/nrf52832-nimble/rt-thread/components/drivers/hwtimer/ |
H A D | hwtimer.c | 16 float overflow; in timeout_calc() local 25 overflow = timer->info->maxcnt/(float)timer->freq; in timeout_calc() 40 if (timeout <= overflow) in timeout_calc() 89 timer->overflow = 0; in rt_hwtimer_init() 159 t = timer->overflow * timer->period_sec + cnt/(float)timer->freq; in rt_hwtimer_read() 182 timer->overflow = 0; in rt_hwtimer_write() 293 timer->overflow ++; in rt_device_hwtimer_isr()
|
/nrf52832-nimble/rt-thread/components/drivers/include/drivers/ |
H A D | hwtimer.h | 72 rt_int32_t overflow; /* timer overflows */ member
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/ |
H A D | ble_store.c | 119 event.overflow.obj_type = obj_type; in ble_store_overflow_event() 120 event.overflow.value = value; in ble_store_overflow_event()
|
H A D | ble_store_util.c | 235 switch (event->overflow.obj_type) { in ble_store_util_status_rr()
|
/nrf52832-nimble/rt-thread/src/ |
H A D | Kconfig | 61 bool "Using stack overflow checking" 64 Enable thread stack overflow checking. The stack overflow is checking when
|
/nrf52832-nimble/packages/NimBLE-latest/porting/nimble/src/ |
H A D | hal_timer.c | 367 uint32_t overflow; in hal_rtc_timer_irq_handler() local 378 overflow = rtctimer->EVENTS_OVRFLW; in hal_rtc_timer_irq_handler() 379 if (overflow) { in hal_rtc_timer_irq_handler()
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/include/host/ |
H A D | ble_store.h | 164 } overflow; member
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/ |
H A D | ble_store_test.c | 106 TEST_ASSERT(ble_store_test_status_event.overflow.obj_type == in ble_store_test_util_overflow_sec() 108 TEST_ASSERT(ble_store_test_status_event.overflow.value == &val); in ble_store_test_util_overflow_sec()
|
/nrf52832-nimble/rt-thread/components/dfs/filesystems/jffs2/cyg/compress/src/ |
H A D | trees.c | 505 int overflow = 0; /* number of elements with bit length too large */ local 517 if (bits > max_length) bits = max_length, overflow++; 530 if (overflow == 0) return; 545 overflow -= 2; 546 } while (overflow > 0);
|
H A D | FAQ | 260 against a buffer overflow of a 4K string space, other than the caller of
|
H A D | ChangeLog | 369 - Document string limit for gzprintf() and possible buffer overflow
|
/nrf52832-nimble/rt-thread/components/drivers/can/ |
H A D | readme-zh.txt | 124 #define RT_CAN_EVENT_RXOF_IND 0x06 /* Rx overflow */
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/ |
H A D | PPPD_FOLLOWUP | 353 2014-08-01 - pppd: Eliminate potential integer overflow in option parsing 365 2014-08-01 - pppd: Fix a stack variable overflow in MSCHAP-v2
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/netif/ppp/ |
H A D | PPPD_FOLLOWUP | 353 2014-08-01 - pppd: Eliminate potential integer overflow in option parsing 365 2014-08-01 - pppd: Fix a stack variable overflow in MSCHAP-v2
|
/nrf52832-nimble/packages/NimBLE-latest/ext/tinycrypt/documentation/ |
H A D | tinycrypt.rst | 124 * The number of bits_hashed in the state is not checked for overflow. Note
|
/nrf52832-nimble/rt-thread/components/net/freemodbus/ |
H A D | Changelog.txt | 172 functions might overflow. There was an error with counting the number
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/ |
H A D | CHANGELOG | 837 * api.h, sockets.c: fixed bug #41499 netconn::recv_avail can overflow 1148 * dhcp.c: fixed bug #34406 dhcp_option_hostname() can overflow the pbuf 1198 * dhcp.c: fixed bug #34122 dhcp: hostname can overflow 1646 overflow) 2865 elements to overflow. This is achieved by adding some bytes before and after
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/ |
H A D | CHANGELOG | 1054 * api.h, sockets.c: fixed bug #41499 netconn::recv_avail can overflow 1365 * dhcp.c: fixed bug #34406 dhcp_option_hostname() can overflow the pbuf 1415 * dhcp.c: fixed bug #34122 dhcp: hostname can overflow 1863 overflow) 3082 elements to overflow. This is achieved by adding some bytes before and after
|
/nrf52832-nimble/rt-thread/components/net/lwip-1.4.1/ |
H A D | CHANGELOG | 221 * dhcp.c: fixed bug #34406 dhcp_option_hostname() can overflow the pbuf 271 * dhcp.c: fixed bug #34122 dhcp: hostname can overflow 719 overflow) 1938 elements to overflow. This is achieved by adding some bytes before and after
|
/nrf52832-nimble/rt-thread/tools/kconfig-frontends/scripts/.autostuff/m4/ |
H A D | libtool.m4 | 5435 # or program results in "error TOC overflow" add -mminimal-toc to 6507 # or program results in "error TOC overflow" add -mminimal-toc to
|
/nrf52832-nimble/rt-thread/tools/kconfig-frontends/ |
H A D | configure | 9884 # or program results in "error TOC overflow" add -mminimal-toc to
|