Home
last modified time | relevance | path

Searched refs:__fortify_fatal (Results 1 – 10 of 10) sorted by relevance

/bionic/libc/private/
Dbionic_fortify.h42 inline __noreturn __printflike(1, 2) void __fortify_fatal(const char* fmt, ...) { in __fortify_fatal() function
56 __fortify_fatal("%s: file descriptor %d < 0", fn, fd); in __check_fd_set()
59 __fortify_fatal("%s: file descriptor %d >= FD_SETSIZE %d", fn, fd, FD_SETSIZE); in __check_fd_set()
62 __fortify_fatal("%s: set size %zu is too small to be an fd_set", fn, set_size); in __check_fd_set()
69 __fortify_fatal("%s: %zu-element pollfd array too small for %u fds", in __check_pollfd_array()
76 __fortify_fatal("%s: %s %zu > SSIZE_MAX", fn, identifier, value); in __check_count()
83 __fortify_fatal("%s: prevented %zu-byte %s %zu-byte buffer", fn, claim, action, actual); in __check_buffer_access()
/bionic/libc/bionic/
Dfortify.cpp98 __fortify_fatal("fgets: buffer size %d < 0", supplied_size); in __fgets_chk()
262 __fortify_fatal("stpncpy: detected read past end of %zu-byte buffer", src_len); in __stpncpy_chk2()
281 __fortify_fatal("strcat: prevented write past end of %zu-byte buffer", dst_buf_size); in __strcat_chk_fail()
287 __fortify_fatal("strchr: prevented read past end of buffer"); in __strchr_chk()
301 __fortify_fatal("strcpy: prevented write past end of %zu-byte buffer", dst_buf_size); in __strcpy_chk_fail()
322 __fortify_fatal("strlen: detected read past end of buffer"); in __strlen_chk()
342 __fortify_fatal("strncat: prevented write past end of buffer"); in __strncat_chk()
373 __fortify_fatal("strncpy: detected read past end of %zu-byte buffer", src_len); in __strncpy_chk2()
392 __fortify_fatal("strrchr: prevented read past end of buffer"); in __strrchr_chk()
405 __fortify_fatal("umask: called with invalid mask %o", mode); in __umask_chk()
[all …]
Dopen.cpp71 if (needs_mode(flags)) __fortify_fatal("open: called with O_CREAT/O_TMPFILE but no mode"); in __open_2()
90 if (needs_mode(flags)) __fortify_fatal("open: called with O_CREAT/O_TMPFILE but no mode"); in __openat_2()
Ddirent.cpp62 #define CHECK_DIR(d) if (d == nullptr) __fortify_fatal("%s: null DIR*", __FUNCTION__)
Dpthread_mutex.cpp803 __fortify_fatal("%s called on a destroyed mutex (%p)", function_name, mutex); in HandleUsingDestroyedMutex()
/bionic/libc/stdio/
Dlocal.h265 if (fp == nullptr) __fortify_fatal("%s: null FILE*", __FUNCTION__)
Dvfscanf.cpp297 __fortify_fatal("scanf 'm' only works with %%c/%%s/%%["); in __svfscanf()
300 __fortify_fatal("scanf 'm' makes no sense with '*'"); in __svfscanf()
Dvfwprintf.cpp439 __fortify_fatal("%%n not allowed on Android"); in FUNCTION_NAME()
Dvfprintf.cpp454 __fortify_fatal("%%n not allowed on Android"); in FUNCTION_NAME()
Dprintf_common.h505 __fortify_fatal("%%n not allowed on Android"); in __find_arguments()