Searched refs:overflow (Results 1 – 15 of 15) sorted by relevance
101 int overflow = offset + len - plat->size; in sandbox_i2c_eeprom_xfer() local102 int initial = len - overflow; in sandbox_i2c_eeprom_xfer()106 overflow); in sandbox_i2c_eeprom_xfer()133 int overflow = offset + len - plat->size; in sandbox_i2c_eeprom_xfer() local134 int initial = len - overflow; in sandbox_i2c_eeprom_xfer()137 memcpy(priv->data, ptr + initial, overflow); in sandbox_i2c_eeprom_xfer()
566 EEPROM chips that implement "address overflow" are ones
211 int num_bytes, overflow; in tegra30_spi_xfer() local218 overflow = bitlen % 8; in tegra30_spi_xfer()255 if (overflow && !num_bytes) in tegra30_spi_xfer()257 (bytes - 1) * 8 + overflow - 1); in tegra30_spi_xfer()
31 * - make the overflow auto (scrollbar if needed)36 .wy-table-responsive { overflow: auto; }
50 dropped due to overflow127 This shows that resuming the trace causes the buffer to overflow::133 22,190,112 traced function calls (8289848 dropped due to overflow)
510 int overflow = 0; /* number of elements with bit length too large */ local522 if (bits > max_length) bits = max_length, overflow++;535 if (overflow == 0) return;550 overflow -= 2;551 } while (overflow > 0);
78 sanity and for buffer overflow conditions.
1040 overflw||overflow1041 overlfow||overflow
859 bool "Stack Protector buffer overflow detection"865 bool "Stack Protector buffer overflow detection for SPL"869 bool "Stack Protector buffer overflow detection for TPL"
78 950,490 traced function calls (333217 dropped due to overflow)
281 - worked around integer overflow in warp driver
548 SZ_ERROR_OUTPUT_EOF - output buffer overflow
54 SPL_SIZE_LIMIT check to ensure such an image does not overflow SRAM63 to ensure such an image does not overflow SRAM if SPL_SIZE_LIMIT73 an image does not overflow SRAM if SPL_SIZE_LIMIT describes the size
757 KBUILD_CFLAGS += $(call cc-disable-warning, stringop-overflow)
354 how many records were dropped due to buffer overflow.
Completed in 65 milliseconds