/bionic/libc/bionic/ |
__fgets_chk.cpp | 48 __fortify_chk_fail("fgets buffer size less than 0", 0); 52 __fortify_chk_fail("fgets buffer overflow", 0);
|
__memmove_chk.cpp | 48 __fortify_chk_fail("memmove buffer overflow",
|
__memset_chk.cpp | 46 __fortify_chk_fail("memset buffer overflow",
|
__strcpy_chk.cpp | 48 __fortify_chk_fail("strcpy buffer overflow",
|
__strlcat_chk.cpp | 49 __fortify_chk_fail("strlcat buffer overflow", 0);
|
__strlcpy_chk.cpp | 49 __fortify_chk_fail("strlcpy buffer overflow", 0);
|
__strlen_chk.cpp | 60 __fortify_chk_fail("strlen read overflow", 0);
|
__strncpy_chk.cpp | 48 __fortify_chk_fail("strncpy buffer overflow",
|
__umask_chk.cpp | 46 __fortify_chk_fail("umask called with invalid mask", 0);
|
__strcat_chk.cpp | 53 __fortify_chk_fail("strcat integer overflow", 58 __fortify_chk_fail("strcat buffer overflow",
|
__strncat_chk.cpp | 58 __fortify_chk_fail("strncat integer overflow", 63 __fortify_chk_fail("strncat buffer overflow",
|
__memcpy_chk.cpp | 49 __fortify_chk_fail("memcpy buffer overflow",
|
__vsnprintf_chk.cpp | 54 __fortify_chk_fail("vsnprintf buffer overflow", 0);
|
__vsprintf_chk.cpp | 55 __fortify_chk_fail("vsprintf buffer overflow", 0);
|
open.c | 56 __fortify_chk_fail("open(O_CREAT) called without specifying a mode", 0);
|
openat.c | 57 __fortify_chk_fail("openat(O_CREAT) called without specifying a mode", 0);
|
libc_logging.cpp | 484 void __fortify_chk_fail(const char *msg, uint32_t tag) { function
|
/bionic/libc/string/ |
strchr.c | 39 __fortify_chk_fail("strchr read beyond buffer", 0);
|
strrchr.c | 41 __fortify_chk_fail("strrchr read beyond buffer", 0);
|
/bionic/libc/private/ |
libc_logging.h | 108 __LIBC_HIDDEN__ __noreturn void __fortify_chk_fail(const char* msg, uint32_t event_tag);
|