Searched +full:bad +full:- +full:build +full:- +full:check (Results 1 – 25 of 1111) sorted by relevance
12345678910>>...45
| /external/oss-fuzz/infra/base-images/base-runner/ |
| D | bad_build_check | 1 #!/bin/bash -u 8 # http://www.apache.org/licenses/LICENSE-2.0 18 # A minimal number of runs to test fuzz target with a non-empty input. 34 # The value below can definitely be higher (like 500-1000), but avoid being too 35 # agressive here while still evaluating the DFT-based fuzzing approach. 44 # Usually, a non UBSan build (e.g. ASan) has 165 calls to UBSan runtime. The 46 # some very small targets that may have < 200 UBSan calls even in a UBSan build. 47 # Use the threshold value of 169 (slightly > 165) for UBSan build. 50 # It would be risky to use the threshold value close to 165 for non UBSan build, 52 # of calls to UBSan runtime even in ASan build. With that, we use the threshold [all …]
|
| /external/oss-fuzz/infra/cifuzz/external-actions/build_fuzzers/ |
| D | action.yml | 2 name: 'build-fuzzers' 3 description: "Builds an OSS-Fuzz project's fuzzers." 9 dry-run: 12 allowed-broken-targets-percentage: 16 description: 'The sanitizer to build the fuzzers with.' 18 project-src-path: 21 bad-build-check: 22 description: "Whether or not OSS-Fuzz's check for bad builds should be done." 25 storage-repo: 29 storage-repo-branch: [all …]
|
| /external/wayland/ |
| D | Makefile.am | 5 ACLOCAL_AMFLAGS = -I m4 ${ACLOCAL_FLAGS} 8 -I$(top_builddir)/src \ 9 -I$(top_srcdir)/src \ 10 -I$(top_builddir)/protocol 15 dist_aclocal_DATA = wayland-scanner.m4 18 wayland-scanner.mk \ 25 bin_PROGRAMS = wayland-scanner 27 wayland_scanner_CPPFLAGS = $(AM_CPPFLAGS) -include config.h 29 wayland_scanner_LDADD = $(EXPAT_LIBS) $(LIBXML_LIBS) libwayland-util.la 30 pkgconfig_DATA += src/wayland-scanner.pc [all …]
|
| /external/oss-fuzz/infra/cifuzz/actions/build_fuzzers/ |
| D | action.yml | 2 name: 'build-fuzzers' 3 description: "Builds an OSS-Fuzz project's fuzzers." 5 oss-fuzz-project-name: 6 description: 'Name of the corresponding OSS-Fuzz project.' 12 dry-run: 15 allowed-broken-targets-percentage: 19 description: 'The sanitizer to build the fuzzers with.' 21 project-src-path: 24 bad-build-check: 25 description: "Whether or not OSS-Fuzz's check for bad builds should be done." [all …]
|
| /external/toolchain-utils/binary_search_tool/common/ |
| D | hash_test.sh | 1 #!/bin/bash -u 7 # itself. It waits for the test setup script to build and install the 10 # otherwise it is 'bad'. This allows the rest of the bisecting tool 12 # dealing with a real 'bad' image). 18 # Make an md5sum of all the files you want to check. For example if you want 19 # file1, file2, and file3 to be found as bad items: 23 # (Make sure you are hashing the files from your good build and that the hashes 24 # from good to bad build differ) 27 # In this example, file1, file2, file3 will be found as the bad files 28 # because their hashes won't match when from the bad build tree. This is [all …]
|
| /external/toolchain-utils/binary_search_tool/android/ |
| D | README.android.md | 5 thing or thing(s) in the set is 'bad'. `binary_search_state.py` assumes 7 and one which contains at least one bad item. `binary_search_state.py` 8 then copies items from the good and bad sets into a working set and 9 tests the result (good or bad). `binary_search_state.py` requires that 13 …/sites.google.com/a/google.com/chromeos-toolchain-team-home2/home/team-tools-and-scripts/binary-se… 16 `binary_search_state.py` in order to find the bad object or set of 17 bad objects in an Android build. Furthermore, it can also help find 18 the bad compiler pass and transformation when building that bad object. 23 After setting up your 2 build trees (see Prerequisites section), do the 26 - Decide which test script to use (`boot_test.sh` or [all …]
|
| D | switch_to_bad.sh | 1 #!/bin/bash -u 7 # symlinks a list of object files from the 'bad' build tree into the working 8 # build tree, for testing. 10 # It is highly recommended to not use --noincremental with these scripts. If the 11 # switch scripts are given non incremental sets of GOOD/BAD objects, make will 12 # not be able to do an incremental build and will take much longer to build. 20 # Symlink from BAD obj to working tree. 21 SWITCH_CMD="ln -sf ${BISECT_BAD_BUILD}/{} {}; touch {};" 25 # Check that number of arguments == 1 26 if [ $# -eq 1 ] ; then [all …]
|
| D | generate_cmd.sh | 1 #!/bin/bash -eu 4 # Use of this source code is governed by a BSD-style license that can be 7 # This script extracts command line options to build bad item. 15 # The item will be `-o relative-path-to-object `, which will be used 17 # We care about the `-o` at the beginning and ` ` at the end are necessary, 18 # so that we can get build command for exact this object file. 19 # Example: prebuilt/../clang++ -O3 -MF obj1.o.d -o obj.o obj.cpp 20 # We should count this command as one to build obj.o, not obj1.o.d. 21 real_path=$(realpath --relative-to="${BISECT_WORK_BUILD}" "${abs_path}") 22 item="-o $real_path " [all …]
|
| /external/toolchain-utils/binary_search_tool/full_bisect_test/ |
| D | run-test-nowrapper.sh | 8 # It makes sure the good & bad object directories exist (soft links); checks 9 # to see if it needs to compile the good & bad sources & populate the 12 # Then it calls main-bisect-test, which runs the actual bisection tests. This 16 # toolchain-utils directory and the 17 # toolchain-utils/binary_search_tool directory for these testers to work. 24 if [[ ! -d "${DIR}" ]] ; then 26 echo "You need to run this from toolchain-utils/binary_search_tool ." 33 rm -f good-objects 34 rm -f bad-objects 36 ln -s good-objects-permanent good-objects [all …]
|
| /external/angle/build/config/clang/ |
| D | BUILD.gn | 2 # Use of this source code is governed by a BSD-style license that can be 5 import("//build/config/rust.gni") 9 import("//build/config/ios/config.gni") # For `target_environment` 19 "-Xclang", 20 "-add-plugin", 21 "-Xclang", 22 "find-bad-constructs", 24 "-Xclang", 25 "-plugin-arg-find-bad-constructs", 26 "-Xclang", [all …]
|
| /external/cronet/third_party/icu/source/ |
| D | configure.ac | 1 # -*-autoconf-*- 3 # AC_COPYRIGHT([ Copyright (c) 1999-2015, International Business Machines Corporation and others. A… 9 # Check for autoconf version 14 …m4_esyscmd_s([sed -n 's/^[ ]*#[ ]*define[ ]*U_ICU_VERSION[ ]*"\([^"]*\)".*/\1/p' "./common/uni… 15 [http://icu-project.org/bugs], 17 [http://icu-project.org]) 31 # for icu-config 32 # This may be removed later - mow (June 17, 2010) 34 case `/bin/sh -c "echo -n x"` in 35 -n*) [all …]
|
| /external/icu/icu4c/source/ |
| D | configure.ac | 1 # -*-autoconf-*- 3 # AC_COPYRIGHT([ Copyright (c) 1999-2015, International Business Machines Corporation and others. A… 9 # Check for autoconf version 14 …m4_esyscmd_s([sed -n 's/^[ ]*#[ ]*define[ ]*U_ICU_VERSION[ ]*"\([^"]*\)".*/\1/p' "./common/uni… 15 [http://icu-project.org/bugs], 17 [http://icu-project.org]) 31 # for icu-config 32 # This may be removed later - mow (June 17, 2010) 34 case `/bin/sh -c "echo -n x"` in 35 -n*) [all …]
|
| /external/golang-protobuf/ |
| D | integration_test.go | 2 // Use of this source code is governed by a BSD-style 5 //go:build ignore 6 // +build ignore 36 buildRelease = flag.Bool("buildRelease", false, "build release binaries") 50 golangLatest = golangVersions[len(golangVersions)-1] 60 // purgeTimeout determines the maximum age of unused sub-directories. 76 // Fail the test late, so we can test uncommitted changes with -failfast. 81 gitUntracked := mustRunCommand(t, "git", "ls-files", "--others", "--exclude-standard") 86 // Do the relatively fast checks up-front. 88 diff := mustRunCommand(t, "go", "run", "-tags", "protolegacy", "./internal/cmd/generate-types") [all …]
|
| /external/autotest/server/hosts/ |
| D | cros_firmware.py | 3 # Use of this source code is governed by a BSD-style license that can be 11 fix problems by updating or re-installing the firmware. 16 to check for corruption, and supplies `FaftFirmwareRepair` to 17 re-install firmware of current faft stable_version via servo 22 firmware that is out-of-date from the designated version. This model 23 also supplys `GeneralFirmwareRepair` to re-install firmware that 28 * DUTs used for general testing. These DUTs automatically check for 30 * DUTs in pools used for FAFT testing. These check for bad firmware 32 `FirmwareRepair`. These DUTs don't check for or install the 39 # pylint: disable=missing-docstring [all …]
|
| /external/oss-fuzz/infra/base-images/base-builder/ |
| D | bisect_clang.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 34 stdout = stdout.decode('utf-8') 35 stderr = stderr.decode('utf-8') 48 culprit_regex = re.compile('([a-z0-9]{40}) is the first (good|bad) commit') 61 command = ['git', '-C', self.repo_dir] + git_subcommand 65 """Build LLVM at the currently checkedout commit, then run |test_command|. 66 If returncode is 0 run 'git bisect good' otherwise return 'git bisect bad'. 74 retcode, stdout, _ = self.do_bisect_command('bad') 78 """Do git bisect assuming |good_commit| is good, |bad_commit| is bad and 89 # Do bad commit first since it is more likely to be recent. [all …]
|
| /external/pigweed/pw_presubmit/py/pw_presubmit/ |
| D | format_code.py | 9 # https://www.apache.org/licenses/LICENSE-2.0 18 This uses clang-format, gn format, gofmt, and python -m yapf to format source 75 def _colorize_diff_line(line: str) -> str: 76 if line.startswith('--- ') or line.startswith('+++ '): 78 if line.startswith('-'): 87 def colorize_diff(lines: Iterable[str]) -> str: 95 def _diff(path, original: bytes, formatted: bytes) -> str: 109 def _diff_formatted(path, formatter: Formatter) -> Optional[str]: 119 def _check_files(files, formatter: Formatter) -> Dict[Path, str]: 130 def _clang_format(*args: Union[Path, str], **kwargs) -> bytes: [all …]
|
| /external/elfutils/tests/ |
| D | run-lfs-symbols.sh | 18 . $srcdir/test-subr.sh 20 if ! grep -q -F '#define _FILE_OFFSET_BITS' ${abs_top_builddir}/config.h; then 32 # $ gcc -m32 -O2 nolfs.c -o testfile-nolfs 33 testfiles testfile-nolfs 37 /^\w/ && bad[$0] 40 /@@GLIBC_/ && $1 in bad { print $1 }' 42 LFS=$(printf "$LFS_FORMAT" "${abs_srcdir}/lfs-symbols") 45 make print-$1 -C $2 |& awk -F= "/^$1=/{ print \$2 }" 50 if [ -e "$1" ]; then 51 bad=$(testrun ${abs_top_builddir}/src/nm -u "$1" | awk "$LFS") [all …]
|
| /external/google-breakpad/ |
| D | configure.ac | 33 AC_INIT(breakpad, 0.1, google-breakpad-dev@googlegroups.com) 34 dnl Sanity check: the argument is just a file that should exist. 40 AM_INIT_AUTOMAKE(subdir-objects tar-ustar 1.11.1) 54 AS_HELP_STRING([--enable-m32], 55 [Compile/build with -m32] 59 CFLAGS="${CFLAGS} -m32" 60 CXXFLAGS="${CXXFLAGS} -m32" 67 AC_MSG_ERROR(bad value ${enableval} for --enable-m32) 86 AX_CHECK_COMPILE_FLAG([-Werror=unknown-warning-option],[ 87 ax_compiler_flags_test="-Werror=unknown-warning-option" [all …]
|
| /external/ltp/tools/sparse/ |
| D | README.md | 7 It is integrated with the LTP build system. Just run `make check` or 8 `make check-a_test01`, where `a_test01` is an arbitrary test 13 The bad news is you must get and build Sparse[^1]. The good news is 14 that this only takes a minute and the build system does it for 15 you. Just try running `make check` as described above. 29 $ git submodule update --init 32 ### Modifying CFLAGS and -m32 34 When compiling the LTP with `-m32` it may break building 35 `sparse-ltp`. We do not pass LTP's `CFLAGS` or `HOST_CFLAGS` to 39 To avoid issues with m32, just pre-build the checker with a non-m32 [all …]
|
| /external/toolchain-utils/binary_search_tool/cros_pkg/ |
| D | setup.sh | 1 #!/bin/bash -u 7 # the three necessary build tree directories (see the prerequisites section of 15 # This script sets up a soft link definining /build/${board} to point 16 # to the working build tree, for the binary search triags process. In 29 GOOD_BUILD=/build/${BOARD}.good 30 BAD_BUILD=/build/${BOARD}.bad 31 WORK_BUILD=/build/${BOARD}.work 37 if [[ ! -d ${GOOD_BUILD} ]] ; then 42 if [[ ! -d ${BAD_BUILD} ]] ; then 47 if [[ ! -d ${WORK_BUILD} ]] ; then [all …]
|
| /external/curl/docs/libcurl/ |
| D | libcurl-errors.3 | 21 .\" * SPDX-License-Identifier: curl 25 .TH libcurl-errors 3 "23 Nov 2021" "libcurl 7.81.0" "libcurl errors" 27 libcurl-errors \- error codes in libcurl 44 support. The support might be a compile-time option that you did not use, it 54 A requested feature, protocol or option was not found built-in in this libcurl 55 due to a build-time decision. This means that a feature or option was not 83 FTP servers return a 227-line as a response to a PASV command. If libcurl 123 Operation timeout. The specified time-out period was reached according to the 150 path does not identify an existing file. Did you check file permissions? 162 A function was called with a bad parameter. [all …]
|
| /external/clang/test/Modules/ |
| D | explicit-build.cpp | 1 // RUN: rm -rf %t 3 // ------------------------------- 4 // Build chained modules A, B, and C 5 // RUN: %clang_cc1 -x c++ -std=c++11 -fmodules -fimplicit-module-maps -fmodules-cache-path=%t -Rmod… 6 // RUN: -fmodule-name=a -emit-module %S/Inputs/explicit-build/module.modulemap -o %t/a.p… 7 // RUN: 2>&1 | FileCheck --check-prefix=CHECK-NO-IMPLICIT-BUILD %s --allow-empty 9 // RUN: %clang_cc1 -x c++ -std=c++11 -fmodules -fimplicit-module-maps -fmodules-cache-path=%t -Rmod… 10 // RUN: -fmodule-file=%t/a.pcm \ 11 // RUN: -fmodule-name=b -emit-module %S/Inputs/explicit-build/module.modulemap -o %t/b.p… 12 // RUN: 2>&1 | FileCheck --check-prefix=CHECK-NO-IMPLICIT-BUILD %s --allow-empty [all …]
|
| /external/python/cpython3/Doc/library/ |
| D | devmode.rst | 13 It can be enabled using the :option:`-X dev <-X>` command line option or by 16 See also :ref:`Python debug build <debug-build>`. 24 PYTHONMALLOC=debug PYTHONASYNCIODEBUG=1 python3 -W default -X faulthandler 28 * Add ``default`` :ref:`warning filter <describing-warning-filters>`. The 37 filters <describing-warning-filters>`. 39 It behaves as if the :option:`-W default <-W>` command line option is used. 41 Use the :option:`-W error <-W>` command line option or set the 45 * Install debug hooks on memory allocators to check for: 65 It behaves as if the :option:`-X faulthandler <-X>` command line option is 69 * Enable :ref:`asyncio debug mode <asyncio-debug-mode>`. For example, [all …]
|
| /external/autotest/test_suites/ |
| D | control.calibration | 2 # Use of this source code is governed by a BSD-style license that can be 5 AUTHOR = 'chromeos-lab-infrastructure' 7 PURPOSE = 'Calibration check run in buildbot to ensure the build will not break duts' 15 This suite is intended to be run by buildbot as a calibration check of the build. 17 on the safety checks built into the provisioning code to identify bad builds.
|
| D | control.sanity | 2 # Use of this source code is governed by a BSD-style license that can be 5 AUTHOR = 'chromeos-lab-infrastructure' 7 PURPOSE = 'Sanity check run in buildbot to ensure the build will not break duts' 15 This suite is intended to be run by buildbot as a sanity check of the build. 17 on the safety checks built into the provisioning code to identify bad builds.
|
12345678910>>...45