HomeSort by: relevance | last modified time | path
    Searched refs:CHECK (Results 1 - 25 of 150) sorted by relevancy

1 2 3 4 5 6

  /src/tests/include/sys/
t_cdefs.c 75 #define CHECK(a, b) ATF_REQUIRE(__type_min(a) == s[b].min); \
78 CHECK(signed char, 0);
79 CHECK(signed short, 1);
80 CHECK(signed int, 2);
81 CHECK(signed long, 3);
82 CHECK(signed long long, 4);
83 #undef CHECK
94 #define CHECK(a, b) ATF_REQUIRE(__type_min(a) == u[b].min); \
97 CHECK(unsigned char, 0);
98 CHECK(unsigned short, 1)
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/asan/
asan_posix.cc 53 CHECK(tsd_destructor);
63 CHECK(!tsd_destructor);
68 CHECK(tsd_destructor);
73 CHECK(tsd_destructor);
74 CHECK(tsd);
75 CHECK(!key.key);
80 CHECK(tsd_destructor);
91 CHECK(!tsd_key_inited);
97 CHECK(tsd_key_inited);
102 CHECK(tsd_key_inited)
    [all...]
asan_suppressions.cc 48 CHECK(suppression_ctx);
55 CHECK(suppression_ctx);
61 CHECK(suppression_ctx);
71 CHECK(suppression_ctx);
86 CHECK(frames);
asan_win.cc 82 CHECK(REAL(SetUnhandledExceptionFilter));
92 CHECK(REAL(RtlRaiseException));
101 CHECK(REAL(RaiseException));
109 CHECK(REAL(__C_specific_handler));
117 CHECK(REAL(_except_handler3));
127 CHECK(REAL(_except_handler4));
165 CHECK(GetModuleHandleExW(GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS |
185 CHECK(::__interception::OverrideFunction("RtlRaiseException",
206 CHECK(tsd_key_inited);
211 CHECK(tsd_key_inited)
    [all...]
asan_globals.cc 100 CHECK(global_registration_site_vector);
134 // Check ODR violation for given global G via special ODR indicator. We use
138 // Instrumentation requests to skip ODR check.
157 // Check ODR violation for given global G by checking if it's already poisoned.
162 // This check may not be enough: if the first global is much larger
180 // indicator symbol to perform similar check.
186 // and can freely check ODR violation with the first method.
198 CHECK(asan_inited);
201 CHECK(flags()->report_globals);
202 CHECK(AddrIsInMem(g->beg))
    [all...]
  /src/tests/lib/libm/
t_next.c 53 #define CHECK(i, next, x, d, y) do \
69 * check(x, n)
76 check(const double *x, unsigned n) function
81 CHECK(i, nextafter, x[i], x[i], x[i]);
82 CHECK(i, nexttoward, x[i], x[i], x[i]);
83 CHECK(i, nextafter, -x[i], -x[i], -x[i]);
84 CHECK(i, nexttoward, -x[i], -x[i], -x[i]);
91 CHECK(i, nexttoward, x[i], x[i]*(1 + LDBL_EPSILON),
95 CHECK(i, nextafter, x[i], x[i + 1], x[i + 1]);
96 CHECK(i, nexttoward, x[i], x[i + 1], x[i + 1])
    [all...]
  /src/tests/lib/libc/tls/
t_tls_static.c 62 #define CHECK(a, b) \
64 CHECK(1, 1);
65 CHECK(2, 0);
67 CHECK(1, -1);
68 CHECK(2, -1);
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_mac_libcdep.cc 25 CHECK(res != MAP_FAILED);
sanitizer_netbsd.cc 95 CHECK(real_##func);
100 CHECK(&__mmap);
115 CHECK(&_sys_close);
120 CHECK(&_sys_open);
125 CHECK(&_sys_open);
131 CHECK(&_sys_read);
138 CHECK(&_sys_write);
145 CHECK(&__ftruncate);
183 CHECK(&_sys_readlink);
198 CHECK(&_sys_sched_yield)
    [all...]
sanitizer_procmaps_linux.cc 46 CHECK(IsOneOf(*data_.current, '-', 'r'));
49 CHECK(IsOneOf(*data_.current, '-', 'w'));
51 CHECK(IsOneOf(*data_.current, '-', 'x'));
53 CHECK(IsOneOf(*data_.current, 's', 'p'));
sanitizer_signal_interceptors.inc 82 CHECK(!was_called_once);
  /src/regress/sys/kern/getcwd/
getcwd.c 229 #define CHECK(dir, call, ret, err) \
250 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), -1, EACCES);
263 CHECK("/tmp/permdir/subdir", __getcwd(kbuf, sizeof(kbuf)), 20, 0);
289 CHECK ("/tmp/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 15, 0);
303 CHECK ("/chrootdir", __getcwd(kbuf, sizeof(kbuf)), 11, 0);
306 CHECK ("/", __getcwd(kbuf, sizeof(kbuf)), 2, 0);
308 CHECK ("/subdir", __getcwd(kbuf, sizeof(kbuf)), 8, 0);
341 CHECK("/", __getcwd(0, 0), -1, ERANGE);
342 CHECK("/", __getcwd(0, -1), -1, ERANGE);
343 CHECK("/", __getcwd(kbuf, 0xdeadbeef), -1, ERANGE); /* large negative *
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/msan/
msan_origin.h 73 CHECK(isChainedOrigin());
77 CHECK(isStackOrigin());
81 CHECK(isHeapOrigin());
87 CHECK(isChainedOrigin());
99 CHECK((id & kStackIdMask) == id);
105 CHECK(stack_id);
106 CHECK((stack_id & kHeapIdMask) == stack_id);
119 CHECK(depth < (1 << kDepthBits));
133 CHECK((chained_id & kChainedIdMask) == chained_id);
159 CHECK(isChainedOrigin())
    [all...]
msan_linux.cc 86 CHECK(addr_is_type(start, type));
87 CHECK(addr_is_type((start + end) / 2, type));
88 CHECK(addr_is_type(end - 1, type));
91 CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
92 CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
96 CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
97 CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
101 CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
102 CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
132 // Check if the segment should be mapped based on platform constraints
    [all...]
msan_thread.cc 31 CHECK(AddrIsInStack((uptr)&local));
46 CHECK(MEM_IS_APP(stack_bottom_));
47 CHECK(MEM_IS_APP(stack_top_ - 1));
  /src/tests/usr.sbin/inetd/
test_server.c 45 #define CHECK(expr) do {\
98 CHECK(count = recv(0, buffer, sizeof(buffer), 0));
101 CHECK(send(1, buffer, (size_t)count, 0));
113 CHECK(fd = accept(0, (struct sockaddr*)&addr, &addr_len));
114 CHECK(count = recv(fd, buffer, sizeof(buffer), 0));
117 CHECK(send(fd, buffer, (size_t)count, 0));
118 CHECK(shutdown(fd, SHUT_RDWR));
119 CHECK(close(fd));
143 CHECK(count = recvmsg(0, &header, 0));
145 CHECK(sendto(1, buffer, (size_t)count, 0
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/unit/
tsan_shadow_test.cc 55 CHECK(IsAppMem((uptr)&global));
56 CHECK(IsAppMem((uptr)&stack));
57 CHECK(IsAppMem((uptr)heap));
59 CHECK(IsShadowMem(MemToShadow((uptr)&global)));
60 CHECK(IsShadowMem(MemToShadow((uptr)&stack)));
61 CHECK(IsShadowMem(MemToShadow((uptr)heap)));
  /src/sys/external/bsd/compiler_rt/dist/lib/ubsan/
ubsan_value.cc 24 CHECK(getType().isSignedIntegerTy());
45 CHECK(getType().isUnsignedIntegerTy());
64 CHECK(Val >= 0);
72 CHECK(getType().isFloatTy());
ubsan_value.h 125 CHECK(isIntegerTy());
131 CHECK(isFloatTy());
144 /// runtime when a check failure occurs).
153 CHECK(getType().isIntegerTy());
161 CHECK(getType().isFloatTy());
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/
sanitizer_list_test.cc 60 CHECK(l->empty());
83 CHECK(l.empty());
91 CHECK(l.empty());
108 CHECK(l.empty());
125 CHECK(l.empty());
142 CHECK(l.empty());
149 CHECK(l1.empty());
150 CHECK(l2.empty());
153 CHECK(l1.empty());
154 CHECK(l2.empty())
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/rtl/
tsan_test_util_posix.cc 79 CHECK(offset_from_aligned < kAlign);
98 CHECK(!alive_);
102 CHECK(!alive_);
113 CHECK(0);
117 CHECK(!alive_);
118 CHECK(type_ == Normal);
125 CHECK(alive_);
138 CHECK(alive_);
150 CHECK(alive_);
163 CHECK(alive_)
    [all...]
tsan_mutex.cc 30 CHECK(t.TryLock(m));
34 CHECK(!t.TryLock(m));
48 CHECK(t.TryLock(m));
52 CHECK(!t.TryLock(m));
66 CHECK(t.TryLock(m));
70 CHECK(!t.TryLock(m));
76 CHECK(t.TryReadLock(m));
80 CHECK(!t.TryReadLock(m));
84 CHECK(!t.TryLock(m));
88 CHECK(t.TryReadLock(m))
    [all...]
  /src/sys/arch/vax/floppy/
defboo.hp 15 D/G B 0 ! BOOT PARAMETERS: MULTI USER AFTER CHECK
  /src/tests/lib/libc/stdlib/
t_strtol.c 50 check(struct test *t, long int li, long long int lli, intmax_t ji, char *end) function
125 check(&t[i], li, lli, ji, end);
160 #define CHECK(r, f, fun) \
173 CHECK(li, "%ld", strtol);
174 CHECK(lli, "%lld", strtoll);
175 CHECK(ji, "%jd", strtoimax);
176 CHECK(uli, "%lu", strtoul);
177 CHECK(ulli, "%llu", strtoull);
178 CHECK(uji, "%ju", strtoumax);
213 check(&t[i], li, lli, ji, end)
    [all...]
  /src/usr.sbin/puffs/mount_9p/
ninebuf.c 47 #define CHECK(v) if (!(v)) abort()
194 CHECK(rv == 0);
204 CHECK(rv == 0);
214 CHECK(rv == 0);
224 CHECK(rv == 0);
234 CHECK(rv == 0);
250 CHECK(rv == 0);

Completed in 35 milliseconds

1 2 3 4 5 6