Searched refs:allowed (Results 1 - 25 of 153) sorted by relevance

1234567

/external/libchrome/base/threading/
H A Dthread_restrictions.cc29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument
31 g_io_disallowed.Get().Set(!allowed);
40 "disallows IO! If this thread really should be allowed to "
48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument
50 g_singleton_disallowed.Get().Set(!allowed);
57 NOTREACHED() << "LazyInstance/Singleton is not allowed to be used on this "
76 NOTREACHED() << "Waiting is not allowed to be used on this thread to "
81 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument
83 g_wait_disallowed.Get().Set(!allowed);
H A Dthread_restrictions.h106 // 1) If a thread should not be allowed to make IO calls, mark it:
108 // By default, threads *are* allowed to make IO calls.
112 // current thread is allowed:
132 // Whether IO is allowed when the ScopedAllowIO was constructed.
140 // Threads start out in the *allowed* state.
142 static bool SetIOAllowed(bool allowed);
144 // Check whether the current thread is allowed to make IO calls,
151 static bool SetSingletonAllowed(bool allowed);
153 // Check whether the current thread is allowed to use singletons (Singleton /
157 // Disable waiting on the current thread. Threads start out in the *allowed*
166 SetIOAllowed(bool allowed) argument
168 SetSingletonAllowed(bool allowed) argument
231 SetWaitAllowed(bool allowed) argument
[all...]
/external/curl/docs/cmdline-opts/
H A Dconnect-timeout.d3 Help: Maximum time allowed for connection
H A Dmax-redirs.d3 Help: Maximum number of redirects allowed
6 Set maximum number of redirection-followings allowed. When --location is used,
H A Ddata-raw.d4 Help: HTTP POST data, '@' allowed
H A Ddelegation.d6 Set LEVEL to tell the server what it is allowed to delegate when it
H A Dmax-time.d4 Help: Maximum time allowed for the transfer
/external/tensorflow/tensorflow/core/framework/
H A Dkernel_def_builder.cc38 const char* attr_name, gtl::ArraySlice<DataType> allowed) {
42 for (DataType dt : allowed) {
49 DataType allowed) {
52 constraint->mutable_allowed_values()->mutable_list()->add_type(allowed);
37 TypeConstraint( const char* attr_name, gtl::ArraySlice<DataType> allowed) argument
48 TypeConstraint(const char* attr_name, DataType allowed) argument
H A Dkernel_def_builder.h47 gtl::ArraySlice<DataType> allowed);
50 KernelDefBuilder& TypeConstraint(const char* attr_name, DataType allowed);
H A Dop_def_builder.cc124 bool ProcessCompoundType(const StringPiece type_string, AttrValue* allowed) { argument
127 allowed->mutable_list()->add_type(dt);
131 allowed->mutable_list()->add_type(dt);
136 allowed->mutable_list()->add_type(dt);
176 AttrValue* allowed = attr->mutable_allowed_values(); local
177 VERIFY(ProcessCompoundType(type_string, allowed),
181 AttrValue* allowed = attr->mutable_allowed_values(); local
189 "Trouble parsing allowed string at '", spec, "'");
195 allowed->mutable_list()->add_s(unescaped);
210 if (ProcessCompoundType(type_string, allowed)) {
[all...]
/external/nos/host/android/hals/oemlock/
H A DOemLock.cpp51 bool allowed, const hidl_vec<uint8_t>& signature) {
52 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByCarrier: " << allowed;
54 if (!allowed) {
97 const bool allowed = response.locked() == 0; local
98 _hidl_cb(OemLockStatus::OK, allowed);
102 Return<OemLockStatus> OemLock::setOemUnlockAllowedByDevice(bool allowed) { argument
103 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByDevice: " << allowed;
106 request.set_locked(allowed ? 0 : 1);
132 const bool allowed = response.locked() == 0; local
133 _hidl_cb(OemLockStatus::OK, allowed);
50 setOemUnlockAllowedByCarrier( bool allowed, const hidl_vec<uint8_t>& signature) argument
[all...]
/external/libese/esed/
H A DOemLock.cpp38 bool allowed, const hidl_vec<uint8_t>& signature) {
39 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByCarrier: " << allowed;
50 // "allowed" == unlocked == 0.
51 uint8_t lock_byte = allowed ? 0 : 1;
66 LOG(ERROR) << "Failed to change lock state (allowed="
67 << allowed << "): " << res;
117 // if data[0] == 1, lock == true, so allowed == false.
122 Return<OemLockStatus> OemLock::setOemUnlockAllowedByDevice(bool allowed) { argument
123 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByDevice: " << allowed;
126 // "allowed"
37 setOemUnlockAllowedByCarrier( bool allowed, const hidl_vec<uint8_t>& signature) argument
[all...]
H A DOemLock.h43 bool allowed, const hidl_vec<uint8_t>& signature) override;
47 Return<OemLockStatus> setOemUnlockAllowedByDevice(bool allowed) override;
/external/clang/test/Preprocessor/
H A Dwarning_tests.c37 #error Alias expansion not allowed
/external/selinux/libsepol/include/sepol/policydb/
H A Dflask_types.h58 sepol_access_vector_t allowed; member in struct:sepol_av_decision
/external/tensorflow/tensorflow/python/kernel_tests/
H A Dpriority_queue_test.py55 allowed = {}
58 if e not in allowed:
59 allowed[e] = set()
60 allowed[e].add((v0, v1))
65 self.assertTrue((dv0, dv1) in allowed[e])
101 allowed = {}
104 if e not in allowed:
105 allowed[e] = set()
106 allowed[e].add((v0, v1))
111 self.assertTrue((dv0, dv1) in allowed[
[all...]
/external/llvm/test/MC/ARM/
H A Darm-qualifier-diagnostics.s9 @ CHECK: error: instruction with .n (narrow) qualifier not allowed in arm mode
H A Ddirective-arch_extension-sec.s15 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture
18 @ CHECK-V7-NOT: error: architectural extension 'sec' is not allowed for the current base architecture
26 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture
29 @ CHECK-V7-NOT: error: architectural extension 'sec' is not allowed for the current base architecture
/external/nos/host/android/hals/oemlock/test/
H A Dtest.cpp169 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) {
171 (void) allowed;
184 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) {
186 ASSERT_TRUE(allowed);
199 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) {
201 ASSERT_FALSE(allowed);
211 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) {
213 (void) allowed;
266 hal.isOemUnlockAllowedByDevice([](OemLockStatus status, bool allowed) {
268 (void) allowed;
[all...]
/external/libmojo/mojo/public/cpp/bindings/lib/
H A Dsync_call_restrictions.cc23 bool allowed() const { function in class:mojo::__anon11835::SyncCallSettings
72 if (!SyncCallSettings::current()->allowed()) {
73 LOG(FATAL) << "Mojo sync calls are not allowed in this process because "
/external/nos/host/android/hals/oemlock/include/
H A DOemLock.h45 bool allowed, const hidl_vec<uint8_t>& signature) override;
47 Return<OemLockStatus> setOemUnlockAllowedByDevice(bool allowed) override;
/external/testng/src/test/java/test/
H A DReturnValueTest.java41 private void runTest(boolean allowed) { argument
48 if (allowed) {
/external/selinux/libselinux/src/
H A Dcompute_av.c54 &avd->allowed, &avd->decided,
89 avd->allowed = lavd.allowed;
143 avd->allowed = lavd.allowed;
/external/selinux/libselinux/utils/
H A Dcompute_av.c32 printf("allowed=");
33 print_access_vector(tclass, avd.allowed);
/external/linux-kselftest/tools/testing/selftests/vm/
H A Dcompaction_test.c56 char allowed; local
67 if (read(fd, &allowed, sizeof(char)) != sizeof(char)) {
75 if (allowed == '1')

Completed in 5253 milliseconds

1234567