| /third_party/ltp/testcases/kernel/containers/userns/ |
| D | userns03.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 13 * ID-inside-ns ID-outside-ns length 15 * ID-outside-ns is interpreted according to which process is opening the file. 17 * If the process opening the file is in the same user namespace as the process 18 * PID, then ID-outside-ns is defined with respect to the parent user namespace. 20 * If the process opening the file is in a different user namespace, then 21 * ID-outside-ns is defined with respect to the user namespace of the process 25 * check if setgroups is allowed, see kernel commits: 27 * - 9cc46516ddf4 ("userns: Add a knob to disable setgroups on a per user namespace basis") 28 * - 66d2f338ee4c ("userns: Allow setting gid_maps without privilege when setgroups is disabled") [all …]
|
| /third_party/rust/rust/src/tools/miri/tests/fail/shims/fs/ |
| D | isolated_file.stderr | 1 error: unsupported operation: `open` not available when isolation is enabled 2 --> RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC 4 LL | let fd = cvt_r(|| unsafe { open64(path.as_ptr(), flags, opts.mode as c_int) })?; 5 … ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ `open` not available when isolation is enabled 7 = help: pass the flag `-Zmiri-disable-isolation` to disable isolation; 8 …= help: or pass `-Zmiri-isolation-error=warn` to configure Miri to return an error code from isola… 10 = note: inside closure at RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC 11 …= note: inside `std::sys::PLATFORM::cvt_r::<i32, [closure@std::sys::PLATFORM::fs::File::open_c::{c… 12 = note: inside `std::sys::PLATFORM::fs::File::open_c` at RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC 13 = note: inside closure at RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
| D | eap_config.h | 3 * Copyright (c) 2003-2013, Jouni Malinen <j@w1.fi> 13 * struct eap_peer_config - EAP peer configuration/credentials 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 20 * EAP-PSK/PAX/SAKE/GPSK). 25 * identity_len - EAP Identity length 30 * anonymous_identity - Anonymous EAP Identity 32 * This field is used for unencrypted use with EAP types that support 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 39 * This field can also be used with EAP-SIM/AKA/AKA' to store the [all …]
|
| /third_party/rust/rust/src/ci/ |
| D | shared.sh | 4 # This file is intended to be sourced with `. shared.sh` or 8 export MIRRORS_BASE="https://ci-mirrors.rust-lang.org/rustc" 11 # Duplicated in docker/dist-various-2/shared.sh 18 if [[ $n -lt $max ]]; then 31 [[ "${CI-false}" = "true" ]] || isGitHubActions 35 [[ "${GITHUB_ACTIONS-false}" = "true" ]] 40 [[ "${RUST_GHA_SELF_HOSTED-false}" = "true" ]] 52 [[ "${OSTYPE}" = "linux-gnu" ]] 56 if [[ $# -ne 1 ]]; then 57 echo "usage: $0 <branch-name>" [all …]
|
| /third_party/python/Lib/ |
| D | glob.py | 17 The pattern may contain simple shell-style wildcards a la 22 If `include_hidden` is true, the patterns '*', '?', '**' will match hidden 25 If `recursive` is true, the pattern '**' will match any files and 35 The pattern may contain simple shell-style wildcards a la 40 If recursive is true, the pattern '**' will match any files and 45 if root_dir is not None: 62 dirname, basename = os.path.split(pathname) 81 # `os.path.split()` returns the argument itself as a dirname if it is a 82 # drive or UNC path. Prevent an infinite recursion if a drive or UNC path 99 yield os.path.join(dirname, name) [all …]
|
| /third_party/python/Tools/scripts/ |
| D | fixcid.py | 5 # avoid making substitutions inside strings or comments. 6 # Inside strings, substitutions are never made; inside comments, 7 # it is a user option (off by default). 14 # The option -r reverses the sense of the substitutions (this may be 17 # If the old identifier is prefixed with a '*' (with no intervening 18 # whitespace), then it will not be substituted inside comments. 22 # like a C file (ends in .h or .c). The special filename '-' means 28 # The original files are kept as back-up with a "~" suffix. 30 # Changes made are reported to stdout in a diff-like format. 50 ' [-c] [-r] [-s file] ... file-or-directory ...\n') [all …]
|
| /third_party/skia/m133/tools/viewer/ |
| D | SimpleStrokerSlide.cpp | 4 * Use of this source code is governed by a BSD-style license that can be 23 static SkPoint rotate90(const SkPoint& p) { return {p.fY, -p.fX}; } in rotate90() 24 static SkPoint rotate180(const SkPoint& p) { return p * -1; } in rotate180() 92 // Returns the fill path 93 SkPath getFillPath(const SkPath& path, const SkPaint& paint); 107 void initForPath(const SkPath& path, const SkPaint& paint); 119 // Appends path in reverse to result 120 static void appendPathReversed(const PathRecorder& path, PathRecorder* result); 129 void SkPathStroker2::initForPath(const SkPath& path, const SkPaint& paint) { in initForPath() argument 137 SkPath SkPathStroker2::getFillPath(const SkPath& path, const SkPaint& paint) { in getFillPath() argument [all …]
|
| /third_party/skia/samplecode/ |
| D | SampleSimpleStroker.cpp | 4 * Use of this source code is governed by a BSD-style license that can be 20 static SkPoint rotate90(const SkPoint& p) { return {p.fY, -p.fX}; } in rotate90() 21 static SkPoint rotate180(const SkPoint& p) { return p * -1; } in rotate180() 89 // Returns the fill path 90 SkPath getFillPath(const SkPath& path, const SkPaint& paint); 104 void initForPath(const SkPath& path, const SkPaint& paint); 116 // Appends path in reverse to result 117 static void appendPathReversed(const PathRecorder& path, PathRecorder* result); 126 void SkPathStroker2::initForPath(const SkPath& path, const SkPaint& paint) { in initForPath() argument 134 SkPath SkPathStroker2::getFillPath(const SkPath& path, const SkPaint& paint) { in getFillPath() argument [all …]
|
| /third_party/skia/include/core/ |
| D | SkPathTypes.h | 4 * Use of this source code is governed by a BSD-style license that can be 14 /** Specifies that "inside" is computed by a non-zero sum of signed edge crossings */ 16 /** Specifies that "inside" is computed by an odd number of edge crossings */ 18 /** Same as Winding, but draws outside of the path, rather than inside */ 20 /** Same as EvenOdd, but draws outside of the path, rather than inside */ 39 /** counter-clockwise direction for adding closed contours */
|
| D | SkRegion.h | 4 * Use of this source code is governed by a BSD-style license that can be 17 SkRegion describes the set of pixels used to clip SkCanvas. SkRegion is compact, 27 /** Constructs an empty SkRegion. SkRegion is set to empty bounds 38 the returned result share pointer values. The underlying SkRect array is 41 Creating a SkRegion copy is very efficient and never allocates memory. 61 /** Releases ownership of any shared data and deletes data if SkRegion is sole owner. 69 the returned result share pointer values. The underlying SkRect array is 72 Creating a SkRegion copy is very efficient and never allocates memory. 102 /** Sets SkRegion to src, and returns true if src bounds is not empty. 104 SkRegion and src share pointer values. The underlying SkRect array is [all …]
|
| /third_party/skia/m133/include/core/ |
| D | SkPathTypes.h | 4 * Use of this source code is governed by a BSD-style license that can be 12 /** Specifies that "inside" is computed by a non-zero sum of signed edge crossings */ 14 /** Specifies that "inside" is computed by an odd number of edge crossings */ 16 /** Same as Winding, but draws outside of the path, rather than inside */ 18 /** Same as EvenOdd, but draws outside of the path, rather than inside */ 37 /** counter-clockwise direction for adding closed contours */
|
| D | SkRegion.h | 4 * Use of this source code is governed by a BSD-style license that can be 24 SkRegion describes the set of pixels used to clip SkCanvas. SkRegion is compact, 34 /** Constructs an empty SkRegion. SkRegion is set to empty bounds 45 the returned result share pointer values. The underlying SkRect array is 48 Creating a SkRegion copy is very efficient and never allocates memory. 68 /** Releases ownership of any shared data and deletes data if SkRegion is sole owner. 76 the returned result share pointer values. The underlying SkRect array is 79 Creating a SkRegion copy is very efficient and never allocates memory. 109 /** Sets SkRegion to src, and returns true if src bounds is not empty. 111 SkRegion and src share pointer values. The underlying SkRect array is [all …]
|
| /third_party/rust/rust/src/tools/clippy/clippy_dev/src/setup/ |
| D | intellij.rs | 4 use std::path::{Path, PathBuf}; 6 // This module takes an absolute path to a rustc repo and alters the dependencies to point towards 8 // This allows IntelliJ to analyze rustc internals and show proper information inside Clippy 9 // code. See https://github.com/rust-lang/rust-clippy/issues/5514 for details 29 const fn new(name: &'static str, cargo_file: &'static str, lib_rs_file: &'static str) -> Self { in new() 52 fn check_and_get_rustc_dir(rustc_path: &str) -> Result<PathBuf, ()> { in check_and_get_rustc_dir() 53 let mut path = PathBuf::from(rustc_path); in check_and_get_rustc_dir() localVariable 55 if path.is_relative() { in check_and_get_rustc_dir() 56 match path.canonicalize() { in check_and_get_rustc_dir() 58 println!("info: the rustc path was resolved to: `{}`", absolute_path.display()); in check_and_get_rustc_dir() [all …]
|
| /third_party/rust/rust/tests/ui/closures/2229_closure_analysis/diagnostics/ |
| D | box.rs | 10 // Check diagnostics when the same path is mutated both inside and outside the closure 18 e.0.0.m.x = format!("not-x"); in box_1() 21 e.0.0.m.x = format!("not-x"); in box_1() 22 //~^ ERROR: cannot assign to `e.0.0.m.x` because it is borrowed in box_1() 26 // Check diagnostics when a path is mutated inside a closure while attempting to read it outside 35 e.0.0.m.x = format!("not-x"); in box_2() 39 //~^ ERROR: cannot borrow `e.0.0.m.x` as immutable because it is also borrowed as mutable in box_2() 43 // Check diagnostics when a path is read inside a closure while attempting to mutate it outside 55 e.0.0.m.x = format!("not-x"); in box_3() 56 //~^ ERROR: cannot assign to `e.0.0.m.x` because it is borrowed in box_3()
|
| /third_party/python/Mac/Tools/ |
| D | pythonw.c | 2 * This wrapper program executes a python executable hidden inside an 3 * application bundle inside the Python framework. This is needed to run 4 * GUI code: some GUI API's don't work unless the program is inside an 8 * slightly more control over how the "real" interpreter is executed. 31 #include <mach-o/dyld.h> 40 * In a regular framework the structure is: 47 * structure is: 51 * /.Python <- the dylib 55 * feature, support for that structure is provided as 77 end = g_path + len - 1; in get_python_path() [all …]
|
| /third_party/rust/rust/src/doc/rustdoc/src/ |
| D | what-is-rustdoc.md | 1 # What is rustdoc? 3 The standard Rust distribution ships with a tool called `rustdoc`. Its job is 13 $ cargo new docs --lib 21 /// foo is a function 25 Let's run `rustdoc` on our code. To do so, we can call it with the path to 32 This will create a new directory, `doc`, with a website inside! In our case, 33 the main page is located in `doc/lib/index.html`. If you open that up in 40 think that our package is named "lib"? Second, why does it not have any 43 The first problem is due to `rustdoc` trying to be helpful; like `rustc`, 44 it assumes that our crate's name is the name of the file for the crate [all …]
|
| /third_party/rust/crates/libc/ci/ |
| D | run.sh | 6 set -ex 8 MIRRORS_URL="https://ci-mirrors.rust-lang.org/libc" 12 # If we're going to run tests inside of a qemu image, then we don't need any of 17 # script from the second which we place inside. 19 tmpdir=/tmp/qemu-img-creation 20 mkdir -p "${tmpdir}" 22 if [ -z "${QEMU#*.gz}" ]; then 23 # image is .gz : download and uncompress it 25 if [ ! -f "${tmpdir}/${qemufile}" ]; then 26 curl --retry 5 "${MIRRORS_URL}/${QEMU}" | \ [all …]
|
| /third_party/python/Mac/IDLE/IDLE.app/Contents/Resources/ |
| D | idlemain.py | 8 os.chdir(os.path.expanduser('~/Documents')) 11 # Make sure sys.executable points to the python interpreter inside the 12 # framework, instead of at the helper executable inside the application 19 # Python{-32} (symlink) 24 # ../IDLE.app/Contents/MacOS/Python{-32} is symlinked to 26 # /Resources/Python.app/Contents/MacOS/Python{-32} 27 # which is the Python interpreter executable 29 # The flow of control is as follows: 30 # 1. IDLE.app is launched which starts python running the IDLE script 32 # PYTHONEXECUTABLE = .../IDLE.app/Contents/MacOS/Python{-32} [all …]
|
| /third_party/gn/src/gn/ |
| D | filesystem_utils.h | 2 // Use of this source code is governed by a BSD-style license that can be 20 inline std::string FilePathToUTF8(const base::FilePath& path) { in FilePathToUTF8() argument 21 return FilePathToUTF8(path.value()); in FilePathToUTF8() 25 // Extensions ----------------------------------------------------------------- 28 // slash). Returns std::string::npos if not found. Returns path.size() if the 30 size_t FindExtensionOffset(const std::string& path); 34 std::string_view FindExtension(const std::string* path); 36 // Filename parts ------------------------------------------------------------- 39 // 0 if no slash was found. Returns path.size() if the path ends with a slash. 41 size_t FindFilenameOffset(const std::string& path); [all …]
|
| /third_party/ltp/testcases/kernel/syscalls/fanotify/ |
| D | fanotify10.c | 1 // SPDX-License-Identifier: GPL-2.0 19 * This is a regression test for commit: 23 * Test case #16 is a regression test for commit: 321 .tname = "ignore events on file created inside a parent watching children", 331 .tname = "don't ignore events on file created inside a parent not watching children", 341 .tname = "ignore mount events created inside a parent watching children", 351 .tname = "don't ignore mount events created inside a parent not watching children", 361 .tname = "ignore fs events created inside a parent watching children", 371 .tname = "don't ignore fs events created inside a parent not watching children", 406 .tname = "don't ignore mount events created inside a parent with evicted ignore mark", [all …]
|
| /third_party/skia/m133/src/gpu/tessellate/ |
| D | Tessellation.cpp | 4 * Use of this source code is governed by a BSD-style license that can be 32 // chops, where N is the the magnitude of its control points. 39 constexpr static int kMaxChopsPerCurve = 128/*magnitude of +fp32_max - -fp32_max*/ * 43 // Writes a new path, chopping as necessary so no verbs require more segments than 55 SkPath path() const { return fPath; } in path() function in skgpu::tess::__anon95a9c96d0111::PathChopper 63 // Use a heap stack to recursively chop the quad into manageable, on-screen segments. in quadTo() 67 const SkPoint* p = fPointStack.end() - 3; in quadTo() 90 // Use a heap stack to recursively chop the conic into manageable, on-screen segments. in conicTo() 95 const SkPoint* p = fPointStack.end() - 3; in conicTo() 105 this->lineTo(line); in conicTo() [all …]
|
| /third_party/rust/rust/src/tools/clippy/tests/ |
| D | versioncheck.rs | 1 #![cfg_attr(feature = "deny-warnings", deny(warnings))] 9 fn read_version(path: &str) -> String { in consistent_clippy_crate_versions() 10 …let contents = fs::read_to_string(path).unwrap_or_else(|e| panic!("error reading `{path}`: {e:?}")… in consistent_clippy_crate_versions() 15 .unwrap_or_else(|| panic!("error finding version in `{path}`")) in consistent_clippy_crate_versions() 19 // do not run this test inside the upstream rustc repo: in consistent_clippy_crate_versions() 20 // https://github.com/rust-lang/rust-clippy/issues/6683 in consistent_clippy_crate_versions() 33 for path in paths { in consistent_clippy_crate_versions() 34 assert_eq!(clippy_version, read_version(path), "{path} version differs"); in consistent_clippy_crate_versions() 40 // do not run this test inside the upstream rustc repo: in check_that_clippy_has_the_same_major_version_as_rustc() 41 // https://github.com/rust-lang/rust-clippy/issues/6683 in check_that_clippy_has_the_same_major_version_as_rustc() [all …]
|
| /third_party/rust/rust/compiler/rustc_ast_passes/ |
| D | messages.ftl | 27 ast_passes_bad_c_variadic = only foreign or `unsafe extern "C"` functions may be C-variadic 29 ast_passes_body_in_extern = incorrect `{$kind}` inside `extern` block 32 ….existing = `extern` blocks define existing foreign {$kind}s and {$kind}s inside of them cannot ha… 53 ….suggestion = if `{$ident}` is an associated type you're trying to set, use the associated type bi… 54 ….suggestion_path = if `{$trait_segment}::{$potential_assoc}` is an associated type you're trying t… 55 .note = see issue #20041 <https://github.com/rust-lang/rust/issues/20041> for more information 63 ast_passes_extern_item_ascii = items in `extern` blocks cannot use non-ascii identifiers 65 ….note = this limitation may be lifted in the future; see issue #83942 <https://github.com/rust-lan… 67 ast_passes_extern_keyword_link = for more information, visit https://doc.rust-lang.org/std/keyword.… 69 ast_passes_extern_types_cannot = `type`s inside `extern` blocks cannot have {$descr} [all …]
|
| /third_party/rust/crates/libloading/src/os/windows/ |
| D | mod.rs | 58 /// The platform-specific counterpart of the cross-platform [`Library`](crate::Library). 62 // Now, this is sort-of-tricky. MSDN documentation does not really make any claims as to safety of 64 // say for sure whether the Win32 APIs used to implement `Library` are thread-safe or not. 66 // My investigation ended up with a question about thread-safety properties of the API involved 67 // being sent to an internal (to MS) general question mailing-list. The conclusion of the mail is 70 // * Nobody inside MS (at least out of all of the people who have seen the question) knows for 72 // * However, the general consensus between MS developers is that one can rely on the API being 73 // thread-safe. In case it is not thread-safe it should be considered a bug on the Windows 80 /// If the `filename` specifies a full path, the function only searches that path for the 81 /// module. Otherwise, if the `filename` specifies a relative path or a module name without a [all …]
|
| /third_party/rust/rust/src/tools/rust-analyzer/crates/ide-db/src/ |
| D | famous_defs.rs | 8 /// Helps with finding well-know things inside the standard library. This is 9 /// somewhat similar to the known paths infra inside hir, but it different; We 10 /// want to make sure that IDE specific paths don't become interesting inside 13 /// Note that, by default, rust-analyzer tests **do not** include core or std 19 /// //- minicore: iterator, ord, derive 25 pub fn std(&self) -> Option<Crate> { in std() 29 pub fn core(&self) -> Option<Crate> { in core() 33 pub fn alloc(&self) -> Option<Crate> { in alloc() 37 pub fn test(&self) -> Option<Crate> { in test() 41 pub fn proc_macro(&self) -> Option<Crate> { in proc_macro() [all …]
|