/external/libchrome/base/threading/ |
H A D | thread_restrictions.cc | 29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument 31 g_io_disallowed.Get().Set(!allowed); 40 "disallows IO! If this thread really should be allowed to " 48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument 50 g_singleton_disallowed.Get().Set(!allowed); 57 NOTREACHED() << "LazyInstance/Singleton is not allowed to be used on this " 76 NOTREACHED() << "Waiting is not allowed to be used on this thread to " 81 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument 83 g_wait_disallowed.Get().Set(!allowed);
|
H A D | thread_restrictions.h | 106 // 1) If a thread should not be allowed to make IO calls, mark it: 108 // By default, threads *are* allowed to make IO calls. 112 // current thread is allowed: 132 // Whether IO is allowed when the ScopedAllowIO was constructed. 140 // Threads start out in the *allowed* state. 142 static bool SetIOAllowed(bool allowed); 144 // Check whether the current thread is allowed to make IO calls, 151 static bool SetSingletonAllowed(bool allowed); 153 // Check whether the current thread is allowed to use singletons (Singleton / 157 // Disable waiting on the current thread. Threads start out in the *allowed* 166 SetIOAllowed(bool allowed) argument 168 SetSingletonAllowed(bool allowed) argument 231 SetWaitAllowed(bool allowed) argument [all...] |
/external/curl/docs/cmdline-opts/ |
H A D | connect-timeout.d | 3 Help: Maximum time allowed for connection
|
H A D | max-redirs.d | 3 Help: Maximum number of redirects allowed 6 Set maximum number of redirection-followings allowed. When --location is used,
|
H A D | data-raw.d | 4 Help: HTTP POST data, '@' allowed
|
H A D | delegation.d | 6 Set LEVEL to tell the server what it is allowed to delegate when it
|
H A D | max-time.d | 4 Help: Maximum time allowed for the transfer
|
/external/tensorflow/tensorflow/core/framework/ |
H A D | kernel_def_builder.cc | 38 const char* attr_name, gtl::ArraySlice<DataType> allowed) { 42 for (DataType dt : allowed) { 49 DataType allowed) { 52 constraint->mutable_allowed_values()->mutable_list()->add_type(allowed); 37 TypeConstraint( const char* attr_name, gtl::ArraySlice<DataType> allowed) argument 48 TypeConstraint(const char* attr_name, DataType allowed) argument
|
H A D | kernel_def_builder.h | 47 gtl::ArraySlice<DataType> allowed); 50 KernelDefBuilder& TypeConstraint(const char* attr_name, DataType allowed);
|
H A D | op_def_builder.cc | 124 bool ProcessCompoundType(const StringPiece type_string, AttrValue* allowed) { argument 127 allowed->mutable_list()->add_type(dt); 131 allowed->mutable_list()->add_type(dt); 136 allowed->mutable_list()->add_type(dt); 176 AttrValue* allowed = attr->mutable_allowed_values(); local 177 VERIFY(ProcessCompoundType(type_string, allowed), 181 AttrValue* allowed = attr->mutable_allowed_values(); local 189 "Trouble parsing allowed string at '", spec, "'"); 195 allowed->mutable_list()->add_s(unescaped); 210 if (ProcessCompoundType(type_string, allowed)) { [all...] |
/external/nos/host/android/hals/oemlock/ |
H A D | OemLock.cpp | 51 bool allowed, const hidl_vec<uint8_t>& signature) { 52 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByCarrier: " << allowed; 54 if (!allowed) { 97 const bool allowed = response.locked() == 0; local 98 _hidl_cb(OemLockStatus::OK, allowed); 102 Return<OemLockStatus> OemLock::setOemUnlockAllowedByDevice(bool allowed) { argument 103 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByDevice: " << allowed; 106 request.set_locked(allowed ? 0 : 1); 132 const bool allowed = response.locked() == 0; local 133 _hidl_cb(OemLockStatus::OK, allowed); 50 setOemUnlockAllowedByCarrier( bool allowed, const hidl_vec<uint8_t>& signature) argument [all...] |
/external/libese/esed/ |
H A D | OemLock.cpp | 38 bool allowed, const hidl_vec<uint8_t>& signature) { 39 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByCarrier: " << allowed; 50 // "allowed" == unlocked == 0. 51 uint8_t lock_byte = allowed ? 0 : 1; 66 LOG(ERROR) << "Failed to change lock state (allowed=" 67 << allowed << "): " << res; 117 // if data[0] == 1, lock == true, so allowed == false. 122 Return<OemLockStatus> OemLock::setOemUnlockAllowedByDevice(bool allowed) { argument 123 LOG(INFO) << "Running OemLock::setOemUnlockAllowedByDevice: " << allowed; 126 // "allowed" 37 setOemUnlockAllowedByCarrier( bool allowed, const hidl_vec<uint8_t>& signature) argument [all...] |
H A D | OemLock.h | 43 bool allowed, const hidl_vec<uint8_t>& signature) override; 47 Return<OemLockStatus> setOemUnlockAllowedByDevice(bool allowed) override;
|
/external/clang/test/Preprocessor/ |
H A D | warning_tests.c | 37 #error Alias expansion not allowed
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 58 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/tensorflow/tensorflow/python/kernel_tests/ |
H A D | priority_queue_test.py | 55 allowed = {} 58 if e not in allowed: 59 allowed[e] = set() 60 allowed[e].add((v0, v1)) 65 self.assertTrue((dv0, dv1) in allowed[e]) 101 allowed = {} 104 if e not in allowed: 105 allowed[e] = set() 106 allowed[e].add((v0, v1)) 111 self.assertTrue((dv0, dv1) in allowed[ [all...] |
/external/llvm/test/MC/ARM/ |
H A D | arm-qualifier-diagnostics.s | 9 @ CHECK: error: instruction with .n (narrow) qualifier not allowed in arm mode
|
H A D | directive-arch_extension-sec.s | 15 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture 18 @ CHECK-V7-NOT: error: architectural extension 'sec' is not allowed for the current base architecture 26 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture 29 @ CHECK-V7-NOT: error: architectural extension 'sec' is not allowed for the current base architecture
|
/external/nos/host/android/hals/oemlock/test/ |
H A D | test.cpp | 169 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) { 171 (void) allowed; 184 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) { 186 ASSERT_TRUE(allowed); 199 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) { 201 ASSERT_FALSE(allowed); 211 hal.isOemUnlockAllowedByCarrier([](OemLockStatus status, bool allowed) { 213 (void) allowed; 266 hal.isOemUnlockAllowedByDevice([](OemLockStatus status, bool allowed) { 268 (void) allowed; [all...] |
/external/libmojo/mojo/public/cpp/bindings/lib/ |
H A D | sync_call_restrictions.cc | 23 bool allowed() const { function in class:mojo::__anon11835::SyncCallSettings 72 if (!SyncCallSettings::current()->allowed()) { 73 LOG(FATAL) << "Mojo sync calls are not allowed in this process because "
|
/external/nos/host/android/hals/oemlock/include/ |
H A D | OemLock.h | 45 bool allowed, const hidl_vec<uint8_t>& signature) override; 47 Return<OemLockStatus> setOemUnlockAllowedByDevice(bool allowed) override;
|
/external/testng/src/test/java/test/ |
H A D | ReturnValueTest.java | 41 private void runTest(boolean allowed) { argument 48 if (allowed) {
|
/external/selinux/libselinux/src/ |
H A D | compute_av.c | 54 &avd->allowed, &avd->decided, 89 avd->allowed = lavd.allowed; 143 avd->allowed = lavd.allowed;
|
/external/selinux/libselinux/utils/ |
H A D | compute_av.c | 32 printf("allowed="); 33 print_access_vector(tclass, avd.allowed);
|
/external/linux-kselftest/tools/testing/selftests/vm/ |
H A D | compaction_test.c | 56 char allowed; local 67 if (read(fd, &allowed, sizeof(char)) != sizeof(char)) { 75 if (allowed == '1')
|