/hardware/intel/common/libva/test/basic/ |
test_09.c | 25 #define TEST_DESCRIPTION "Create/destroy contexts for all profiles / entrypoints" 47 VAContextID *contexts = malloc(max_entrypoints * num_profiles * sizeof(VAContextID)); local 79 va_status = vaCreateContext( va_dpy, configs[i], width, height, flags, surfaces + i*surface_count, surface_count, &contexts[i] ); 85 status("vaDestroyContext for context %08x\n", contexts[i]); 86 va_status = vaDestroyContext( va_dpy, contexts[i] ); 100 free(contexts);
|
/packages/services/Car/tests/carservice_test/src/com/android/car/test/ |
AudioRoutingPolicyTest.java | 99 int contexts = v.get(VehicleAudioRoutingPolicyIndex.CONTEXTS); local 100 // check if all contexts are allowed ones. 101 assertTrue((contexts & ~( 126 v.get(VehicleAudioRoutingPolicyIndex.CONTEXTS).intValue()); 136 v.get(VehicleAudioRoutingPolicyIndex.CONTEXTS).intValue());
|
/external/clang/test/SemaObjCXX/ |
arc-ppe.mm | 3 // Make sure the ARC auto-deduction of id* in unevaluated contexts
|
/external/mesa3d/src/glx/apple/ |
RELEASE_NOTES | 49 o Shared Contexts 52 contexts requires a similar visual or GLXFBConfig be used in the 71 contexts, though they are all direct contexts by definition (see above).
|
/external/selinux/libselinux/include/selinux/ |
get_context_list.h | 12 /* Get an ordered list of authorized security contexts for a user session 14 NULL-terminated array of contexts. Every entry in the list will 65 /* Given a list of authorized security contexts for the user, 73 if a list of authorized contexts could not be obtained.
|
/external/selinux/libselinux/man/man3/ |
selabel_open.3 | 79 File contexts backend, described in 83 Media contexts backend, described in 87 X Windows contexts backend, described in 91 Database objects contexts backend, described in
|
/external/selinux/libselinux/src/ |
policy.h | 14 /* Initial length guess for getting contexts. */
|
/external/selinux/semodule-utils/semodule_package/ |
semodule_unpackage.8 | 6 .B semodule_unpackage <module> [<file contexts>]
|
/external/skia/tools/gpu/gl/debug/ |
GrProgramObj.h | 29 // TODO: this flag system won't work w/ multiple contexts!
|
/external/valgrind/drd/tests/ |
atomic_var.stderr.exp | 12 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
sem_as_mutex3.stderr.exp | 12 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
sem_open3.stderr.exp | 12 ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
|
/external/valgrind/memcheck/tests/ |
erringfds.stderr.exp | 11 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
/external/valgrind/memcheck/tests/linux/ |
brk.stderr.exp | 13 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
capget.stderr.exp2 | 15 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
lsframe1.stderr.exp | 12 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
lsframe2.stderr.exp | 12 ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
|
/external/clang/tools/libclang/ |
CIndexCodeCompletion.cpp | 296 unsigned long long Contexts; 329 Contexts(CXCompletionContext_Unknown), 355 unsigned long long contexts = 0; local 360 contexts = CXCompletionContext_MacroName; 367 contexts = CXCompletionContext_AnyType | 370 contexts |= CXCompletionContext_EnumTag | 379 contexts = CXCompletionContext_AnyType | 383 contexts |= CXCompletionContext_EnumTag | 392 contexts = CXCompletionContext_AnyValue; 394 contexts |= CXCompletionContext_AnyType [all...] |
/external/clang/test/SemaTemplate/ |
instantiate-sizeof.cpp | 3 // Make sure we handle contexts correctly with sizeof 13 // contexts in class template methods correctly. Previously we assumed these
|
instantiation-depth.cpp | 10 // expected-note {{skipping 2 contexts in backtrace}} \ 27 // expected-note {{skipping 2 contexts in backtrace}} \
|
/external/llvm/tools/llvm-diff/ |
DiffConsumer.cpp | 73 unsigned N = contexts.size(); 76 DiffContext &ctxt = contexts[N]; 95 if (contexts.empty()) return; 97 I = contexts.begin(), E = contexts.end(); I != E; ++I) { 144 contexts.push_back(DiffContext(L, R)); 149 Differences |= contexts.back().Differences; 150 contexts.pop_back();
|
/external/selinux/libselinux/man/man5/ |
customizable_types.5 | 21 .I /etc/selinux/{SELINUXTYPE}/contexts/customizable_types 44 # ./contexts/customizable_types
|
failsafe_context.5 | 15 .I /etc/selinux/{SELINUXTYPE}/contexts/failsafe_context 57 # ./contexts/failsafe_context
|
/external/selinux/libselinux/man/man8/ |
matchpathcon.8 | 3 matchpathcon \- get the default SELinux security context for the specified path from the file contexts configuration 25 Identical paths can have different security contexts, depending on the file
|
/external/swiftshader/third_party/LLVM/tools/llvm-diff/ |
DiffConsumer.cpp | 68 unsigned N = contexts.size(); 71 DiffContext &ctxt = contexts[N]; 90 if (contexts.empty()) return; 92 I = contexts.begin(), E = contexts.end(); I != E; ++I) { 139 contexts.push_back(DiffContext(L, R)); 144 Differences |= contexts.back().Differences; 145 contexts.pop_back();
|