/aosp_15_r20/external/rust/android-crates-io/crates/tempfile/src/dir/ |
D | mod.rs | 2 // file at the top-level directory of this distribution and at 3 // http://rust-lang.org/COPYRIGHT. 5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or 6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license 7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your 14 use std::path::{self, Path, PathBuf}; 28 /// destructor is run. 32 /// See [the resource leaking][resource-leaking] docs on `TempDir`. 36 /// If the directory can not be created, `Err` is returned. 45 /// // Create a directory inside of `env::temp_dir()` [all …]
|
/aosp_15_r20/external/autotest/site_utils/lxc/ |
H A D | config.py | 2 # Use of this source code is governed by a BSD-style license that can be 33 target: config file's location inside container. 34 append: true to append the content of config file to existing file inside 35 container. If it's set to false, the existing file inside container will 37 permission: Permission to set to the config file inside container. 48 /etc/resolv.conf inside container. 54 target: the folder's location inside container. 55 mount: true to mount the source folder onto the target inside container. 56 A setting with false value of mount is invalid. 57 readonly: true if the mounted folder inside container should be readonly. [all …]
|
/aosp_15_r20/external/robolectric/integration_tests/nativegraphics/src/test/java/org/robolectric/shadows/ |
H A D | ShadowNativeRegionTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 11 * distributed under the License is distributed on an "AS IS" BASIS, 29 import android.graphics.Path; 146 // is set up incorrectly, it will crash trying to get the instance from mNativeRegion. in testConstructor() 206 // Region is empty in testIsComplex() 227 // This region contains only one rectangle and it is the expected one. in testQuickContains1() 239 // This region contains only one rectangle and it is the expected one. in testQuickContains2() 254 // union (inclusive-or) the two regions in testUnion() 261 // 1. union rectangle inside this region in testUnion() 292 // Test point inside this region. in testContains() [all …]
|
/aosp_15_r20/cts/tests/tests/graphics/src/android/graphics/cts/ |
H A D | RegionTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 11 * distributed under the License is distributed on an "AS IS" BASIS, 24 import android.graphics.Path; 188 // Region is empty in testIsComplex() 209 // This region contains only one rectangle and it is the expected one. in testQuickContains1() 221 // This region contains only one rectangle and it is the expected one. in testQuickContains2() 236 // union (inclusive-or) the two regions in testUnion() 243 // 1. union rectangle inside this region in testUnion() 274 // Test point inside this region. in testContains() 277 // Test left-top corner. in testContains() [all …]
|
/aosp_15_r20/prebuilts/vndk/v34/x86_64/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 119 * This is only safe to use for processes that do not execute untrusted code. 125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 142 * This option is *dangerous* as it negates most of the functionality of 157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v34/x86/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 119 * This is only safe to use for processes that do not execute untrusted code. 125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 142 * This option is *dangerous* as it negates most of the functionality of 157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v34/arm64/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 119 * This is only safe to use for processes that do not execute untrusted code. 125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 142 * This option is *dangerous* as it negates most of the functionality of 157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v34/arm/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 119 * This is only safe to use for processes that do not execute untrusted code. 125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 142 * This option is *dangerous* as it negates most of the functionality of 157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/external/minijail/ |
H A D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 119 * This is only safe to use for processes that do not execute untrusted code. 125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 142 * This option is *dangerous* as it negates most of the functionality of 157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/gdal/raster_to_gtiff/ |
H A D | README.md | 2 …is repository is an example of how Sandboxed API can be used with GDAL C Raster API to implement t… 6 1. Register needed drivers inside the sandbox 8 3. Map output file inside the sandbox and create a GeoTIFF dataset backed by this file 16 …-line utility that uses sandboxed GDAL to implement the workflow and GoogleTest unit tests to comp… 19 … build of libgdal and libproj. Moreover, proj.db file path is required to be able to map it inside… 22 …make a clean installation you can use the build folder as an installation path, with this approach… 23 First, you will need to build PROJ, which is used internally in the GDAL. You can't use the libproj… 24 … PROJ from sources](https://proj.org/install.html#compilation-and-installation-from-source-code) y… 27 wget https://download.osgeo.org/proj/proj-7.1.1.tar.gz 28 tar xvzf proj-7.1.1.tar.gz [all …]
|
/aosp_15_r20/tools/treble/build/sandbox/ |
H A D | nsjail.py | 7 # https://www.apache.org/licenses/LICENSE-2.0 10 # distributed under the License is distributed on an "AS IS" BASIS, 15 """Runs a command inside an NsJail sandbox for building Android. 19 If no command is provided then it will open 72 """Run inside an NsJail sandbox. 77 inside the container. 78 nsjail_bin: A string with the path to the nsjail binary. 79 chroot: A string with the path to the chroot. 80 overlay_config: A string path to an overlay configuration file. 81 source_dir: A string with the path to the Android platform source. [all …]
|
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/ |
D | run_v1alpha1.projects.locations.services.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | run_v1alpha1.namespaces.services.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | run_v1alpha1.namespaces.configurations.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | run_v1alpha1.projects.locations.configurations.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
/aosp_15_r20/prebuilts/vndk/v32/arm/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v31/x86/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v32/x86_64/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v32/arm64/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v31/x86_64/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v31/arm64/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v32/x86/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/prebuilts/vndk/v31/arm/include/external/minijail/ |
D | libminijail.h | 2 * Use of this source code is governed by a BSD-style license that can be 10 * 3) Enter it, which locks the current process inside it, or: 11 * 3) Run a process inside it 61 * setup in the forked process. These can only be used if the jailed process is 64 * If the return value is non-zero, it will be interpreted as -errno and the 92 * minijail_enter() is called. See the documentation in minijail0.1 for 115 * This is only safe to use for processes that do not execute untrusted code. 121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path); 138 * This option is *dangerous* as it negates most of the functionality of 153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>. [all …]
|
/aosp_15_r20/external/rust/crates/inotify/src/ |
D | watches.rs | 11 path::Path, 30 /// `WatchMask` constants can be passed to [`Watches::add`] as is. For 32 /// is accessed: 44 /// # File::create("/tmp/inotify-rs-test-file") 47 /// inotify.watches().add("/tmp/inotify-rs-test-file", WatchMask::ACCESS) 52 /// this is triggered both when files are created or deleted in a directory: 68 /// When watching a directory, this event is only triggered for objects 69 /// inside the directory, not the directory itself. 77 /// directory itself, as well as objects inside the directory. 84 /// When watching a directory, this event is only triggered for objects [all …]
|
/aosp_15_r20/prebuilts/cmake/linux-x86/share/cmake-3.22/Help/manual/ |
D | cmake-file-api.7.rst | 1 .. cmake-manual-description: CMake File-Based API 3 cmake-file-api(7) 13 CMake provides a file-based API that clients may use to get semantic 20 The file-based API uses a ``<build>/.cmake/api/`` directory at the top 21 of a build tree. The API is versioned to support changes to the layout 22 of files within the API directory. API file layout versioning is 29 API v1 is housed in the ``<build>/.cmake/api/v1/`` directory. 48 ------------------------------- 55 ``v1/query/`` directory. The form is:: 57 <build>/.cmake/api/v1/query/<kind>-v<major> [all …]
|