Searched refs:__fortify_error (Results 1 – 4 of 4) sorted by relevance
/third_party/musl/porting/linux/user/src/fortify/ |
D | fortify.c | 36 void __fortify_error(const char* info, ...) in __fortify_error() function 63 __fortify_error("open: " OPEN_TOO_FEW_ARGS_ERROR); in __open_chk() 71 __fortify_error("openat: " OPEN_TOO_FEW_ARGS_ERROR); in __openat_chk() 80 __fortify_error("open64: " OPEN_TOO_FEW_ARGS_ERROR); in __open64_chk() 88 __fortify_error("openat64: " OPEN_TOO_FEW_ARGS_ERROR); in __openat64_chk() 98 __fortify_error("%s: %zu-element pollfd array too small for %u fds\n", in __diagnose_pollfd_array() 122 __fortify_error("%s: avoid %zu-byte %s %zu-byte buffer\n", fn, claim, action, actual); in __diagnose_buffer_access() 155 __fortify_error("umask: called with invalid mask %o\n", mode); in __umask_chk() 165 __fortify_error("%s: %s %zu > SSIZE_MAX\n", fn, identifier, value); in __diagnose_count() 173 __fortify_error("strlen: diagnose read exceed end of buffer\n"); in __strlen_chk() [all …]
|
/third_party/musl/ndk_musl_include/fortify/ |
D | fortify.h | 131 void __fortify_error(const char* info, ...);
|
/third_party/musl/porting/linux/user/include/fortify/ |
D | fortify.h | 131 void __fortify_error(const char* info, ...);
|
/third_party/musl/ |
D | libc.map.txt | 49 __fortify_error;
|