Searched refs:__fortify_fatal (Results 1 – 11 of 11) sorted by relevance
/bionic/libc/private/ |
D | bionic_fortify.h | 42 inline __noreturn __printflike(1, 2) void __fortify_fatal(const char* fmt, ...) { in __fortify_fatal() function 56 __fortify_fatal("%s: file descriptor %d < 0", fn, fd); in __check_fd_set() 59 __fortify_fatal("%s: file descriptor %d >= FD_SETSIZE %d", fn, fd, FD_SETSIZE); in __check_fd_set() 62 __fortify_fatal("%s: set size %zu is too small to be an fd_set", fn, set_size); in __check_fd_set() 69 __fortify_fatal("%s: %zu-element pollfd array too small for %u fds", in __check_pollfd_array() 76 __fortify_fatal("%s: %s %zu > SSIZE_MAX", fn, identifier, value); in __check_count() 83 __fortify_fatal("%s: prevented %zu-byte %s %zu-byte buffer", fn, claim, action, actual); in __check_buffer_access()
|
/bionic/libc/bionic/ |
D | fortify.cpp | 259 __fortify_fatal("stpncpy: detected read past end of %zu-byte buffer", src_len); in __stpncpy_chk2() 278 __fortify_fatal("strcat: prevented write past end of %zu-byte buffer", dst_buf_size); in __strcat_chk_fail() 284 __fortify_fatal("strchr: prevented read past end of buffer"); in __strchr_chk() 298 __fortify_fatal("strcpy: prevented write past end of %zu-byte buffer", dst_buf_size); in __strcpy_chk_fail() 319 __fortify_fatal("strlen: detected read past end of buffer"); in __strlen_chk() 339 __fortify_fatal("strncat: prevented write past end of buffer"); in __strncat_chk() 370 __fortify_fatal("strncpy: detected read past end of %zu-byte buffer", src_len); in __strncpy_chk2() 389 __fortify_fatal("strrchr: prevented read past end of buffer"); in __strrchr_chk() 402 __fortify_fatal("umask: called with invalid mask %o", mode); in __umask_chk() 471 __fortify_fatal("strcat: prevented write past end of %zu-byte buffer", dst_buf_size); in __STRCAT_CHK()
|
D | open.cpp | 71 if (needs_mode(flags)) __fortify_fatal("open: called with O_CREAT/O_TMPFILE but no mode"); in __open_2() 90 if (needs_mode(flags)) __fortify_fatal("open: called with O_CREAT/O_TMPFILE but no mode"); in __openat_2()
|
D | dirent.cpp | 62 #define CHECK_DIR(d) if (d == nullptr) __fortify_fatal("%s: null DIR*", __FUNCTION__)
|
D | pthread_mutex.cpp | 803 __fortify_fatal("%s called on a destroyed mutex (%p)", function_name, mutex); in HandleUsingDestroyedMutex()
|
/bionic/libc/stdio/ |
D | local.h | 265 if (fp == nullptr) __fortify_fatal("%s: null FILE*", __FUNCTION__)
|
D | vfscanf.cpp | 297 __fortify_fatal("scanf 'm' only works with %%c/%%s/%%["); in __svfscanf() 300 __fortify_fatal("scanf 'm' makes no sense with '*'"); in __svfscanf()
|
D | vfwprintf.cpp | 439 __fortify_fatal("%%n not allowed on Android"); in FUNCTION_NAME()
|
D | vfprintf.cpp | 454 __fortify_fatal("%%n not allowed on Android"); in FUNCTION_NAME()
|
D | stdio.cpp | 233 if (fd > SHRT_MAX) __fortify_fatal("stdio: fd %d > SHRT_MAX", fd); in __FILE_init() 774 if (n <= 0) __fortify_fatal("fgets: buffer size %d <= 0", n); in fgets_unlocked()
|
D | printf_common.h | 505 __fortify_fatal("%%n not allowed on Android"); in __find_arguments()
|