/openbmc/qemu/tests/unit/ |
H A D | test-shift128.c | 18 bool overflow; member 112 bool overflow = false; in test_lshift() local 114 ulshift(&tmp.low, &tmp.high, tmp.shift, &overflow); in test_lshift() 117 g_assert_cmpuint(tmp.overflow, ==, overflow); in test_lshift()
|
/openbmc/openbmc/poky/meta/recipes-devtools/gcc/gcc/ |
H A D | 0026-fix-incorrect-preprocessor-line-numbers.patch | 33 large to cause overflow when computing location_t values. */ 121 FAIL: gcc.dg/plugin/location-overflow-test-pr116047.c -fplugin=./location_overflow_plugin.so scan-… 123 FAIL: gcc.dg/plugin/location-overflow-test-pr116047.c -fplugin=./location_overflow_plugin.so scan-… 124 FAIL: gcc.dg/plugin/location-overflow-test-pr120061.c -fplugin=./location_overflow_plugin.so scan-… 239 * gcc.dg/plugin/plugin.exp: Add location-overflow-test-pr116047.c 240 and location-overflow-test-pr120061.c. 244 * gcc.dg/plugin/location-overflow-test-pr116047.c: New test. 245 * gcc.dg/plugin/location-overflow-test-pr116047-1.h: New test. 246 * gcc.dg/plugin/location-overflow-test-pr116047-2.h: New test. 247 * gcc.dg/plugin/location-overflow-test-pr120061.c: New test. [all …]
|
/openbmc/linux/arch/x86/kernel/ |
D | irq_32.c |
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/ |
H A D | 0002-configure-Disable-selected-warnings.patch | 21 -AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS=-Wno-error=format-overflow]) 22 +AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS='-Wno-error=format-overflow'])
|
/openbmc/linux/arch/m68k/fpsp040/ |
D | x_ovfl.S |
|
D | util.S |
|
/openbmc/phosphor-webui/app/server-health/styles/ |
H A D | inventory.scss | 48 overflow: hidden; 57 overflow:auto; 58 overflow-wrap: break-word; 63 overflow: auto;
|
/openbmc/openbmc/poky/meta/recipes-extended/iputils/iputils/ |
H A D | CVE-2025-47268.patch | 4 Subject: [PATCH] ping: Fix signed 64-bit integer overflow in RTT calculation 6 Crafted ICMP Echo Reply packet can cause signed integer overflow in 25 …../ping/ping_common.c:757:25: runtime error: signed integer overflow: -2513732689199106 * 1000000 … 26 …../ping/ping_common.c:757:12: runtime error: signed integer overflow: -4975495174606980224 + -6510… 27 …../ping/ping_common.c:769:47: runtime error: signed integer overflow: 6960633343677281965 * 696063… 32 …../ping/ping_common.c:265:16: runtime error: signed integer overflow: 6960633343677281965 * 2 cann… 37 …../ping/ping_common.c:940:42: runtime error: signed integer overflow: 1740158335919320832 * 174015… 40 To fix the overflow check allowed ranges of struct timeval members: 68 Link: https://github.com/Zephkek/ping-rtt-overflow/
|
/openbmc/phosphor-webui/app/common/styles/elements/ |
H A D | file-upload.scss | 6 overflow: hidden; 16 overflow: hidden; 17 text-overflow: ellipsis;
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/yajl/yajl/ |
H A D | CVE-2022-24795.patch | 6 There was an integer overflow in yajl_buf_ensure_available() leading 9 yajl_buf_ensure_available(). Another result of the overflow was an 14 integer overflow, fortifying buffer allocations, and report the 24 This patch catches the integer overflow and terminates the process 49 + /* need would overflow. */
|
/openbmc/linux/drivers/media/rc/ |
D | igorplugusb.c |
|
/openbmc/linux/tools/testing/selftests/lkdtm/ |
D | tests.txt |
|
/openbmc/openbmc/poky/meta/recipes-bsp/grub/files/ |
H A D | CVE-2024-45780.patch | 4 Subject: [PATCH] fs/tar: Integer overflow leads to heap OOB write 10 using grub_add() and checking for an overflow. 53 + return grub_error (GRUB_ERR_BAD_FS, N_("name size overflow")); 66 + return grub_error (GRUB_ERR_BAD_FS, N_("link size overflow")); 89 + return grub_error (GRUB_ERR_BAD_FS, N_("long name size overflow"));
|
H A D | CVE-2024-45777.patch | 4 Subject: [PATCH] gettext: Integer overflow leads to heap OOB write 7 grub_gettext_getstr_from_position() may overflow 10 an overflow.
|
H A D | CVE-2025-0690.patch | 4 Subject: [PATCH] commands/read: Fix an integer overflow when supplying more 62 + grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected")); 67 + grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected"));
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/audiofile/ |
H A D | audiofile_0.3.6.bb | 17 file://0005-clamp-index-values-to-fix-index-overflow-in-IMA.cpp.patch \ 18 file://0006-Check-for-multiplication-overflow-in-sfconvert.patch \ 20 file://0008-Check-for-multiplication-overflow-in-MSADPCM-decodeS.patch \
|
/openbmc/qemu/scripts/coccinelle/ |
H A D | overflow_muldiv64.cocci | 1 // Find muldiv64(i64, i64, x) for potential overflow 16 cocci.print_main("potential muldiv64() overflow", p)
|
/openbmc/openbmc/meta-raspberrypi/recipes-graphics/userland/files/ |
H A D | 0021-cmake-Disable-format-overflow-warning-as-error.patch | 4 Subject: [PATCH] cmake: Disable format-overflow warning as error 8 …rface/vcos/vcos_logging.h:234:88: error: '%s' directive argument is null [-Werror=format-overflow=] 31 + add_definitions(-Wall -Werror -Wno-error=format-overflow)
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/bearssl/bearssl/ |
H A D | 0002-test-test_x509.c-fix-potential-overflow-issue.patch | 4 Subject: [PATCH 2/2] test/test_x509.c: fix potential overflow issue 6 Instead of doing a memcpy() which does static overflow checking, use 16 …in_memcpy' specified bound 4294967295 exceeds maximum object size 2147483647 [-Wstringop-overflow=]
|
/openbmc/qemu/util/ |
H A D | hexdump.c | 107 bool overflow = umul64_overflow(data_size, 2, &required_buffer_size); in qemu_hexdump_to_buffer() local 108 overflow |= uadd64_overflow(required_buffer_size, 1, &required_buffer_size); in qemu_hexdump_to_buffer() 109 assert(!overflow && buffer_size >= required_buffer_size); in qemu_hexdump_to_buffer()
|
/openbmc/linux/Documentation/ABI/testing/ |
D | sysfs-bus-platform-devices-ampere-smpro |
|
/openbmc/linux/tools/testing/selftests/powerpc/pmu/ebb/ |
D | trace.c |
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/procmail/procmail/ |
H A D | CVE-2014-3618.patch | 1 Description: Fix heap-overflow in formail 2 CVE-2014-3618: Heap-overflow in formail when processing
|
/openbmc/linux/include/uapi/linux/ |
D | ioam6.h |
|
/openbmc/openbmc/poky/meta/recipes-multimedia/libsndfile/libsndfile1/ |
H A D | cve-2022-33065.patch | 4 Subject: [PATCH] mat4/mat5: fix int overflow in dataend calculation 6 The clang sanitizer warns of a possible signed integer overflow when 10 src/mat4.c:323:41: runtime error: signed integer overflow: 205 * -100663296 cannot be represented i… 12 src/mat4.c:323:48: runtime error: signed integer overflow: 838860800 * 4 cannot be represented in t… 46 Subject: [PATCH] au: avoid int overflow while calculating data_end 50 (int)au_fmt.datasize. This can overflow the implicit int_32 return value 99 Subject: [PATCH] avr: fix int overflow in avr_read_header() 102 enough numeric space to avoid an int-overflow. 128 Subject: [PATCH] sds: fix int overflow warning in sample calculations 133 fuzzers become concerned that the addition operation can overflow and [all …]
|