| /external/cronet/net/proxy_resolution/ |
| D | proxy_config_service_android_unittest.cc | 2 // Use of this source code is governed by a BSD-style license that can be 98 return it->second; in GetProperty() 180 // Set up a non-empty configuration in TEST_F() 195 TestMapping("ftp://example.com/", "DIRECT"); in TEST_F() 210 // These values are used in ProxyChangeListener.java to indicate a direct in TEST_F() 213 TestMapping("http://example.com/", "DIRECT"); in TEST_F() 238 // Check that webview uses the default proxy in TEST_F() 239 TestMapping("http://example.com/", "DIRECT"); in TEST_F() 240 TestMapping("https://example.com/", "DIRECT"); in TEST_F() 241 TestMapping("ftp://example.com/", "DIRECT"); in TEST_F() [all …]
|
| /external/compiler-rt/test/asan/TestCases/Android/ |
| D | coverage-android.cc | 1 // Test for direct coverage writing with dlopen. 4 // RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %T/libcoverage_android_test_1… 5 // RUN: %clangxx_asan -fsanitize-coverage=func -DSO_DIR=\"%device\" %s -o %t 7 // RUN: adb shell rm -rf %device/coverage-android 8 // RUN: rm -rf %T/coverage-android 10 // RUN: adb shell mkdir -p %device/coverage-android/direct 11 // RUN: mkdir -p %T/coverage-android/direct 12 // RUN: %env_asan_opts=coverage=1:coverage_direct=1:coverage_dir=%device/coverage-android/direct:ve… 13 // RUN: adb pull %device/coverage-android/direct %T/coverage-android/direct 15 // RUN: cd %T/coverage-android/direct [all …]
|
| /external/llvm/test/Transforms/SafeStack/X86/ |
| D | abi.ll | 1 ; RUN: opt -safe-stack -S -mtriple=i386-pc-linux-gnu < %s -o - | FileCheck %s --check-prefix=TLS 2 ; RUN: opt -safe-stack -S -mtriple=x86_64-pc-linux-gnu < %s -o - | FileCheck %s --check-prefix=TLS 3 ; RUN: opt -safe-stack -S -mtriple=i686-linux-android < %s -o - | FileCheck %s --check-prefix=DIREC… 4 ; RUN: opt -safe-stack -S -mtriple=x86_64-linux-android < %s -o - | FileCheck %s --check-prefix=DIR… 10 ; TLS: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16 13 ; DIRECT-TLS32: %[[USP:.*]] = load i8*, i8* addrspace(256)* inttoptr (i32 36 to i8* addrspace(256)*) 14 ; DIRECT-TLS32: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16 15 ; DIRECT-TLS32: store i8* %[[USST]], i8* addrspace(256)* inttoptr (i32 36 to i8* addrspace(256)*) 17 ; DIRECT-TLS64: %[[USP:.*]] = load i8*, i8* addrspace(257)* inttoptr (i32 72 to i8* addrspace(257)*) 18 ; DIRECT-TLS64: %[[USST:.*]] = getelementptr i8, i8* %[[USP]], i32 -16 [all …]
|
| /external/clang/test/Index/ |
| D | comment-custom-block-command.cpp | 1 // RUN: rm -rf %t 4 // Check that custom block commands are defined correctly. 5 // RUN: %clang_cc1 -fcomment-block-commands=CustomCommand -x c++ -std=c++11 -emit-pch -o %t/out.pch… 6 // RUN: %clang_cc1 -x c++ -std=c++11 -fcomment-block-commands=CustomCommand -include-pch %t/out.pch… 8 // RUN: c-index-test -write-pch %t/out.pch -fcomment-block-commands=CustomCommand -x c++ -std=c++11… 9 …-index-test -test-load-source all -comments-xml-schema=%S/../../bindings/xml/comment-xml-schema.rn… 10 // RUN: c-index-test -test-load-tu %t/out.pch all > %t/out.c-index-pch 12 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-direct 13 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-pch 16 // WRONG-NOT: CommentXMLInvalid [all …]
|
| D | parse-all-comments.c | 39 int trdoxy9; /// A Doxygen non-trailing comment. trdoxyA IS_DOXYGEN_SINGLE 50 int trdoxyF; /// A Doxygen non-trailing comment that gets dropped on the floor. 73 // RUN: rm -rf %t 76 // RUN: c-index-test -write-pch %t/out.pch -fparse-all-comments -x c++ -std=c++11 %s 78 …-index-test -test-load-source all -comments-xml-schema=%S/../../bindings/xml/comment-xml-schema.rn… 79 // RUN: c-index-test -test-load-tu %t/out.pch all > %t/out.c-index-pch 81 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-direct 82 // RUN: FileCheck %s -check-prefix=WRONG < %t/out.c-index-pch 85 // WRONG-NOT: CommentXMLInvalid 87 // RUN: FileCheck %s < %t/out.c-index-direct [all …]
|
| D | annotate-comments-objc.m | 14 //===--- 16 // Check that we attach comments to properties correctly. 17 //===--- 29 - (void)method1_isdoxy1; 30 - (void)method1_isdoxy2; ///< method1_isdoxy2 IS_DOXYGEN_SINGLE 31 - (void)method1_isdoxy3; /**< method1_isdoxy3 IS_DOXYGEN_SINGLE */ 32 - (void)method1_isdoxy4; /*!< method1_isdoxy4 IS_DOXYGEN_SINGLE */ 35 //===--- 37 // Check that we attach comments to enums declared using the NS_ENUM macro. 38 //===--- [all …]
|
| /external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
| D | map_ptr_kern.c | 1 // SPDX-License-Identifier: GPL-2.0 41 VERIFY(map->map_type == g_map_type); in check_bpf_map_fields() 42 VERIFY(map->key_size == key_size); in check_bpf_map_fields() 43 VERIFY(map->value_size == value_size); in check_bpf_map_fields() 44 VERIFY(map->max_entries == max_entries); in check_bpf_map_fields() 45 VERIFY(map->id > 0); in check_bpf_map_fields() 51 struct bpf_map *direct) in check_bpf_map_ptr() argument 53 VERIFY(indirect->map_type == direct->map_type); in check_bpf_map_ptr() 54 VERIFY(indirect->key_size == direct->key_size); in check_bpf_map_ptr() 55 VERIFY(indirect->value_size == direct->value_size); in check_bpf_map_ptr() [all …]
|
| /external/liburing/man/ |
| D | io_uring_prep_accept.3 | 3 .\" SPDX-License-Identifier: LGPL-2.0-or-later 5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual" 7 io_uring_prep_accept \- prepare an accept request 53 For a direct descriptor accept request, the offset is specified by the 55 argument. Direct descriptors are io_uring private file descriptors. They 63 field should use the direct descriptor value rather than the regular file 64 descriptor. Direct descriptors are managed like registered files. 66 If the direct variant is used, the application must first have registered 69 of the appropriate size. Once registered, a direct accept request may use any 75 Note that old kernels don't check the SQE [all …]
|
| D | io_uring_prep_multishot_accept.3 | 3 .\" SPDX-License-Identifier: LGPL-2.0-or-later 5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual" 7 io_uring_prep_accept \- prepare an accept request 53 For a direct descriptor accept request, the offset is specified by the 55 argument. Direct descriptors are io_uring private file descriptors. They 63 field should use the direct descriptor value rather than the regular file 64 descriptor. Direct descriptors are managed like registered files. 66 If the direct variant is used, the application must first have registered 69 of the appropriate size. Once registered, a direct accept request may use any 75 Note that old kernels don't check the SQE [all …]
|
| D | io_uring_prep_accept_direct.3 | 3 .\" SPDX-License-Identifier: LGPL-2.0-or-later 5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual" 7 io_uring_prep_accept \- prepare an accept request 53 For a direct descriptor accept request, the offset is specified by the 55 argument. Direct descriptors are io_uring private file descriptors. They 63 field should use the direct descriptor value rather than the regular file 64 descriptor. Direct descriptors are managed like registered files. 66 If the direct variant is used, the application must first have registered 69 of the appropriate size. Once registered, a direct accept request may use any 75 Note that old kernels don't check the SQE [all …]
|
| D | io_uring_prep_multishot_accept_direct.3 | 3 .\" SPDX-License-Identifier: LGPL-2.0-or-later 5 .TH io_uring_prep_accept 3 "March 13, 2022" "liburing-2.2" "liburing Manual" 7 io_uring_prep_accept \- prepare an accept request 53 For a direct descriptor accept request, the offset is specified by the 55 argument. Direct descriptors are io_uring private file descriptors. They 63 field should use the direct descriptor value rather than the regular file 64 descriptor. Direct descriptors are managed like registered files. 66 If the direct variant is used, the application must first have registered 69 of the appropriate size. Once registered, a direct accept request may use any 75 Note that old kernels don't check the SQE [all …]
|
| /external/compiler-rt/test/asan/TestCases/Posix/ |
| D | coverage-fork-direct.cc | 1 // RUN: %clangxx_asan -fsanitize-coverage=func %s -o %t 2 // RUN: rm -rf %T/coverage-fork-direct 3 // RUN: mkdir -p %T/coverage-fork-direct && cd %T/coverage-fork-direct 35 // CHECK-DAG: Child PID: [[ChildPID:[0-9]+]] 36 // CHECK-DAG: Parent PID: [[ParentPID:[0-9]+]] 37 // CHECK-DAG: read 3 PCs from {{.*}}.[[ParentPID]].sancov 38 // CHECK-DAG: read 1 PCs from {{.*}}.[[ChildPID]].sancov
|
| /external/clang/test/CodeGen/ |
| D | ms-inline-asm-functions.c | 1 // REQUIRES: x86-registered-target 2 // RUN: %clang_cc1 %s -triple i386-pc-windows-msvc -fms-extensions -S -o - | FileCheck %s 5 // way through code generation to know if our call became a direct, pc-relative 14 // CHECK-LABEL: _foo: in foo() 17 // Simple case: direct call. in foo() 19 // CHECK: calll _k in foo() 23 // CHECK: calll *({{.*}}) in foo() 25 // CHECK: calll *({{.*}}) in foo() 29 // CHECK: calll _kptr in foo() 30 // CHECK-FIXME: calll *_kptr in foo() [all …]
|
| /external/pdfium/core/fpdfapi/parser/ |
| D | cpdf_object_avail.cpp | 2 // Use of this source code is governed by a BSD-style license that can be 14 #include "third_party/base/check.h" 26 if (!root_->IsInline()) in CPDF_ObjectAvail() 27 parsed_objnums_.insert(root_->GetObjNum()); in CPDF_ObjectAvail() 57 while (root_ && root_->IsReference()) { in LoadRootObject() 58 const uint32_t ref_obj_num = root_->AsReference()->GetRefObjNum(); in LoadRootObject() 65 RetainPtr<CPDF_Object> direct = in LoadRootObject() local 66 holder_->GetOrParseIndirectObject(ref_obj_num); in LoadRootObject() 67 if (validator_->has_read_problems()) in LoadRootObject() 71 root_ = std::move(direct); in LoadRootObject() [all …]
|
| D | cpdf_object_unittest.cpp | 2 // Use of this source code is governed by a BSD-style license that can be 41 EXPECT_STREQ(str_val, arr->GetByteStringAt(index).c_str()); in TestArrayAccessors() 42 EXPECT_EQ(int_val, arr->GetIntegerAt(index)); in TestArrayAccessors() 43 EXPECT_EQ(float_val, arr->GetFloatAt(index)); in TestArrayAccessors() 44 EXPECT_EQ(arr_val, arr->GetArrayAt(index)); in TestArrayAccessors() 45 EXPECT_EQ(dict_val, arr->GetDictAt(index)); in TestArrayAccessors() 46 EXPECT_EQ(stream_val, arr->GetStreamAt(index)); in TestArrayAccessors() 69 m_ArrayObj->InsertNewAt<CPDF_Number>(0, 8902); in SetUp() 70 m_ArrayObj->InsertNewAt<CPDF_Name>(1, "address"); in SetUp() 73 m_DictObj->SetNewFor<CPDF_Boolean>("bool", false); in SetUp() [all …]
|
| /external/libnl/.github/workflows/ |
| D | ci.yml | 1 name: libnl3-ci 11 clang-format: 12 runs-on: ubuntu-latest 16 - name: Install packages 18 sudo dnf install -y \ 19 clang-tools-extra \ 22 - name: Check out repository code 25 - name: Setup git 27 git config --global --add safe.directory "$PWD" 29 - name: Formatting with clang-format [all …]
|
| /external/clang/lib/StaticAnalyzer/Checkers/ |
| D | DirectIvarAssignment.cpp | 1 //=- DirectIvarAssignment.cpp - Check rules on ObjC properties -*- C++ ----*-==// 8 //===----------------------------------------------------------------------===// 10 // Check that Objective C properties are set with the setter, not though a 11 // direct assignment. 22 //===----------------------------------------------------------------------===// 39 /// the check should not be performed. 42 /// to perform direct instance variable assignment based on their name. 44 return M->getMethodFamily() == OMF_init || in DefaultMethodFilter() 45 M->getMethodFamily() == OMF_dealloc || in DefaultMethodFilter() 46 M->getMethodFamily() == OMF_copy || in DefaultMethodFilter() [all …]
|
| /external/tensorflow/tensorflow/compiler/xla/mlir/ir/runtime/tests/ |
| D | ops.mlir | 1 // RUN: xla-runtime-opt %s | FileCheck %s 3 // CHECK-LABEL: func @pass_context( 4 // CHECK: %[[CTX:.*]]: !rt.kernel_context 9 // CHECK-LABEL: func @set_output( 10 // CHECK: %[[CTX:.*]]: !rt.kernel_context 12 // CHECK: %[[MEMREF:.*]] = memref.alloc 14 // CHECK: rt.set_output %[[CTX]], 0, %[[MEMREF]] 19 // CHECK-LABEL: func @set_error( 20 // CHECK: %[[CTX:.*]]: !rt.kernel_context 22 // CHECK: rt.set_error %[[CTX]], "Failed precondition" [all …]
|
| /external/llvm/test/Instrumentation/AddressSanitizer/ |
| D | instrument-stack.ll | 1 ; This test checks that we are not instrumenting direct inbound stack accesses. 2 ; RUN: opt < %s -asan -asan-module -asan-opt-stack -S | FileCheck %s 4 …t = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:1… 5 target triple = "x86_64-unknown-linux-gnu" 9 ; Ignore direct inbounds stack access. 15 ; CHECK-LABEL: define void @foo 16 ; CHECK-NOT: __asan_report 17 ; CHECK: ret void 27 ; CHECK-LABEL: define void @baz 28 ; CHECK: __asan_report [all …]
|
| /external/llvm/test/CodeGen/X86/ |
| D | and-encoding.ll | 1 ; RUN: llc -show-mc-encoding < %s | FileCheck %s 3 ; Test that the direct object emission selects the and variant with 8 bit 5 ; We used to get this wrong when using direct object emission, but not when 9 target triple = "x86_64-pc-linux" 12 ; CHECK-LABEL: f1: 13 ; CHECK: andq $-32, %rsp # encoding: [0x48,0x83,0xe4,0xe0] 19 ; CHECK-LABEL: f2: 20 ; CHECK: andl $1, %edi # encoding: [0x83,0xe7,0x01] 27 ; CHECK-LABEL: f3: 28 ; CHECK: andl $1, %edi # encoding: [0x83,0xe7,0x01]
|
| D | statepoint-allocas.ll | 2 ; Check that we can lower a use of an alloca both as a deopt value (where the 6 target datalayout = "e-i64:64-f80:128-n8:16:32:64-S128" 7 target triple = "x86_64-pc-linux-gnu" 13 define i32 addrspace(1)* @test(i32 addrspace(1)* %ptr) gc "statepoint-example" { 14 ; CHECK-LABEL: test 15 ; CHECK: pushq %rax 16 ; CHECK: movq %rdi, (%rsp) 17 ; CHECK: callq return_i1 18 ; CHECK: movq (%rsp), %rax 19 ; CHECK: popq %rcx [all …]
|
| /external/ComputeLibrary/src/core/NEON/kernels/arm_gemm/ |
| D | utils.hpp | 2 * Copyright (c) 2017-2022 Arm Limited. 4 * SPDX-License-Identifier: MIT 54 return s.substr(start+4, x-(start+4)); in get_type_name() 66 return (a + b - 1) / b; in iceildiv() 74 return a + b - rem; in roundup() 91 } direct = {}; member 98 // Direct 100 direct.base = base; in IndirectOutputArg() 101 direct.stride = stride; in IndirectOutputArg() 111 direct.base = nullptr; in IndirectOutputArg() [all …]
|
| /external/apache-commons-math/src/main/java/org/apache/commons/math3/geometry/euclidean/oned/ |
| D | OrientedPoint.java | 9 * http://www.apache.org/licenses/LICENSE-2.0 32 private static final double DEFAULT_TOLERANCE = 1.0e-10; 38 private boolean direct; field in OrientedPoint 45 * @param direct if true, the plus side of the hyperplane is towards 50 public OrientedPoint(final Vector1D location, final boolean direct, final double tolerance) { in OrientedPoint() argument 52 this.direct = direct; in OrientedPoint() 58 * @param direct if true, the plus side of the hyperplane is towards 63 public OrientedPoint(final Vector1D location, final boolean direct) { in OrientedPoint() argument 64 this(location, direct, DEFAULT_TOLERANCE); in OrientedPoint() 77 * @param vector vector to check [all …]
|
| /external/libnl/ |
| D | .gitignore | 14 test-suite.log 19 /build-aux/ 39 /doc/build-aux/ 49 /include/stamp-h1 52 /lib/libnl-*.so* 60 /lib/stamp-h1 61 /libnl-1.pc 68 /src/genl-ctrl-list 69 /src/idiag-socket-details 70 /src/nf-ct-add [all …]
|
| /external/tensorflow/tensorflow/compiler/xla/mlir/transforms/runtime/tests/ |
| D | convert_to_entrypoint.mlir | 1 // RUN: xla-runtime-opt %s --xla-rt-convert-to-entrypoint | FileCheck %s 3 // CHECK: func @single_result( 4 // CHECK: %[[CTX:.*]]: !rt.kernel_context, 5 // CHECK: %[[ARG:.*]]: memref<?xf32> 6 // CHECK: ) { 7 func.func @single_result(%arg0: memref<?xf32>) -> memref<?xf32> 9 // CHECK: rt.set_output %[[CTX]], 0, %[[ARG]] : memref<?xf32> 10 // CHECK: return 14 // CHECK: func @two_results( 15 // CHECK: %[[CTX:.*]]: !rt.kernel_context, [all …]
|