/openbmc/qemu/tests/unit/ |
H A D | test-shift128.c | 18 bool overflow; member 112 bool overflow = false; in test_lshift() local 114 ulshift(&tmp.low, &tmp.high, tmp.shift, &overflow); in test_lshift() 117 g_assert_cmpuint(tmp.overflow, ==, overflow); in test_lshift()
|
/openbmc/openbmc/poky/meta/recipes-extended/mdadm/files/ |
H A D | 0001-Use-CC-to-check-for-implicit-fallthrough-warning-sup.patch | 32 - FORMATOVERFLOW := $(shell gcc -Q --help=warnings 2>&1 | grep "format-overflow" | wc -l) 33 + FORMATOVERFLOW := $(shell ${CC} -Q --help=warnings 2>&1 | grep "format-overflow" | wc -l) 35 CWFLAGS += -Wformat-overflow 40 - STRINGOPOVERFLOW := $(shell gcc -Q --help=warnings 2>&1 | grep "stringop-overflow" | wc -l) 41 + STRINGOPOVERFLOW := $(shell ${CC} -Q --help=warnings 2>&1 | grep "stringop-overflow" | wc -l) 43 CWFLAGS += -Wstringop-overflow
|
/openbmc/linux/arch/x86/kernel/ |
H A D | irq_32.c | 71 static inline int execute_on_irq_stack(int overflow, struct irq_desc *desc) in execute_on_irq_stack() argument 94 if (unlikely(overflow)) in execute_on_irq_stack() 153 int overflow = check_stack_overflow(); in __handle_irq() local 155 if (user_mode(regs) || !execute_on_irq_stack(overflow, desc)) { in __handle_irq() 156 if (unlikely(overflow)) in __handle_irq()
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/ |
H A D | 0002-configure-Disable-selected-warnings.patch | 21 -AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS=-Wno-error=format-overflow]) 22 +AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS='-Wno-error=format-overflow'])
|
/openbmc/linux/arch/m68k/fpsp040/ |
H A D | x_ovfl.S | 4 | fpsp_ovfl --- FPSP handler for overflow exception 23 | RM For pos overflow, the largest pos number. For neg overflow, 25 | RP For pos overflow, +infinity. For neg overflow, the largest
|
H A D | util.S | 6 | ovf_res: used by overflow to force the correct 157 | ovf_r_x3 --- overflow result calculation 173 | ovf_res --- overflow result calculation 199 tstb LOCAL_SGN(%a0) |if negative overflow 209 tstb LOCAL_SGN(%a0) |if negative overflow 230 tstb LOCAL_SGN(%a0) |if negative overflow 240 tstb LOCAL_SGN(%a0) |if negative overflow 261 tstb LOCAL_SGN(%a0) |if negative overflow 271 tstb LOCAL_SGN(%a0) |if negative overflow 283 tstb LOCAL_SGN(%a0) |if negative overflow [all …]
|
/openbmc/phosphor-webui/app/server-health/styles/ |
H A D | inventory.scss | 48 overflow: hidden; 57 overflow:auto; 58 overflow-wrap: break-word; 63 overflow: auto;
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/yajl/yajl/ |
H A D | CVE-2022-24795.patch | 6 There was an integer overflow in yajl_buf_ensure_available() leading 9 yajl_buf_ensure_available(). Another result of the overflow was an 14 integer overflow, fortifying buffer allocations, and report the 24 This patch catches the integer overflow and terminates the process 49 + /* need would overflow. */
|
/openbmc/linux/drivers/thermal/st/ |
H A D | st_thermal.c | 32 sensor->overflow = devm_regmap_field_alloc(dev, regmap, in st_thermal_alloc_regfields() 39 IS_ERR(sensor->overflow) || in st_thermal_alloc_regfields() 113 unsigned int overflow; in st_thermal_get_temp() local 116 ret = regmap_field_read(sensor->overflow, &overflow); in st_thermal_get_temp() 119 if (overflow) in st_thermal_get_temp()
|
/openbmc/linux/arch/s390/kernel/ |
H A D | perf_cpum_sf.c | 1114 int overflow; in perf_push_sample() local 1168 overflow = 0; in perf_push_sample() 1172 overflow = 1; in perf_push_sample() 1177 return overflow; in perf_push_sample() 1206 unsigned long long *overflow) in hw_collect_samples() argument 1227 if (!*overflow) { in hw_collect_samples() 1231 *overflow = perf_push_sample(event, in hw_collect_samples() 1236 *overflow += 1; in hw_collect_samples() 1305 if (te->header.overflow) in hw_perf_event_update() 1310 sampl_overflow += te->header.overflow; in hw_perf_event_update() [all …]
|
/openbmc/phosphor-webui/app/common/styles/elements/ |
H A D | file-upload.scss | 6 overflow: hidden; 16 overflow: hidden; 17 text-overflow: ellipsis;
|
/openbmc/linux/drivers/media/rc/ |
H A D | igorplugusb.c | 51 unsigned i, start, overflow; in igorplugusb_irdata() local 61 overflow = ir->buf_in[2]; in igorplugusb_irdata() 62 i = start = overflow + HEADERLEN; in igorplugusb_irdata() 65 dev_err(ir->dev, "receive overflow invalid: %u", overflow); in igorplugusb_irdata() 67 if (overflow > 0) { in igorplugusb_irdata() 69 overflow); in igorplugusb_irdata()
|
/openbmc/linux/tools/testing/selftests/lkdtm/ |
H A D | tests.txt | 78 FORTIFY_STRSCPY detected buffer overflow 79 FORTIFY_STR_OBJECT detected buffer overflow 80 FORTIFY_STR_MEMBER detected buffer overflow 81 FORTIFY_MEM_OBJECT detected buffer overflow
|
/openbmc/linux/arch/m68k/mvme147/ |
H A D | config.c | 150 u8 overflow, tmp; in mvme147_read_clk() local 157 overflow = m147_pcc->t1_cntrl >> 4; in mvme147_read_clk() 158 if (overflow != tmp) in mvme147_read_clk() 161 ticks = count + overflow * PCC_TIMER_CYCLES; in mvme147_read_clk()
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-platform-devices-ampere-smpro | 182 (RO) Return the overflow status of each type HW error reported: 184 - 0 : No overflow 185 - 1 : There is an overflow and the oldest HW errors are dropped 192 …/sys/bus/platform/devices/smpro-errmon.*/overflow_core_ce | Core CE error overflow | 194 …/sys/bus/platform/devices/smpro-errmon.*/overflow_core_ue | Core UE error overflow | 196 …/sys/bus/platform/devices/smpro-errmon.*/overflow_mem_ce | Memory CE error overflow | 198 …/sys/bus/platform/devices/smpro-errmon.*/overflow_mem_ue | Memory UE error overflow | 200 …/sys/bus/platform/devices/smpro-errmon.*/overflow_pcie_ce | any PCIe controller CE error overflow | 202 …/sys/bus/platform/devices/smpro-errmon.*/overflow_pcie_ue | any PCIe controller UE error overflow | 204 …/sys/bus/platform/devices/smpro-errmon.*/overflow_other_ce| any other CE error overflow | [all …]
|
/openbmc/linux/arch/loongarch/kernel/ |
H A D | module.c | 179 goto overflow; in apply_r_larch_sop_imm_field() 186 goto overflow; in apply_r_larch_sop_imm_field() 192 goto overflow; in apply_r_larch_sop_imm_field() 201 goto overflow; in apply_r_larch_sop_imm_field() 207 goto overflow; in apply_r_larch_sop_imm_field() 216 goto overflow; in apply_r_larch_sop_imm_field() 227 goto overflow; in apply_r_larch_sop_imm_field() 235 goto overflow; in apply_r_larch_sop_imm_field() 245 overflow: in apply_r_larch_sop_imm_field()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/audiofile/ |
H A D | audiofile_0.3.6.bb | 17 file://0005-clamp-index-values-to-fix-index-overflow-in-IMA.cpp.patch \ 18 file://0006-Check-for-multiplication-overflow-in-sfconvert.patch \ 20 file://0008-Check-for-multiplication-overflow-in-MSADPCM-decodeS.patch \
|
/openbmc/openbmc/meta-raspberrypi/recipes-graphics/userland/files/ |
H A D | 0021-cmake-Disable-format-overflow-warning-as-error.patch | 4 Subject: [PATCH] cmake: Disable format-overflow warning as error 8 …rface/vcos/vcos_logging.h:234:88: error: '%s' directive argument is null [-Werror=format-overflow=] 31 + add_definitions(-Wall -Werror -Wno-error=format-overflow)
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/bearssl/bearssl/ |
H A D | 0002-test-test_x509.c-fix-potential-overflow-issue.patch | 4 Subject: [PATCH 2/2] test/test_x509.c: fix potential overflow issue 6 Instead of doing a memcpy() which does static overflow checking, use 16 …in_memcpy' specified bound 4294967295 exceeds maximum object size 2147483647 [-Wstringop-overflow=]
|
/openbmc/qemu/scripts/coccinelle/ |
H A D | overflow_muldiv64.cocci | 1 // Find muldiv64(i64, i64, x) for potential overflow 16 cocci.print_main("potential muldiv64() overflow", p)
|
/openbmc/linux/tools/testing/selftests/powerpc/pmu/ebb/ |
H A D | trace.c | 33 tb->overflow = false; in trace_buffer_allocate() 51 if (tb->overflow) in trace_check_alloc() 55 tb->overflow = true; in trace_check_alloc() 279 printf(" overflow %s\n", tb->overflow ? "TRUE" : "false"); in trace_buffer_print()
|
/openbmc/openbmc/poky/meta/recipes-multimedia/libsndfile/libsndfile1/ |
H A D | cve-2022-33065.patch | 4 Subject: [PATCH] mat4/mat5: fix int overflow in dataend calculation 6 The clang sanitizer warns of a possible signed integer overflow when 10 src/mat4.c:323:41: runtime error: signed integer overflow: 205 * -100663296 cannot be represented i… 12 src/mat4.c:323:48: runtime error: signed integer overflow: 838860800 * 4 cannot be represented in t… 46 Subject: [PATCH] au: avoid int overflow while calculating data_end 50 (int)au_fmt.datasize. This can overflow the implicit int_32 return value 99 Subject: [PATCH] avr: fix int overflow in avr_read_header() 102 enough numeric space to avoid an int-overflow. 128 Subject: [PATCH] sds: fix int overflow warning in sample calculations 133 fuzzers become concerned that the addition operation can overflow and [all …]
|
/openbmc/linux/drivers/gpu/drm/nouveau/dispnv50/ |
H A D | crcc37d.c | 87 const u32 overflow = status & 0x0000007e; in crcc37d_ctx_finished() local 92 if (overflow) { in crcc37d_ctx_finished() 95 switch (overflow) { in crcc37d_ctx_finished()
|
H A D | crc907d.c | 103 const u32 overflow = status & 0x0000003e; in crc907d_ctx_finished() local 108 if (overflow) { in crc907d_ctx_finished() 111 switch (overflow) { in crc907d_ctx_finished()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/procmail/procmail/ |
H A D | CVE-2014-3618.patch | 1 Description: Fix heap-overflow in formail 2 CVE-2014-3618: Heap-overflow in formail when processing
|