Home
last modified time | relevance | path

Searched +full:is +full:- +full:path +full:- +full:inside (Results 1 – 25 of 1244) sorted by relevance

12345678910>>...50

/aosp_15_r20/external/rust/android-crates-io/crates/tempfile/src/dir/
Dmod.rs2 // file at the top-level directory of this distribution and at
3 // http://rust-lang.org/COPYRIGHT.
5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
14 use std::path::{self, Path, PathBuf};
28 /// destructor is run.
32 /// See [the resource leaking][resource-leaking] docs on `TempDir`.
36 /// If the directory can not be created, `Err` is returned.
45 /// // Create a directory inside of `env::temp_dir()`
[all …]
/aosp_15_r20/external/autotest/site_utils/lxc/
H A Dconfig.py2 # Use of this source code is governed by a BSD-style license that can be
33 target: config file's location inside container.
34 append: true to append the content of config file to existing file inside
35 container. If it's set to false, the existing file inside container will
37 permission: Permission to set to the config file inside container.
48 /etc/resolv.conf inside container.
54 target: the folder's location inside container.
55 mount: true to mount the source folder onto the target inside container.
56 A setting with false value of mount is invalid.
57 readonly: true if the mounted folder inside container should be readonly.
[all …]
/aosp_15_r20/external/robolectric/integration_tests/nativegraphics/src/test/java/org/robolectric/shadows/
H A DShadowNativeRegionTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
11 * distributed under the License is distributed on an "AS IS" BASIS,
29 import android.graphics.Path;
146 // is set up incorrectly, it will crash trying to get the instance from mNativeRegion. in testConstructor()
206 // Region is empty in testIsComplex()
227 // This region contains only one rectangle and it is the expected one. in testQuickContains1()
239 // This region contains only one rectangle and it is the expected one. in testQuickContains2()
254 // union (inclusive-or) the two regions in testUnion()
261 // 1. union rectangle inside this region in testUnion()
292 // Test point inside this region. in testContains()
[all …]
/aosp_15_r20/cts/tests/tests/graphics/src/android/graphics/cts/
H A DRegionTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
11 * distributed under the License is distributed on an "AS IS" BASIS,
24 import android.graphics.Path;
188 // Region is empty in testIsComplex()
209 // This region contains only one rectangle and it is the expected one. in testQuickContains1()
221 // This region contains only one rectangle and it is the expected one. in testQuickContains2()
236 // union (inclusive-or) the two regions in testUnion()
243 // 1. union rectangle inside this region in testUnion()
274 // Test point inside this region. in testContains()
277 // Test left-top corner. in testContains()
[all …]
/aosp_15_r20/prebuilts/vndk/v34/x86_64/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
119 * This is only safe to use for processes that do not execute untrusted code.
125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
142 * This option is *dangerous* as it negates most of the functionality of
157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v34/x86/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
119 * This is only safe to use for processes that do not execute untrusted code.
125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
142 * This option is *dangerous* as it negates most of the functionality of
157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v34/arm64/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
119 * This is only safe to use for processes that do not execute untrusted code.
125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
142 * This option is *dangerous* as it negates most of the functionality of
157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v34/arm/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
119 * This is only safe to use for processes that do not execute untrusted code.
125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
142 * This option is *dangerous* as it negates most of the functionality of
157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/external/minijail/
H A Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
119 * This is only safe to use for processes that do not execute untrusted code.
125 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
142 * This option is *dangerous* as it negates most of the functionality of
157 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/external/sandboxed-api/oss-internship-2020/gdal/raster_to_gtiff/
H A DREADME.md2 …is repository is an example of how Sandboxed API can be used with GDAL C Raster API to implement t…
6 1. Register needed drivers inside the sandbox
8 3. Map output file inside the sandbox and create a GeoTIFF dataset backed by this file
16-line utility that uses sandboxed GDAL to implement the workflow and GoogleTest unit tests to comp…
19 … build of libgdal and libproj. Moreover, proj.db file path is required to be able to map it inside
22 …make a clean installation you can use the build folder as an installation path, with this approach…
23 First, you will need to build PROJ, which is used internally in the GDAL. You can't use the libproj
24 … PROJ from sources](https://proj.org/install.html#compilation-and-installation-from-source-code) y…
27 wget https://download.osgeo.org/proj/proj-7.1.1.tar.gz
28 tar xvzf proj-7.1.1.tar.gz
[all …]
/aosp_15_r20/tools/treble/build/sandbox/
H A Dnsjail.py7 # https://www.apache.org/licenses/LICENSE-2.0
10 # distributed under the License is distributed on an "AS IS" BASIS,
15 """Runs a command inside an NsJail sandbox for building Android.
19 If no command is provided then it will open
72 """Run inside an NsJail sandbox.
77 inside the container.
78 nsjail_bin: A string with the path to the nsjail binary.
79 chroot: A string with the path to the chroot.
80 overlay_config: A string path to an overlay configuration file.
81 source_dir: A string with the path to the Android platform source.
[all …]
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/
Drun_v1alpha1.projects.locations.services.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Drun_v1alpha1.namespaces.services.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Drun_v1alpha1.namespaces.configurations.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Drun_v1alpha1.projects.locations.configurations.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
/aosp_15_r20/prebuilts/vndk/v32/arm/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v31/x86/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v32/x86_64/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v32/arm64/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v31/x86_64/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v31/arm64/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v32/x86/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/prebuilts/vndk/v31/arm/include/external/minijail/
Dlibminijail.h2 * Use of this source code is governed by a BSD-style license that can be
10 * 3) Enter it, which locks the current process inside it, or:
11 * 3) Run a process inside it
61 * setup in the forked process. These can only be used if the jailed process is
64 * If the return value is non-zero, it will be interpreted as -errno and the
92 * minijail_enter() is called. See the documentation in minijail0.1 for
115 * This is only safe to use for processes that do not execute untrusted code.
121 void minijail_parse_seccomp_filters(struct minijail *j, const char *path);
138 * This option is *dangerous* as it negates most of the functionality of
153 * WARNING: this is NOT THREAD SAFE. See the block comment in </libminijail.c>.
[all …]
/aosp_15_r20/external/rust/crates/inotify/src/
Dwatches.rs11 path::Path,
30 /// `WatchMask` constants can be passed to [`Watches::add`] as is. For
32 /// is accessed:
44 /// # File::create("/tmp/inotify-rs-test-file")
47 /// inotify.watches().add("/tmp/inotify-rs-test-file", WatchMask::ACCESS)
52 /// this is triggered both when files are created or deleted in a directory:
68 /// When watching a directory, this event is only triggered for objects
69 /// inside the directory, not the directory itself.
77 /// directory itself, as well as objects inside the directory.
84 /// When watching a directory, this event is only triggered for objects
[all …]
/aosp_15_r20/prebuilts/cmake/linux-x86/share/cmake-3.22/Help/manual/
Dcmake-file-api.7.rst1 .. cmake-manual-description: CMake File-Based API
3 cmake-file-api(7)
13 CMake provides a file-based API that clients may use to get semantic
20 The file-based API uses a ``<build>/.cmake/api/`` directory at the top
21 of a build tree. The API is versioned to support changes to the layout
22 of files within the API directory. API file layout versioning is
29 API v1 is housed in the ``<build>/.cmake/api/v1/`` directory.
48 -------------------------------
55 ``v1/query/`` directory. The form is::
57 <build>/.cmake/api/v1/query/<kind>-v<major>
[all …]

12345678910>>...50