| /external/llvm/test/Bindings/OCaml/ |
| D | core.ml | 2 * RUN: %ocamlc -g -w +A -package llvm.analysis -package llvm.bitwriter -linkpkg %T/core.ml -o %t 4 * RUN: %ocamlopt -g -w +A -package llvm.analysis -package llvm.bitwriter -linkpkg %T/core.ml -o %t 6 * RUN: llvm-dis < %t.bc > %t.ll 9 * RUN: FileCheck -check-prefix=CHECK-NOWHERE %s < %t.ll 21 (* Tiny unit test framework - really just to help find which line is busted *) 49 | false, true -> () 50 | false, false -> 52 | true, true -> 54 | true, false -> 64 (*===-- Fixture -----------------------------------------------------------===*) [all …]
|
| /external/clang/test/Frontend/ |
| D | verify-ignore-unexpected.c | 1 // RUN: not %clang_cc1 -DTEST_SWITCH -verify-ignore-unexpected=remark,aoeu,note -verify %s 2>&1 \ 2 // RUN: | FileCheck -check-prefix=CHECK-BAD-SWITCH %s 4 // expected-no-diagnostics 6 // CHECK-BAD-SWITCH: error: 'error' diagnostics seen but not expected: 7 // CHECK-BAD-SWITCH-NEXT: (frontend): invalid value 'aoeu' in '-verify-ignore-unexpected=' 9 // RUN: %clang_cc1 -DTEST1 -verify %s 10 // RUN: %clang_cc1 -DTEST1 -verify -verify-ignore-unexpected %s 13 // expected-warning@-1 {{MyWarning1}} 14 int x; // expected-note {{previous definition is here}} 15 float x; // expected-error {{redefinition of 'x'}} [all …]
|
| /external/compiler-rt/test/asan/TestCases/Darwin/ |
| D | suppressions-darwin.cc | 1 // Check that without suppressions, we catch the issue. 2 // RUN: %clangxx_asan -O0 %s -o %t -framework Foundation 3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s 5 // Check that suppressing the interceptor by name works. 8 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s 10 // Check that suppressing by interceptor name works even without the symbolizer 11 …ts=suppressions='"%t.supp"':symbolize=false %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s 13 // Check that suppressing all reports from a library works. 15 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s 17 // Check that suppressing library works even without the symbolizer. [all …]
|
| D | suppressions-sandbox.cc | 1 // Check that without suppressions, we catch the issue. 2 // RUN: %clangxx_asan -O0 %s -o %t -framework Foundation 3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s 5 // Check that suppressing a function name works within a no-fork sandbox 8 // RUN: sandbox-exec -p '(version 1)(allow default)(deny process-fork)' \ 9 // RUN: %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s 23 // CHECK-CRASH: AddressSanitizer: heap-buffer-overflow 24 // CHECK-CRASH-NOT: Ignored. 25 // CHECK-IGNORE-NOT: AddressSanitizer: heap-buffer-overflow 26 // CHECK-IGNORE: Ignored.
|
| /external/stg/ |
| D | stgdiff_test.cc | 1 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 2 // -*- mode: C++ -*- 44 const diff::Ignore ignore; member 59 TEST_CASE("ignore") { 67 diff::Ignore(), 76 diff::Ignore(diff::Ignore::SYMBOL_TYPE_PRESENCE), 85 diff::Ignore(), 94 diff::Ignore(diff::Ignore::TYPE_DECLARATION_STATUS), 103 diff::Ignore(), 112 diff::Ignore(diff::Ignore::PRIMITIVE_TYPE_ENCODING), [all …]
|
| /external/compiler-rt/test/asan/TestCases/ |
| D | suppressions-function.cc | 1 // Check that without suppressions, we catch the issue. 2 // RUN: %clangxx_asan -O0 %s -o %t 3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s 6 // RUN: %clangxx_asan -O0 %s -o %t && %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCh… 7 // RUN: %clangxx_asan -O3 %s -o %t && %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCh… 27 // CHECK-CRASH: AddressSanitizer: heap-use-after-free 28 // CHECK-CRASH-NOT: strlen ignored 29 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free 30 // CHECK-IGNORE: strlen ignored
|
| D | suppressions-interceptor.cc | 1 // Check that without suppressions, we catch the issue. 2 // RUN: %clangxx_asan -O0 %s -o %t 3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s 6 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s 21 // CHECK-CRASH: AddressSanitizer: heap-use-after-free 22 // CHECK-CRASH-NOT: strlen ignored 23 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free 24 // CHECK-IGNORE: strlen ignored
|
| D | suppressions-library.cc | 1 // RUN: %clangxx_asan -O0 -DSHARED_LIB %s -fPIC -shared -o %dynamiclib %ld_flags_rpath_so 2 // RUN: %clangxx_asan -O0 %s -o %t %ld_flags_rpath_exe 4 // Check that without suppressions, we catch the issue. 5 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s 11 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s 39 // CHECK-CRASH: AddressSanitizer: heap-use-after-free 40 // CHECK-CRASH-NOT: strlen ignored 41 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free 42 // CHECK-IGNORE: strlen ignored
|
| D | suppressions-exec-relative-location.cc | 1 // Check that without suppressions, we catch the issue. 2 // RUN: %clangxx_asan -O0 %s -o %t 3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s 7 // RUN: rm -rf %T/suppressions-exec-relative-location 8 // RUN: mkdir -p %T/suppressions-exec-relative-location 9 // RUN: %clangxx_asan -O0 %s -o %T/suppressions-exec-relative-location/exec 11 // RUN: %T/suppressions-exec-relative-location/supp.txt 13 // RUN: %run %T/suppressions-exec-relative-location/exec 2>&1 | \ 14 // RUN: FileCheck --check-prefix=CHECK-IGNORE %s 15 // RUN: rm -rf %T/suppressions-exec-relative-location [all …]
|
| /external/cronet/stable/base/files/ |
| D | file_path_fuzzer.cc | 2 // Use of this source code is governed by a BSD-style license that can be 11 #include "base/check.h" 45 // Create a random path. Smoke-test its getters. in LLVMFuzzerTestOneInput() 47 std::ignore = path.GetComponents(); in LLVMFuzzerTestOneInput() 48 std::ignore = path.DirName(); in LLVMFuzzerTestOneInput() 49 std::ignore = path.BaseName(); in LLVMFuzzerTestOneInput() 50 std::ignore = path.Extension(); in LLVMFuzzerTestOneInput() 51 std::ignore = path.FinalExtension(); in LLVMFuzzerTestOneInput() 52 std::ignore = path.RemoveExtension(); in LLVMFuzzerTestOneInput() 53 std::ignore = path.RemoveFinalExtension(); in LLVMFuzzerTestOneInput() [all …]
|
| /external/cronet/tot/base/files/ |
| D | file_path_fuzzer.cc | 2 // Use of this source code is governed by a BSD-style license that can be 11 #include "base/check.h" 45 // Create a random path. Smoke-test its getters. in LLVMFuzzerTestOneInput() 47 std::ignore = path.GetComponents(); in LLVMFuzzerTestOneInput() 48 std::ignore = path.DirName(); in LLVMFuzzerTestOneInput() 49 std::ignore = path.BaseName(); in LLVMFuzzerTestOneInput() 50 std::ignore = path.Extension(); in LLVMFuzzerTestOneInput() 51 std::ignore = path.FinalExtension(); in LLVMFuzzerTestOneInput() 52 std::ignore = path.RemoveExtension(); in LLVMFuzzerTestOneInput() 53 std::ignore = path.RemoveFinalExtension(); in LLVMFuzzerTestOneInput() [all …]
|
| /external/cronet/stable/build/fuchsia/test/ |
| D | flash_device_unittests.py | 3 # Use of this source code is governed by a BSD-style license that can be 19 # pylint: disable=too-many-public-methods,protected-access 23 def setUp(self) -> None: 46 def test_update_required_on_ignore_returns_immediately(self) -> None: 47 """Test |os_check|='ignore' skips all checks.""" 49 'ignore', 'some-image-dir', None) 52 self.assertEqual(new_image_dir, 'some-image-dir') 54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None: 55 """Test |os_check|!='ignore' checks that image dir is non-Falsey.""" 59 def test_update_required_logs_missing_image_dir(self) -> None: [all …]
|
| D | flash_device.py | 3 # Use of this source code is governed by a BSD-style license that can be 22 # Flash-file lock. Used to restrict number of flash operations per host. 30 serial_num: Optional[str]) -> Tuple[str, str]: 54 serial_num: Optional[str] = None) -> Tuple[bool, Optional[str]]: 57 if os_check == 'ignore': 64 'a product-bundle name and dynamically searching for ' 72 if (os_check == 'check' 91 common.run_ffx_command(cmd=('target', 'flash', '-b', 93 '--no-bootloader-reboot'), 102 serial_num: Optional[str] = None) -> None: [all …]
|
| /external/angle/build/fuchsia/test/ |
| D | flash_device_unittests.py | 3 # Use of this source code is governed by a BSD-style license that can be 19 # pylint: disable=too-many-public-methods,protected-access 23 def setUp(self) -> None: 46 def test_update_required_on_ignore_returns_immediately(self) -> None: 47 """Test |os_check|='ignore' skips all checks.""" 49 'ignore', 'some-image-dir', None) 52 self.assertEqual(new_image_dir, 'some-image-dir') 54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None: 55 """Test |os_check|!='ignore' checks that image dir is non-Falsey.""" 59 def test_update_required_logs_missing_image_dir(self) -> None: [all …]
|
| /external/cronet/tot/build/fuchsia/test/ |
| D | flash_device_unittests.py | 3 # Use of this source code is governed by a BSD-style license that can be 19 # pylint: disable=too-many-public-methods,protected-access 23 def setUp(self) -> None: 46 def test_update_required_on_ignore_returns_immediately(self) -> None: 47 """Test |os_check|='ignore' skips all checks.""" 49 'ignore', 'some-image-dir', None) 52 self.assertEqual(new_image_dir, 'some-image-dir') 54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None: 55 """Test |os_check|!='ignore' checks that image dir is non-Falsey.""" 59 def test_update_required_logs_missing_image_dir(self) -> None: [all …]
|
| /external/pigweed/pw_presubmit/py/pw_presubmit/ |
| D | inclusive_language.py | 7 # https://www.apache.org/licenses/LICENSE-2.0 14 """Inclusive language presubmit check.""" 23 # https://source.android.com/setup/contribute/respectful-code 24 # inclusive-language: disable 28 r'red[-\s]?line', 29 r'(white|gr[ae]y|black)[-\s]*(list|hat)', 40 r'm[ae]n[-\s]*in[-\s]*the[-\s]*middle', 42 r'first[-\s]?class[-\s]?citizen', 44 # inclusive-language: enable 46 # Test: master # inclusive-language: ignore [all …]
|
| D | todo_check.py | 7 # https://www.apache.org/licenses/LICENSE-2.0 14 """Check the formatting of TODOs.""" 43 # todo-check: disable 44 # pylint: disable=line-too-long 47 r'(?:\bTODO: b/\d+(?:, ?b/\d+)* - )|' 48 r'(?:\bTODO: https://issues\.(?:pigweed|fuchsia)\.dev/(?:issues/)?\d+ - )|' 49 r'(?:\bTODO: https://issues\.chromium\.org/(?:issues/)?\d+ - )|' 50 r'(?:\bTODO: https://(?:(?:pw|fx)bug\.dev|crbug\.com)/\d+ - )|' 51 r'(?:\bTODO: (?:(?:pw|fx)bug\.dev|crbug\.com)/\d+ - )|' 52 r'(?:\bTODO: <(?:(?:pw|fx)bug\.dev|crbug\.com)/\d+> - )|' [all …]
|
| /external/cronet/stable/base/ |
| D | command_line_fuzzer.cc | 2 // Use of this source code is governed by a BSD-style license that can be 12 #include "base/check.h" 54 !StartsWith(text, "-") && !StartsWith(text, "/"); in IsValidSwitchName() 90 CHECK(command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput() 91 CHECK(command_line.GetSwitchValueNative(name) == value); in LLVMFuzzerTestOneInput() 100 CHECK(!command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput() 101 CHECK(command_line.GetSwitchValueNative(name).empty()); in LLVMFuzzerTestOneInput() 120 // Check a switch. in LLVMFuzzerTestOneInput() 123 std::ignore = command_line.HasSwitch(name); in LLVMFuzzerTestOneInput() 124 std::ignore = command_line.GetSwitchValueNative(name); in LLVMFuzzerTestOneInput() [all …]
|
| /external/cronet/tot/base/ |
| D | command_line_fuzzer.cc | 2 // Use of this source code is governed by a BSD-style license that can be 12 #include "base/check.h" 54 !StartsWith(text, "-") && !StartsWith(text, "/"); in IsValidSwitchName() 90 CHECK(command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput() 91 CHECK(command_line.GetSwitchValueNative(name) == value); in LLVMFuzzerTestOneInput() 100 CHECK(!command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput() 101 CHECK(command_line.GetSwitchValueNative(name).empty()); in LLVMFuzzerTestOneInput() 120 // Check a switch. in LLVMFuzzerTestOneInput() 123 std::ignore = command_line.HasSwitch(name); in LLVMFuzzerTestOneInput() 124 std::ignore = command_line.GetSwitchValueNative(name); in LLVMFuzzerTestOneInput() [all …]
|
| /external/pytorch/torch/_inductor/fx_passes/ |
| D | split_cat.py | 1 # mypy: allow-untyped-defs 120 assert isinstance(node.args[-1], int) 121 return node.args[-1] 125 assert isinstance(node.args[-1], int) 126 return node.args[-1] 137 # getitem getitem -> user=1 139 # split split -> dim=1, user=1, split_section_size=1 141 # getitem getitem -> user=1 143 # cat (dim=1) -> user=1 149 # getitem getitem -> user=1 [all …]
|
| /external/llvm/test/Transforms/SimplifyCFG/ |
| D | switch-dead-default.ll | 1 ; RUN: opt %s -S -simplifycfg | FileCheck %s 5 ; CHECK-LABEL: @test 6 ; CHECK: br i1 [[IGNORE:%.*]], label %true, label %false 21 ; CHECK-LABEL: @test2 39 ; CHECK-LABEL: default1: 40 ; CHECK-NEXT: unreachable 45 ; This one is a negative test - we know the value of the default, 48 ; CHECK-LABEL: @test3 63 ; CHECK-LABEL: default: 64 ; CHECK-NEXT: call void @foo [all …]
|
| /external/clang/test/Modules/ |
| D | ignored_macros.m | 1 // First trial: pass -DIGNORED=1 to both. This should obviously work. 2 // RUN: rm -rf %t.modules 3 …ang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps -I %S/Inputs … 4 // RUN: %clang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps -I … 6 // Second trial: pass -DIGNORED=1 only to the second invocation. We 9 // RUN: rm -rf %t.modules 10 …N: %clang_cc1 -fmodules-cache-path=%t.modules -fmodules -fimplicit-module-maps -I %S/Inputs -emit-… 11 // RUN: not %clang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps… 12 // RUN: FileCheck -check-prefix=CHECK-CONFLICT %s < %t.err 13 // CHECK-CONFLICT: PCH was compiled with module cache path [all …]
|
| /external/rust/beto-rust/common/cmd_runner/src/ |
| D | license_checker.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 28 pub fn run(&self, checker: &LicenseChecker, root: &path::Path) -> anyhow::Result<()> { in run() 30 LicenseSubcommand::CheckLicenseHeaders => checker.check(root)?, in run() 38 pub ignore: &'static [&'static str], field 42 pub fn check(&self, root: &path::Path) -> anyhow::Result<()> { in check() method 44 let ignore = self.ignore_globset()?; in check() localVariable 47 |p| !ignore.is_match(p), in check() 63 eprintln!("Consider adding binary files to the ignore list in src/licence.rs."); in check() 67 Err(anyhow::anyhow!("License header check failed")) in check() 73 pub fn add_missing(&self, root: &path::Path) -> anyhow::Result<()> { in add_missing() [all …]
|
| /external/mesa3d/docs/relnotes/ |
| D | 17.0.5.rst | 15 ---------------- 19 7510eee0d0077860b250d30d73305048c2df4ba09ea8fc04e4f3eec7beece301 mesa-17.0.5.tar.gz 20 668efa445d2f57a26e5c096b1965a685733a3b57d9c736f9d6460263847f9bfe mesa-17.0.5.tar.xz 23 ------------ 28 --------- 30 - `Bug 97524 <https://bugs.freedesktop.org/show_bug.cgi?id=97524>`__ - 35 ------- 39 - cherry-ignore: Add the pci_id into the shader cache UUID 40 - cherry-ignore: fix crash if ctx torn down with no rendering 41 - cherry-ignore: Fix typos. [all …]
|
| D | 17.1.10.rst | 15 ---------------- 19 a48ce6b643a728b2b0f926151930525b3670fbff1fb688527fd9051eab9f30a4 mesa-17.1.10.tar.gz 20 cbc0d681cc4df47d8deb5a36f45b420978128522fd665b2cd4c7096316f11bdb mesa-17.1.10.tar.xz 23 ------------ 28 --------- 30 - `Bug 102844 <https://bugs.freedesktop.org/show_bug.cgi?id=102844>`__ 31 - memory leak with glDeleteProgram for shader program type 35 ------- 39 - osmesa: link with libunwind if enabled (v2) 43 - docs: add sha256 checksums for 17.1.9 [all …]
|