/external/libcxx/test/std/depr/depr.str.strstreams/depr.strstreambuf/depr.strstreambuf.cons/ |
custom_alloc.pass.cpp | 38 virtual int_type overflow(int_type c) function in struct:test 39 {return std::strstreambuf::overflow(c);} 47 s.overflow('a');
|
/external/llvm/test/CodeGen/ARM/ |
umulo-32.ll | 8 %tmp0 = tail call %umul.ty @llvm.umul.with.overflow.i32(i32 %a, i32 37) 14 declare %umul.ty @llvm.umul.with.overflow.i32(i32, i32) nounwind readnone 32 %5 = call %umul.ty @llvm.umul.with.overflow.i32(i32 %4, i32 8)
|
/external/valgrind/memcheck/tests/x86-solaris/ |
context_eflags.c | 43 /* Set overflow and sign flags. */ 63 printf(" overflow=%d, sign=%d\n", 67 printf(" overflow=%d, sign=%d\n", OBIT(eflags), SBIT(eflags));
|
context_eflags2.c | 52 /* Set overflow and sign flags. */ 67 /* Check that the overflow and sign flags are uninitialised. 74 /* Check that the overflow and sign flags are uninitialised. */
|
/frameworks/av/media/libstagefright/codecs/avc/enc/ |
Android.mk | 35 LOCAL_SANITIZE := signed-integer-overflow 78 LOCAL_SANITIZE := signed-integer-overflow 98 LOCAL_SANITIZE := signed-integer-overflow
|
/frameworks/av/media/libstagefright/codecs/m4v_h263/enc/ |
Android.mk | 38 LOCAL_SANITIZE := signed-integer-overflow 81 LOCAL_SANITIZE := signed-integer-overflow 97 LOCAL_SANITIZE := signed-integer-overflow
|
/ndk/sources/cxx-stl/llvm-libc++/libcxx/test/depr/depr.str.strstreams/depr.strstreambuf/depr.strstreambuf.cons/ |
custom_alloc.pass.cpp | 38 virtual int_type overflow(int_type c) function in struct:test 39 {return std::strstreambuf::overflow(c);} 47 s.overflow('a');
|
/toolchain/binutils/binutils-2.25/ld/emulparams/ |
elf32mep.sh | 19 "tiny section overflow"); 49 __assert_based_size = ASSERT ((. - __tpbase) <= 0x80, "based section overflow"); 53 __assert_near_size = ASSERT (. <= 0x1000000, "near section overflow");
|
/art/test/800-smali/smali/ |
b_24399945.smali | 16 :case3 # key = INT_MIN (overflow!)
|
/bionic/tests/ |
fortify_compilation_test.cpp | 35 // GCC: warning: call to int __builtin___sprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer 40 // GCC: warning: call to int __builtin___sprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer 49 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer 54 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer 59 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer 64 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer 73 // GCC: warning: call to void* __builtin___memcpy_chk(void*, const void*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer 82 // GCC: warning: call to void* __builtin___memmove_chk(void*, const void*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer 91 // GCC: warning: call to void* __builtin___memset_chk(void*, int, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer 100 // GCC: warning: call to {{(char\* __builtin___strcpy_chk\(char\*, const char\*, unsigned int\))|(void\* __builtin___memcpy_chk\(void\*, const void\*, (long )?unsigned int, (long )?unsigned int\))}} will always overflow destination buffe [all...] |
/external/bison/m4/ |
fpieee.m4 | 11 dnl - The overflow and division by zero behaviour: The result are values 15 dnl - A set of conditions (overflow, underflow, inexact, etc.) which can 20 dnl Ensure non-trapping behaviour of floating-point overflow and 22 dnl (For integer overflow, see gcc's -ftrapv option; for integer division by
|
/external/chromium-trace/catapult/tracing/tracing/ui/extras/chrome/cc/ |
picture_ops_chart_summary_view.css | 12 overflow: hidden;
|
/external/chromium-trace/catapult/tracing/tracing/ui/extras/chrome/gpu/ |
state_view.css | 9 overflow: auto;
|
/external/chromium-trace/catapult/tracing/tracing/ui/extras/system_stats/ |
system_stats_instance_track.css | 14 overflow: hidden;
|
/external/clang/docs/ |
UndefinedBehaviorSanitizer.rst | 16 * Signed integer overflow 18 overflow the destination 48 test.cc:3:5: runtime error: signed integer overflow: 2147483647 + 1 cannot be represented in type 'int' 61 % clang++ -fsanitize=signed-integer-overflow,null,alignment -fno-sanitize-recover=null -fsanitize-trap=alignment 83 - ``-fsanitize=float-cast-overflow``: Conversion to, from, or 84 between floating-point types which would overflow the 107 signed left shift, also checks for signed overflow in C, and for 108 unsigned overflow in C++. You can use ``-fsanitize=shift-base`` or 111 - ``-fsanitize=signed-integer-overflow``: Signed integer overflow, [all...] |
/external/clang/test/Index/ |
annotate-deep-statements.cpp | 4 // Check that we don't get stack overflow trying to annotate an extremely deep AST.
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
asan_preload_test-2.cc | 16 // CHECK: AddressSanitizer: heap-buffer-overflow
|
/external/compiler-rt/test/asan/TestCases/ |
alloca_big_alignment.cc | 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
|
alloca_overflow_partial.cc | 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
|
alloca_overflow_right.cc | 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
|
alloca_underflow_left.cc | 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
|
stack-frame-demangle.cc | 11 // CHECK: ERROR: AddressSanitizer: stack-buffer-overflow
|
stack-oob-frames.cc | 44 // CHECK0: AddressSanitizer: stack-buffer-overflow 52 // CHECK1: AddressSanitizer: stack-buffer-overflow 56 // CHECK2: AddressSanitizer: stack-buffer-overflow 60 // CHECK3: AddressSanitizer: stack-buffer-overflow
|
/external/compiler-rt/test/ubsan/TestCases/Misc/Linux/ |
ubsan_options.cc | 15 // CHECK: ubsan_options.cc:[[@LINE-1]]:44: runtime error: unsigned integer overflow
|
/external/icu/android_icu4j/cts-coverage/src/main/tests/android/icu/cts/coverage/text/ |
AlphabeticIndexTest.java | 63 index.setOverflowLabel("overflow"); 79 case OVERFLOW: 95 assertEquals("overflow", overflowBucket.getLabel()); 96 assertEquals("overflow", index.getOverflowLabel());
|