Home
last modified time | relevance | path

Searched full:bad (Results 1 – 25 of 250) sorted by relevance

12345678910

/Zephyr-latest/tests/kernel/device/src/
Dmmio.c84 zassert_equal(rom->phys_addr, DT_INST_REG_ADDR(0), "bad phys_addr"); in ZTEST()
85 zassert_equal(rom->size, DT_INST_REG_SIZE(0), "bad size"); in ZTEST()
91 zassert_equal(rom->addr, DT_INST_REG_ADDR(0), "bad addr"); in ZTEST()
92 zassert_equal(regs, rom->addr, "bad regs"); in ZTEST()
172 zassert_not_equal(regs_corge, 0, "bad regs_corge"); in ZTEST()
173 zassert_not_equal(regs_grault, 0, "bad regs_grault"); in ZTEST()
177 "bad phys_addr (corge)"); in ZTEST()
179 "bad size (corge)"); in ZTEST()
181 "bad phys_addr (grault)"); in ZTEST()
183 "bad size (grault)"); in ZTEST()
[all …]
Dmmio_multireg.c74 zassert_not_equal(regs_chip, 0, "bad regs_chip"); in ZTEST()
75 zassert_not_equal(regs_dale, 0, "bad regs_dale"); in ZTEST()
79 "bad phys_addr (chip)"); in ZTEST()
81 "bad size (chip)"); in ZTEST()
83 "bad phys_addr (dale)"); in ZTEST()
85 "bad size (dale)"); in ZTEST()
88 "bad addr (chip)"); in ZTEST()
89 zassert_equal(regs_chip, rom_chip->addr, "bad regs (chip)"); in ZTEST()
91 "bad addr (dale)"); in ZTEST()
92 zassert_equal(regs_dale, rom_dale->addr, "bad regs (dale)"); in ZTEST()
/Zephyr-latest/scripts/ci/
Dpylintrc71 bad-classmethod-argument,
72 bad-mcs-method-argument,
73 bad-mcs-classmethod-argument,
94 bad-reversed-sequence,
122 bad-except-order,
123 raising-bad-type,
124 bad-exception-context,
129 bad-super-call,
156 bad-format-character,
163 bad-string-format-type,
[all …]
/Zephyr-latest/tests/subsys/fs/littlefs/src/
Dtest_util.c33 "bad root init return"); in ZTEST()
34 zassert_str_equal(path.path, "/", "bad root init path"); in ZTEST()
38 "bad mnt init return"); in ZTEST()
39 zassert_str_equal(path.path, mnt.mnt_point, "bad mnt init path"); in ZTEST()
67 "bad overrun init return"); in ZTEST()
69 "bad overrun init"); in ZTEST()
72 "bad overrun path"); in ZTEST()
80 MNT "/" ELT1, "bad mnt init elt1"); in ZTEST()
83 MNT "/" ELT1 "/" ELT2, "bad mnt init elt1 elt2"); in ZTEST()
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/test_scripts/
Drun_test_tolerate_pipeline_variant_rx_tx_prio_invert.sh11 # peer while a bad peer tries to spam ATT requests.
22 # - The bad peer spams ATT requests as fast as possible.
25 # - Either: The DUT may disconnect the bad peer ACL after
26 # receiving a protocol violation occurs. The bad peer shall
27 # be able to reconnect and continue the bad behavior.
/Zephyr-latest/scripts/tests/twister/
Dtest_quarantine.py191 'very bad dummy platform',
197 'bad scenario 1',
200 'bad sim',
204 'bad scenario 1',
227 'not quarantined with bad scenario',
241 platforms=['very bad dummy platform'],
246 scenarios=['bad scenario 1', 'bad scenario 2'],
249 simulations=['bad sim']
/Zephyr-latest/tests/subsys/settings_commit_prio/src/
Dmain.c19 zassert_equal(prio, 0, "Bad commit order"); in commit0()
27 zassert_equal(prio, 1, "Bad commit order"); in commit1()
35 zassert_equal(prio, 2, "Bad commit order"); in commit2()
43 zassert_equal(prio, 3, "Bad commit order"); in commit3()
51 zassert_equal(prio, 0, "Bad commit order"); in commit5()
/Zephyr-latest/tests/net/socket/socketpair/src/
Dexpected_failures.c22 zassert_equal(res, -1, "socketpair should fail with bad address family"); in ZTEST_USER_F()
24 "errno should be EAFNOSUPPORT with bad address family"); in ZTEST_USER_F()
36 "errno should be EPROTOTYPE with bad socket type"); in ZTEST_USER_F()
48 "errno should be EPROTONOSUPPORT with bad protocol"); in ZTEST_USER_F()
61 "errno should be EFAULT with bad socket vector"); in ZTEST_USER_F()
/Zephyr-latest/scripts/dts/python-devicetree/tests/test-bindings-include/
Dinclude-invalid-keys.yaml9 bad-key-1: 3
10 bad-key-2: 3
/Zephyr-latest/tests/subsys/settings/fcb/src/
Dsettings_test_save_2_fcb.c58 zassert_true(val8 == 42U, "bad value read"); in ZTEST()
59 zassert_str_equal(val_string[0], test_ref_value[0], "bad value read"); in ZTEST()
82 "bad value read"); in ZTEST()
83 zassert_true(val8 == 42U, "bad value read"); in ZTEST()
Dsettings_test_delete_fcb.c41 zassert_true(val8 == 153U, "bad value read"); in ZTEST()
48 zassert_true(val8 == 0x55, "bad value read"); in ZTEST()
Dsettings_test_save_one_fcb.c47 zassert_true(val8 == 42U, "bad value read"); in ZTEST()
54 zassert_true(val8 == 44U, "bad value read"); in ZTEST()
/Zephyr-latest/tests/net/offloaded_netdev/src/
Dmain.c155 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST()
157 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST()
166 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST()
168 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST()
217 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST()
219 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST()
228 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST()
230 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST()
280 "Bad transition-count, offload_impl_enable not called correctly"); in ZTEST()
282 "Bad up-count, offload_impl_enable not called correctly"); in ZTEST()
[all …]
/Zephyr-latest/tests/subsys/settings/file/src/
Dsettings_test_compress_file.c55 zassert_true(val8 == i, "Bad value loaded"); in ZTEST()
66 zassert_true(rc == 0, "bad value read"); in ZTEST()
76 zassert_true(val64 == i, "Bad value loaded"); in ZTEST()
83 zassert_true(rc == 0, "bad value read"); in ZTEST()
Dsettings_test_save_in_file.c42 zassert_true(rc == 0, "bad value read"); in ZTEST()
50 zassert_true(rc == 0, "bad value read"); in ZTEST()
Dsettings_test_save_one_file.c45 zassert_true(val8 == 42U, "bad value read"); in ZTEST()
52 zassert_true(val8 == 44U, "bad value read"); in ZTEST()
/Zephyr-latest/tests/bsim/bluetooth/host/att/pipeline/dut/src/
Dmain.c296 struct bt_conn *good, *bad; in dut_procedure() local
305 LOG_DBG("Central: Connect to bad peer"); in dut_procedure()
306 bad = connect(); in dut_procedure()
310 do_dlu(bad); in dut_procedure()
311 send_write_handle(bad); in dut_procedure()
330 * - a "bad" peer, spamming ATT requests as fast as possible. in test_procedure_0()
333 * The bad peer uses the tinyhost (raw hci) to send requests. in test_procedure_0()
335 * The DUT is allowed to disconnect the ACL of the bad peer. in test_procedure_0()
336 * If that happens, the bad peer will reconnect and continue. in test_procedure_0()
343 * - Bad peer sends ATT requests as fast as it can in test_procedure_0()
/Zephyr-latest/tests/bsim/bluetooth/host/security/ccc_update/src/
Dperipheral.c198 /* check that subscribtion is restored for bad client */ in connect_wait_unsubscribtion()
200 FAIL("Subscribtion has not been restored for bad client\n"); in connect_wait_unsubscribtion()
203 /* confirm to bad client that the subscribtion had not been restored */ in connect_wait_unsubscribtion()
205 /* wait for confirmation that bad client requested unsubscribtion */ in connect_wait_unsubscribtion()
210 FAIL("Bad client didn't manage to update CCC config\n"); in connect_wait_unsubscribtion()
213 /* confirm to bad client that unsubscribtion request has been well registered */ in connect_wait_unsubscribtion()
294 * test pass if the bad client manage to unsubscribe in run_peripheral()
/Zephyr-latest/drivers/firmware/scmi/
Dmailbox.h76 "bad bidirectional channel description"); \
81 "bad unidirectional channel description"); \
84 "bad SHMEM count"); \
87 "bad mbox count"); \
/Zephyr-latest/subsys/net/ip/
Dicmpv4.h23 #define NET_ICMPV4_BAD_IP_HEADER 12 /* Bad IP header */
28 #define NET_ICMPV4_BAD_IP_HEADER_LENGTH 2 /* Bad length field */
/Zephyr-latest/tests/kernel/common/src/
Dmain.c58 zassert_equal(index, 17, "bad index"); in ZTEST()
62 zassert_equal(index, 0, "bad index"); in ZTEST()
/Zephyr-latest/tests/arch/common/semihost/src/
Dmain.c20 zassert_true(fd > 0, "Bad handle (%d)", fd); in ZTEST()
38 zassert_true(fd > 0, "Bad handle (%d)", fd); in ZTEST()
66 zassert_true(fd > 0, "Bad handle (%d)", fd); in ZTEST()
/Zephyr-latest/drivers/ipm/
Dipm_sedi.c120 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_send()
129 LOG_ERR("bad params when sending ipm msg on device: %p", dev); in ipm_sedi_send()
195 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_register_callback()
200 LOG_ERR("bad params when add ipm callback on device: %p", dev); in ipm_sedi_register_callback()
216 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_complete()
243 __ASSERT((dev != NULL), "bad params\n"); in ipm_sedi_set_enable()
/Zephyr-latest/tests/drivers/charger/sbs_charger/src/
Dtest_sbs_charger.c42 zassert_equal(ret, -ENOTSUP, "Getting bad property %d has a good status.", prop); in ZTEST_USER_F()
64 zassert_equal(ret, -ENOTSUP, "Setting bad property %d has a good status.", prop); in ZTEST_USER_F()
/Zephyr-latest/tests/subsys/fs/common/
Dtest_fs_basic.c68 "stat written hello bad size"); in create_write_hello()
144 "stat old hello bad size"); in seek_within_hello()
209 "stat old hello bad size"); in truncate_hello()
233 "stat open 3/4 bad size"); in truncate_hello()
248 "stat closed truncated bad size"); in truncate_hello()
337 "stat sync bad size"); in sync_goodbye()

12345678910