/Zephyr-Core-3.6.0/tests/unit/pot/ |
D | CMakeLists.txt | 13 target_compile_options(testbinary PRIVATE -Wno-overflow) 16 target_compile_options(testbinary PRIVATE -Wno-shift-count-overflow -Wno-integer-overflow)
|
/Zephyr-Core-3.6.0/dts/arm/nxp/ |
D | nxp_s32k1xx.dtsi | 245 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 255 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 265 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 275 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 285 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 295 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 305 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow"; 315 interrupt-names = "0-1", "2-3", "4-5", "6-7", "overflow";
|
/Zephyr-Core-3.6.0/drivers/pwm/ |
D | pwm_mcux_ftm.c | 282 uint16_t cnt, bool overflow) in mcux_ftm_capture_first_edge() argument 296 capture->first_edge_overflow = overflow; in mcux_ftm_capture_first_edge() 298 LOG_DBG("pair = %d, 1st cnt = %u, 1st ovf = %d", pair, cnt, overflow); in mcux_ftm_capture_first_edge() 302 uint16_t cnt, bool overflow) in mcux_ftm_capture_second_edge() argument 335 if (unlikely(overflow && second_cnv > cnt)) { in mcux_ftm_capture_second_edge() 362 second_cnv, cycles, cnt, overflow); in mcux_ftm_capture_second_edge() 403 bool overflow; in mcux_ftm_irq_handler() local 413 overflow = mcux_ftm_handle_overflow(dev); in mcux_ftm_irq_handler() 418 mcux_ftm_capture_second_edge(dev, ch, cnt, overflow); in mcux_ftm_irq_handler() 420 mcux_ftm_capture_first_edge(dev, ch, cnt, overflow); in mcux_ftm_irq_handler() [all …]
|
/Zephyr-Core-3.6.0/doc/safety/images/ |
D | zephyr-safety-process.svg | 1 …overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: fl…
|
/Zephyr-Core-3.6.0/drivers/timer/ |
D | Kconfig.nrf_rtc | 40 bool "Trigger overflow" 42 When enabled, a function can be used to trigger RTC overflow and
|
/Zephyr-Core-3.6.0/drivers/led_strip/ |
D | ws2812_spi.c | 78 bool overflow; in num_pixels_ok() local 80 overflow = size_mul_overflow(num_pixels, cfg->num_colors * 8, &nbytes); in num_pixels_ok() 81 return !overflow && (nbytes <= cfg->px_buf_size); in num_pixels_ok()
|
/Zephyr-Core-3.6.0/subsys/net/ip/ |
D | icmpv4.c | 199 uint8_t overflow; in icmpv4_update_time_stamp() local 226 overflow = (flag & 0xF0) >> 4U; in icmpv4_update_time_stamp() 237 if (overflow == 0x0F) { in icmpv4_update_time_stamp() 248 overflow++; in icmpv4_update_time_stamp() 249 flag = (overflow << 4U) | flag; in icmpv4_update_time_stamp() 287 if (net_pkt_write_u8(reply, (overflow << 4) | flag)) { in icmpv4_update_time_stamp()
|
/Zephyr-Core-3.6.0/doc/security/ |
D | vulnerabilities.rst | 20 Buffer overflow in :code:`getaddrinfo()`. 180 The shell subsystem contains a buffer overflow, whereby an adversary 414 cause an integer overflow, resulting in memory corruption. 514 A malicious userspace application can cause a integer overflow and 598 MQTT buffer overflow on receive buffer 603 When calculating the packet length, arithmetic overflow can result in 625 length field on publish messages, allowing a buffer overflow and 677 characters long will cause a buffer overflow. 763 Possible overflow in mempool 771 * That leads to heap overflow. [all …]
|
/Zephyr-Core-3.6.0/include/zephyr/linker/ |
D | kobject-text.ld | 29 location counter, and then detect the overflow with an assertion
|
/Zephyr-Core-3.6.0/doc/_doxygen/ |
D | doxygen-awesome-sidebar-only.css | 56 overflow: visible; 73 overflow: hidden;
|
D | doxygen-awesome.css | 549 overflow: hidden; 750 overflow: auto; 1014 overflow: visible; 1016 overflow: visible; 1070 overflow-x: scroll; 1154 overflow: hidden; 1188 overflow: auto; 1208 overflow: hidden; 1223 overflow-x: auto; 1259 overflow: initial; [all …]
|
/Zephyr-Core-3.6.0/drivers/sensor/qdec_nrfx/ |
D | qdec_nrfx.c | 47 bool overflow = ((acc > 0) && (ACC_MAX - acc < data->acc)) || in accumulate() local 50 if (!overflow) { in accumulate()
|
/Zephyr-Core-3.6.0/tests/arch/arm/arm_interrupt/ |
D | README.txt | 17 stack overflow errors explicitly due to exception frame context 118 E: Stack overflow (context area not valid) 123 E: >>> ZEPHYR FATAL ERROR 2: Stack overflow on CPU 0
|
/Zephyr-Core-3.6.0/boards/arm/nucleo_l053r8/ |
D | nucleo_l053r8.dts | 71 /* (Test cases fail due to 'SRAM' region overflow) */
|
/Zephyr-Core-3.6.0/boards/arm/nucleo_f031k6/ |
D | nucleo_f031k6.dts | 68 /* (Test cases fail due to 'SRAM' region overflow) */
|
/Zephyr-Core-3.6.0/doc/_static/css/ |
D | custom.css | 405 overflow: auto; 420 overflow: auto; 433 overflow: auto; 445 overflow: auto; 457 overflow: visible; 723 overflow-y: auto; 736 overflow: hidden; 745 overflow-y: auto; 746 overflow-x: hidden; 754 overflow-y: initial;
|
/Zephyr-Core-3.6.0/boards/arm/nucleo_f030r8/ |
D | nucleo_f030r8.dts | 72 /* (Test cases fail due to 'SRAM' region overflow) */
|
/Zephyr-Core-3.6.0/doc/kernel/services/other/ |
D | fatal.rst | 208 way can detect the overflow, but cannot guarantee against data corruption and 213 :kconfig:option:`CONFIG_STACK_SENTINEL` is a software-only stack overflow detection 217 interrupt exit, the overflow may be detected a nontrivial amount of time after 225 invokes a fatal stack overflow error. An error in this case does not indicate
|
/Zephyr-Core-3.6.0/drivers/ethernet/ |
D | Kconfig.dwmac | 65 memory. A smaller number increases the risk of an overflow and
|
/Zephyr-Core-3.6.0/lib/posix/options/ |
D | Kconfig.pthread | 54 This is the default amount of space to reserve at the overflow end of a
|
/Zephyr-Core-3.6.0/drivers/ieee802154/ |
D | ieee802154_cc2520.h | 52 bool overflow; member
|
/Zephyr-Core-3.6.0/subsys/sensing/ |
D | Kconfig | 67 data, then ring buf will always be put into data until overflow.
|
/Zephyr-Core-3.6.0/cmake/compiler/clang/ |
D | compiler_flags.cmake | 105 -Wno-shift-overflow
|
/Zephyr-Core-3.6.0/doc/services/ipc/ipc_service/backends/ |
D | ipc_service_icbmsg.rst | 30 …size of the ICMsg queue is large enough to hold messages for all blocks, so it will never overflow.
|
/Zephyr-Core-3.6.0/arch/arm64/core/ |
D | Kconfig | 143 used for user stack overflow checking, because kernel stack support 161 requires to be enough to do the stack overflow check.
|