HomeSort by relevance Sort by last modified time
    Searched full:overflow (Results 601 - 625 of 9855) sorted by null

<<21222324252627282930>>

  /prebuilts/ndk/current/platforms/android-23/arch-mips/usr/include/machine/
fenv.h 48 * 14 -> cause bit for overflow exception
53 * 9 -> enable exception for overflow exception
58 * 4 -> flag overflow exception
  /prebuilts/ndk/current/platforms/android-23/arch-mips64/usr/include/machine/
fenv.h 48 * 14 -> cause bit for overflow exception
53 * 9 -> enable exception for overflow exception
58 * 4 -> flag overflow exception
  /prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/machine/
fenv.h 49 * * [10] - OFE, Overflow exception trap;
58 * * [28] - V, Overflow conditon flag for AArch32 (AArch64 sets PSTATE.V);
65 * * [2] - OFC, Overflow cumulative exception;
  /prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/machine/
fenv.h 48 * 14 -> cause bit for overflow exception
53 * 9 -> enable exception for overflow exception
58 * 4 -> flag overflow exception
  /prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/machine/
fenv.h 48 * 14 -> cause bit for overflow exception
53 * 9 -> enable exception for overflow exception
58 * 4 -> flag overflow exception
  /system/core/libutils/tests/
Vector_test.cpp 107 // overflow : the size here will be (1 + SIZE_MAX).
116 // This should fail because the calculated capacity will overflow even though
128 // EXPECT_DEATH(vector.insertArrayAt(NULL, 0, (SIZE_MAX / 2)), "new_alloc_size overflow");
  /art/runtime/arch/arm64/
fault_handler_arm64.cc 67 // In the case of a stack overflow, the stack is not valid and we can't
166 VLOG(signals) << "stack overflow handler with sp at " << std::hex << &uc;
174 VLOG(signals) << "checking for stack overflow, sp: " << std::hex << sp <<
179 // Check that the fault address is the value expected for a stack overflow.
181 VLOG(signals) << "Not a stack overflow";
185 VLOG(signals) << "Stack overflow found";
  /external/boringssl/src/crypto/modes/
ctr.c 85 * (ivec), and that the application has full control over overflow and the rest
87 * the counter doesn't overflow into the rest of the IV when incremented. */
191 * has to handle overflow. 'if' below detects the
192 * overflow, which is then handled by limiting the
193 * amount of blocks to the exact overflow point... */
202 /* ... overflow was detected, propogate carry. */
  /external/dng_sdk/source/
dng_rect.h 64 ThrowProgramError ("Overflow in dng_rect constructor");
75 ThrowProgramError ("Overflow in dng_rect constructor");
120 // the result is converted to an int32 without an overflow check, and
121 // we want to make sure no overflow can occur in such cases. We provide
133 ThrowProgramError ("Overflow computing rectangle width");
153 ThrowProgramError ("Overflow computing rectangle height");
  /packages/apps/Email/src/com/beetstra/jutf7/
UTF7StyleCharsetEncoder.java 90 * Note that this method might return <code>CoderResult.OVERFLOW</code> (as
108 return CoderResult.OVERFLOW;
119 * Note that this method might return <code>CoderResult.OVERFLOW</code>,
126 * However, String.getBytes() fails if CoderResult.OVERFLOW is returned,
147 return CoderResult.OVERFLOW;
166 return CoderResult.OVERFLOW;
  /prebuilts/go/darwin-x86/src/math/
exp.go 12 // Very large values overflow to 0 or +Inf.
83 // if x > 7.09782712893383973096e+02 then exp(x) overflow
98 Overflow = 7.09782712893383973096e+02
109 case x > Overflow:
142 Overflow = 1.0239999999999999e+03
152 case x > Overflow:
  /prebuilts/go/linux-x86/src/math/
exp.go 12 // Very large values overflow to 0 or +Inf.
83 // if x > 7.09782712893383973096e+02 then exp(x) overflow
98 Overflow = 7.09782712893383973096e+02
109 case x > Overflow:
142 Overflow = 1.0239999999999999e+03
152 case x > Overflow:
  /bionic/libm/upstream-freebsd/lib/msun/src/
s_nearbyint.c 37 * because the only exception defined for rint() is overflow, and
38 * rounding can't overflow as long as emax >= p.
  /bionic/tests/
sstream_test.cpp 32 if (!should_overflow) { // glibc writes garbage on overflow.
39 // for chars, so there's no possibility of overflow.
  /external/chromium-trace/catapult/third_party/polymer/components/paper-dropdown-menu/
paper-dropdown-menu-shared-styles.html 29 overflow: hidden;
31 text-overflow: ellipsis;
  /external/clang/test/CodeGenCXX/
new-overflow.cpp 16 // CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[N]], i32 4)
38 // CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[N]], i32 400)
62 // CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[N]], i32 400)
66 // CHECK-NEXT: [[T4:%.*]] = call { i32, i1 } @llvm.uadd.with.overflow.i32(i32 [[T2]], i32 4)
127 // CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[N]], i32 4)
149 // CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[N]], i32 400)
174 // CHECK-NEXT: [[T2:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[T1]], i32 4)
199 // CHECK-NEXT: [[T2:%.*]] = call { i32, i1 } @llvm.umul.with.overflow.i32(i32 [[T1]], i32 4)
  /external/compiler-rt/test/asan/TestCases/Posix/
halt_on_error_suppress_equal_pcs.cc 10 // RUN: [ $(grep -c 'ERROR: AddressSanitizer: stack-buffer-overflow' %t1.log) -eq 25 ]
17 // RUN: [ $(grep -c 'ERROR: AddressSanitizer: stack-buffer-overflow' %t2.log) -eq 30 ]
  /external/compiler-rt/test/asan/TestCases/
global-location.cc 7 // CHECK: AddressSanitizer: global-buffer-overflow
38 // CHECK: SUMMARY: AddressSanitizer: global-buffer-overflow
strcat_strict.c 34 // CHECK1: {{.*ERROR: AddressSanitizer: heap-buffer-overflow on address}}
38 // CHECK2: {{.*ERROR: AddressSanitizer: heap-buffer-overflow on address}}
strncat_strict.c 34 // CHECK1: {{.*ERROR: AddressSanitizer: heap-buffer-overflow on address}}
38 // CHECK2: {{.*ERROR: AddressSanitizer: heap-buffer-overflow on address}}
  /external/doclava/res/assets/templates/
head_tag.cs 32 html,body{overflow:auto;}
34 #doc-content{overflow:visible;border-left:3px solid #666;}
  /external/freetype/src/psaux/
psconv.c 143 FT_TRACE4(( "!!!OVERFLOW:!!!" ));
253 /* only add digit if we don't overflow */
295 goto Overflow;
302 goto Overflow;
308 goto Overflow;
334 /* it's not necessary to check this addition for overflow */
349 Overflow:
351 FT_TRACE4(( "!!!OVERFLOW:!!!" ));
  /external/google-breakpad/src/processor/
exploitability_linux.cc 51 // can determine that the call would overflow the target buffer.
63 // Check the crashing thread for functions suggesting a buffer overflow or
  /external/libgdx/extensions/gdx-freetype/jni/freetype-2.6.2/src/psaux/
psconv.c 143 FT_TRACE4(( "!!!OVERFLOW:!!!" ));
253 /* only add digit if we don't overflow */
295 goto Overflow;
302 goto Overflow;
308 goto Overflow;
334 /* it's not necessary to check this addition for overflow */
349 Overflow:
351 FT_TRACE4(( "!!!OVERFLOW:!!!" ));
  /external/libopus/tests/
test_opus_padding.c 28 /* Check for overflow in reading the padding length.
51 fprintf(stderr, " Checking for padding overflow... ");

Completed in 1140 milliseconds

<<21222324252627282930>>