| /src/tests/include/sys/ |
| t_cdefs.c | 75 #define CHECK(a, b) ATF_REQUIRE(__type_min(a) == s[b].min); \ 78 CHECK(signed char, 0); 79 CHECK(signed short, 1); 80 CHECK(signed int, 2); 81 CHECK(signed long, 3); 82 CHECK(signed long long, 4); 83 #undef CHECK 94 #define CHECK(a, b) ATF_REQUIRE(__type_min(a) == u[b].min); \ 97 CHECK(unsigned char, 0); 98 CHECK(unsigned short, 1) [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
| asan_posix.cc | 53 CHECK(tsd_destructor); 63 CHECK(!tsd_destructor); 68 CHECK(tsd_destructor); 73 CHECK(tsd_destructor); 74 CHECK(tsd); 75 CHECK(!key.key); 80 CHECK(tsd_destructor); 91 CHECK(!tsd_key_inited); 97 CHECK(tsd_key_inited); 102 CHECK(tsd_key_inited) [all...] |
| asan_suppressions.cc | 48 CHECK(suppression_ctx); 55 CHECK(suppression_ctx); 61 CHECK(suppression_ctx); 71 CHECK(suppression_ctx); 86 CHECK(frames);
|
| asan_win.cc | 82 CHECK(REAL(SetUnhandledExceptionFilter)); 92 CHECK(REAL(RtlRaiseException)); 101 CHECK(REAL(RaiseException)); 109 CHECK(REAL(__C_specific_handler)); 117 CHECK(REAL(_except_handler3)); 127 CHECK(REAL(_except_handler4)); 165 CHECK(GetModuleHandleExW(GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS | 185 CHECK(::__interception::OverrideFunction("RtlRaiseException", 206 CHECK(tsd_key_inited); 211 CHECK(tsd_key_inited) [all...] |
| asan_globals.cc | 100 CHECK(global_registration_site_vector); 134 // Check ODR violation for given global G via special ODR indicator. We use 138 // Instrumentation requests to skip ODR check. 157 // Check ODR violation for given global G by checking if it's already poisoned. 162 // This check may not be enough: if the first global is much larger 180 // indicator symbol to perform similar check. 186 // and can freely check ODR violation with the first method. 198 CHECK(asan_inited); 201 CHECK(flags()->report_globals); 202 CHECK(AddrIsInMem(g->beg)) [all...] |
| /src/tests/lib/libm/ |
| t_next.c | 53 #define CHECK(i, next, x, d, y) do \ 69 * check(x, n) 76 check(const double *x, unsigned n) function 81 CHECK(i, nextafter, x[i], x[i], x[i]); 82 CHECK(i, nexttoward, x[i], x[i], x[i]); 83 CHECK(i, nextafter, -x[i], -x[i], -x[i]); 84 CHECK(i, nexttoward, -x[i], -x[i], -x[i]); 91 CHECK(i, nexttoward, x[i], x[i]*(1 + LDBL_EPSILON), 95 CHECK(i, nextafter, x[i], x[i + 1], x[i + 1]); 96 CHECK(i, nexttoward, x[i], x[i + 1], x[i + 1]) [all...] |
| /src/tests/lib/libc/tls/ |
| t_tls_static.c | 62 #define CHECK(a, b) \ 64 CHECK(1, 1); 65 CHECK(2, 0); 67 CHECK(1, -1); 68 CHECK(2, -1);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_mac_libcdep.cc | 25 CHECK(res != MAP_FAILED);
|
| sanitizer_netbsd.cc | 95 CHECK(real_##func); 100 CHECK(&__mmap); 115 CHECK(&_sys_close); 120 CHECK(&_sys_open); 125 CHECK(&_sys_open); 131 CHECK(&_sys_read); 138 CHECK(&_sys_write); 145 CHECK(&__ftruncate); 183 CHECK(&_sys_readlink); 198 CHECK(&_sys_sched_yield) [all...] |
| sanitizer_procmaps_linux.cc | 46 CHECK(IsOneOf(*data_.current, '-', 'r')); 49 CHECK(IsOneOf(*data_.current, '-', 'w')); 51 CHECK(IsOneOf(*data_.current, '-', 'x')); 53 CHECK(IsOneOf(*data_.current, 's', 'p'));
|
| sanitizer_signal_interceptors.inc | 82 CHECK(!was_called_once);
|
| /src/regress/sys/kern/getcwd/ |
| getcwd.c | 229 #define CHECK(dir, call, ret, err) \ 250 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), -1, EACCES); 263 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), 20, 0); 289 CHECK ("/tmp/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 15, 0); 303 CHECK ("/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 11, 0); 306 CHECK ("/", __getcwd(kbuf, sizeof(kbuf)), 2, 0); 308 CHECK ("/subdir", __getcwd(kbuf, sizeof(kbuf)), 8, 0); 341 CHECK("/", __getcwd(0, 0), -1, ERANGE); 342 CHECK("/", __getcwd(0, -1), -1, ERANGE); 343 CHECK("/", __getcwd(kbuf, 0xdeadbeef), -1, ERANGE); /* large negative * [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
| msan_origin.h | 73 CHECK(isChainedOrigin()); 77 CHECK(isStackOrigin()); 81 CHECK(isHeapOrigin()); 87 CHECK(isChainedOrigin()); 99 CHECK((id & kStackIdMask) == id); 105 CHECK(stack_id); 106 CHECK((stack_id & kHeapIdMask) == stack_id); 119 CHECK(depth < (1 << kDepthBits)); 133 CHECK((chained_id & kChainedIdMask) == chained_id); 159 CHECK(isChainedOrigin()) [all...] |
| msan_linux.cc | 86 CHECK(addr_is_type(start, type)); 87 CHECK(addr_is_type((start + end) / 2, type)); 88 CHECK(addr_is_type(end - 1, type)); 91 CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr))); 92 CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr))); 96 CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr))); 97 CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr))); 101 CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr))); 102 CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr))); 132 // Check if the segment should be mapped based on platform constraints [all...] |
| msan_thread.cc | 31 CHECK(AddrIsInStack((uptr)&local)); 46 CHECK(MEM_IS_APP(stack_bottom_)); 47 CHECK(MEM_IS_APP(stack_top_ - 1));
|
| /src/tests/usr.sbin/inetd/ |
| test_server.c | 45 #define CHECK(expr) do {\ 98 CHECK(count = recv(0, buffer, sizeof(buffer), 0)); 101 CHECK(send(1, buffer, (size_t)count, 0)); 113 CHECK(fd = accept(0, (struct sockaddr*)&addr, &addr_len)); 114 CHECK(count = recv(fd, buffer, sizeof(buffer), 0)); 117 CHECK(send(fd, buffer, (size_t)count, 0)); 118 CHECK(shutdown(fd, SHUT_RDWR)); 119 CHECK(close(fd)); 143 CHECK(count = recvmsg(0, &header, 0)); 145 CHECK(sendto(1, buffer, (size_t)count, 0 [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/unit/ |
| tsan_shadow_test.cc | 55 CHECK(IsAppMem((uptr)&global)); 56 CHECK(IsAppMem((uptr)&stack)); 57 CHECK(IsAppMem((uptr)heap)); 59 CHECK(IsShadowMem(MemToShadow((uptr)&global))); 60 CHECK(IsShadowMem(MemToShadow((uptr)&stack))); 61 CHECK(IsShadowMem(MemToShadow((uptr)heap)));
|
| /src/sys/external/bsd/compiler_rt/dist/lib/ubsan/ |
| ubsan_value.cc | 24 CHECK(getType().isSignedIntegerTy()); 45 CHECK(getType().isUnsignedIntegerTy()); 64 CHECK(Val >= 0); 72 CHECK(getType().isFloatTy());
|
| ubsan_value.h | 125 CHECK(isIntegerTy()); 131 CHECK(isFloatTy()); 144 /// runtime when a check failure occurs). 153 CHECK(getType().isIntegerTy()); 161 CHECK(getType().isFloatTy());
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
| sanitizer_list_test.cc | 60 CHECK(l->empty()); 83 CHECK(l.empty()); 91 CHECK(l.empty()); 108 CHECK(l.empty()); 125 CHECK(l.empty()); 142 CHECK(l.empty()); 149 CHECK(l1.empty()); 150 CHECK(l2.empty()); 153 CHECK(l1.empty()); 154 CHECK(l2.empty()) [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/rtl/ |
| tsan_test_util_posix.cc | 79 CHECK(offset_from_aligned < kAlign); 98 CHECK(!alive_); 102 CHECK(!alive_); 113 CHECK(0); 117 CHECK(!alive_); 118 CHECK(type_ == Normal); 125 CHECK(alive_); 138 CHECK(alive_); 150 CHECK(alive_); 163 CHECK(alive_) [all...] |
| tsan_mutex.cc | 30 CHECK(t.TryLock(m)); 34 CHECK(!t.TryLock(m)); 48 CHECK(t.TryLock(m)); 52 CHECK(!t.TryLock(m)); 66 CHECK(t.TryLock(m)); 70 CHECK(!t.TryLock(m)); 76 CHECK(t.TryReadLock(m)); 80 CHECK(!t.TryReadLock(m)); 84 CHECK(!t.TryLock(m)); 88 CHECK(t.TryReadLock(m)) [all...] |
| /src/sys/arch/vax/floppy/ |
| defboo.hp | 15 D/G B 0 ! BOOT PARAMETERS: MULTI USER AFTER CHECK
|
| /src/tests/lib/libc/stdlib/ |
| t_strtol.c | 50 check(struct test *t, long int li, long long int lli, intmax_t ji, char *end) function 125 check(&t[i], li, lli, ji, end); 160 #define CHECK(r, f, fun) \ 173 CHECK(li, "%ld", strtol); 174 CHECK(lli, "%lld", strtoll); 175 CHECK(ji, "%jd", strtoimax); 176 CHECK(uli, "%lu", strtoul); 177 CHECK(ulli, "%llu", strtoull); 178 CHECK(uji, "%ju", strtoumax); 213 check(&t[i], li, lli, ji, end) [all...] |
| /src/usr.sbin/puffs/mount_9p/ |
| ninebuf.c | 47 #define CHECK(v) if (!(v)) abort() 194 CHECK(rv == 0); 204 CHECK(rv == 0); 214 CHECK(rv == 0); 224 CHECK(rv == 0); 234 CHECK(rv == 0); 250 CHECK(rv == 0);
|