Home
last modified time | relevance | path

Searched refs:overflow (Results 1 – 21 of 21) sorted by relevance

/nrf52832-nimble/rt-thread/components/drivers/hwtimer/
H A Dhwtimer.c16 float overflow; in timeout_calc() local
25 overflow = timer->info->maxcnt/(float)timer->freq; in timeout_calc()
40 if (timeout <= overflow) in timeout_calc()
89 timer->overflow = 0; in rt_hwtimer_init()
159 t = timer->overflow * timer->period_sec + cnt/(float)timer->freq; in rt_hwtimer_read()
182 timer->overflow = 0; in rt_hwtimer_write()
293 timer->overflow ++; in rt_device_hwtimer_isr()
/nrf52832-nimble/rt-thread/components/drivers/include/drivers/
H A Dhwtimer.h72 rt_int32_t overflow; /* timer overflows */ member
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/
H A Dble_store.c119 event.overflow.obj_type = obj_type; in ble_store_overflow_event()
120 event.overflow.value = value; in ble_store_overflow_event()
H A Dble_store_util.c235 switch (event->overflow.obj_type) { in ble_store_util_status_rr()
/nrf52832-nimble/rt-thread/src/
H A DKconfig61 bool "Using stack overflow checking"
64 Enable thread stack overflow checking. The stack overflow is checking when
/nrf52832-nimble/packages/NimBLE-latest/porting/nimble/src/
H A Dhal_timer.c367 uint32_t overflow; in hal_rtc_timer_irq_handler() local
378 overflow = rtctimer->EVENTS_OVRFLW; in hal_rtc_timer_irq_handler()
379 if (overflow) { in hal_rtc_timer_irq_handler()
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/include/host/
H A Dble_store.h164 } overflow; member
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/
H A Dble_store_test.c106 TEST_ASSERT(ble_store_test_status_event.overflow.obj_type == in ble_store_test_util_overflow_sec()
108 TEST_ASSERT(ble_store_test_status_event.overflow.value == &val); in ble_store_test_util_overflow_sec()
/nrf52832-nimble/rt-thread/components/dfs/filesystems/jffs2/cyg/compress/src/
H A Dtrees.c505 int overflow = 0; /* number of elements with bit length too large */ local
517 if (bits > max_length) bits = max_length, overflow++;
530 if (overflow == 0) return;
545 overflow -= 2;
546 } while (overflow > 0);
H A DFAQ260 against a buffer overflow of a 4K string space, other than the caller of
H A DChangeLog369 - Document string limit for gzprintf() and possible buffer overflow
/nrf52832-nimble/rt-thread/components/drivers/can/
H A Dreadme-zh.txt124 #define RT_CAN_EVENT_RXOF_IND 0x06 /* Rx overflow */
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/
H A DPPPD_FOLLOWUP353 2014-08-01 - pppd: Eliminate potential integer overflow in option parsing
365 2014-08-01 - pppd: Fix a stack variable overflow in MSCHAP-v2
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/netif/ppp/
H A DPPPD_FOLLOWUP353 2014-08-01 - pppd: Eliminate potential integer overflow in option parsing
365 2014-08-01 - pppd: Fix a stack variable overflow in MSCHAP-v2
/nrf52832-nimble/packages/NimBLE-latest/ext/tinycrypt/documentation/
H A Dtinycrypt.rst124 * The number of bits_hashed in the state is not checked for overflow. Note
/nrf52832-nimble/rt-thread/components/net/freemodbus/
H A DChangelog.txt172 functions might overflow. There was an error with counting the number
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/
H A DCHANGELOG837 * api.h, sockets.c: fixed bug #41499 netconn::recv_avail can overflow
1148 * dhcp.c: fixed bug #34406 dhcp_option_hostname() can overflow the pbuf
1198 * dhcp.c: fixed bug #34122 dhcp: hostname can overflow
1646 overflow)
2865 elements to overflow. This is achieved by adding some bytes before and after
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/
H A DCHANGELOG1054 * api.h, sockets.c: fixed bug #41499 netconn::recv_avail can overflow
1365 * dhcp.c: fixed bug #34406 dhcp_option_hostname() can overflow the pbuf
1415 * dhcp.c: fixed bug #34122 dhcp: hostname can overflow
1863 overflow)
3082 elements to overflow. This is achieved by adding some bytes before and after
/nrf52832-nimble/rt-thread/components/net/lwip-1.4.1/
H A DCHANGELOG221 * dhcp.c: fixed bug #34406 dhcp_option_hostname() can overflow the pbuf
271 * dhcp.c: fixed bug #34122 dhcp: hostname can overflow
719 overflow)
1938 elements to overflow. This is achieved by adding some bytes before and after
/nrf52832-nimble/rt-thread/tools/kconfig-frontends/scripts/.autostuff/m4/
H A Dlibtool.m45435 # or program results in "error TOC overflow" add -mminimal-toc to
6507 # or program results in "error TOC overflow" add -mminimal-toc to
/nrf52832-nimble/rt-thread/tools/kconfig-frontends/
H A Dconfigure9884 # or program results in "error TOC overflow" add -mminimal-toc to