OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:overflow
(Results
601 - 625
of
9855
) sorted by null
<<
21
22
23
24
25
26
27
28
29
30
>>
/prebuilts/ndk/current/platforms/android-23/arch-mips/usr/include/machine/
fenv.h
48
* 14 -> cause bit for
overflow
exception
53
* 9 -> enable exception for
overflow
exception
58
* 4 -> flag
overflow
exception
/prebuilts/ndk/current/platforms/android-23/arch-mips64/usr/include/machine/
fenv.h
48
* 14 -> cause bit for
overflow
exception
53
* 9 -> enable exception for
overflow
exception
58
* 4 -> flag
overflow
exception
/prebuilts/ndk/current/platforms/android-24/arch-arm64/usr/include/machine/
fenv.h
49
* * [10] - OFE,
Overflow
exception trap;
58
* * [28] - V,
Overflow
conditon flag for AArch32 (AArch64 sets PSTATE.V);
65
* * [2] - OFC,
Overflow
cumulative exception;
/prebuilts/ndk/current/platforms/android-24/arch-mips/usr/include/machine/
fenv.h
48
* 14 -> cause bit for
overflow
exception
53
* 9 -> enable exception for
overflow
exception
58
* 4 -> flag
overflow
exception
/prebuilts/ndk/current/platforms/android-24/arch-mips64/usr/include/machine/
fenv.h
48
* 14 -> cause bit for
overflow
exception
53
* 9 -> enable exception for
overflow
exception
58
* 4 -> flag
overflow
exception
/system/core/libutils/tests/
Vector_test.cpp
107
//
overflow
: the size here will be (1 + SIZE_MAX).
116
// This should fail because the calculated capacity will
overflow
even though
128
// EXPECT_DEATH(vector.insertArrayAt(NULL, 0, (SIZE_MAX / 2)), "new_alloc_size
overflow
");
/art/runtime/arch/arm64/
fault_handler_arm64.cc
67
// In the case of a stack
overflow
, the stack is not valid and we can't
166
VLOG(signals) << "stack
overflow
handler with sp at " << std::hex << &uc;
174
VLOG(signals) << "checking for stack
overflow
, sp: " << std::hex << sp <<
179
// Check that the fault address is the value expected for a stack
overflow
.
181
VLOG(signals) << "Not a stack
overflow
";
185
VLOG(signals) << "Stack
overflow
found";
/external/boringssl/src/crypto/modes/
ctr.c
85
* (ivec), and that the application has full control over
overflow
and the rest
87
* the counter doesn't
overflow
into the rest of the IV when incremented. */
191
* has to handle
overflow
. 'if' below detects the
192
*
overflow
, which is then handled by limiting the
193
* amount of blocks to the exact
overflow
point... */
202
/* ...
overflow
was detected, propogate carry. */
/external/dng_sdk/source/
dng_rect.h
64
ThrowProgramError ("
Overflow
in dng_rect constructor");
75
ThrowProgramError ("
Overflow
in dng_rect constructor");
120
// the result is converted to an int32 without an
overflow
check, and
121
// we want to make sure no
overflow
can occur in such cases. We provide
133
ThrowProgramError ("
Overflow
computing rectangle width");
153
ThrowProgramError ("
Overflow
computing rectangle height");
/packages/apps/Email/src/com/beetstra/jutf7/
UTF7StyleCharsetEncoder.java
90
* Note that this method might return <code>CoderResult.
OVERFLOW
</code> (as
108
return CoderResult.
OVERFLOW
;
119
* Note that this method might return <code>CoderResult.
OVERFLOW
</code>,
126
* However, String.getBytes() fails if CoderResult.
OVERFLOW
is returned,
147
return CoderResult.
OVERFLOW
;
166
return CoderResult.
OVERFLOW
;
/prebuilts/go/darwin-x86/src/math/
exp.go
12
// Very large values
overflow
to 0 or +Inf.
83
// if x > 7.09782712893383973096e+02 then exp(x)
overflow
98
Overflow
= 7.09782712893383973096e+02
109
case x >
Overflow
:
142
Overflow
= 1.0239999999999999e+03
152
case x >
Overflow
:
/prebuilts/go/linux-x86/src/math/
exp.go
12
// Very large values
overflow
to 0 or +Inf.
83
// if x > 7.09782712893383973096e+02 then exp(x)
overflow
98
Overflow
= 7.09782712893383973096e+02
109
case x >
Overflow
:
142
Overflow
= 1.0239999999999999e+03
152
case x >
Overflow
:
/bionic/libm/upstream-freebsd/lib/msun/src/
s_nearbyint.c
37
* because the only exception defined for rint() is
overflow
, and
38
* rounding can't
overflow
as long as emax >= p.
/bionic/tests/
sstream_test.cpp
32
if (!should_overflow) { // glibc writes garbage on
overflow
.
39
// for chars, so there's no possibility of
overflow
.
/external/chromium-trace/catapult/third_party/polymer/components/paper-dropdown-menu/
paper-dropdown-menu-shared-styles.html
29
overflow
: hidden;
31
text-
overflow
: ellipsis;
/external/clang/test/CodeGenCXX/
new-overflow.cpp
16
// CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[N]], i32 4)
38
// CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[N]], i32 400)
62
// CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[N]], i32 400)
66
// CHECK-NEXT: [[T4:%.*]] = call { i32, i1 } @llvm.uadd.with.
overflow
.i32(i32 [[T2]], i32 4)
127
// CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[N]], i32 4)
149
// CHECK-NEXT: [[T0:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[N]], i32 400)
174
// CHECK-NEXT: [[T2:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[T1]], i32 4)
199
// CHECK-NEXT: [[T2:%.*]] = call { i32, i1 } @llvm.umul.with.
overflow
.i32(i32 [[T1]], i32 4)
/external/compiler-rt/test/asan/TestCases/Posix/
halt_on_error_suppress_equal_pcs.cc
10
// RUN: [ $(grep -c 'ERROR: AddressSanitizer: stack-buffer-
overflow
' %t1.log) -eq 25 ]
17
// RUN: [ $(grep -c 'ERROR: AddressSanitizer: stack-buffer-
overflow
' %t2.log) -eq 30 ]
/external/compiler-rt/test/asan/TestCases/
global-location.cc
7
// CHECK: AddressSanitizer: global-buffer-
overflow
38
// CHECK: SUMMARY: AddressSanitizer: global-buffer-
overflow
strcat_strict.c
34
// CHECK1: {{.*ERROR: AddressSanitizer: heap-buffer-
overflow
on address}}
38
// CHECK2: {{.*ERROR: AddressSanitizer: heap-buffer-
overflow
on address}}
strncat_strict.c
34
// CHECK1: {{.*ERROR: AddressSanitizer: heap-buffer-
overflow
on address}}
38
// CHECK2: {{.*ERROR: AddressSanitizer: heap-buffer-
overflow
on address}}
/external/doclava/res/assets/templates/
head_tag.cs
32
html,body{
overflow
:auto;}
34
#doc-content{
overflow
:visible;border-left:3px solid #666;}
/external/freetype/src/psaux/
psconv.c
143
FT_TRACE4(( "!!!
OVERFLOW
:!!!" ));
253
/* only add digit if we don't
overflow
*/
295
goto
Overflow
;
302
goto
Overflow
;
308
goto
Overflow
;
334
/* it's not necessary to check this addition for
overflow
*/
349
Overflow
:
351
FT_TRACE4(( "!!!
OVERFLOW
:!!!" ));
/external/google-breakpad/src/processor/
exploitability_linux.cc
51
// can determine that the call would
overflow
the target buffer.
63
// Check the crashing thread for functions suggesting a buffer
overflow
or
/external/libgdx/extensions/gdx-freetype/jni/freetype-2.6.2/src/psaux/
psconv.c
143
FT_TRACE4(( "!!!
OVERFLOW
:!!!" ));
253
/* only add digit if we don't
overflow
*/
295
goto
Overflow
;
302
goto
Overflow
;
308
goto
Overflow
;
334
/* it's not necessary to check this addition for
overflow
*/
349
Overflow
:
351
FT_TRACE4(( "!!!
OVERFLOW
:!!!" ));
/external/libopus/tests/
test_opus_padding.c
28
/* Check for
overflow
in reading the padding length.
51
fprintf(stderr, " Checking for padding
overflow
... ");
Completed in 1140 milliseconds
<<
21
22
23
24
25
26
27
28
29
30
>>