| /external/autotest/site_utils/lxc/ |
| D | config.py | 2 # Use of this source code is governed by a BSD-style license that can be 33 target: config file's location inside container. 34 append: true to append the content of config file to existing file inside 35 container. If it's set to false, the existing file inside container will 37 permission: Permission to set to the config file inside container. 48 /etc/resolv.conf inside container. 54 target: the folder's location inside container. 55 mount: true to mount the source folder onto the target inside container. 56 A setting with false value of mount is invalid. 57 readonly: true if the mounted folder inside container should be readonly. [all …]
|
| /external/sandboxed-api/oss-internship-2020/gdal/raster_to_gtiff/ |
| D | README.md | 2 …is repository is an example of how Sandboxed API can be used with GDAL C Raster API to implement t… 6 1. Register needed drivers inside the sandbox 8 3. Map output file inside the sandbox and create a GeoTIFF dataset backed by this file 16 …-line utility that uses sandboxed GDAL to implement the workflow and GoogleTest unit tests to comp… 19 … build of libgdal and libproj. Moreover, proj.db file path is required to be able to map it inside… 22 …make a clean installation you can use the build folder as an installation path, with this approach… 23 First, you will need to build PROJ, which is used internally in the GDAL. You can't use the libproj… 24 … PROJ from sources](https://proj.org/install.html#compilation-and-installation-from-source-code) y… 27 wget https://download.osgeo.org/proj/proj-7.1.1.tar.gz 28 tar xvzf proj-7.1.1.tar.gz [all …]
|
| /external/rust/crates/tempfile/src/ |
| D | dir.rs | 2 // file at the top-level directory of this distribution and at 3 // http://rust-lang.org/COPYRIGHT. 5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or 6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license 7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your 13 use std::path::{self, Path, PathBuf}; 24 /// destructor is run. 28 /// See [the resource leaking][resource-leaking] docs on `TempDir`. 32 /// If the directory can not be created, `Err` is returned. 46 /// # fn run() -> Result<(), io::Error> { [all …]
|
| /external/oss-fuzz/infra/cifuzz/ |
| D | continuous_integration.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 10 # distributed under the License is distributed on an "AS IS" BASIS, 21 # pylint: disable=wrong-import-position,import-error 22 sys.path.append(os.path.dirname(os.path.dirname(os.path.abspath(__file__)))) 31 # pylint: disable=too-few-public-methods 44 'git', 'symbolic-ref', 'refs/remotes/origin/HEAD', 58 """Returns the source repo path, if it has been checked out. None is 60 if not os.path.exists(self.workspace.repo_storage): 63 # Note: this assumes there is only one repo checked out here. 68 repo_path = os.path.join(self.workspace.repo_storage, listing[0]) [all …]
|
| /external/minijail/ |
| D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 119 * This is only safe to use for processes that do not execute untrusted code. 125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 142 * This option is *dangerous* as it negates most of the functionality of 157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
| D | minijail0.1 | 3 minijail0 \- sandbox a process 9 Runs PROGRAM inside a sandbox. 11 \fB-a <table>\fR 15 \fB-b <src>[,[dest][,<writeable>]]\fR, \fB--bind-mount=<src>[,[dest][,<writeable>]]\fR 16 Bind-mount \fIsrc\fR into the chroot directory at \fIdest\fR, optionally writeable. 17 The \fIsrc\fR path must be an absolute path. 19 If \fIdest\fR is not specified, it will default to \fIsrc\fR. 23 To create a writable bind-mount set \fIwritable\fR to \fB1\fR. If not specified 24 it will default to \fB0\fR (read-only). 26 \fB-B <mask>\fR [all …]
|
| /external/ltp/testcases/kernel/containers/userns/ |
| D | userns03.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 13 * ID-inside-ns ID-outside-ns length 15 * ID-outside-ns is interpreted according to which process is opening the file. 17 * If the process opening the file is in the same user namespace as the process 18 * PID, then ID-outside-ns is defined with respect to the parent user namespace. 20 * If the process opening the file is in a different user namespace, then 21 * ID-outside-ns is defined with respect to the user namespace of the process 25 * check if setgroups is allowed, see kernel commits: 27 * - 9cc46516ddf4 ("userns: Add a knob to disable setgroups on a per user namespace basis") 28 * - 66d2f338ee4c ("userns: Allow setting gid_maps without privilege when setgroups is disabled") [all …]
|
| /external/sandboxed-api/sandboxed_api/sandbox2/ |
| D | mounts.h | 7 // https://www.apache.org/licenses/LICENSE-2.0 10 // distributed under the License is distributed on an "AS IS" BASIS, 42 root.mutable_root_node()->set_writable(false); in Mounts() 53 absl::Status AddFile(absl::string_view path, bool is_ro = true) { 54 return AddFileAt(path, path, is_ro); 57 absl::Status AddFileAt(absl::string_view outside, absl::string_view inside, 60 absl::Status AddDirectory(absl::string_view path, bool is_ro = true) { 61 return AddDirectoryAt(path, path, is_ro); 65 absl::string_view inside, bool is_ro = true); 67 absl::Status AddMappingsForBinary(const std::string& path, [all …]
|
| /external/toolchain-utils/pgo_tools/ |
| D | pgo_tools.py | 2 # Use of this source code is governed by a BSD-style license that can be 10 from pathlib import Path 19 Command = List[Union[str, Path]] 24 cwd: Optional[Path] = None, argument 29 ) -> subprocess.CompletedProcess: 39 dir_extra = f" in {cwd}" if cwd is not None else "" 47 encoding="utf-8", 54 def installed_llvm_has_pgo_generate_enabled() -> bool: 55 """Returns whether the currently-installed LLVM has USE=pgo_generate.""" 57 ["equery", "--no-color", "--no-pipe", "u", "sys-devel/llvm"], [all …]
|
| /external/robolectric/integration_tests/nativegraphics/src/test/java/org/robolectric/shadows/ |
| D | ShadowNativeRegionTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 11 * distributed under the License is distributed on an "AS IS" BASIS, 29 import android.graphics.Path; 146 // is set up incorrectly, it will crash trying to get the instance from mNativeRegion. in testConstructor() 206 // Region is empty in testIsComplex() 227 // This region contains only one rectangle and it is the expected one. in testQuickContains1() 239 // This region contains only one rectangle and it is the expected one. in testQuickContains2() 254 // union (inclusive-or) the two regions in testUnion() 261 // 1. union rectangle inside this region in testUnion() 292 // Test point inside this region. in testContains() [all …]
|
| /external/toolchain-utils/rust-analyzer-chromiumos-wrapper/ |
| D | README.md | 1 # rust-analyzer-chromiumos-wrapper 5 rust-analyzer is an LSP server for the Rust language. It allows editors like 6 vim, emacs, or VS Code to provide IDE-like features for Rust. 8 This program, `rust-analyzer-chromiumos-wrapper`, is a wrapper around 9 `rust-analyzer`. It exists to translate paths between an instance of 10 rust-analyzer running inside the chromiumos chroot and a client running outside 13 It is of course possible to simply run `rust-analyzer` outside the chroot, but 18 to invoke `rust-analyzer` inside the chroot and translate paths. Otherwise, it 19 will attempt to invoke a `rust-analyzer` outside the chroot and will not 22 It only supports a limited set of rust-analyzer's command line options, which [all …]
|
| /external/google-cloud-java/java-life-sciences/proto-google-cloud-life-sciences-v2beta/src/main/java/com/google/cloud/lifesciences/v2beta/ |
| D | MountOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 11 * distributed under the License is distributed on an "AS IS" BASIS, 55 * The path to mount the disk inside the container. 58 * <code>string path = 2;</code> 60 * @return The path. 67 * The path to mount the disk inside the container. 70 * <code>string path = 2;</code> 72 * @return The bytes for path. 80 * If true, the disk is mounted read-only inside the container.
|
| D | Mount.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 11 * distributed under the License is distributed on an "AS IS" BASIS, 25 * Carries information about a particular disk mount inside a container. 130 * The path to mount the disk inside the container. 133 * <code>string path = 2;</code> 135 * @return The path. 153 * The path to mount the disk inside the container. 156 * <code>string path = 2;</code> 158 * @return The bytes for path. 179 * If true, the disk is mounted read-only inside the container. [all …]
|
| /external/python/cpython3/Lib/ |
| D | glob.py | 17 The pattern may contain simple shell-style wildcards a la 22 If `include_hidden` is true, the patterns '*', '?', '**' will match hidden 25 If `recursive` is true, the pattern '**' will match any files and 35 The pattern may contain simple shell-style wildcards a la 40 If recursive is true, the pattern '**' will match any files and 45 if root_dir is not None: 62 dirname, basename = os.path.split(pathname) 81 # `os.path.split()` returns the argument itself as a dirname if it is a 82 # drive or UNC path. Prevent an infinite recursion if a drive or UNC path 99 yield os.path.join(dirname, name) [all …]
|
| /external/python/setuptools/setuptools/ |
| D | glob.py | 19 The pattern may contain simple shell-style wildcards a la 24 If recursive is true, the pattern '**' will match any files and 33 The pattern may contain simple shell-style wildcards a la 38 If recursive is true, the pattern '**' will match any files and 49 dirname, basename = os.path.split(pathname) 54 if os.path.lexists(pathname): 58 if os.path.isdir(dirname): 65 # `os.path.split()` returns the argument itself as a dirname if it is a 66 # drive or UNC path. Prevent an infinite recursion if a drive or UNC path 76 yield os.path.join(dirname, name) [all …]
|
| /external/skia/tools/viewer/ |
| D | SimpleStrokerSlide.cpp | 4 * Use of this source code is governed by a BSD-style license that can be 23 static SkPoint rotate90(const SkPoint& p) { return {p.fY, -p.fX}; } in rotate90() 24 static SkPoint rotate180(const SkPoint& p) { return p * -1; } in rotate180() 92 // Returns the fill path 93 SkPath getFillPath(const SkPath& path, const SkPaint& paint); 107 void initForPath(const SkPath& path, const SkPaint& paint); 119 // Appends path in reverse to result 120 static void appendPathReversed(const PathRecorder& path, PathRecorder* result); 129 void SkPathStroker2::initForPath(const SkPath& path, const SkPaint& paint) { in initForPath() argument 137 SkPath SkPathStroker2::getFillPath(const SkPath& path, const SkPaint& paint) { in getFillPath() argument [all …]
|
| /external/python/cpython2/Tools/scripts/ |
| D | fixcid.py | 5 # avoid making substitutions inside strings or comments. 6 # Inside strings, substitutions are never made; inside comments, 7 # it is a user option (off by default). 14 # The option -r reverses the sense of the substitutions (this may be 17 # If the old identifier is prefixed with a '*' (with no intervening 18 # whitespace), then it will not be substituted inside comments. 22 # like a C file (ends in .h or .c). The special filename '-' means 28 # The original files are kept as back-up with a "~" suffix. 30 # Changes made are reported to stdout in a diff-like format. 50 ' [-c] [-r] [-s file] ... file-or-directory ...\n') [all …]
|
| /external/python/cpython3/Tools/scripts/ |
| D | fixcid.py | 5 # avoid making substitutions inside strings or comments. 6 # Inside strings, substitutions are never made; inside comments, 7 # it is a user option (off by default). 14 # The option -r reverses the sense of the substitutions (this may be 17 # If the old identifier is prefixed with a '*' (with no intervening 18 # whitespace), then it will not be substituted inside comments. 22 # like a C file (ends in .h or .c). The special filename '-' means 28 # The original files are kept as back-up with a "~" suffix. 30 # Changes made are reported to stdout in a diff-like format. 50 ' [-c] [-r] [-s file] ... file-or-directory ...\n') [all …]
|
| /external/armnn/samples/ObjectDetection/ |
| D | Readme.md | 4 This is a sample code showing object detection using Arm NN in two different modes: 21 1. Public Arm NN C++ API is provided by Arm NN library. 32 sudo apt install gcc-9 g++-9 35 -DCMAKE_C_COMPILER=gcc-9 -DCMAKE_CXX_COMPILER=g++-9 48 …ries can be downloaded from https://github.com/ARM-software/armnn/releases/download/v21.11/ArmNN-l… 52 1. Inside custom user directory specified by ARMNN_LIB_DIR cmake option. 53 2. Inside the current Arm NN repository, assuming that Arm NN was built following [this instruction… 54 3. Inside default locations for system libraries, assuming Arm NN was installed from deb packages. 64 Your host platform may have OpenCV available through linux package manager. If this is the case, pl… 66 sudo apt install python3-opencv [all …]
|
| /external/tensorflow/tensorflow/tools/ci_build/ |
| D | ci_build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 11 # distributed under the License is distributed on an "AS IS" BASIS, 17 # Usage: ci_build.sh <CONTAINER_TYPE> [--dockerfile <DOCKERFILE_PATH>] 23 # DOCKERFILE_PATH: (Optional) Path to the Dockerfile used for docker build. 24 # If this optional value is not supplied (via the 25 # --dockerfile flag), default Dockerfiles in the same 29 # tensorflow/tools/ci_build/builds/pip.sh gpu -c opt --config=cuda 42 if [[ "$1" == "--dockerfile" ]]; then 45 echo "Using custom Dockerfile path: ${DOCKERFILE_PATH}" 46 echo "Using custom docker build context path: ${DOCKER_CONTEXT_PATH}" [all …]
|
| /external/vboot_reference/tests/ |
| D | test_using_qemu.sh | 4 # Use of this source code is governed by a BSD-style license that can be 13 # BUILD_RUN - path to build directory inside chroot 14 # HOME - home directory inside chroot 15 # QEMU_RUN - path to QEMU binary inside chroot 16 # SYSROOT - path to root for target platform, outside chroot 18 set -e 21 sudo mkdir -p "${SYSROOT}/proc" "${SYSROOT}/dev" 22 sudo mount --bind /proc "${SYSROOT}/proc" 23 sudo mount --bind /dev "${SYSROOT}/dev" 27 sudo chroot ${SYSROOT} ${QEMU_RUN} -drop-ld-preload \ [all …]
|
| /external/ltp/testcases/kernel/syscalls/fanotify/ |
| D | fanotify10.c | 1 // SPDX-License-Identifier: GPL-2.0 19 * This is a regression test for commit: 23 * Test case #16 is a regression test for commit: 321 .tname = "ignore events on file created inside a parent watching children", 331 .tname = "don't ignore events on file created inside a parent not watching children", 341 .tname = "ignore mount events created inside a parent watching children", 351 .tname = "don't ignore mount events created inside a parent not watching children", 361 .tname = "ignore fs events created inside a parent watching children", 371 .tname = "don't ignore fs events created inside a parent not watching children", 406 .tname = "don't ignore mount events created inside a parent with evicted ignore mark", [all …]
|
| /external/rust/crates/debug_tree/src/ |
| D | internal.rs | 15 Inside, enumerator 23 pub fn new(text: Option<&str>) -> Tree { in new() 30 /// Navigate to the branch at the given `path` relative to this tree. 31 /// If a valid branch is found by following the path, it is returned. 32 pub fn at_mut(&mut self, path: &[usize]) -> Option<&mut Tree> { in at_mut() 33 match path.first() { in at_mut() 35 Some(x) => x.at_mut(&path[1..]), in at_mut() 44 /// `does_continue` is a bool for each column indicating whether the tree continues. 51 ) -> Vec<String> { in lines() 61 _ => Position::Inside, in lines() [all …]
|
| /external/skia/include/core/ |
| D | SkPathTypes.h | 4 * Use of this source code is governed by a BSD-style license that can be 12 /** Specifies that "inside" is computed by a non-zero sum of signed edge crossings */ 14 /** Specifies that "inside" is computed by an odd number of edge crossings */ 16 /** Same as Winding, but draws outside of the path, rather than inside */ 18 /** Same as EvenOdd, but draws outside of the path, rather than inside */ 37 /** counter-clockwise direction for adding closed contours */
|
| /external/python/cpython3/Mac/Tools/ |
| D | pythonw.c | 2 * This wrapper program executes a python executable hidden inside an 3 * application bundle inside the Python framework. This is needed to run 4 * GUI code: some GUI API's don't work unless the program is inside an 8 * slightly more control over how the "real" interpreter is executed. 31 #include <mach-o/dyld.h> 40 * In a regular framework the structure is: 47 * structure is: 51 * /.Python <- the dylib 55 * feature, support for that structure is provided as 77 end = g_path + len - 1; in get_python_path() [all …]
|