/external/clang/test/CodeGen/ |
ubsan-blacklist.c | 4 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -emit-llvm %s -o - | FileCheck %s --check-prefix=DEFAULT 5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC 6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE
|
builtins-overflow.c | 1 // Test CodeGen for Security Check Overflow Builtins. 19 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.uadd.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 33 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.sadd.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 47 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.usub.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 61 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.ssub.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 75 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 89 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.smul.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 104 // CHECK: [[S:%.+]] = call { i33, i1 } @llvm.sadd.with.overflow.i33(i33 [[XE]], i33 [[YE]]) 122 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.uadd.with.overflow.i32(i32 %{{.+}}, i32 %{{.+}}) 142 // CHECK: [[S:%.+]] = call { i32, i1 } @llvm.uadd.with.overflow.i32(i32 [[XE]], i32 [[YE]] [all...] |
sanitize-recover.c | 1 // RUN: %clang_cc1 -triple x86_64-apple-darwin10 -fsanitize=unsigned-integer-overflow -fsanitize-recover=unsigned-integer-overflow %s -emit-llvm -o - | FileCheck %s --check-prefix=RECOVER 2 // RUN: %clang_cc1 -triple x86_64-apple-darwin10 -fsanitize=unsigned-integer-overflow %s -emit-llvm -o - | FileCheck %s --check-prefix=ABORT 10 // RECOVER: uadd.with.overflow.i32 13 // ABORT: uadd.with.overflow.i32
|
unsigned-overflow.c | 1 // RUN: %clang_cc1 -triple x86_64-apple-darwin10 -fsanitize=unsigned-integer-overflow %s -emit-llvm -o - | FileCheck %s 16 // CHECK-NEXT: [[T3:%.*]] = call { i64, i1 } @llvm.uadd.with.overflow.i64(i64 [[T1]], i64 [[T2]]) 28 // CHECK-NEXT: [[T3:%.*]] = call { i64, i1 } @llvm.usub.with.overflow.i64(i64 [[T1]], i64 [[T2]]) 40 // CHECK-NEXT: [[T3:%.*]] = call { i64, i1 } @llvm.umul.with.overflow.i64(i64 [[T1]], i64 [[T2]]) 52 // CHECK-NEXT: [[T2:%.*]] = call { i64, i1 } @llvm.uadd.with.overflow.i64(i64 [[T1]], i64 1) 63 // CHECK-NEXT: [[T2:%.*]] = call { i64, i1 } @llvm.uadd.with.overflow.i64(i64 [[T1]], i64 1) 74 // CHECK-NEXT: [[T3:%.*]] = call { i32, i1 } @llvm.uadd.with.overflow.i32(i32 [[T1]], i32 [[T2]]) 86 // CHECK-NEXT: [[T3:%.*]] = call { i32, i1 } @llvm.usub.with.overflow.i32(i32 [[T1]], i32 [[T2]]) 98 // CHECK-NEXT: [[T3:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[T1]], i32 [[T2]]) 110 // CHECK-NEXT: [[T2:%.*]] = call { i32, i1 } @llvm.uadd.with.overflow.i32(i32 [[T1]], i32 1 [all...] |
/external/compiler-rt/test/asan/TestCases/ |
intra-object-overflow.cc | 16 // CHECK: ERROR: AddressSanitizer: intra-object-overflow 17 // CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cc:[[@LINE-2]] 28 // CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cc:[[@LINE-1]]
|
strtol_strict.c | 32 // Buffer overflow if there is no terminating null (depends on base) 39 // Buffer overflow if there is no terminating null (depends on base) 56 // Buffer overflow if base is invalid. 68 fprintf(stderr, "ERROR: AddressSanitizer: heap-buffer-overflow on address\n"); 74 // Buffer overflow if base is invalid. 80 // Overflow if no digits are found. 89 // Overflow if no digits are found. 98 // Overflow if no digits are found. 113 // CHECK1: {{.*ERROR: AddressSanitizer: heap-buffer-overflow on address}} 116 // CHECK2: {{.*ERROR: AddressSanitizer: heap-buffer-overflow on address} [all...] |
/external/llvm/test/CodeGen/X86/ |
umul-with-carry.ll | 4 ; FIXME: umul-with-overflow not supported yet. 11 %t = call {i32, i1} @llvm.umul.with.overflow.i32(i32 %v1, i32 %v2) 26 declare {i32, i1} @llvm.umul.with.overflow.i32(i32, i32)
|
add.ll | 30 %t = call {i32, i1} @llvm.sadd.with.overflow.i32(i32 %v1, i32 %v2) 33 br i1 %obit, label %overflow, label %normal 37 br label %overflow 39 overflow: 53 %t = call {i32, i1} @llvm.uadd.with.overflow.i32(i32 %v1, i32 %v2) 74 declare {i32, i1} @llvm.sadd.with.overflow.i32(i32, i32) 75 declare {i32, i1} @llvm.uadd.with.overflow.i32(i32, i32) 97 %t = call {i32, i1} @llvm.uadd.with.overflow.i32(i32 %v1, i32 %v2) 113 %overflow = and i65 %sum, -18446744073709551616 114 %res.1 = icmp ne i65 %overflow, [all...] |
/external/llvm/test/Transforms/InstCombine/ |
sdiv-2.ll | 14 br i1 %2, label %overflow, label %bb7 20 br i1 %5, label %overflow, label %bb8 26 overflow: ; preds = %bb7, %bb5
|
/external/v8/test/mjsunit/ |
number-literal.js | 21 test('overflow-inf', '1e2000', 'Infinity'); 22 test('overflow-inf-exact', '1.797693134862315808e+308', 'Infinity'); 23 test('non-overflow-inf-exact', '1.797693134862315807e+308',
|
math-floor-negative.js | 31 // Trigger overflow when converting/truncating double to integer. 32 // Divide by 10 to avoid overflow when smi-tagging at the end. 37 // Trigger no overflow. 42 // Trigger overflow when compensating by subtracting after compare. 43 // Divide by 10 to avoid overflow when smi-tagging at the end.
|
/external/valgrind/none/tests/linux/ |
Makefile.am | 18 stack-overflow.stderr.exp stack-overflow.vgtest 31 stack-overflow
|
/frameworks/av/media/libstagefright/rtsp/ |
Android.mk | 36 LOCAL_SANITIZE := unsigned-integer-overflow signed-integer-overflow 62 LOCAL_SANITIZE := signed-integer-overflow
|
/external/compiler-rt/test/ubsan/TestCases/Float/ |
cast-overflow.cpp | 1 // RUN: %clangxx -fsanitize=float-cast-overflow %s -o %t 85 // Floating point -> integer overflow. 89 // CHECK-0: {{.*}}cast-overflow.cpp:[[@LINE+1]]:27: runtime error: value 2.14748{{.*}} is outside the range of representable values of type 'int' 91 // CHECK-0: SUMMARY: {{.*}}Sanitizer: float-cast-overflow {{.*}}cast-overflow.cpp:[[@LINE-1]] 95 // CHECK-1: {{.*}}cast-overflow.cpp:[[@LINE+1]]:27: runtime error: value -2.14748{{.*}} is outside the range of representable values of type 'int' 100 // CHECK-2: {{.*}}cast-overflow.cpp:[[@LINE+2]]:37: runtime error: value -1 is outside the range of representable values of type 'unsigned int' 106 // CHECK-3: {{.*}}cast-overflow.cpp:[[@LINE+1]]:37: runtime error: value 4.2949{{.*}} is outside the range of representable values of type 'unsigned int' 112 // CHECK-4: {{.*}}cast-overflow.cpp:[[@LINE+1]]:27: runtime error: value {{.*}} is outside the range of representable values of type 'int' 117 // CHECK-5: {{.*}}cast-overflow.cpp:[[@LINE+1]]:27: runtime error: value {{.*}} is outside the range of representable values of ty (…) [all...] |
/external/v8/test/webkit/fast/js/ |
stack-overflow-arrity-catch.js | 24 description('Test that if an arrity check causes a stack overflow, the exception goes to the right catch'); 40 // Should get here because of stack overflow, 41 // now cause a stack overflow exception due to arrity processing 71 // Should get here because of stack overflow, 72 // now cause a stack overflow exception due to arrity processing
|
/external/clang/test/Sema/ |
switch-1.c | 12 // expected-warning@-2 {{overflow in expression; result is -2147483647 with type 'int'}} 20 // expected-warning@-2 {{overflow in expression; result is -4 with type 'long'}} 28 // expected-warning@-2 {{overflow in expression; result is -1375982336 with type 'int'}} 36 // expected-warning@-2 {{overflow in expression; result is -4 with type 'int'}} 43 // expected-warning@-2 {{overflow in expression; result is -4 with type 'int'}} 52 return (i, 65537) * 65537; // expected-warning {{overflow in expression; result is 131073 with type 'int'}} \ 57 unsigned long long l = 65536 * 65536; // expected-warning {{overflow in expression; result is 0 with type 'int'}}
|
/external/libvpx/libvpx/vpx_dsp/x86/ |
fwd_txfm_sse2.h | 223 int overflow = k_check_epi32_overflow_4(preg0, preg1, preg2, preg3, zero); local 224 if (!overflow) { 225 overflow = k_check_epi32_overflow_4(preg4, preg5, preg6, preg7, zero); 227 return overflow; 247 int overflow = k_check_epi32_overflow_4(preg0, preg1, preg2, preg3, zero); local 248 if (!overflow) { 249 overflow = k_check_epi32_overflow_4(preg4, preg5, preg6, preg7, zero); 250 if (!overflow) { 251 overflow = k_check_epi32_overflow_4(preg8, preg9, preg10, preg11, 253 if (!overflow) { 295 int overflow = k_check_epi32_overflow_4(preg0, preg1, preg2, preg3, zero); local [all...] |
/external/llvm/test/CodeGen/AMDGPU/ |
saddo.ll | 5 declare { i32, i1 } @llvm.sadd.with.overflow.i32(i32, i32) nounwind readnone 6 declare { i64, i1 } @llvm.sadd.with.overflow.i64(i64, i64) nounwind readnone 10 %sadd = call { i64, i1 } @llvm.sadd.with.overflow.i64(i64 %a, i64 %b) nounwind 21 %sadd = call { i32, i1 } @llvm.sadd.with.overflow.i32(i32 %a, i32 %b) nounwind 33 %sadd = call { i32, i1 } @llvm.sadd.with.overflow.i32(i32 %a, i32 %b) nounwind 43 %sadd = call { i64, i1 } @llvm.sadd.with.overflow.i64(i64 %a, i64 %b) nounwind 57 %sadd = call { i64, i1 } @llvm.sadd.with.overflow.i64(i64 %a, i64 %b) nounwind
|
ssubo.ll | 5 declare { i32, i1 } @llvm.ssub.with.overflow.i32(i32, i32) nounwind readnone 6 declare { i64, i1 } @llvm.ssub.with.overflow.i64(i64, i64) nounwind readnone 10 %ssub = call { i64, i1 } @llvm.ssub.with.overflow.i64(i64 %a, i64 %b) nounwind 21 %ssub = call { i32, i1 } @llvm.ssub.with.overflow.i32(i32 %a, i32 %b) nounwind 33 %ssub = call { i32, i1 } @llvm.ssub.with.overflow.i32(i32 %a, i32 %b) nounwind 45 %ssub = call { i64, i1 } @llvm.ssub.with.overflow.i64(i64 %a, i64 %b) nounwind 59 %ssub = call { i64, i1 } @llvm.ssub.with.overflow.i64(i64 %a, i64 %b) nounwind
|
/art/runtime/arch/mips/ |
fault_handler_mips.cc | 53 // In the case of a stack overflow, the stack is not valid and we can't 95 // Stack overflow fault handler. 98 // minus the overflow region size (16K typically). The instruction that 105 // If we determine this is a stack overflow we need to move the stack pointer 106 // to the overflow region below the protected region. 111 VLOG(signals) << "stack overflow handler with sp at " << std::hex << &uc; 119 VLOG(signals) << "checking for stack overflow, sp: " << std::hex << sp << 124 // Check that the fault address is the value expected for a stack overflow. 126 VLOG(signals) << "Not a stack overflow"; 130 VLOG(signals) << "Stack overflow found" [all...] |
/art/runtime/arch/mips64/ |
fault_handler_mips64.cc | 53 // In the case of a stack overflow, the stack is not valid and we can't 95 // Stack overflow fault handler. 98 // minus the overflow region size (16K typically). The instruction that 105 // If we determine this is a stack overflow we need to move the stack pointer 106 // to the overflow region below the protected region. 111 VLOG(signals) << "stack overflow handler with sp at " << std::hex << &uc; 119 VLOG(signals) << "checking for stack overflow, sp: " << std::hex << sp << 124 // Check that the fault address is the value expected for a stack overflow. 126 VLOG(signals) << "Not a stack overflow"; 130 VLOG(signals) << "Stack overflow found" [all...] |
/libcore/luni/src/test/java/libcore/java/lang/ |
MathTest.java | 52 fail(); // This is not an overflow 64 fail(); // This is not an overflow 75 fail(); // This is not an overflow 86 fail(); // This is not an overflow 97 fail(); // This is not an overflow 108 fail(); // This is not an overflow 141 fail(); // This is not an overflow 152 fail(); // This is not an overflow 163 fail(); // This is not an overflow 174 fail(); // This is not an overflow [all...] |
/external/compiler-rt/lib/ubsan/ |
ubsan_checks.inc | 24 UBSAN_CHECK(SignedIntegerOverflow, "signed-integer-overflow", 25 "signed-integer-overflow") 26 UBSAN_CHECK(UnsignedIntegerOverflow, "unsigned-integer-overflow", 27 "unsigned-integer-overflow") 37 UBSAN_CHECK(FloatCastOverflow, "float-cast-overflow", "float-cast-overflow")
|
/frameworks/av/media/libstagefright/codecs/aacenc/ |
Android.mk | 79 LOCAL_SANITIZE := signed-integer-overflow unsigned-integer-overflow 107 LOCAL_SANITIZE := signed-integer-overflow unsigned-integer-overflow 133 LOCAL_SANITIZE := signed-integer-overflow unsigned-integer-overflow
|
/external/eigen/test/ |
sizeoverflow.cpp | 41 // there are 2 levels of overflow checking. first in PlainObjectBase.h we check for overflow in rows*cols computations. 43 // Then in Memory.h we check for overflow in size * sizeof(T) computations.
|