Home
last modified time | relevance | path

Searched +full:is +full:- +full:path +full:- +full:inside (Results 1 – 25 of 1072) sorted by relevance

12345678910>>...43

/third_party/ltp/testcases/kernel/containers/userns/
Duserns03.c1 // SPDX-License-Identifier: GPL-2.0-or-later
13 * ID-inside-ns ID-outside-ns length
15 * ID-outside-ns is interpreted according to which process is opening the file.
17 * If the process opening the file is in the same user namespace as the process
18 * PID, then ID-outside-ns is defined with respect to the parent user namespace.
20 * If the process opening the file is in a different user namespace, then
21 * ID-outside-ns is defined with respect to the user namespace of the process
25 * check if setgroups is allowed, see kernel commits:
27 * - 9cc46516ddf4 ("userns: Add a knob to disable setgroups on a per user namespace basis")
28 * - 66d2f338ee4c ("userns: Allow setting gid_maps without privilege when setgroups is disabled")
[all …]
/third_party/rust/rust/src/tools/miri/tests/fail/shims/fs/
Disolated_file.stderr1 error: unsupported operation: `open` not available when isolation is enabled
2 --> RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC
4 LL | let fd = cvt_r(|| unsafe { open64(path.as_ptr(), flags, opts.mode as c_int) })?;
5 … ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ `open` not available when isolation is enabled
7 = help: pass the flag `-Zmiri-disable-isolation` to disable isolation;
8 …= help: or pass `-Zmiri-isolation-error=warn` to configure Miri to return an error code from isola…
10 = note: inside closure at RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC
11 …= note: inside `std::sys::PLATFORM::cvt_r::<i32, [closure@std::sys::PLATFORM::fs::File::open_c::{c…
12 = note: inside `std::sys::PLATFORM::fs::File::open_c` at RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC
13 = note: inside closure at RUSTLIB/std/src/sys/PLATFORM/fs.rs:LL:CC
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_config.h3 * Copyright (c) 2003-2013, Jouni Malinen <j@w1.fi>
13 * struct eap_peer_config - EAP peer configuration/credentials
17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
20 * EAP-PSK/PAX/SAKE/GPSK).
25 * identity_len - EAP Identity length
30 * anonymous_identity - Anonymous EAP Identity
32 * This field is used for unencrypted use with EAP types that support
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
39 * This field can also be used with EAP-SIM/AKA/AKA' to store the
[all …]
/third_party/rust/rust/src/ci/
Dshared.sh4 # This file is intended to be sourced with `. shared.sh` or
8 export MIRRORS_BASE="https://ci-mirrors.rust-lang.org/rustc"
11 # Duplicated in docker/dist-various-2/shared.sh
18 if [[ $n -lt $max ]]; then
31 [[ "${CI-false}" = "true" ]] || isGitHubActions
35 [[ "${GITHUB_ACTIONS-false}" = "true" ]]
40 [[ "${RUST_GHA_SELF_HOSTED-false}" = "true" ]]
52 [[ "${OSTYPE}" = "linux-gnu" ]]
56 if [[ $# -ne 1 ]]; then
57 echo "usage: $0 <branch-name>"
[all …]
/third_party/python/Lib/
Dglob.py17 The pattern may contain simple shell-style wildcards a la
22 If `include_hidden` is true, the patterns '*', '?', '**' will match hidden
25 If `recursive` is true, the pattern '**' will match any files and
35 The pattern may contain simple shell-style wildcards a la
40 If recursive is true, the pattern '**' will match any files and
45 if root_dir is not None:
62 dirname, basename = os.path.split(pathname)
81 # `os.path.split()` returns the argument itself as a dirname if it is a
82 # drive or UNC path. Prevent an infinite recursion if a drive or UNC path
99 yield os.path.join(dirname, name)
[all …]
/third_party/python/Tools/scripts/
Dfixcid.py5 # avoid making substitutions inside strings or comments.
6 # Inside strings, substitutions are never made; inside comments,
7 # it is a user option (off by default).
14 # The option -r reverses the sense of the substitutions (this may be
17 # If the old identifier is prefixed with a '*' (with no intervening
18 # whitespace), then it will not be substituted inside comments.
22 # like a C file (ends in .h or .c). The special filename '-' means
28 # The original files are kept as back-up with a "~" suffix.
30 # Changes made are reported to stdout in a diff-like format.
50 ' [-c] [-r] [-s file] ... file-or-directory ...\n')
[all …]
/third_party/skia/m133/tools/viewer/
DSimpleStrokerSlide.cpp4 * Use of this source code is governed by a BSD-style license that can be
23 static SkPoint rotate90(const SkPoint& p) { return {p.fY, -p.fX}; } in rotate90()
24 static SkPoint rotate180(const SkPoint& p) { return p * -1; } in rotate180()
92 // Returns the fill path
93 SkPath getFillPath(const SkPath& path, const SkPaint& paint);
107 void initForPath(const SkPath& path, const SkPaint& paint);
119 // Appends path in reverse to result
120 static void appendPathReversed(const PathRecorder& path, PathRecorder* result);
129 void SkPathStroker2::initForPath(const SkPath& path, const SkPaint& paint) { in initForPath() argument
137 SkPath SkPathStroker2::getFillPath(const SkPath& path, const SkPaint& paint) { in getFillPath() argument
[all …]
/third_party/skia/samplecode/
DSampleSimpleStroker.cpp4 * Use of this source code is governed by a BSD-style license that can be
20 static SkPoint rotate90(const SkPoint& p) { return {p.fY, -p.fX}; } in rotate90()
21 static SkPoint rotate180(const SkPoint& p) { return p * -1; } in rotate180()
89 // Returns the fill path
90 SkPath getFillPath(const SkPath& path, const SkPaint& paint);
104 void initForPath(const SkPath& path, const SkPaint& paint);
116 // Appends path in reverse to result
117 static void appendPathReversed(const PathRecorder& path, PathRecorder* result);
126 void SkPathStroker2::initForPath(const SkPath& path, const SkPaint& paint) { in initForPath() argument
134 SkPath SkPathStroker2::getFillPath(const SkPath& path, const SkPaint& paint) { in getFillPath() argument
[all …]
/third_party/skia/include/core/
DSkPathTypes.h4 * Use of this source code is governed by a BSD-style license that can be
14 /** Specifies that "inside" is computed by a non-zero sum of signed edge crossings */
16 /** Specifies that "inside" is computed by an odd number of edge crossings */
18 /** Same as Winding, but draws outside of the path, rather than inside */
20 /** Same as EvenOdd, but draws outside of the path, rather than inside */
39 /** counter-clockwise direction for adding closed contours */
DSkRegion.h4 * Use of this source code is governed by a BSD-style license that can be
17 SkRegion describes the set of pixels used to clip SkCanvas. SkRegion is compact,
27 /** Constructs an empty SkRegion. SkRegion is set to empty bounds
38 the returned result share pointer values. The underlying SkRect array is
41 Creating a SkRegion copy is very efficient and never allocates memory.
61 /** Releases ownership of any shared data and deletes data if SkRegion is sole owner.
69 the returned result share pointer values. The underlying SkRect array is
72 Creating a SkRegion copy is very efficient and never allocates memory.
102 /** Sets SkRegion to src, and returns true if src bounds is not empty.
104 SkRegion and src share pointer values. The underlying SkRect array is
[all …]
/third_party/skia/m133/include/core/
DSkPathTypes.h4 * Use of this source code is governed by a BSD-style license that can be
12 /** Specifies that "inside" is computed by a non-zero sum of signed edge crossings */
14 /** Specifies that "inside" is computed by an odd number of edge crossings */
16 /** Same as Winding, but draws outside of the path, rather than inside */
18 /** Same as EvenOdd, but draws outside of the path, rather than inside */
37 /** counter-clockwise direction for adding closed contours */
DSkRegion.h4 * Use of this source code is governed by a BSD-style license that can be
24 SkRegion describes the set of pixels used to clip SkCanvas. SkRegion is compact,
34 /** Constructs an empty SkRegion. SkRegion is set to empty bounds
45 the returned result share pointer values. The underlying SkRect array is
48 Creating a SkRegion copy is very efficient and never allocates memory.
68 /** Releases ownership of any shared data and deletes data if SkRegion is sole owner.
76 the returned result share pointer values. The underlying SkRect array is
79 Creating a SkRegion copy is very efficient and never allocates memory.
109 /** Sets SkRegion to src, and returns true if src bounds is not empty.
111 SkRegion and src share pointer values. The underlying SkRect array is
[all …]
/third_party/rust/rust/src/tools/clippy/clippy_dev/src/setup/
Dintellij.rs4 use std::path::{Path, PathBuf};
6 // This module takes an absolute path to a rustc repo and alters the dependencies to point towards
8 // This allows IntelliJ to analyze rustc internals and show proper information inside Clippy
9 // code. See https://github.com/rust-lang/rust-clippy/issues/5514 for details
29 const fn new(name: &'static str, cargo_file: &'static str, lib_rs_file: &'static str) -> Self { in new()
52 fn check_and_get_rustc_dir(rustc_path: &str) -> Result<PathBuf, ()> { in check_and_get_rustc_dir()
53 let mut path = PathBuf::from(rustc_path); in check_and_get_rustc_dir() localVariable
55 if path.is_relative() { in check_and_get_rustc_dir()
56 match path.canonicalize() { in check_and_get_rustc_dir()
58 println!("info: the rustc path was resolved to: `{}`", absolute_path.display()); in check_and_get_rustc_dir()
[all …]
/third_party/rust/rust/tests/ui/closures/2229_closure_analysis/diagnostics/
Dbox.rs10 // Check diagnostics when the same path is mutated both inside and outside the closure
18 e.0.0.m.x = format!("not-x"); in box_1()
21 e.0.0.m.x = format!("not-x"); in box_1()
22 //~^ ERROR: cannot assign to `e.0.0.m.x` because it is borrowed in box_1()
26 // Check diagnostics when a path is mutated inside a closure while attempting to read it outside
35 e.0.0.m.x = format!("not-x"); in box_2()
39 //~^ ERROR: cannot borrow `e.0.0.m.x` as immutable because it is also borrowed as mutable in box_2()
43 // Check diagnostics when a path is read inside a closure while attempting to mutate it outside
55 e.0.0.m.x = format!("not-x"); in box_3()
56 //~^ ERROR: cannot assign to `e.0.0.m.x` because it is borrowed in box_3()
/third_party/python/Mac/Tools/
Dpythonw.c2 * This wrapper program executes a python executable hidden inside an
3 * application bundle inside the Python framework. This is needed to run
4 * GUI code: some GUI API's don't work unless the program is inside an
8 * slightly more control over how the "real" interpreter is executed.
31 #include <mach-o/dyld.h>
40 * In a regular framework the structure is:
47 * structure is:
51 * /.Python <- the dylib
55 * feature, support for that structure is provided as
77 end = g_path + len - 1; in get_python_path()
[all …]
/third_party/rust/rust/src/doc/rustdoc/src/
Dwhat-is-rustdoc.md1 # What is rustdoc?
3 The standard Rust distribution ships with a tool called `rustdoc`. Its job is
13 $ cargo new docs --lib
21 /// foo is a function
25 Let's run `rustdoc` on our code. To do so, we can call it with the path to
32 This will create a new directory, `doc`, with a website inside! In our case,
33 the main page is located in `doc/lib/index.html`. If you open that up in
40 think that our package is named "lib"? Second, why does it not have any
43 The first problem is due to `rustdoc` trying to be helpful; like `rustc`,
44 it assumes that our crate's name is the name of the file for the crate
[all …]
/third_party/rust/crates/libc/ci/
Drun.sh6 set -ex
8 MIRRORS_URL="https://ci-mirrors.rust-lang.org/libc"
12 # If we're going to run tests inside of a qemu image, then we don't need any of
17 # script from the second which we place inside.
19 tmpdir=/tmp/qemu-img-creation
20 mkdir -p "${tmpdir}"
22 if [ -z "${QEMU#*.gz}" ]; then
23 # image is .gz : download and uncompress it
25 if [ ! -f "${tmpdir}/${qemufile}" ]; then
26 curl --retry 5 "${MIRRORS_URL}/${QEMU}" | \
[all …]
/third_party/python/Mac/IDLE/IDLE.app/Contents/Resources/
Didlemain.py8 os.chdir(os.path.expanduser('~/Documents'))
11 # Make sure sys.executable points to the python interpreter inside the
12 # framework, instead of at the helper executable inside the application
19 # Python{-32} (symlink)
24 # ../IDLE.app/Contents/MacOS/Python{-32} is symlinked to
26 # /Resources/Python.app/Contents/MacOS/Python{-32}
27 # which is the Python interpreter executable
29 # The flow of control is as follows:
30 # 1. IDLE.app is launched which starts python running the IDLE script
32 # PYTHONEXECUTABLE = .../IDLE.app/Contents/MacOS/Python{-32}
[all …]
/third_party/gn/src/gn/
Dfilesystem_utils.h2 // Use of this source code is governed by a BSD-style license that can be
20 inline std::string FilePathToUTF8(const base::FilePath& path) { in FilePathToUTF8() argument
21 return FilePathToUTF8(path.value()); in FilePathToUTF8()
25 // Extensions -----------------------------------------------------------------
28 // slash). Returns std::string::npos if not found. Returns path.size() if the
30 size_t FindExtensionOffset(const std::string& path);
34 std::string_view FindExtension(const std::string* path);
36 // Filename parts -------------------------------------------------------------
39 // 0 if no slash was found. Returns path.size() if the path ends with a slash.
41 size_t FindFilenameOffset(const std::string& path);
[all …]
/third_party/ltp/testcases/kernel/syscalls/fanotify/
Dfanotify10.c1 // SPDX-License-Identifier: GPL-2.0
19 * This is a regression test for commit:
23 * Test case #16 is a regression test for commit:
321 .tname = "ignore events on file created inside a parent watching children",
331 .tname = "don't ignore events on file created inside a parent not watching children",
341 .tname = "ignore mount events created inside a parent watching children",
351 .tname = "don't ignore mount events created inside a parent not watching children",
361 .tname = "ignore fs events created inside a parent watching children",
371 .tname = "don't ignore fs events created inside a parent not watching children",
406 .tname = "don't ignore mount events created inside a parent with evicted ignore mark",
[all …]
/third_party/skia/m133/src/gpu/tessellate/
DTessellation.cpp4 * Use of this source code is governed by a BSD-style license that can be
32 // chops, where N is the the magnitude of its control points.
39 constexpr static int kMaxChopsPerCurve = 128/*magnitude of +fp32_max - -fp32_max*/ *
43 // Writes a new path, chopping as necessary so no verbs require more segments than
55 SkPath path() const { return fPath; } in path() function in skgpu::tess::__anon95a9c96d0111::PathChopper
63 // Use a heap stack to recursively chop the quad into manageable, on-screen segments. in quadTo()
67 const SkPoint* p = fPointStack.end() - 3; in quadTo()
90 // Use a heap stack to recursively chop the conic into manageable, on-screen segments. in conicTo()
95 const SkPoint* p = fPointStack.end() - 3; in conicTo()
105 this->lineTo(line); in conicTo()
[all …]
/third_party/rust/rust/src/tools/clippy/tests/
Dversioncheck.rs1 #![cfg_attr(feature = "deny-warnings", deny(warnings))]
9 fn read_version(path: &str) -> String { in consistent_clippy_crate_versions()
10 …let contents = fs::read_to_string(path).unwrap_or_else(|e| panic!("error reading `{path}`: {e:?}")… in consistent_clippy_crate_versions()
15 .unwrap_or_else(|| panic!("error finding version in `{path}`")) in consistent_clippy_crate_versions()
19 // do not run this test inside the upstream rustc repo: in consistent_clippy_crate_versions()
20 // https://github.com/rust-lang/rust-clippy/issues/6683 in consistent_clippy_crate_versions()
33 for path in paths { in consistent_clippy_crate_versions()
34 assert_eq!(clippy_version, read_version(path), "{path} version differs"); in consistent_clippy_crate_versions()
40 // do not run this test inside the upstream rustc repo: in check_that_clippy_has_the_same_major_version_as_rustc()
41 // https://github.com/rust-lang/rust-clippy/issues/6683 in check_that_clippy_has_the_same_major_version_as_rustc()
[all …]
/third_party/rust/rust/compiler/rustc_ast_passes/
Dmessages.ftl27 ast_passes_bad_c_variadic = only foreign or `unsafe extern "C"` functions may be C-variadic
29 ast_passes_body_in_extern = incorrect `{$kind}` inside `extern` block
32 ….existing = `extern` blocks define existing foreign {$kind}s and {$kind}s inside of them cannot ha…
53 ….suggestion = if `{$ident}` is an associated type you're trying to set, use the associated type bi…
54 ….suggestion_path = if `{$trait_segment}::{$potential_assoc}` is an associated type you're trying t…
55 .note = see issue #20041 <https://github.com/rust-lang/rust/issues/20041> for more information
63 ast_passes_extern_item_ascii = items in `extern` blocks cannot use non-ascii identifiers
65 ….note = this limitation may be lifted in the future; see issue #83942 <https://github.com/rust-lan…
67 ast_passes_extern_keyword_link = for more information, visit https://doc.rust-lang.org/std/keyword.…
69 ast_passes_extern_types_cannot = `type`s inside `extern` blocks cannot have {$descr}
[all …]
/third_party/rust/crates/libloading/src/os/windows/
Dmod.rs58 /// The platform-specific counterpart of the cross-platform [`Library`](crate::Library).
62 // Now, this is sort-of-tricky. MSDN documentation does not really make any claims as to safety of
64 // say for sure whether the Win32 APIs used to implement `Library` are thread-safe or not.
66 // My investigation ended up with a question about thread-safety properties of the API involved
67 // being sent to an internal (to MS) general question mailing-list. The conclusion of the mail is
70 // * Nobody inside MS (at least out of all of the people who have seen the question) knows for
72 // * However, the general consensus between MS developers is that one can rely on the API being
73 // thread-safe. In case it is not thread-safe it should be considered a bug on the Windows
80 /// If the `filename` specifies a full path, the function only searches that path for the
81 /// module. Otherwise, if the `filename` specifies a relative path or a module name without a
[all …]
/third_party/rust/rust/src/tools/rust-analyzer/crates/ide-db/src/
Dfamous_defs.rs8 /// Helps with finding well-know things inside the standard library. This is
9 /// somewhat similar to the known paths infra inside hir, but it different; We
10 /// want to make sure that IDE specific paths don't become interesting inside
13 /// Note that, by default, rust-analyzer tests **do not** include core or std
19 /// //- minicore: iterator, ord, derive
25 pub fn std(&self) -> Option<Crate> { in std()
29 pub fn core(&self) -> Option<Crate> { in core()
33 pub fn alloc(&self) -> Option<Crate> { in alloc()
37 pub fn test(&self) -> Option<Crate> { in test()
41 pub fn proc_macro(&self) -> Option<Crate> { in proc_macro()
[all …]

12345678910>>...43