_contexts
54 # ./contexts/default_contexts
virtual_domain_context.5 8 file contains a list of domain contexts that are available for use by the SELinux-aware virtulization API libvirt (see \fBlibvirtd\fR(8)).
13 .I /etc/selinux/{SELINUXTYPE}/contexts/virtual_domain_context
33 # ./contexts/virtual_domain_context
virtual_image_context.5 8 file contains a list of image contexts for use by the SELinux-aware virtulization API libvirt (see \fBlibvirtd\fR(8)).
13 .I /etc/selinux/{SELINUXTYPE}/contexts/virtual_image_context
33 # ./contexts/virtual_image_context
  /external/selinux/libselinux/man/man3/
matchmediacon.3 12 matches the specified media type with the media contexts configuration and
27 .I /etc/selinux/{POLICYTYPE}/contexts/files/media
selinux_file_context_cmp.3 3 selinux_file_context_cmp \- Compare two SELinux security contexts excluding the 'user' component
21 This is useful as for most object contexts, the user component is not relevant.
47 The contexts being compared do not specifically need to be file contexts.
  /external/clang/test/Coverage/
ast-printing.c 4 // RUN: %clang_cc1 -print-decl-contexts %s
ast-printing.cpp 4 // RUN: %clang_cc1 -print-decl-contexts %s
  /external/valgrind/gdbserver_tests/
mcmain_pic.stderr.exp 6 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)

Completed in 470 milliseconds

1 2 34 5 6 7 8 91011>>