Home
last modified time | relevance | path

Searched +full:check +full:- +full:direct (Results 1 – 25 of 1162) sorted by relevance

12345678910>>...47

/external/cronet/net/proxy_resolution/
Dproxy_config_service_android_unittest.cc2 // Use of this source code is governed by a BSD-style license that can be
98 return it->second; in GetProperty()
180 // Set up a non-empty configuration in TEST_F()
195 TestMapping("ftp://example.com/", "DIRECT"); in TEST_F()
210 // These values are used in ProxyChangeListener.java to indicate a direct in TEST_F()
213 TestMapping("http://example.com/", "DIRECT"); in TEST_F()
238 // Check that webview uses the default proxy in TEST_F()
239 TestMapping("http://example.com/", "DIRECT"); in TEST_F()
240 TestMapping("https://example.com/", "DIRECT"); in TEST_F()
241 TestMapping("ftp://example.com/", "DIRECT"); in TEST_F()
[all …]
/external/compiler-rt/test/asan/TestCases/Android/
Dcoverage-android.cc1 // Test for direct coverage writing with dlopen.
4 // RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %T/libcoverage_android_test_1…
5 // RUN: %clangxx_asan -fsanitize-coverage=func -DSO_DIR=\"%device\" %s -o %t
7 // RUN: adb shell rm -rf %device/coverage-android
8 // RUN: rm -rf %T/coverage-android
10 // RUN: adb shell mkdir -p %device/coverage-android/direct
11 // RUN: mkdir -p %T/coverage-android/direct
12 // RUN: %env_asan_opts=coverage=1:coverage_direct=1:coverage_dir=%device/coverage-android/direct:ve…
13 // RUN: adb pull %device/coverage-android/direct %T/coverage-android/direct
15 // RUN: cd %T/coverage-android/direct
[all …]
/external/llvm/test/Transforms/SafeStack/X86/
Dabi.ll1 ; RUN: opt -safe-stack -S -mtriple=i386-pc-linux-gnu < %s -o - | FileCheck %s --check-prefix=TLS
2 ; RUN: opt -safe-stack -S -mtriple=x86_64-pc-linux-gnu < %s -o - | FileCheck %s --check-prefix=TLS
3 ; RUN: opt -safe-stack -S -mtriple=i686-linux-android < %s -o - | FileCheck %s --check-prefix=DIREC…
4 ; RUN: opt -safe-stack -S -mtriple=x86_64-linux-android < %s -o - | FileCheck %s --check-prefix=DIR…
10 ; TLS: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16
13 ; DIRECT-TLS32: %[[USP:.*]] = load i8*, i8* addrspace(256)* inttoptr (i32 36 to i8* addrspace(256)*)
14 ; DIRECT-TLS32: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16
15 ; DIRECT-TLS32: store i8* %[[USST]], i8* addrspace(256)* inttoptr (i32 36 to i8* addrspace(256)*)
17 ; DIRECT-TLS64: %[[USP:.*]] = load i8*, i8* addrspace(257)* inttoptr (i32 72 to i8* addrspace(257)*)
18 ; DIRECT-TLS64: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16
[all …]
/external/clang/test/Index/
Dcomment-custom-block-command.cpp1 // RUN: rm -rf %t
4 // Check that custom block commands are defined correctly.
5 // RUN: %clang_cc1 -fcomment-block-commands=CustomCommand -x c++ -std=c++11 -emit-pch -o %t/out.pch…
6 // RUN: %clang_cc1 -x c++ -std=c++11 -fcomment-block-commands=CustomCommand -include-pch %t/out.pch…
8 // RUN: c-index-test -write-pch %t/out.pch -fcomment-block-commands=CustomCommand -x c++ -std=c++11…
9-index-test -test-load-source all -comments-xml-schema=%S/../../bindings/xml/comment-xml-schema.rn…
10 // RUN: c-index-test -test-load-tu %t/out.pch all > %t/out.c-index-pch
12 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-direct
13 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-pch
16 // WRONG-NOT: CommentXMLInvalid
[all …]
Dparse-all-comments.c39 int trdoxy9; /// A Doxygen non-trailing comment. trdoxyA IS_DOXYGEN_SINGLE
50 int trdoxyF; /// A Doxygen non-trailing comment that gets dropped on the floor.
73 // RUN: rm -rf %t
76 // RUN: c-index-test -write-pch %t/out.pch -fparse-all-comments -x c++ -std=c++11 %s
78-index-test -test-load-source all -comments-xml-schema=%S/../../bindings/xml/comment-xml-schema.rn…
79 // RUN: c-index-test -test-load-tu %t/out.pch all > %t/out.c-index-pch
81 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-direct
82 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-pch
85 // WRONG-NOT: CommentXMLInvalid
87 // RUN: FileCheck %s < %t/out.c-index-direct
[all …]
Dannotate-comments-objc.m14 //===---
16 // Check that we attach comments to properties correctly.
17 //===---
29 - (void)method1_isdoxy1;
30 - (void)method1_isdoxy2; ///< method1_isdoxy2 IS_DOXYGEN_SINGLE
31 - (void)method1_isdoxy3; /**< method1_isdoxy3 IS_DOXYGEN_SINGLE */
32 - (void)method1_isdoxy4; /*!< method1_isdoxy4 IS_DOXYGEN_SINGLE */
35 //===---
37 // Check that we attach comments to enums declared using the NS_ENUM macro.
38 //===---
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dmap_ptr_kern.c1 // SPDX-License-Identifier: GPL-2.0
41 VERIFY(map->map_type == g_map_type); in check_bpf_map_fields()
42 VERIFY(map->key_size == key_size); in check_bpf_map_fields()
43 VERIFY(map->value_size == value_size); in check_bpf_map_fields()
44 VERIFY(map->max_entries == max_entries); in check_bpf_map_fields()
45 VERIFY(map->id > 0); in check_bpf_map_fields()
51 struct bpf_map *direct) in check_bpf_map_ptr() argument
53 VERIFY(indirect->map_type == direct->map_type); in check_bpf_map_ptr()
54 VERIFY(indirect->key_size == direct->key_size); in check_bpf_map_ptr()
55 VERIFY(indirect->value_size == direct->value_size); in check_bpf_map_ptr()
[all …]
/external/liburing/man/
Dio_uring_prep_accept.33 .\" SPDX-License-Identifier: LGPL-2.0-or-later
5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual"
7 io_uring_prep_accept \- prepare an accept request
53 For a direct descriptor accept request, the offset is specified by the
55 argument. Direct descriptors are io_uring private file descriptors. They
63 field should use the direct descriptor value rather than the regular file
64 descriptor. Direct descriptors are managed like registered files.
66 If the direct variant is used, the application must first have registered
69 of the appropriate size. Once registered, a direct accept request may use any
75 Note that old kernels don't check the SQE
[all …]
Dio_uring_prep_multishot_accept.33 .\" SPDX-License-Identifier: LGPL-2.0-or-later
5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual"
7 io_uring_prep_accept \- prepare an accept request
53 For a direct descriptor accept request, the offset is specified by the
55 argument. Direct descriptors are io_uring private file descriptors. They
63 field should use the direct descriptor value rather than the regular file
64 descriptor. Direct descriptors are managed like registered files.
66 If the direct variant is used, the application must first have registered
69 of the appropriate size. Once registered, a direct accept request may use any
75 Note that old kernels don't check the SQE
[all …]
Dio_uring_prep_accept_direct.33 .\" SPDX-License-Identifier: LGPL-2.0-or-later
5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual"
7 io_uring_prep_accept \- prepare an accept request
53 For a direct descriptor accept request, the offset is specified by the
55 argument. Direct descriptors are io_uring private file descriptors. They
63 field should use the direct descriptor value rather than the regular file
64 descriptor. Direct descriptors are managed like registered files.
66 If the direct variant is used, the application must first have registered
69 of the appropriate size. Once registered, a direct accept request may use any
75 Note that old kernels don't check the SQE
[all …]
Dio_uring_prep_multishot_accept_direct.33 .\" SPDX-License-Identifier: LGPL-2.0-or-later
5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual"
7 io_uring_prep_accept \- prepare an accept request
53 For a direct descriptor accept request, the offset is specified by the
55 argument. Direct descriptors are io_uring private file descriptors. They
63 field should use the direct descriptor value rather than the regular file
64 descriptor. Direct descriptors are managed like registered files.
66 If the direct variant is used, the application must first have registered
69 of the appropriate size. Once registered, a direct accept request may use any
75 Note that old kernels don't check the SQE
[all …]
/external/compiler-rt/test/asan/TestCases/Posix/
Dcoverage-fork-direct.cc1 // RUN: %clangxx_asan -fsanitize-coverage=func %s -o %t
2 // RUN: rm -rf %T/coverage-fork-direct
3 // RUN: mkdir -p %T/coverage-fork-direct && cd %T/coverage-fork-direct
35 // CHECK-DAG: Child PID: [[ChildPID:[0-9]+]]
36 // CHECK-DAG: Parent PID: [[ParentPID:[0-9]+]]
37 // CHECK-DAG: read 3 PCs from {{.*}}.[[ParentPID]].sancov
38 // CHECK-DAG: read 1 PCs from {{.*}}.[[ChildPID]].sancov
/external/clang/test/CodeGen/
Dms-inline-asm-functions.c1 // REQUIRES: x86-registered-target
2 // RUN: %clang_cc1 %s -triple i386-pc-windows-msvc -fms-extensions -S -o - | FileCheck %s
5 // way through code generation to know if our call became a direct, pc-relative
14 // CHECK-LABEL: _foo: in foo()
17 // Simple case: direct call. in foo()
19 // CHECK: calll _k in foo()
23 // CHECK: calll *({{.*}}) in foo()
25 // CHECK: calll *({{.*}}) in foo()
29 // CHECK: calll _kptr in foo()
30 // CHECK-FIXME: calll *_kptr in foo()
[all …]
/external/pdfium/core/fpdfapi/parser/
Dcpdf_object_avail.cpp2 // Use of this source code is governed by a BSD-style license that can be
14 #include "third_party/base/check.h"
26 if (!root_->IsInline()) in CPDF_ObjectAvail()
27 parsed_objnums_.insert(root_->GetObjNum()); in CPDF_ObjectAvail()
57 while (root_ && root_->IsReference()) { in LoadRootObject()
58 const uint32_t ref_obj_num = root_->AsReference()->GetRefObjNum(); in LoadRootObject()
65 RetainPtr<CPDF_Object> direct = in LoadRootObject() local
66 holder_->GetOrParseIndirectObject(ref_obj_num); in LoadRootObject()
67 if (validator_->has_read_problems()) in LoadRootObject()
71 root_ = std::move(direct); in LoadRootObject()
[all …]
Dcpdf_object_unittest.cpp2 // Use of this source code is governed by a BSD-style license that can be
41 EXPECT_STREQ(str_val, arr->GetByteStringAt(index).c_str()); in TestArrayAccessors()
42 EXPECT_EQ(int_val, arr->GetIntegerAt(index)); in TestArrayAccessors()
43 EXPECT_EQ(float_val, arr->GetFloatAt(index)); in TestArrayAccessors()
44 EXPECT_EQ(arr_val, arr->GetArrayAt(index)); in TestArrayAccessors()
45 EXPECT_EQ(dict_val, arr->GetDictAt(index)); in TestArrayAccessors()
46 EXPECT_EQ(stream_val, arr->GetStreamAt(index)); in TestArrayAccessors()
69 m_ArrayObj->InsertNewAt<CPDF_Number>(0, 8902); in SetUp()
70 m_ArrayObj->InsertNewAt<CPDF_Name>(1, "address"); in SetUp()
73 m_DictObj->SetNewFor<CPDF_Boolean>("bool", false); in SetUp()
[all …]
/external/libnl/.github/workflows/
Dci.yml1 name: libnl3-ci
11 clang-format:
12 runs-on: ubuntu-latest
16 - name: Install packages
18 sudo dnf install -y \
19 clang-tools-extra \
22 - name: Check out repository code
25 - name: Setup git
27 git config --global --add safe.directory "$PWD"
29 - name: Formatting with clang-format
[all …]
/external/clang/lib/StaticAnalyzer/Checkers/
DDirectIvarAssignment.cpp1 //=- DirectIvarAssignment.cpp - Check rules on ObjC properties -*- C++ ----*-==//
8 //===----------------------------------------------------------------------===//
10 // Check that Objective C properties are set with the setter, not though a
11 // direct assignment.
22 //===----------------------------------------------------------------------===//
39 /// the check should not be performed.
42 /// to perform direct instance variable assignment based on their name.
44 return M->getMethodFamily() == OMF_init || in DefaultMethodFilter()
45 M->getMethodFamily() == OMF_dealloc || in DefaultMethodFilter()
46 M->getMethodFamily() == OMF_copy || in DefaultMethodFilter()
[all …]
/external/tensorflow/tensorflow/compiler/xla/mlir/ir/runtime/tests/
Dops.mlir1 // RUN: xla-runtime-opt %s | FileCheck %s
3 // CHECK-LABEL: func @pass_context(
4 // CHECK: %[[CTX:.*]]: !rt.kernel_context
9 // CHECK-LABEL: func @set_output(
10 // CHECK: %[[CTX:.*]]: !rt.kernel_context
12 // CHECK: %[[MEMREF:.*]] = memref.alloc
14 // CHECK: rt.set_output %[[CTX]], 0, %[[MEMREF]]
19 // CHECK-LABEL: func @set_error(
20 // CHECK: %[[CTX:.*]]: !rt.kernel_context
22 // CHECK: rt.set_error %[[CTX]], "Failed precondition"
[all …]
/external/llvm/test/Instrumentation/AddressSanitizer/
Dinstrument-stack.ll1 ; This test checks that we are not instrumenting direct inbound stack accesses.
2 ; RUN: opt < %s -asan -asan-module -asan-opt-stack -S | FileCheck %s
4 …t = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:1…
5 target triple = "x86_64-unknown-linux-gnu"
9 ; Ignore direct inbounds stack access.
15 ; CHECK-LABEL: define void @foo
16 ; CHECK-NOT: __asan_report
17 ; CHECK: ret void
27 ; CHECK-LABEL: define void @baz
28 ; CHECK: __asan_report
[all …]
/external/llvm/test/CodeGen/X86/
Dand-encoding.ll1 ; RUN: llc -show-mc-encoding < %s | FileCheck %s
3 ; Test that the direct object emission selects the and variant with 8 bit
5 ; We used to get this wrong when using direct object emission, but not when
9 target triple = "x86_64-pc-linux"
12 ; CHECK-LABEL: f1:
13 ; CHECK: andq $-32, %rsp # encoding: [0x48,0x83,0xe4,0xe0]
19 ; CHECK-LABEL: f2:
20 ; CHECK: andl $1, %edi # encoding: [0x83,0xe7,0x01]
27 ; CHECK-LABEL: f3:
28 ; CHECK: andl $1, %edi # encoding: [0x83,0xe7,0x01]
Dstatepoint-allocas.ll2 ; Check that we can lower a use of an alloca both as a deopt value (where the
6 target datalayout = "e-i64:64-f80:128-n8:16:32:64-S128"
7 target triple = "x86_64-pc-linux-gnu"
13 define i32 addrspace(1)* @test(i32 addrspace(1)* %ptr) gc "statepoint-example" {
14 ; CHECK-LABEL: test
15 ; CHECK: pushq %rax
16 ; CHECK: movq %rdi, (%rsp)
17 ; CHECK: callq return_i1
18 ; CHECK: movq (%rsp), %rax
19 ; CHECK: popq %rcx
[all …]
/external/ComputeLibrary/src/core/NEON/kernels/arm_gemm/
Dutils.hpp2 * Copyright (c) 2017-2022 Arm Limited.
4 * SPDX-License-Identifier: MIT
54 return s.substr(start+4, x-(start+4)); in get_type_name()
66 return (a + b - 1) / b; in iceildiv()
74 return a + b - rem; in roundup()
91 } direct = {}; member
98 // Direct
100 direct.base = base; in IndirectOutputArg()
101 direct.stride = stride; in IndirectOutputArg()
111 direct.base = nullptr; in IndirectOutputArg()
[all …]
/external/apache-commons-math/src/main/java/org/apache/commons/math3/geometry/euclidean/oned/
DOrientedPoint.java9 * http://www.apache.org/licenses/LICENSE-2.0
32 private static final double DEFAULT_TOLERANCE = 1.0e-10;
38 private boolean direct; field in OrientedPoint
45 * @param direct if true, the plus side of the hyperplane is towards
50 public OrientedPoint(final Vector1D location, final boolean direct, final double tolerance) { in OrientedPoint() argument
52 this.direct = direct; in OrientedPoint()
58 * @param direct if true, the plus side of the hyperplane is towards
63 public OrientedPoint(final Vector1D location, final boolean direct) { in OrientedPoint() argument
64 this(location, direct, DEFAULT_TOLERANCE); in OrientedPoint()
77 * @param vector vector to check
[all …]
/external/libnl/
D.gitignore14 test-suite.log
19 /build-aux/
39 /doc/build-aux/
49 /include/stamp-h1
52 /lib/libnl-*.so*
60 /lib/stamp-h1
61 /libnl-1.pc
68 /src/genl-ctrl-list
69 /src/idiag-socket-details
70 /src/nf-ct-add
[all …]
/external/tensorflow/tensorflow/compiler/xla/mlir/transforms/runtime/tests/
Dconvert_to_entrypoint.mlir1 // RUN: xla-runtime-opt %s --xla-rt-convert-to-entrypoint | FileCheck %s
3 // CHECK: func @single_result(
4 // CHECK: %[[CTX:.*]]: !rt.kernel_context,
5 // CHECK: %[[ARG:.*]]: memref<?xf32>
6 // CHECK: ) {
7 func.func @single_result(%arg0: memref<?xf32>) -> memref<?xf32>
9 // CHECK: rt.set_output %[[CTX]], 0, %[[ARG]] : memref<?xf32>
10 // CHECK: return
14 // CHECK: func @two_results(
15 // CHECK: %[[CTX:.*]]: !rt.kernel_context,
[all …]

12345678910>>...47