/frameworks/rs/script_api/ |
rs_core.spec | 21 RenderScript code is compiled on devices at runtime to allow platform-independence as well.
|
/compatibility/cdd/8_performance-and-power/ |
8_5_consistent-performance.md | 37 * [C-2-2] MUST not allow any user space processes except the device drivers 38 used by the application to run on the exclusive cores, but MAY allow some
|
/external/curl/src/ |
tool_paramhlp.c | 312 /* Allow strtok() here since this isn't used threaded */ 317 enum e_action { allow, deny, set } action = allow; enumerator in enum:e_action 331 action = allow; 345 case allow:
|
/external/llvm/test/MC/ARM/ |
comment.s | 12 @ the symver directive should allow @ in the second symbol name
|
/external/tensorflow/tensorflow/contrib/pi_examples/camera/ |
Makefile | 46 -Wl,--allow-multiple-definition \
|
/external/tensorflow/tensorflow/contrib/pi_examples/label_image/ |
Makefile | 46 -Wl,--allow-multiple-definition \
|
/toolchain/binutils/binutils-2.27/gas/testsuite/gas/arm/ |
copro.s | 45 # Extra instructions to allow for code alignment in arm-aout target.
|
/tools/tradefederation/core/src/com/android/tradefed/util/ |
IRunUtil.java | 260 * @param allow whether to allow run interrupts on the current thread. 262 public void allowInterrupt(boolean allow);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
UsbDebuggingActivity.java | 83 // add "always allow" checkbox 153 boolean allow = (which == AlertDialog.BUTTON_POSITIVE); 154 boolean alwaysAllow = allow && mAlwaysAllow.isChecked(); 158 if (allow) {
|
/prebuilts/go/darwin-x86/src/cmd/go/internal/work/ |
security.go | 6 // We must avoid flags like -fplugin=, which can allow 104 // in a wildcard would allow tunnelling arbitrary additional 143 allow *regexp.Regexp 151 allow = r 167 if allow != nil && allow.FindString(arg) == arg {
|
/prebuilts/go/linux-x86/src/cmd/go/internal/work/ |
security.go | 6 // We must avoid flags like -fplugin=, which can allow 104 // in a wildcard would allow tunnelling arbitrary additional 143 allow *regexp.Regexp 151 allow = r 167 if allow != nil && allow.FindString(arg) == arg {
|
/external/selinux/libsepol/tests/policies/test-deps/ |
base-metreq.conf | 458 allow sysadm_t file_exec_t: file { execute read write ioctl lock entrypoint }; 464 allow base_optional_1 base_optional_2 : file { read write }; 468 # Role Allow 469 allow user_r sysadm_r;
|
base-notmetreq.conf | 445 allow sysadm_t file_exec_t: file { execute read write ioctl lock entrypoint }; 451 allow base_optional_1 base_optional_2 : file { read write }; 455 # Role Allow 456 allow user_r sysadm_r;
|
small-base.conf | 446 allow sysadm_t file_exec_t: file { execute read write ioctl lock entrypoint }; 452 allow base_optional_1 base_optional_2 : file { read write }; 456 # Role Allow 457 allow user_r sysadm_r;
|
/prebuilts/go/darwin-x86/src/cmd/compile/internal/ssa/ |
redblack32_test.go | 22 // returned to allow comparison of calculated tree size 37 // returned to allow comparison of calculated tree size 133 // to allow an eyeball check on the tree balance.
|
/prebuilts/go/linux-x86/src/cmd/compile/internal/ssa/ |
redblack32_test.go | 22 // returned to allow comparison of calculated tree size 37 // returned to allow comparison of calculated tree size 133 // to allow an eyeball check on the tree balance.
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/src/ |
seccomp_bpf_tests.c | 70 #define SECCOMP_RET_ALLOW 0x7fff0000U // allow 514 struct sock_fprog allow; local 559 FILTER_ALLOC(allow); 568 FILTER_FREE(allow); 581 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); 602 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); 625 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); 646 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); 665 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); 684 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); [all...] |
/external/mesa3d/docs/specs/ |
EXT_shader_integer_mix.spec | 113 1) Should we allow linear interpolation of integers via a non-boolean 118 2) Should we allow mix() to select between boolean components? 132 4 09/06/2013 mattst88 Allow extension on OpenGL ES 3.0.
|
/frameworks/ml/nn/runtime/ |
ModelBuilder.h | 48 int relaxComputationFloat32toFloat16(bool allow); 59 // We don't allow more than uint32_t worth of operands 63 // We don't allow more than uint32_t worth of operations 133 // Once the model has been finished, we should not allow further
|
/frameworks/native/libs/gui/include/gui/ |
BufferQueueProducer.h | 159 virtual status_t allowAllocation(bool allow);
|
/frameworks/native/services/surfaceflinger/ |
MonitoredProducer.h | 60 virtual status_t allowAllocation(bool allow);
|
/packages/apps/Settings/src/com/android/settings/fuelgauge/ |
RequestIgnoreBatteryOptimizations.java | 94 p.mPositiveButtonText = getText(R.string.allow);
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/ |
Android.mk | 16 # This allow us to have different device owner and profile owner, some APIs may behave differently
|
/cts/tests/framework/base/windowmanager/src/android/server/wm/ |
AlertWindowsImportanceTests.java | 123 setAlertWindowPermission(true /* allow */); 138 setAlertWindowPermission(false /* allow */); 143 setAlertWindowPermission(true /* allow */); 172 private void setAlertWindowPermission(boolean allow) throws Exception { 174 + " android:system_alert_window " + (allow ? "allow" : "deny");
|
AlertWindowsTests.java | 218 private void setAlertWindowPermission(final ComponentName activityName, final boolean allow) 220 int mode = allow ? MODE_ALLOWED : MODE_ERRORED;
|