/third_party/skia/buildtools/checkdeps/ |
H A D | results.py | 13 """A single dependency violation.""" 16 # The include or import path that is in violation of a rule. 38 def AddViolation(self, violation): 39 """Adds a violation.""" 40 self.violations.append(violation) 80 for violation in dependee_status.violations: 81 lines.append(self.FormatViolation(violation, self.verbose)) 85 def FormatViolation(violation, verbose=False): 88 lines.append(' For %s' % violation.rules) 91 (violation [all...] |
H A D | cpp_checker.py | 109 is_include, violation = self.CheckLine(rules, line, filepath) 112 if violation: 113 dependee_status.AddViolation(violation)
|
H A D | proto_checker.py | 103 is_import, violation = self.CheckLine(rules, line, filepath) 106 if violation: 107 dependee_status.AddViolation(violation)
|
H A D | checkdeps.py | 127 is_include, violation = checker.CheckLine( 129 if not violation: 131 rule_type = violation.violated_rule.allow 135 violation, self.verbose) 232 help='Count #includes in violation of intended rules.')
|
H A D | java_checker.py | 172 is_import, violation = self.CheckLine(rules, line, filepath) 173 if violation: 174 dependee_status.AddViolation(violation)
|
/third_party/vk-gl-cts/external/vulkancts/framework/vulkan/ |
H A D | vkAllocationCallbackUtil.cpp | 712 std::ostream& operator<< (std::ostream& str, const AllocationCallbackViolation& violation) in operator <<() argument 714 switch (violation.reason) in operator <<() 718 DE_ASSERT(violation.record.type == AllocationCallbackRecord::TYPE_FREE); in operator <<() 719 str << "Double free of " << tcu::toHex(violation.record.data.free.mem); in operator <<() 725 DE_ASSERT(violation.record.type == AllocationCallbackRecord::TYPE_FREE); in operator <<() 726 str << "Attempt to free " << tcu::toHex(violation.record.data.free.mem) << " which has not been allocated"; in operator <<() 732 DE_ASSERT(violation.record.type == AllocationCallbackRecord::TYPE_REALLOCATION); in operator <<() 733 str << "Attempt to reallocate " << tcu::toHex(violation.record.data.reallocation.original) << " which has not been allocated"; in operator <<() 739 DE_ASSERT(violation.record.type == AllocationCallbackRecord::TYPE_REALLOCATION); in operator <<() 740 str << "Attempt to reallocate " << tcu::toHex(violation in operator <<() [all...] |
H A D | vkAllocationCallbackUtil.hpp | 232 std::ostream& operator<< (std::ostream& str, const AllocationCallbackViolation& violation);
|
/third_party/node/deps/v8/src/torque/ |
H A D | declarable.cc | 126 if (auto violation = constraints[i].IsViolated(types[i])) { in FindConstraintViolation() 127 return {"Could not instantiate generic, " + *violation + "."}; in FindConstraintViolation() 158 if (auto violation = in InferSpecializationTypes() 160 inference.Fail(*violation); in InferSpecializationTypes()
|
H A D | declarable.h | 576 if (auto violation = in AddSpecialization() 578 Error(*violation).Throw(); in AddSpecialization()
|
/third_party/selinux/libsepol/src/ |
H A D | hierarchy.c | 525 ERR(a->handle, "Role bounds violation, %s exceeds %s", in bounds_check_role_callback() 568 ERR(a->handle, "User bounds violation, %s exceeds %s", in bounds_check_user_callback() 672 int violation = 0; in hierarchy_check_constraints() local 679 violation = 1; in hierarchy_check_constraints() 683 violation = 1; in hierarchy_check_constraints() 688 violation = 1; in hierarchy_check_constraints() 693 if (violation) in hierarchy_check_constraints()
|
/third_party/vk-gl-cts/modules/glshared/ |
H A D | glsFboUtil.cpp | 781 // rule violation exists? in isFBOStatusValid() 806 // rule violation exists? in isErrorCodeValid() 909 // rule violation already exists? in addViolation() 919 // new violation in addViolation() 921 RuleViolation violation; in addViolation() local 923 violation.errorCode = code; in addViolation() 924 violation.rules.insert(std::string(description)); in addViolation() 926 dst.push_back(violation); in addViolation()
|
/third_party/selinux/libsepol/cil/src/ |
H A D | cil_binary.c | 4790 static int cil_check_neverallow(const struct cil_db *db, policydb_t *pdb, struct cil_tree_node *node, int *violation) in cil_check_neverallow() argument 4831 *violation = CIL_TRUE; in cil_check_neverallow() 4853 *violation = CIL_TRUE; in cil_check_neverallow() 4877 static int cil_check_neverallows(const struct cil_db *db, policydb_t *pdb, struct cil_list *neverallows, int *violation) in cil_check_neverallows() argument 4883 rc = cil_check_neverallow(db, pdb, item->data, violation); in cil_check_neverallows() 4946 static int cil_check_type_bounds(const struct cil_db *db, policydb_t *pdb, void *type_value_to_cil, struct cil_class *class_value_to_cil[], struct cil_perm **perm_value_to_cil[], int *violation) in cil_check_type_bounds() argument 4976 *violation = CIL_TRUE; in cil_check_type_bounds() 5158 int violation = CIL_FALSE; in cil_binary_create_allocated_pdb() local 5160 rc = cil_check_neverallows(db, pdb, neverallows, &violation); in cil_binary_create_allocated_pdb() 5166 violation in cil_binary_create_allocated_pdb() [all...] |
/third_party/rust/crates/memchr/bench/data/code/ |
H A D | rust-library.rs | [all...] |