| /OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/deps/boost/1.65.1/include/boost/typeof/ |
| H A D | int_encoding.hpp | 51 BOOST_STATIC_CONSTANT(std::size_t, overflow = (m % 2 == 1)); 56 template<class V, std::size_t n, bool overflow = (n >= 0x3fffffff)> 80 template<std::size_t n, class Iter, bool overflow> 107 BOOST_STATIC_CONSTANT(std::size_t,overflow = unpack<m>::overflow); 111 static const T value = (T)(std::size_t)decode_size_t<n, nextpos, overflow>::value; 113 typedef typename decode_size_t<self_t::n, nextpos, self_t::overflow>::iter iter;
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-bsp/grub/files/ |
| H A D | 0001-font-Fix-size-overflow-in-grub_font_get_glyph_intern.patch | 4 Subject: [PATCH] font: Fix size overflow in grub_font_get_glyph_internal() 6 The length of memory allocation and file read may overflow. This patch 10 if overflow happens. This patch introduces grub_video_bitmap_calc_1bpp_bufsz(). 15 overflow occurs or false if there is no overflow. The semantics of arguments 85 + * Equivalent to "*result = (width * height + 7) / 8" if no overflow occurs. 86 + * Return true when overflow occurs or false if there is no overflow. 91 + * XXX: Will report false overflow if width * height > UINT64_MAX.
|
| /OK3568_Linux_fs/buildroot/package/gcc/10.4.0/ |
| H A D | 0001-Revert-re-PR-target-92095-internal-error-with-O1-mcp.patch | 29 gcc/testsuite/gcc.target/sparc/overflow-3.c | 2 +- 30 gcc/testsuite/gcc.target/sparc/overflow-4.c | 2 +- 31 gcc/testsuite/gcc.target/sparc/overflow-5.c | 2 +- 290 diff --git a/gcc/testsuite/gcc.target/sparc/overflow-3.c b/gcc/testsuite/gcc.target/sparc/overflow-… 292 --- a/gcc/testsuite/gcc.target/sparc/overflow-3.c 293 +++ b/gcc/testsuite/gcc.target/sparc/overflow-3.c 302 diff --git a/gcc/testsuite/gcc.target/sparc/overflow-4.c b/gcc/testsuite/gcc.target/sparc/overflow-… 304 --- a/gcc/testsuite/gcc.target/sparc/overflow-4.c 305 +++ b/gcc/testsuite/gcc.target/sparc/overflow-4.c 314 diff --git a/gcc/testsuite/gcc.target/sparc/overflow-5.c b/gcc/testsuite/gcc.target/sparc/overflow-… [all …]
|
| /OK3568_Linux_fs/buildroot/package/gcc/8.4.0/ |
| H A D | 0002-Revert-re-PR-target-92095-internal-error-with-O1-mcp.patch | 26 gcc/testsuite/gcc.target/sparc/overflow-3.c | 2 +- 27 gcc/testsuite/gcc.target/sparc/overflow-4.c | 2 +- 28 gcc/testsuite/gcc.target/sparc/overflow-5.c | 2 +- 287 diff --git a/gcc/testsuite/gcc.target/sparc/overflow-3.c b/gcc/testsuite/gcc.target/sparc/overflow-… 289 --- a/gcc/testsuite/gcc.target/sparc/overflow-3.c 290 +++ b/gcc/testsuite/gcc.target/sparc/overflow-3.c 298 diff --git a/gcc/testsuite/gcc.target/sparc/overflow-4.c b/gcc/testsuite/gcc.target/sparc/overflow-… 300 --- a/gcc/testsuite/gcc.target/sparc/overflow-4.c 301 +++ b/gcc/testsuite/gcc.target/sparc/overflow-4.c 309 diff --git a/gcc/testsuite/gcc.target/sparc/overflow-5.c b/gcc/testsuite/gcc.target/sparc/overflow-… [all …]
|
| /OK3568_Linux_fs/kernel/arch/x86/kernel/ |
| H A D | irq_32.c | 73 static inline int execute_on_irq_stack(int overflow, struct irq_desc *desc) in execute_on_irq_stack() argument 96 if (unlikely(overflow)) in execute_on_irq_stack() 153 int overflow = check_stack_overflow(); in __handle_irq() local 155 if (user_mode(regs) || !execute_on_irq_stack(overflow, desc)) { in __handle_irq() 156 if (unlikely(overflow)) in __handle_irq()
|
| /OK3568_Linux_fs/buildroot/package/glibc/2.28-69-g1e5c5303a522764d7e9d2302a60e4a32cdb902f1/ |
| H A D | 0005-Disable-spurious-Wstringop-overflow-for-setjmp-longj.patch | 4 Subject: [PATCH 05/20] Disable spurious -Wstringop-overflow for setjmp/longjmp 8 -Wstringop-overflow warnings from calls to setjmp and longjmp with a 47 + /* This call results in a -Wstringop-overflow warning because struct 51 + DIAG_IGNORE_NEEDS_COMMENT (11, "-Wstringop-overflow="); 76 + /* This call results in a -Wstringop-overflow warning because struct 80 + DIAG_IGNORE_NEEDS_COMMENT (11, "-Wstringop-overflow="); 105 + /* This call results in a -Wstringop-overflow warning because struct 109 + DIAG_IGNORE_NEEDS_COMMENT (11, "-Wstringop-overflow=");
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/ |
| H A D | 0002-configure-Disable-selected-warnings.patch | 21 -AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS=-Wno-error=format-overflow]) 22 +AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS='-Wno-error=format-overflow'])
|
| /OK3568_Linux_fs/kernel/arch/s390/kernel/ |
| H A D | perf_cpum_sf.c | 1081 int overflow; in perf_push_sample() local 1135 overflow = 0; in perf_push_sample() 1139 overflow = 1; in perf_push_sample() 1144 return overflow; in perf_push_sample() 1173 unsigned long long *overflow) in hw_collect_samples() argument 1194 if (!*overflow) { in hw_collect_samples() 1198 *overflow = perf_push_sample(event, in hw_collect_samples() 1203 *overflow += 1; in hw_collect_samples() 1276 if (te->overflow) in hw_perf_event_update() 1281 sampl_overflow += te->overflow; in hw_perf_event_update() [all …]
|
| /OK3568_Linux_fs/kernel/arch/m68k/fpsp040/ |
| H A D | x_ovfl.S | 4 | fpsp_ovfl --- FPSP handler for overflow exception 23 | RM For pos overflow, the largest pos number. For neg overflow, 25 | RP For pos overflow, +infinity. For neg overflow, the largest
|
| H A D | util.S | 6 | ovf_res: used by overflow to force the correct 157 | ovf_r_x3 --- overflow result calculation 173 | ovf_res --- overflow result calculation 199 tstb LOCAL_SGN(%a0) |if negative overflow 209 tstb LOCAL_SGN(%a0) |if negative overflow 230 tstb LOCAL_SGN(%a0) |if negative overflow 240 tstb LOCAL_SGN(%a0) |if negative overflow 261 tstb LOCAL_SGN(%a0) |if negative overflow 271 tstb LOCAL_SGN(%a0) |if negative overflow 283 tstb LOCAL_SGN(%a0) |if negative overflow [all …]
|
| /OK3568_Linux_fs/kernel/drivers/media/platform/rockchip/isp/ |
| H A D | capture_v2x.h | 21 void rkisp_mipi_v20_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_device *dev); 31 static inline void rkisp_mipi_v20_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_de… in rkisp_mipi_v20_isr() argument 40 void rkisp_mipi_v21_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_device *dev); 45 static inline void rkisp_mipi_v21_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_de… in rkisp_mipi_v21_isr() argument
|
| H A D | capture_v3x.h | 15 void rkisp_mipi_v30_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_device *dev); 20 static inline void rkisp_mipi_v30_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_de… in rkisp_mipi_v30_isr() argument 27 void rkisp_mipi_v32_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_device *dev); 41 static inline void rkisp_mipi_v32_isr(u32 phy, u32 packet, u32 overflow, u32 state, struct rkisp_de… in rkisp_mipi_v32_isr() argument
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0028-linux-Fix-integer-overflows-in-initrd-size-handling.patch | 61 + grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected")); 102 + goto overflow; 115 + goto overflow; 126 + goto overflow; 138 + goto overflow; 145 + overflow: 148 + return grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected"));
|
| /OK3568_Linux_fs/kernel/drivers/media/rc/ |
| H A D | igorplugusb.c | 51 unsigned i, start, overflow; in igorplugusb_irdata() local 61 overflow = ir->buf_in[2]; in igorplugusb_irdata() 62 i = start = overflow + HEADERLEN; in igorplugusb_irdata() 65 dev_err(ir->dev, "receive overflow invalid: %u", overflow); in igorplugusb_irdata() 67 if (overflow > 0) { in igorplugusb_irdata() 69 overflow); in igorplugusb_irdata()
|
| /OK3568_Linux_fs/kernel/drivers/thermal/st/ |
| H A D | st_thermal.c | 32 sensor->overflow = devm_regmap_field_alloc(dev, regmap, in st_thermal_alloc_regfields() 39 IS_ERR(sensor->overflow) || in st_thermal_alloc_regfields() 114 unsigned int overflow; in st_thermal_get_temp() local 117 ret = regmap_field_read(sensor->overflow, &overflow); in st_thermal_get_temp() 120 if (overflow) in st_thermal_get_temp()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/ |
| H A D | fix-potential-signed-overflow-in-pointer-arithmatic.patch | 4 Subject: [PATCH] Fix potential signed overflow in pointer arithmatic 7 type, so that 's - src' in strlcpy and others may trigger signed overflow. 8 In case of compilation by gcc or clang with -ftrapv option, the overflow 52 + * overflow when the string ends where the MSB has changed. 78 + * overflow when the string ends where the MSB has changed. 104 + * overflow when the string ends where the MSB has changed.
|
| /OK3568_Linux_fs/kernel/arch/m68k/mvme147/ |
| H A D | config.c | 151 u8 overflow, tmp; in mvme147_read_clk() local 158 overflow = m147_pcc->t1_cntrl >> 4; in mvme147_read_clk() 159 if (overflow != tmp) in mvme147_read_clk() 162 ticks = count + overflow * PCC_TIMER_CYCLES; in mvme147_read_clk()
|
| /OK3568_Linux_fs/u-boot/lib/ |
| H A D | sysmem.c | 68 bool overflow = false; in sysmem_dump() local 100 overflow = (check->magic != SYSMEM_MAGIC); in sysmem_dump() 104 overflow = (check->magic != SYSMEM_MAGIC); in sysmem_dump() 106 overflow = false; in sysmem_dump() 110 i, mem->attr.name, overflow ? " <Overflow!>" : "", in sysmem_dump() 172 int overflow = 0, overlap = 0; in sysmem_overflow_check() local 247 overflow = (check->magic != SYSMEM_MAGIC); in sysmem_overflow_check() 251 overflow = (check->magic != SYSMEM_MAGIC); in sysmem_overflow_check() 253 overflow = 0; in sysmem_overflow_check() 256 if (overflow) { in sysmem_overflow_check() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-kernel/ipmitool/ |
| H A D | ipmitool_1.8.18.bb | 27 file://0001-fru-Fix-buffer-overflow-vulnerabilities.patch \ 28 file://0001-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch \ 29 file://0002-session-Fix-buffer-overflow-in-ipmi_get_session_info.patch \ 30 file://0003-channel-Fix-buffer-overflow.patch \
|
| /OK3568_Linux_fs/kernel/arch/h8300/kernel/ |
| H A D | module.c | 48 goto overflow; in apply_relocate_add() 56 goto overflow; in apply_relocate_add() 67 overflow: in apply_relocate_add()
|
| /OK3568_Linux_fs/app/forlinx/quectelCM/libmnl/ |
| H A D | nlmsg.c | 417 bool overflow; member 446 b->overflow = false; in mnl_nlmsg_batch_start() 478 b->overflow = true; in mnl_nlmsg_batch_next() 496 if (b->overflow) { in mnl_nlmsg_batch_reset() 501 b->overflow = false; in mnl_nlmsg_batch_reset()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/lua/lua/ |
| H A D | CVE-2022-33099.patch | 7 and some errors can recur (e.g., string overflow while creating an 8 error message in 'luaG_runerror', or a C-stack overflow before calling 11 This commit fixes the bug "Lua-stack overflow when C stack overflows 48 luaG_runerror(L, "string length overflow");
|
| /OK3568_Linux_fs/buildroot/package/pure-ftpd/ |
| H A D | 0004-Initialize-the-max-upload-file-size-when-quotas-are-enabled.patch | 25 if (quota_update("a, 0LL, 0LL, &overflow) == 0 && 26 (overflow > 0 || quota.files >= user_quota_files || 31 overflow = 1;
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/lib/gcc/arm-none-linux-gnueabihf/10.3.1/plugin/include/ |
| H A D | wide-int.h | 2161 wi::neg (const T &x, overflow_type *overflow) 2163 *overflow = only_sign_bit_p (x) ? OVF_OVERFLOW : OVF_NONE; 2463 wi::add (const T1 &x, const T2 &y, signop sgn, overflow_type *overflow) 2480 *overflow = OVF_UNDERFLOW; 2482 *overflow = OVF_OVERFLOW; 2484 *overflow = OVF_NONE; 2487 *overflow = OVF_NONE; 2490 *overflow = ((resultl << (HOST_BITS_PER_WIDE_INT - precision)) 2499 sgn, overflow)); 2549 wi::sub (const T1 &x, const T2 &y, signop sgn, overflow_type *overflow) [all …]
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/lib/gcc/aarch64-none-linux-gnu/10.3.1/plugin/include/ |
| H A D | wide-int.h | 2161 wi::neg (const T &x, overflow_type *overflow) 2163 *overflow = only_sign_bit_p (x) ? OVF_OVERFLOW : OVF_NONE; 2463 wi::add (const T1 &x, const T2 &y, signop sgn, overflow_type *overflow) 2480 *overflow = OVF_UNDERFLOW; 2482 *overflow = OVF_OVERFLOW; 2484 *overflow = OVF_NONE; 2487 *overflow = OVF_NONE; 2490 *overflow = ((resultl << (HOST_BITS_PER_WIDE_INT - precision)) 2499 sgn, overflow)); 2549 wi::sub (const T1 &x, const T2 &y, signop sgn, overflow_type *overflow) [all …]
|