Home
last modified time | relevance | path

Searched +full:check +full:- +full:ignore (Results 1 – 25 of 1277) sorted by relevance

12345678910>>...52

/external/llvm/test/Bindings/OCaml/
Dcore.ml2 * RUN: %ocamlc -g -w +A -package llvm.analysis -package llvm.bitwriter -linkpkg %T/core.ml -o %t
4 * RUN: %ocamlopt -g -w +A -package llvm.analysis -package llvm.bitwriter -linkpkg %T/core.ml -o %t
6 * RUN: llvm-dis < %t.bc > %t.ll
9 * RUN: FileCheck -check-prefix=CHECK-NOWHERE %s < %t.ll
21 (* Tiny unit test framework - really just to help find which line is busted *)
49 | false, true -> ()
50 | false, false ->
52 | true, true ->
54 | true, false ->
64 (*===-- Fixture -----------------------------------------------------------===*)
[all …]
/external/clang/test/Frontend/
Dverify-ignore-unexpected.c1 // RUN: not %clang_cc1 -DTEST_SWITCH -verify-ignore-unexpected=remark,aoeu,note -verify %s 2>&1 \
2 // RUN: | FileCheck -check-prefix=CHECK-BAD-SWITCH %s
4 // expected-no-diagnostics
6 // CHECK-BAD-SWITCH: error: 'error' diagnostics seen but not expected:
7 // CHECK-BAD-SWITCH-NEXT: (frontend): invalid value 'aoeu' in '-verify-ignore-unexpected='
9 // RUN: %clang_cc1 -DTEST1 -verify %s
10 // RUN: %clang_cc1 -DTEST1 -verify -verify-ignore-unexpected %s
13 // expected-warning@-1 {{MyWarning1}}
14 int x; // expected-note {{previous definition is here}}
15 float x; // expected-error {{redefinition of 'x'}}
[all …]
/external/compiler-rt/test/asan/TestCases/Darwin/
Dsuppressions-darwin.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t -framework Foundation
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
5 // Check that suppressing the interceptor by name works.
8 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
10 // Check that suppressing by interceptor name works even without the symbolizer
11 …ts=suppressions='"%t.supp"':symbolize=false %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
13 // Check that suppressing all reports from a library works.
15 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
17 // Check that suppressing library works even without the symbolizer.
[all …]
Dsuppressions-sandbox.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t -framework Foundation
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
5 // Check that suppressing a function name works within a no-fork sandbox
8 // RUN: sandbox-exec -p '(version 1)(allow default)(deny process-fork)' \
9 // RUN: %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
23 // CHECK-CRASH: AddressSanitizer: heap-buffer-overflow
24 // CHECK-CRASH-NOT: Ignored.
25 // CHECK-IGNORE-NOT: AddressSanitizer: heap-buffer-overflow
26 // CHECK-IGNORE: Ignored.
/external/stg/
Dstgdiff_test.cc1 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
2 // -*- mode: C++ -*-
44 const diff::Ignore ignore; member
59 TEST_CASE("ignore") {
67 diff::Ignore(),
76 diff::Ignore(diff::Ignore::SYMBOL_TYPE_PRESENCE),
85 diff::Ignore(),
94 diff::Ignore(diff::Ignore::TYPE_DECLARATION_STATUS),
103 diff::Ignore(),
112 diff::Ignore(diff::Ignore::PRIMITIVE_TYPE_ENCODING),
[all …]
/external/compiler-rt/test/asan/TestCases/
Dsuppressions-function.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
6 // RUN: %clangxx_asan -O0 %s -o %t && %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCh…
7 // RUN: %clangxx_asan -O3 %s -o %t && %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCh…
27 // CHECK-CRASH: AddressSanitizer: heap-use-after-free
28 // CHECK-CRASH-NOT: strlen ignored
29 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free
30 // CHECK-IGNORE: strlen ignored
Dsuppressions-interceptor.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
6 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
21 // CHECK-CRASH: AddressSanitizer: heap-use-after-free
22 // CHECK-CRASH-NOT: strlen ignored
23 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free
24 // CHECK-IGNORE: strlen ignored
Dsuppressions-library.cc1 // RUN: %clangxx_asan -O0 -DSHARED_LIB %s -fPIC -shared -o %dynamiclib %ld_flags_rpath_so
2 // RUN: %clangxx_asan -O0 %s -o %t %ld_flags_rpath_exe
4 // Check that without suppressions, we catch the issue.
5 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
11 …UN: %env_asan_opts=suppressions='"%t.supp"' %run %t 2>&1 | FileCheck --check-prefix=CHECK-IGNORE %s
39 // CHECK-CRASH: AddressSanitizer: heap-use-after-free
40 // CHECK-CRASH-NOT: strlen ignored
41 // CHECK-IGNORE-NOT: AddressSanitizer: heap-use-after-free
42 // CHECK-IGNORE: strlen ignored
Dsuppressions-exec-relative-location.cc1 // Check that without suppressions, we catch the issue.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
7 // RUN: rm -rf %T/suppressions-exec-relative-location
8 // RUN: mkdir -p %T/suppressions-exec-relative-location
9 // RUN: %clangxx_asan -O0 %s -o %T/suppressions-exec-relative-location/exec
11 // RUN: %T/suppressions-exec-relative-location/supp.txt
13 // RUN: %run %T/suppressions-exec-relative-location/exec 2>&1 | \
14 // RUN: FileCheck --check-prefix=CHECK-IGNORE %s
15 // RUN: rm -rf %T/suppressions-exec-relative-location
[all …]
/external/cronet/stable/base/files/
Dfile_path_fuzzer.cc2 // Use of this source code is governed by a BSD-style license that can be
11 #include "base/check.h"
45 // Create a random path. Smoke-test its getters. in LLVMFuzzerTestOneInput()
47 std::ignore = path.GetComponents(); in LLVMFuzzerTestOneInput()
48 std::ignore = path.DirName(); in LLVMFuzzerTestOneInput()
49 std::ignore = path.BaseName(); in LLVMFuzzerTestOneInput()
50 std::ignore = path.Extension(); in LLVMFuzzerTestOneInput()
51 std::ignore = path.FinalExtension(); in LLVMFuzzerTestOneInput()
52 std::ignore = path.RemoveExtension(); in LLVMFuzzerTestOneInput()
53 std::ignore = path.RemoveFinalExtension(); in LLVMFuzzerTestOneInput()
[all …]
/external/cronet/tot/base/files/
Dfile_path_fuzzer.cc2 // Use of this source code is governed by a BSD-style license that can be
11 #include "base/check.h"
45 // Create a random path. Smoke-test its getters. in LLVMFuzzerTestOneInput()
47 std::ignore = path.GetComponents(); in LLVMFuzzerTestOneInput()
48 std::ignore = path.DirName(); in LLVMFuzzerTestOneInput()
49 std::ignore = path.BaseName(); in LLVMFuzzerTestOneInput()
50 std::ignore = path.Extension(); in LLVMFuzzerTestOneInput()
51 std::ignore = path.FinalExtension(); in LLVMFuzzerTestOneInput()
52 std::ignore = path.RemoveExtension(); in LLVMFuzzerTestOneInput()
53 std::ignore = path.RemoveFinalExtension(); in LLVMFuzzerTestOneInput()
[all …]
/external/cronet/stable/build/fuchsia/test/
Dflash_device_unittests.py3 # Use of this source code is governed by a BSD-style license that can be
19 # pylint: disable=too-many-public-methods,protected-access
23 def setUp(self) -> None:
46 def test_update_required_on_ignore_returns_immediately(self) -> None:
47 """Test |os_check|='ignore' skips all checks."""
49 'ignore', 'some-image-dir', None)
52 self.assertEqual(new_image_dir, 'some-image-dir')
54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None:
55 """Test |os_check|!='ignore' checks that image dir is non-Falsey."""
59 def test_update_required_logs_missing_image_dir(self) -> None:
[all …]
Dflash_device.py3 # Use of this source code is governed by a BSD-style license that can be
22 # Flash-file lock. Used to restrict number of flash operations per host.
30 serial_num: Optional[str]) -> Tuple[str, str]:
54 serial_num: Optional[str] = None) -> Tuple[bool, Optional[str]]:
57 if os_check == 'ignore':
64 'a product-bundle name and dynamically searching for '
72 if (os_check == 'check'
91 common.run_ffx_command(cmd=('target', 'flash', '-b',
93 '--no-bootloader-reboot'),
102 serial_num: Optional[str] = None) -> None:
[all …]
/external/angle/build/fuchsia/test/
Dflash_device_unittests.py3 # Use of this source code is governed by a BSD-style license that can be
19 # pylint: disable=too-many-public-methods,protected-access
23 def setUp(self) -> None:
46 def test_update_required_on_ignore_returns_immediately(self) -> None:
47 """Test |os_check|='ignore' skips all checks."""
49 'ignore', 'some-image-dir', None)
52 self.assertEqual(new_image_dir, 'some-image-dir')
54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None:
55 """Test |os_check|!='ignore' checks that image dir is non-Falsey."""
59 def test_update_required_logs_missing_image_dir(self) -> None:
[all …]
/external/cronet/tot/build/fuchsia/test/
Dflash_device_unittests.py3 # Use of this source code is governed by a BSD-style license that can be
19 # pylint: disable=too-many-public-methods,protected-access
23 def setUp(self) -> None:
46 def test_update_required_on_ignore_returns_immediately(self) -> None:
47 """Test |os_check|='ignore' skips all checks."""
49 'ignore', 'some-image-dir', None)
52 self.assertEqual(new_image_dir, 'some-image-dir')
54 def test_update_required_raises_value_error_if_no_image_dir(self) -> None:
55 """Test |os_check|!='ignore' checks that image dir is non-Falsey."""
59 def test_update_required_logs_missing_image_dir(self) -> None:
[all …]
/external/pigweed/pw_presubmit/py/pw_presubmit/
Dinclusive_language.py7 # https://www.apache.org/licenses/LICENSE-2.0
14 """Inclusive language presubmit check."""
23 # https://source.android.com/setup/contribute/respectful-code
24 # inclusive-language: disable
28 r'red[-\s]?line',
29 r'(white|gr[ae]y|black)[-\s]*(list|hat)',
40 r'm[ae]n[-\s]*in[-\s]*the[-\s]*middle',
42 r'first[-\s]?class[-\s]?citizen',
44 # inclusive-language: enable
46 # Test: master # inclusive-language: ignore
[all …]
Dtodo_check.py7 # https://www.apache.org/licenses/LICENSE-2.0
14 """Check the formatting of TODOs."""
43 # todo-check: disable
44 # pylint: disable=line-too-long
47 r'(?:\bTODO: b/\d+(?:, ?b/\d+)* - )|'
48 r'(?:\bTODO: https://issues\.(?:pigweed|fuchsia)\.dev/(?:issues/)?\d+ - )|'
49 r'(?:\bTODO: https://issues\.chromium\.org/(?:issues/)?\d+ - )|'
50 r'(?:\bTODO: https://(?:(?:pw|fx)bug\.dev|crbug\.com)/\d+ - )|'
51 r'(?:\bTODO: (?:(?:pw|fx)bug\.dev|crbug\.com)/\d+ - )|'
52 r'(?:\bTODO: <(?:(?:pw|fx)bug\.dev|crbug\.com)/\d+> - )|'
[all …]
/external/cronet/stable/base/
Dcommand_line_fuzzer.cc2 // Use of this source code is governed by a BSD-style license that can be
12 #include "base/check.h"
54 !StartsWith(text, "-") && !StartsWith(text, "/"); in IsValidSwitchName()
90 CHECK(command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput()
91 CHECK(command_line.GetSwitchValueNative(name) == value); in LLVMFuzzerTestOneInput()
100 CHECK(!command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput()
101 CHECK(command_line.GetSwitchValueNative(name).empty()); in LLVMFuzzerTestOneInput()
120 // Check a switch. in LLVMFuzzerTestOneInput()
123 std::ignore = command_line.HasSwitch(name); in LLVMFuzzerTestOneInput()
124 std::ignore = command_line.GetSwitchValueNative(name); in LLVMFuzzerTestOneInput()
[all …]
/external/cronet/tot/base/
Dcommand_line_fuzzer.cc2 // Use of this source code is governed by a BSD-style license that can be
12 #include "base/check.h"
54 !StartsWith(text, "-") && !StartsWith(text, "/"); in IsValidSwitchName()
90 CHECK(command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput()
91 CHECK(command_line.GetSwitchValueNative(name) == value); in LLVMFuzzerTestOneInput()
100 CHECK(!command_line.HasSwitch(name)); in LLVMFuzzerTestOneInput()
101 CHECK(command_line.GetSwitchValueNative(name).empty()); in LLVMFuzzerTestOneInput()
120 // Check a switch. in LLVMFuzzerTestOneInput()
123 std::ignore = command_line.HasSwitch(name); in LLVMFuzzerTestOneInput()
124 std::ignore = command_line.GetSwitchValueNative(name); in LLVMFuzzerTestOneInput()
[all …]
/external/pytorch/torch/_inductor/fx_passes/
Dsplit_cat.py1 # mypy: allow-untyped-defs
120 assert isinstance(node.args[-1], int)
121 return node.args[-1]
125 assert isinstance(node.args[-1], int)
126 return node.args[-1]
137 # getitem getitem -> user=1
139 # split split -> dim=1, user=1, split_section_size=1
141 # getitem getitem -> user=1
143 # cat (dim=1) -> user=1
149 # getitem getitem -> user=1
[all …]
/external/llvm/test/Transforms/SimplifyCFG/
Dswitch-dead-default.ll1 ; RUN: opt %s -S -simplifycfg | FileCheck %s
5 ; CHECK-LABEL: @test
6 ; CHECK: br i1 [[IGNORE:%.*]], label %true, label %false
21 ; CHECK-LABEL: @test2
39 ; CHECK-LABEL: default1:
40 ; CHECK-NEXT: unreachable
45 ; This one is a negative test - we know the value of the default,
48 ; CHECK-LABEL: @test3
63 ; CHECK-LABEL: default:
64 ; CHECK-NEXT: call void @foo
[all …]
/external/clang/test/Modules/
Dignored_macros.m1 // First trial: pass -DIGNORED=1 to both. This should obviously work.
2 // RUN: rm -rf %t.modules
3 …ang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps -I %S/Inputs
4 // RUN: %clang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps -I …
6 // Second trial: pass -DIGNORED=1 only to the second invocation. We
9 // RUN: rm -rf %t.modules
10 …N: %clang_cc1 -fmodules-cache-path=%t.modules -fmodules -fimplicit-module-maps -I %S/Inputs -emit-
11 // RUN: not %clang_cc1 -fmodules-cache-path=%t.modules -DIGNORED=1 -fmodules -fimplicit-module-maps…
12 // RUN: FileCheck -check-prefix=CHECK-CONFLICT %s < %t.err
13 // CHECK-CONFLICT: PCH was compiled with module cache path
[all …]
/external/rust/beto-rust/common/cmd_runner/src/
Dlicense_checker.rs7 // http://www.apache.org/licenses/LICENSE-2.0
28 pub fn run(&self, checker: &LicenseChecker, root: &path::Path) -> anyhow::Result<()> { in run()
30 LicenseSubcommand::CheckLicenseHeaders => checker.check(root)?, in run()
38 pub ignore: &'static [&'static str], field
42 pub fn check(&self, root: &path::Path) -> anyhow::Result<()> { in check() method
44 let ignore = self.ignore_globset()?; in check() localVariable
47 |p| !ignore.is_match(p), in check()
63 eprintln!("Consider adding binary files to the ignore list in src/licence.rs."); in check()
67 Err(anyhow::anyhow!("License header check failed")) in check()
73 pub fn add_missing(&self, root: &path::Path) -> anyhow::Result<()> { in add_missing()
[all …]
/external/mesa3d/docs/relnotes/
D17.0.5.rst15 ----------------
19 7510eee0d0077860b250d30d73305048c2df4ba09ea8fc04e4f3eec7beece301 mesa-17.0.5.tar.gz
20 668efa445d2f57a26e5c096b1965a685733a3b57d9c736f9d6460263847f9bfe mesa-17.0.5.tar.xz
23 ------------
28 ---------
30 - `Bug 97524 <https://bugs.freedesktop.org/show_bug.cgi?id=97524>`__ -
35 -------
39 - cherry-ignore: Add the pci_id into the shader cache UUID
40 - cherry-ignore: fix crash if ctx torn down with no rendering
41 - cherry-ignore: Fix typos.
[all …]
D17.1.10.rst15 ----------------
19 a48ce6b643a728b2b0f926151930525b3670fbff1fb688527fd9051eab9f30a4 mesa-17.1.10.tar.gz
20 cbc0d681cc4df47d8deb5a36f45b420978128522fd665b2cd4c7096316f11bdb mesa-17.1.10.tar.xz
23 ------------
28 ---------
30 - `Bug 102844 <https://bugs.freedesktop.org/show_bug.cgi?id=102844>`__
31 - memory leak with glDeleteProgram for shader program type
35 -------
39 - osmesa: link with libunwind if enabled (v2)
43 - docs: add sha256 checksums for 17.1.9
[all …]

12345678910>>...52