HomeSort by relevance Sort by last modified time
    Searched full:overflow (Results 226 - 250 of 9855) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/libcxx/test/std/depr/depr.str.strstreams/depr.strstreambuf/depr.strstreambuf.cons/
custom_alloc.pass.cpp 38 virtual int_type overflow(int_type c) function in struct:test
39 {return std::strstreambuf::overflow(c);}
47 s.overflow('a');
  /external/llvm/test/CodeGen/ARM/
umulo-32.ll 8 %tmp0 = tail call %umul.ty @llvm.umul.with.overflow.i32(i32 %a, i32 37)
14 declare %umul.ty @llvm.umul.with.overflow.i32(i32, i32) nounwind readnone
32 %5 = call %umul.ty @llvm.umul.with.overflow.i32(i32 %4, i32 8)
  /external/valgrind/memcheck/tests/x86-solaris/
context_eflags.c 43 /* Set overflow and sign flags. */
63 printf(" overflow=%d, sign=%d\n",
67 printf(" overflow=%d, sign=%d\n", OBIT(eflags), SBIT(eflags));
context_eflags2.c 52 /* Set overflow and sign flags. */
67 /* Check that the overflow and sign flags are uninitialised.
74 /* Check that the overflow and sign flags are uninitialised. */
  /frameworks/av/media/libstagefright/codecs/avc/enc/
Android.mk 35 LOCAL_SANITIZE := signed-integer-overflow
78 LOCAL_SANITIZE := signed-integer-overflow
98 LOCAL_SANITIZE := signed-integer-overflow
  /frameworks/av/media/libstagefright/codecs/m4v_h263/enc/
Android.mk 38 LOCAL_SANITIZE := signed-integer-overflow
81 LOCAL_SANITIZE := signed-integer-overflow
97 LOCAL_SANITIZE := signed-integer-overflow
  /ndk/sources/cxx-stl/llvm-libc++/libcxx/test/depr/depr.str.strstreams/depr.strstreambuf/depr.strstreambuf.cons/
custom_alloc.pass.cpp 38 virtual int_type overflow(int_type c) function in struct:test
39 {return std::strstreambuf::overflow(c);}
47 s.overflow('a');
  /toolchain/binutils/binutils-2.25/ld/emulparams/
elf32mep.sh 19 "tiny section overflow");
49 __assert_based_size = ASSERT ((. - __tpbase) <= 0x80, "based section overflow");
53 __assert_near_size = ASSERT (. <= 0x1000000, "near section overflow");
  /art/test/800-smali/smali/
b_24399945.smali 16 :case3 # key = INT_MIN (overflow!)
  /bionic/tests/
fortify_compilation_test.cpp 35 // GCC: warning: call to int __builtin___sprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
40 // GCC: warning: call to int __builtin___sprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
49 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
54 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
59 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
64 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
73 // GCC: warning: call to void* __builtin___memcpy_chk(void*, const void*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
82 // GCC: warning: call to void* __builtin___memmove_chk(void*, const void*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
91 // GCC: warning: call to void* __builtin___memset_chk(void*, int, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
100 // GCC: warning: call to {{(char\* __builtin___strcpy_chk\(char\*, const char\*, unsigned int\))|(void\* __builtin___memcpy_chk\(void\*, const void\*, (long )?unsigned int, (long )?unsigned int\))}} will always overflow destination buffe
    [all...]
  /external/bison/m4/
fpieee.m4 11 dnl - The overflow and division by zero behaviour: The result are values
15 dnl - A set of conditions (overflow, underflow, inexact, etc.) which can
20 dnl Ensure non-trapping behaviour of floating-point overflow and
22 dnl (For integer overflow, see gcc's -ftrapv option; for integer division by
  /external/chromium-trace/catapult/tracing/tracing/ui/extras/chrome/cc/
picture_ops_chart_summary_view.css 12 overflow: hidden;
  /external/chromium-trace/catapult/tracing/tracing/ui/extras/chrome/gpu/
state_view.css 9 overflow: auto;
  /external/chromium-trace/catapult/tracing/tracing/ui/extras/system_stats/
system_stats_instance_track.css 14 overflow: hidden;
  /external/clang/docs/
UndefinedBehaviorSanitizer.rst 16 * Signed integer overflow
18 overflow the destination
48 test.cc:3:5: runtime error: signed integer overflow: 2147483647 + 1 cannot be represented in type 'int'
61 % clang++ -fsanitize=signed-integer-overflow,null,alignment -fno-sanitize-recover=null -fsanitize-trap=alignment
83 - ``-fsanitize=float-cast-overflow``: Conversion to, from, or
84 between floating-point types which would overflow the
107 signed left shift, also checks for signed overflow in C, and for
108 unsigned overflow in C++. You can use ``-fsanitize=shift-base`` or
111 - ``-fsanitize=signed-integer-overflow``: Signed integer overflow,
    [all...]
  /external/clang/test/Index/
annotate-deep-statements.cpp 4 // Check that we don't get stack overflow trying to annotate an extremely deep AST.
  /external/compiler-rt/test/asan/TestCases/Linux/
asan_preload_test-2.cc 16 // CHECK: AddressSanitizer: heap-buffer-overflow
  /external/compiler-rt/test/asan/TestCases/
alloca_big_alignment.cc 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
alloca_overflow_partial.cc 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
alloca_overflow_right.cc 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
alloca_underflow_left.cc 11 // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
stack-frame-demangle.cc 11 // CHECK: ERROR: AddressSanitizer: stack-buffer-overflow
stack-oob-frames.cc 44 // CHECK0: AddressSanitizer: stack-buffer-overflow
52 // CHECK1: AddressSanitizer: stack-buffer-overflow
56 // CHECK2: AddressSanitizer: stack-buffer-overflow
60 // CHECK3: AddressSanitizer: stack-buffer-overflow
  /external/compiler-rt/test/ubsan/TestCases/Misc/Linux/
ubsan_options.cc 15 // CHECK: ubsan_options.cc:[[@LINE-1]]:44: runtime error: unsigned integer overflow
  /external/icu/android_icu4j/cts-coverage/src/main/tests/android/icu/cts/coverage/text/
AlphabeticIndexTest.java 63 index.setOverflowLabel("overflow");
79 case OVERFLOW:
95 assertEquals("overflow", overflowBucket.getLabel());
96 assertEquals("overflow", index.getOverflowLabel());

Completed in 1569 milliseconds

1 2 3 4 5 6 7 8 91011>>