Home
last modified time | relevance | path

Searched +full:check +full:- +full:ignore (Results 1 – 25 of 1230) sorted by relevance

12345678910>>...50

/external/llvm/test/Bindings/OCaml/
Dcore.ml2 * RUN: %ocamlc -g -w +A -package llvm.analysis -package llvm.bitwriter -linkpkg %T/core.ml -o %t
4 * RUN: %ocamlopt -g -w +A -package llvm.analysis -package llvm.bitwriter -linkpkg %T/core.ml -o %t
6 * RUN: llvm-dis < %t.bc > %t.ll
9 * RUN: FileCheck -check-prefix=CHECK-NOWHERE %s < %t.ll
21 (* Tiny unit test framework - really just to help find which line is busted *)
49 | false, true -> ()
50 | false, false ->
52 | true, true ->
54 | true, false ->
64 (*===-- Fixture -----------------------------------------------------------===*)
[all …]
/external/clang/test/Frontend/
Dverify-ignore-unexpected.c1 // RUN: not %clang_cc1 -DTEST_SWITCH -verify-ignore-unexpected=remark,aoeu,note -verify %s 2>&1 \
2 // RUN: | FileCheck -check-prefix=CHECK-BAD-SWITCH %s
4 // expected-no-diagnostics
6 // CHECK-BAD-SWITCH: error: 'error' diagnostics seen but not expected:
7 // CHECK-BAD-SWITCH-NEXT: (frontend): invalid value 'aoeu' in '-verify-ignore-unexpected='
9 // RUN: %clang_cc1 -DTEST1 -verify %s
10 // RUN: %clang_cc1 -DTEST1 -verify -verify-ignore-unexpected %s
13 // expected-warning@-1 {{MyWarning1}}
14 int x; // expected-note {{previous definition is here}}
15 float x; // expected-error {{redefinition of 'x'}}
[all …]
/external/compiler-rt/test/asan/TestCases/Darwin/
Dsuppressions-darwin.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t -framework Foundation
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
5 // Check that suppressing the interceptor by name works.
8 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
10 // Check that suppressing by interceptor name works even without the symbolizer
11 …ts=suppressions='"%t.supp"':symbolize=false %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
13 // Check that suppressing all reports from a library works.
15 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
17 // Check that suppressing library works even without the symbolizer.
[all …]
Dsuppressions-sandbox.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t -framework Foundation
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
5 // Check that suppressing a function name works within a no-fork sandbox
8 // RUN: sandbox-exec -p '(version 1)(allow default)(deny process-fork)' \
9 // RUN: %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
23 // CHECK-CRASH: AddressSanitizer: heap-buffer-overflow
24 // CHECK-CRASH-NOT: Ignored.
25 // CHECK-IGNORE-NOT: AddressSanitizer: heap-buffer-overflow
26 // CHECK-IGNORE: Ignored.
/external/stg/
Dstgdiff_test.cc1 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
2 // -*- mode: C++ -*-
41 const stg::Ignore ignore; member
56 TEST_CASE("ignore") {
64 stg::Ignore(),
73 stg::Ignore(stg::Ignore::SYMBOL_TYPE_PRESENCE),
82 stg::Ignore(),
91 stg::Ignore(stg::Ignore::TYPE_DECLARATION_STATUS),
100 stg::Ignore(),
109 stg::Ignore(stg::Ignore::PRIMITIVE_TYPE_ENCODING),
[all …]
/external/cronet/base/files/
Dfile_path_fuzzer.cc2 // Use of this source code is governed by a BSD-style license that can be
11 #include "base/check.h"
45 // Create a random path. Smoke-test its getters. in LLVMFuzzerTestOneInput()
47 std::ignore = path.GetComponents(); in LLVMFuzzerTestOneInput()
48 std::ignore = path.DirName(); in LLVMFuzzerTestOneInput()
49 std::ignore = path.BaseName(); in LLVMFuzzerTestOneInput()
50 std::ignore = path.Extension(); in LLVMFuzzerTestOneInput()
51 std::ignore = path.FinalExtension(); in LLVMFuzzerTestOneInput()
52 std::ignore = path.RemoveExtension(); in LLVMFuzzerTestOneInput()
53 std::ignore = path.RemoveFinalExtension(); in LLVMFuzzerTestOneInput()
[all …]
/external/compiler-rt/test/asan/TestCases/
Dsuppressions-function.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
6 // RUN: %clangxx_asan -O0 %s -o %t && %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCh…
7 // RUN: %clangxx_asan -O3 %s -o %t && %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCh…
27 // CHECK-CRASH: AddressSanitizer: heap-use-after-free
28 // CHECK-CRASH-NOT: strlen ignored
29 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free
30 // CHECK-IGNORE: strlen ignored
Dsuppressions-interceptor.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
6 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
21 // CHECK-CRASH: AddressSanitizer: heap-use-after-free
22 // CHECK-CRASH-NOT: strlen ignored
23 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free
24 // CHECK-IGNORE: strlen ignored
Dsuppressions-library.cc1 // RUN: %clangxx_asan -O0 -DSHARED_LIB %s -fPIC -shared -o %dynamiclib %ld_flags_rpath_so
2 // RUN: %clangxx_asan -O0 %s -o %t %ld_flags_rpath_exe
4 // Check that without suppressions, we catch the issue.
5 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
11 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
39 // CHECK-CRASH: AddressSanitizer: heap-use-after-free
40 // CHECK-CRASH-NOT: strlen ignored
41 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free
42 // CHECK-IGNORE: strlen ignored
Dsuppressions-exec-relative-location.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
7 // RUN: rm -rf %T/suppressions-exec-relative-location
8 // RUN: mkdir -p %T/suppressions-exec-relative-location
9 // RUN: %clangxx_asan -O0 %s -o %T/suppressions-exec-relative-location/exec
11 // RUN: %T/suppressions-exec-relative-location/supp.txt
13 // RUN: %run %T/suppressions-exec-relative-location/exec 2>&1 | \
14 // RUN: FileCheck --check-prefix=CHECK-IGNORE %s
15 // RUN: rm -rf %T/suppressions-exec-relative-location
[all …]
/external/angle/build/fuchsia/test/
Dflash_device_unittests.py3 # Use of this source code is governed by a BSD-style license that can be
19 # pylint: disable=too-many-public-methods,protected-access
23 def setUp(self) -> None:
46 def test_update_required_on_ignore_returns_immediately(self) -> None:
47 """Test |os_check|='ignore' skips all checks."""
49 'ignore', 'some-image-dir', None)
52 self.assertEqual(new_image_dir, 'some-image-dir')
54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None:
55 """Test |os_check|!='ignore' checks that image dir is non-Falsey."""
59 def test_update_required_logs_missing_image_dir(self) -> None:
[all …]
Dflash_device.py3 # Use of this source code is governed by a BSD-style license that can be
22 # Flash-file lock. Used to restrict number of flash operations per host.
30 serial_num: Optional[str]) -> Tuple[str, str]:
54 serial_num: Optional[str] = None) -> Tuple[bool, Optional[str]]:
57 if os_check == 'ignore':
64 'a product-bundle name and dynamically searching for '
72 if (os_check == 'check'
91 common.run_ffx_command(cmd=('target', 'flash', '-b',
93 '--no-bootloader-reboot'),
102 serial_num: Optional[str] = None) -> None:
[all …]
/external/cronet/build/fuchsia/test/
Dflash_device_unittests.py3 # Use of this source code is governed by a BSD-style license that can be
20 # pylint: disable=too-many-public-methods,protected-access
24 def setUp(self) -> None:
47 def test_update_required_on_ignore_returns_immediately(self) -> None:
48 """Test |os_check|='ignore' skips all checks."""
50 'ignore', 'some-image-dir', None)
53 self.assertEqual(new_image_dir, 'some-image-dir')
55 def test_update_required_raises_value_error_if_no_image_dir(self) -> None:
56 """Test |os_check|!='ignore' checks that image dir is non-Falsey."""
60 def test_update_required_logs_missing_image_dir(self) -> None:
[all …]
/external/python/cpython2/Doc/tools/
Drstlint.py2 # -*- coding: utf-8 -*-
4 # Check for stylistic and formal issues in .rst and .py
9 # TODO: - wrong versions in versionadded/changed
10 # - wrong markup after versionchanged directive
24 'contents', 'csv-table', 'danger', 'date', 'default-role', 'epigraph',
26 'important', 'include', 'line-block', 'list-table', 'meta', 'note',
27 'parsed-literal', 'pull-quote', 'raw', 'replace',
28 'restructuredtext-test-directive', 'role', 'rubric', 'sectnum', 'sidebar',
29 'table', 'target-notes', 'tip', 'title', 'topic', 'unicode', 'warning',
34 'code-block', 'confval', 'cssclass', 'ctype', 'currentmodule', 'cvar',
[all …]
/external/pigweed/pw_presubmit/py/pw_presubmit/
Dtodo_check.py7 # https://www.apache.org/licenses/LICENSE-2.0
14 """Check the formatting of TODOs."""
43 # todo-check: disable
44 # pylint: disable=line-too-long
47 r'(?:\bTODO: b/\d+(?:, ?b/\d+)* - )|'
48 r'(?:\bTODO: https://issues.pigweed.dev/issues/\d+ - )|'
49 r'(?:\bTODO: https://pwbug.dev/\d+ - )|'
50 r'(?:\bTODO: pwbug.dev/\d+ - )|'
51 r'(?:\bTODO: <pwbug.dev/\d+> - )|'
52 r'(?:\bTODO: https://github\.com/bazelbuild/[a-z][-_a-z0-9]*/issues/\d+[ ]-[ ])'
[all …]
Dinclusive_language.py7 # https://www.apache.org/licenses/LICENSE-2.0
14 """Inclusive language presubmit check."""
23 # https://source.android.com/setup/contribute/respectful-code
24 # inclusive-language: disable
28 r'red[-\s]?line',
29 r'(white|gr[ae]y|black)[-\s]*(list|hat)',
40 r'm[ae]n[-\s]*in[-\s]*the[-\s]*middle',
42 r'first[-\s]?class[-\s]?citizen',
44 # inclusive-language: enable
46 # Test: master # inclusive-language: ignore
[all …]
/external/cronet/base/
Dcommand_line_fuzzer.cc2 // Use of this source code is governed by a BSD-style license that can be
12 #include "base/check.h"
54 !StartsWith(text, "-") && !StartsWith(text, "/"); in IsValidSwitchName()
90 CHECK(command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput()
91 CHECK(command_line.GetSwitchValueNative(name) == value); in LLVMFuzzerTestOneInput()
100 CHECK(!command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput()
101 CHECK(command_line.GetSwitchValueNative(name).empty()); in LLVMFuzzerTestOneInput()
120 // Check a switch. in LLVMFuzzerTestOneInput()
123 std::ignore = command_line.HasSwitch(name); in LLVMFuzzerTestOneInput()
124 std::ignore = command_line.GetSwitchValueNative(name); in LLVMFuzzerTestOneInput()
[all …]
/external/angle/build/fuchsia/
Dupdate_product_bundles_test.py3 # Use of this source code is governed by a BSD-style license that can be
34 update_product_bundles.convert_to_products(['unknown-image']),
35 ['unknown-image'])
40 ['smart_display_eng.astro-release']), ['smart_display_eng.astro'])
45 'qemu.arm64', 'qemu.x64', 'core.x64-dfv2-release',
46 'workstation_eng.chromebook-x64-release'
50 'terminal.qemu-arm64', 'terminal.x64', 'core.x64-dfv2',
51 'workstation_eng.chromebook-x64'
63 mock.call(cmd=('repository', 'remove', 'foo'), check=True),
64 mock.call(cmd=('repository', 'remove', 'bar'), check=True),
[all …]
/external/clang/test/Modules/
Dignored_macros.m1 // First trial: pass -DIGNORED=1 to both. This should obviously work.
2 // RUN: rm -rf %t.modules
3 …ang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps -I %S/Inputs
4 // RUN: %clang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps -I …
6 // Second trial: pass -DIGNORED=1 only to the second invocation. We
9 // RUN: rm -rf %t.modules
10 …N: %clang_cc1 -fmodules-cache-path=%t.modules -fmodules -fimplicit-module-maps -I %S/Inputs -emit-
11 // RUN: not %clang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps…
12 // RUN: FileCheck -check-prefix=CHECK-CONFLICT %s < %t.err
13 // CHECK-CONFLICT: PCH was compiled with module cache path
[all …]
/external/llvm/test/Transforms/SimplifyCFG/
Dswitch-dead-default.ll1 ; RUN: opt %s -S -simplifycfg | FileCheck %s
5 ; CHECK-LABEL: @test
6 ; CHECK: br i1 [[IGNORE:%.*]], label %true, label %false
21 ; CHECK-LABEL: @test2
39 ; CHECK-LABEL: default1:
40 ; CHECK-NEXT: unreachable
45 ; This one is a negative test - we know the value of the default,
48 ; CHECK-LABEL: @test3
63 ; CHECK-LABEL: default:
64 ; CHECK-NEXT: call void @foo
[all …]
/external/rust/beto-rust/common/cmd_runner/src/
Dlicense_checker.rs7 // http://www.apache.org/licenses/LICENSE-2.0
28 pub fn run(&self, checker: &LicenseChecker, root: &path::Path) -> anyhow::Result<()> { in run()
30 LicenseSubcommand::CheckLicenseHeaders => checker.check(root)?, in run()
38 pub ignore: &'static [&'static str], field
42 pub fn check(&self, root: &path::Path) -> anyhow::Result<()> { in check() method
44 let ignore = self.ignore_globset()?; in check() localVariable
47 |p| !ignore.is_match(p), in check()
63 eprintln!("Consider adding binary files to the ignore list in src/licence.rs."); in check()
67 Err(anyhow::anyhow!("License header check failed")) in check()
73 pub fn add_missing(&self, root: &path::Path) -> anyhow::Result<()> { in add_missing()
[all …]
/external/mesa3d/docs/relnotes/
D17.0.5.rst15 ----------------
19 7510eee0d0077860b250d30d73305048c2df4ba09ea8fc04e4f3eec7beece301 mesa-17.0.5.tar.gz
20 668efa445d2f57a26e5c096b1965a685733a3b57d9c736f9d6460263847f9bfe mesa-17.0.5.tar.xz
23 ------------
28 ---------
30 - `Bug 97524 <https://bugs.freedesktop.org/show_bug.cgi?id=97524>`__ -
35 -------
39 - cherry-ignore: Add the pci_id into the shader cache UUID
40 - cherry-ignore: fix crash if ctx torn down with no rendering
41 - cherry-ignore: Fix typos.
[all …]
D17.1.10.rst15 ----------------
19 a48ce6b643a728b2b0f926151930525b3670fbff1fb688527fd9051eab9f30a4 mesa-17.1.10.tar.gz
20 cbc0d681cc4df47d8deb5a36f45b420978128522fd665b2cd4c7096316f11bdb mesa-17.1.10.tar.xz
23 ------------
28 ---------
30 - `Bug 102844 <https://bugs.freedesktop.org/show_bug.cgi?id=102844>`__
31 - memory leak with glDeleteProgram for shader program type
35 -------
39 - osmesa: link with libunwind if enabled (v2)
43 - docs: add sha256 checksums for 17.1.9
[all …]
/external/googleapis/google/cloud/visionai/v1/
Dstreams_service.proto7 // http://www.apache.org/licenses/LICENSE-2.0
45 "https://www.googleapis.com/auth/cloud-platform";
370 // ignore the request if it has already been completed. The server will
375 // the server can check if original operation with the same request ID was
376 // received, and if so, will ignore the second request. This prevents clients
380 // not supported (00000000-0000-0000-0000-000000000000).
399 // ignore the request if it has already been completed. The server will
404 // the server can check if original operation with the same request ID was
405 // received, and if so, will ignore the second request. This prevents clients
409 // not supported (00000000-0000-0000-0000-000000000000).
[all …]
/external/googleapis/google/cloud/visionai/v1alpha1/
Dstreams_service.proto7 // http://www.apache.org/licenses/LICENSE-2.0
43 option (google.api.oauth_scopes) = "https://www.googleapis.com/auth/cloud-platform";
348 // so that if you must retry your request, the server will know to ignore
354 // the server can check if original operation with the same request ID was
355 // received, and if so, will ignore the second request. This prevents clients
359 // not supported (00000000-0000-0000-0000-000000000000).
376 // so that if you must retry your request, the server will know to ignore
382 // the server can check if original operation with the same request ID was
383 // received, and if so, will ignore the second request. This prevents clients
387 // not supported (00000000-0000-0000-0000-000000000000).
[all …]

12345678910>>...50