Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/stdafx.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_endpoint_object.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_io_completion.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_endpoint_object.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_interface.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/AdbWinUsbApi.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/stdafx.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_io_completion.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_interface.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/stdafx.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/stdafx.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/stdafx.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api_instance.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_object_handle.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_endpoint_object.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/AdbWinApi.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_interface.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api_legacy.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_io_completion.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface_enum.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_helper_routines.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_interface.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_io_completion.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api_instance.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_object_handle.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_helper_routines.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_io_completion.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_endpoint_object.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api_private_defines.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface_enum.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/stdafx.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_endpoint_object.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_winusb_api.h
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_io_completion.cpp
Examining data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_endpoint_object.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/GLES3/gl3ext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/GLES3/gl3platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/GLES3/gl3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/android/bitmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/android/input.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/android/configuration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/math.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/SLES/OpenSLES_Android.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/SLES/OpenSLES_Platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/SLES/OpenSLES_AndroidConfiguration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/SLES/OpenSLES.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/SLES/OpenSLES_AndroidMetadata.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/android/input.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/android/native_window.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/android/rect.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/OMXAL/OpenMAXAL.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/OMXAL/OpenMAXAL_Platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/OMXAL/OpenMAXAL_Android.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/android/sensor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/wait.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/sys/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/if_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/if_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/ethernet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/ethertypes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/if.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/if_ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/if_packet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/route.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/net/if_ieee1394.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/fnmatch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/machine/endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sgtty.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/getopt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netdb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdint.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/fts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/pthread.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/termio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wctype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/nsswitch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/assert.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/locale.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/strings.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/link.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/syslog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/cdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/taskstats_kern.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/errqueue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/relay.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mod_devicetable.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kdev_t.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/version.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nf_conntrack_sctp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nfnetlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_SECMARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nf_conntrack_ftp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_limit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_statistic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_connbytes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nf_conntrack_common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_physdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_tcpudp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_realm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_comment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nf_conntrack_tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_mac.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_quota.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_helper.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_CLASSIFY.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_sctp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_CONNSECMARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_pkttype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_conntrack.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_state.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nf_conntrack_tuple_common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/nfnetlink_conntrack.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_tcpmss.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_NFQUEUE.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_esp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_length.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_dccp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_multiport.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kref.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/stacktrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pci.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msdos_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/qnxtypes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msm_adsp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kmod.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mc146818rtc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kernel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/vmalloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/etherdevice.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/shm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/rbtree.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sysfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/un.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/stddef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msm_mdp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pfkeyv2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_vlan.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/seqlock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/platform_device.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/irq_cpustat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/compiler-gcc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hil.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_LOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_comment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_dscp_.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_nat_rule.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_conntrack_tuple.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_nat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_hashlimit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_pkttype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_realm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_helper.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_CLASSIFY.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ECN.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_conntrack.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_DSCP.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_physdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_queue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ah.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_TCPMSS.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_NFQUEUE.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_iprange.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_dccp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_length.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_sctp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_recent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_state.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_REJECT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_connbytes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_tos_.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_TOS.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_addrtype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_TTL.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_owner.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_mac.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_esp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dccp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/xprt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/stats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/gss_err.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/gss_asn1.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/auth.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/debug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/gss_api.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/clnt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/xdr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/timer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/svc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/auth_gss.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/svcauth.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/msg_prot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/lockd/xdr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/lockd/nlm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pci_ids.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fadvise.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs_xdr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_tun.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/highmem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/futex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs4.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/slab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/jiffies.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/numa.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_ppp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/init.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/preempt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/calc64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_fs_sb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dmaengine.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdreg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ashmem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/aio_abi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/jbd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kobject.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/bitops.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/gfp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/byteorder/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/byteorder/generic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/byteorder/swabb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/byteorder/big_endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/byteorder/little_endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/notifier.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/spinlock_api_smp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_bridge.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/attribute_container.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/vt_buffer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mempool.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/i2c.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/stringify.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/patchkey.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/rtnetlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/list.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/percpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ncp_no.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/uio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/autoconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/in.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/udp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/qic117.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/akm8976.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/err.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmapi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/spinlock_api_up.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nodemask.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pagemap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/spinlock_up.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/backing-dev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/rwsem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/omap_csmi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/debug_locks.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/binfmts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ata.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_dir.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mempolicy.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/serial_core.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/binder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipmi_msgdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/threads.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dirent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ftape.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/zlib.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ioport.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/clk.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/android_pmem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/zconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmsap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sysctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/moduleparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/bitmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kernelcapi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/genhd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ufs_fs_sb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/percpu_counter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wait.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/usb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wireless.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/partitions.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/cfi_endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/nand_ecc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/bbm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/compatmac.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/nand.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/cfi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/flashchip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/onenand_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/map.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/nftl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/blktrans.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/mtd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/zorro_ids.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/in6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/file.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/input.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mutex-debug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/completion.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_bridge.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/skbuff.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ioprio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/klist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/keyboard.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/tty.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ppp_defs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/xor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md_k.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md_p.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md_u.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/timex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pkt_cls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_ipv6header.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_esp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_LOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_frag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_opts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_ah.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_owner.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_REJECT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_mac.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_physdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_rt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_length.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_packet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kexec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipmi_smi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_fs_i.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/proc_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_hippi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/vfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kernel_stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipv6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_fc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mmzone.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/smb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext3_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/irqreturn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ctype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msm_audio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dma-mapping.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/spinlock_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pkt_sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmppp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mutex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/smp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ppdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mt9t013.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/xattr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/vt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/lockdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/taskstats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/serial_reg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/key.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/spinlock_types_up.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/elf-em.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ktime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/coda.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/apm_bios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/irqflags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/linkage.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/keychord.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hardirq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ufs_fs_i.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/android_power.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/cpumask.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/workqueue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/console_struct.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/tiocl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdlc/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/thread_info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/reboot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/route.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/compiler.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/timer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/plist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/usb_ch9.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/personality.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/delay.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/posix_acl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/bio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_fddi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pnp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/quota.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/smp_lock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/magic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/stats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/const.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/export.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/auth.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/debug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/nfsfh.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/xdr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/interface.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/elevator.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext2_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mca.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/module.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/net.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/pci_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/device.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/cpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/usbdevice_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/loop.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/seq_file.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mmc/mmc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mmc/card.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mmc/host.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/icmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/cache.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/major.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/textsearch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/swap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/miscdevice.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/auto_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/config.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/cdrom.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/random.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/times.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ncp_mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/circ_buf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ncp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/blkdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/filter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netdevice.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/spinlock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/serio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmioc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nvram.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/rcupdate.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/node.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsacl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/blkpg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sysdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/coda_fs_i.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/capability.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/transport_class.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/inotify.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_tr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/capi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/rtc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_arcnet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/blockgroup_lock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/interrupt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/dirent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/grp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/zlib.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/SLES/OpenSLES_Android.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/SLES/OpenSLES_Platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/SLES/OpenSLES_AndroidConfiguration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/SLES/OpenSLES.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/zconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/dlfcn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/mtd/mtd-user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/mtd/mtd-abi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/memory.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/resolv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/semaphore.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/icmp6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/in.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/udp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/in_systm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/ip_icmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/in6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/if_ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/ip6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/ip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netinet/tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/pathconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/netpacket/packet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/ctype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES/gl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES/glext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES/glplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/mntent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/regex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/asset_manager_jni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/obb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/native_window_jni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/bitmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/input.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/storage_manager.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/asset_manager.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/native_activity.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/window.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/native_window.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/log.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/sensor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/rect.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/configuration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/looper.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/alloca.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES2/gl2ext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES2/gl2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES2/gl2platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/byteswap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/inttypes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/time64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/memory_model.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/pgtable-nopmd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/futex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/xor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/sections.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/percpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/pgtable-nopud.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/mman-common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/errno-base.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/audit_dir_write.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/mutex-xchg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/emergency-restart.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/cputime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/tlb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/pgtable.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/ipc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/local.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/topology.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/le.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/fls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/non-atomic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/ffz.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/fls64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/__ffs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/find.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/bitops/atomic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/4level-fixup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/math.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/thread_db.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/libgen.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/KHR/khrplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/malloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/arpa/nameser.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/arpa/inet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/arpa/telnet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/features.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/lastlog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/util.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/pwd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/jni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ioctl_compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/exec_elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/un.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/syslimits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/select.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/linux-syscalls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/sysmacros.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/sysconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/sendfile.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/uio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/queue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/dirent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/system_properties.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/wait.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/socketcalls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/file.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/eventfd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/atomics.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/timeb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_errdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/vfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/cdefs_elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/klog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_sigdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/vt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ttychars.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_wchar_limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/reboot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_system_properties.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/cdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ttydev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/epoll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/times.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/sysinfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ipc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/inotify.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/cachectl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/syscall.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/fsuid.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/paths.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/kernel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/internal_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/cdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/ieee.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/cpu-features.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/div64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/vga.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/mc146818rtc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/glue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/scatterlist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/dyntick.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/hardware.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/bitops.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/percpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/sizes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/locks.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/processor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/fpstate.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/ide.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/io.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/mtd-xip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/memory.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/timex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/semaphore.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/pgalloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/dma-mapping.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/spinlock_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/smp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/proc-fns.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/uaccess.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/suspend.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/page.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/linkage.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/hardirq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/cacheflush.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/cputime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/thread_info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/hw_irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/unaligned.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/pgtable-hwdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/delay.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/domain.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/system.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/procinfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/module.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/shmparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/cache.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/pgtable.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/local.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/tlbflush.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/spinlock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/vmalloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/hardware.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/gpio-switch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/io.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/mtd-xip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/memory.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board-perseus2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/timex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/gpio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/serial.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/mux.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/irqs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/cpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/mcbsp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/omap24xx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/fpga.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/dma.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/atomic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/topology.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/dma.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/sys/_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/src/atexit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/src/crtbegin_so.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/src/__dso_handle.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/src/crtbegin_static.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/src/crtbegin_dynamic.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/src/__dso_handle_so.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/kernel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/internal_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/regdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/regnum.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/cdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/ieee.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/div64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/vga.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mc146818rtc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/txx9irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/barrier.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mach-ip22/ds1286.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/scatterlist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/fpregdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/vr41xx/irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mips-boards/bonito64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mips-boards/msc01_pci.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mips-boards/generic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mips-boards/malta.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/reg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/addrspace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/bitops.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sibyte/bcm1480_scd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sibyte/sb1250_int.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sibyte/sb1250.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sibyte/bcm1480_int.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sibyte/sb1250_scd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/floppy.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mmu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/fw/arc/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sections.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/bootinfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/jazzdma.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgi/hpc3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgi/ioc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgi/pi1.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/percpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cpu-info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/fixmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/bug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pci/bridge.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/processor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/irq_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ide.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cacheops.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/debug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/io.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mach-generic/spaces.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/timex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/i8253.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/current.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pgalloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/jazz.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mmzone.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/war.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dma-mapping.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/regdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mutex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/smp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/crime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/smp-ops.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/uaccess.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mipsmtregs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/gt64120.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/page.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/linkage.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/hardirq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pgtable-32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cmpxchg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cacheflush.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cputime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/thread_info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/segment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/hw_irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/unaligned.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/prefetch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/tlb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/compiler.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/kmap_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dsp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mips_mt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/delay.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/system.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sysmips.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/module.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/shmparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mipsregs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/device.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cpu-features.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dec/ioasic_addrs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dec/ecc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dec/system.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dec/kn02xa.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/irq_gt641xx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cache.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pgtable-bits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/hazards.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/i8259.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/kdebug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pgtable.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgidefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/local.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/tlbflush.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/atomic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/arch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/kldir.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/sn0/hubio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/sn0/addrs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/sn0/hubni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/sn0/hubmd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/sn0/hubpi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/io.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/addrs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/ioc3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/hub.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/klkernvars.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/checksum.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ds1286.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/topology.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/dma.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/cachectl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/xtalk/xtalk.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/xtalk/xwidget.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mach-au1x00/au1000.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/mach-au1x00/au1xxx_psc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/sys/ioctl_compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/sys/linux-syscalls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/sys/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/sys/_sigdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/sys/_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/src/crtbegin.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/src/atexit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/src/crtbegin_so.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/kernel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/internal_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/cdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/ieee.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/div64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/dma_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/processor_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pda.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/vsyscall.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mc146818rtc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/module_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/semaphore_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/desc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/scatterlist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/io_apic_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/bitops_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pgtable_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pgalloc_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/highmem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/string_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/processor-flags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/bitops.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/required-features.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/e820.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/swiotlb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/irq_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mmu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/sections.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/unistd_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/percpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/dwarf2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/scatterlist_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/genapic_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mc146818rtc_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/hw_irq_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/fixmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/percpu_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/bug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/rwlock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/msr-index.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/user32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/processor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/dma-mapping_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/tsc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/apic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/posix_types_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/atomic_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/genapic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/segment_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/io.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ia32_unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/user_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/i8253.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ldt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/io_apic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/current.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/semaphore.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/alternative_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pgalloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/page_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/math_emu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/hardirq_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/xen/hypercall.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/apic_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/dma-mapping.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/spinlock_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/smp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/acpi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/i387.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/apicdef_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/uaccess.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/apicdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/irqflags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/page.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/linkage.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cpufeature_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/hardirq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/i387_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/smp_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cmpxchg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cacheflush.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cputime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/acpi_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pgtable-2level-defs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/thread_info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/local_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/segment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/hw_irq.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/unaligned.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/uaccess_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/dwarf2_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/kmap_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cpufeature.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/io_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/alternative.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/delay.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/spinlock_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/system.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pgtable-2level.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/paravirt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/linkage_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/voyager.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/irqflags_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/current_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/module.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mmsegment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/shmparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/desc_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cache.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/msr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/system_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/i8259.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/pgtable.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/ptrace-abi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/desc_defs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/local.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/tlbflush.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/spinlock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/vm86.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/tlbflush_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cmpxchg_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/atomic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/thread_info_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/fixmap_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/dma.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/sys/_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/src/crtbegin.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/src/atexit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/src/crtbegin_so.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/src/__stack_chk_fail_local.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/src/asm_multiarch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-15/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-17/include/android/configuration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-23/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-23/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-23/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-23/include/android/trace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-23/include/android/multinetwork.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/if_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/if_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/ethernet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/ethertypes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/if.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/if_ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/if_packet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/route.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/net/if_ieee1394.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fnmatch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/machine/wchar_limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/machine/ieee.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/machine/endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sgtty.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/getopt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netdb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdint.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdatomic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pthread.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/termio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/uchar.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wctype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/nsswitch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/assert.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/locale.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/strings.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/xlocale.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/err.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/link.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/syslog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_device.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_cablemodem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/reiserfs_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/version.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/ca.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/video.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/audio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/dmx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/net.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/osd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/frontend.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/errqueue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmsvc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/v4l2-subdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vhost.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmmpc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irqnr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn_ppp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/btrfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/igmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/udf_fs_i.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kdev_t.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/version.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_nfacct.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_connmark.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_conntrack_sctp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_queue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_NFLOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_ecn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_DSCP.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_dscp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_TPROXY.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_IDLETIMER.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_TCPMSS.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_u32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_SECMARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_LED.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_conntrack_ftp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_connlabel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_limit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_recent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_HMARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_statistic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_connbytes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_owner.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_conntrack_common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_physdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_tcpudp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_acct.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_realm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_comment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_conntrack_tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/ipset/ip_set.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/ipset/ip_set_hash.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/ipset/ip_set_list.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/ipset/ip_set_bitmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_cthelper.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CHECKSUM.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_log.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_addrtype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_cttimeout.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_iprange.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_ipvs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_mac.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_RATEEST.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_cluster.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_cgroup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_quota.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_cpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_LOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_l2tp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_helper.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_bpf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CLASSIFY.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_connlimit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_TCPOPTSTRIP.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_sctp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_nat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CONNSECMARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_pkttype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_AUDIT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_mark.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_conntrack.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_SYNPROXY.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_devgroup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_state.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_rateest.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_osf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_conntrack_tuple_common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nfnetlink_conntrack.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/nf_tables_compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_tcpmss.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_ipcomp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_MARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CONNMARK.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_NFQUEUE.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_esp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_policy.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_TEE.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_hashlimit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_length.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_dccp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_multiport.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_rpfilter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_set.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/adb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/v4l2-mediabus.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pci.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlmconstants.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/omap3isp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/in_route.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/perf_event.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/msdos_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/qnxtypes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kernel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auto_fs4.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/joystick.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ax25.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/genwqe/genwqe_card.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fiemap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/uinput.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ixjuser.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/shm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_9p.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_pci.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/suspend_ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/veth.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/un.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vfio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/videodev2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/stddef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_decnet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sdla.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppopns.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_netlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fuse.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/const.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kernel-page-flags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/minix_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pfkeyv2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_vlan.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/gfs2_ondisk.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_LOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ECN.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ah.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ecn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_CLUSTERIP.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_REJECT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_TTL.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ttl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dccp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sunrpc/debug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/som.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fadvise.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/arcfb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_eql.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_tun.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_tunnel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_slip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc_config.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/futex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs4.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_ltalk.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_ppp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_link.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_frad.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netrom.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/efs_fs_sb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdreg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/romfs_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ashmem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/aio_abi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/watchdog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fdreg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn/capicmd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/matroxfb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elf-fdpic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fib_rules.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_phonet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/toshiba.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mdio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/byteorder/big_endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/byteorder/little_endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_console.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/genetlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cuda.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mroute6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppolac.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_rng.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sonypi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ppp-comp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tcp_metrics.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/seccomp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/parport.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/edd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/i2c.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/spi/spidev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pktcdvd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arpt_mangle.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/patchkey.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mqueue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rtnetlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_net.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bpqether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_no.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wimax/i2400m.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn_divertif.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip6_tunnel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/uio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/unix_diag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wimax.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/caif/if_caif.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/caif/caif_socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cifs/cifs_mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bcm933xx_hcs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/in.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/udp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/falloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bcache.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/i8k.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmapi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hsi/hsi_char.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/securebits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cciss_defs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/icmpv6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rfkill.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/binfmts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_team.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mmtimer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mempolicy.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/firewire-constants.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/serial_core.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sock_diag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pmu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/binder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipmi_msgdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs_idmap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_log.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ip6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_vlan.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_redirect.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_mark_m.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_among.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_mark_t.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_stp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_802_3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_pkttype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_nflog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_limit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_nat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arpreply.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/uuid.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdnif.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hiddev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmsap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sonet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sysctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/firewire-cdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kernelcapi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/acct.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hash_info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wait.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_ematch/tc_em_meta.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_ematch/tc_em_text.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_ematch/tc_em_cmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_ematch/tc_em_nbyte.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vsp1.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wireless.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/uvcvideo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/zorro_ids.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bsg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cgroupstats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/phonet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/in6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ptp_clock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmbr2684.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/llc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/i2c-dev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ppp-ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/input.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_x25.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rose.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/blktrace_api.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_bridge.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ioprio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/cdc-wdm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/functionfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/ch11.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/f_accessory.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/video.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/gadgetfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/audio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/g_printer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/tmc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/cdc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/ch9.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/f_mtp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usb/midi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ivtvfb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/keyboard.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tty.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/oom.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/selinux_netlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ppp_defs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/raid/md_p.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/raid/md_u.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hidraw.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/timex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cycx_cfm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_alg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pkt_cls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_ipv6header.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_hl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_LOG.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_HL.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_mh.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_frag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_opts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_ah.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_REJECT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_NPT.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_rt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmlec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sync.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/msg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_packet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_balloon.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kexec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/flat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppox.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/signalfd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/baycom.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sw_sync.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rds.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_hippi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipv6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_fc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elfcore.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ivtv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/adfs_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/omapfb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nl80211.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mtio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/openvswitch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_ring.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/zorro.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cn_proc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdlcdrv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irda.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppol2tp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pkt_sched.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sound.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netlink_diag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmppp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_config.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mic_common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nbd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm_eni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ppdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cramfs_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hpet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xattr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nubus.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_bonding.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wanrouter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/taskstats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/serial_reg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ultrasound.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_addrlabel.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hysdn_if.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmarp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fsl_hypervisor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elf-em.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coda.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hw_breakpoint.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_plock.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/apm_bios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/keychord.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/jffs2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/screen_info.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tiocl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/net_dropmon.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/lp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dqblk_xfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-log-userspace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hid.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs4_mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coda_psdev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdlc/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/net_tstamp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/v4l2-controls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/serial.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/reboot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/i2o-dev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/route.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/radeonfb.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/compiler.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/gigaset_dev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/scc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipmi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ion.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bfs_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm_nicstar.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipv6_route.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm_zatm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/connector.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/personality.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_fddi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can/gw.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can/netlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can/bcm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can/raw.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can/error.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_addr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs_mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cm4000_cs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/quota.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/inet_diag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/magic.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdlc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_blk.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/gameport.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/v4l2-common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/qnx4_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pps.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsd/stats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsd/export.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsd/cld.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsd/debug.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsd/nfsfh.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sctp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/neighbour.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/module.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/net.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pci_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_plip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/agpgart.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usbdevice_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/v4l2-dv-timings.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/loop.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_csum.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_skbedit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_ipt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_defact.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_mirred.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_gact.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_nat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_act/tc_pedit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/x25.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mmc/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/icmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mei.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atalk.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipsec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/gen_stats.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fanotify.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/major.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auto_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs_fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cdrom.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/random.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/times.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/raw.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/audit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm_he.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/n_r3964.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/uhid.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/l2tp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/virtio_ids.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/keyctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sysinfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/packet_diag.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/b1lli.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/filter.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/synclink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mroute.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vm_sockets.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netdevice.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/phantom.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/media.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/serio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmioc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm_tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nvram.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_infiniband.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsacl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm_idt77105.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/blkpg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cciss_ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mic_ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cyclades.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/capability.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip_vs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/meye.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/inotify.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hsr_netlink.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/snmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/capi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/map_to_7segment.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/reiserfs_xattr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rtc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mii.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nvme.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/libc-compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/eventpoll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tty_flags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmclip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_arcnet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dcbnl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaMuxer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaCodec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaCrypto.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaError.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaFormat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaDrm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/media/NdkMediaExtractor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/dirent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/grp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/SLES/OpenSLES_Android.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/SLES/OpenSLES_Platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/SLES/OpenSLES_AndroidConfiguration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/SLES/OpenSLES.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/SLES/OpenSLES_AndroidMetadata.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/dlfcn.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/memory.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/resolv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/semaphore.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES3/gl31.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES3/gl3platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES3/gl3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/icmp6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/in.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/udp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/in_systm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/ip_icmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/in6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/if_ether.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/ip6.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/ip.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netinet/tcp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pathconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/netpacket/packet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ctype.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/mntent.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/regex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/android/api-level.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/android/dlext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/android/sensor.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/android/configuration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/alloca.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2ext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/byteswap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/inttypes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/time64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/signal-defs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/mman-common.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/int-ll64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/errno-base.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/int-l64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/shmparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/math.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ftw.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/search.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/libgen.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/malloc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/nameser.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/nameser_compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/inet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/telnet.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/features.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/lastlog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/complex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/util.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pwd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/procfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ioctl_compat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/shm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/un.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/syslimits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/select.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/sysmacros.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/timerfd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/reg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ttydefaults.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/user.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/sysconf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/sendfile.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/uio.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/queue.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/auxv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/system_properties.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/wait.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/socketcalls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/file.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/eventfd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/timex.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/msg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/signalfd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/vfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/statvfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/cdefs_elf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/klog.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/xattr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/vt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/mount.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ttychars.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/reboot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/limits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/personality.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/cdefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/glibc-syscalls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utime.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ttydev.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/epoll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/swap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/times.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/sysinfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ipc.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/endian.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/capability.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/inotify.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/cachectl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/syscall.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/sem.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/fsuid.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/paths.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/time.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/machine/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/machine/cpu-features.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/perf_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/hwcap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/src/crtbegin.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/src/atexit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/src/__dso_handle.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/machine/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/hwcap.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/include/asm/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/src/crtbegin.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/src/atexit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm64/src/crtbegin_so.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/regdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/regnum.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/reg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/inst.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/sysmips.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/sgidefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/break.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/cachectl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/sgidefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/src/crtbegin.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/src/atexit.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/src/crtbegin_so.c
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/src/asm_multiarch.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/regdef.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/regnum.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/reg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/inst.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/sysmips.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/sgidefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/break.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/cachectl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/sgidefs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/machine/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/machine/fpu.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/i386/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/posix_types_64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/vsyscall.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/hyperv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/mtrr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/processor-flags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/e820.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/bootparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/perf_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/unistd_x32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/unistd_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/msr-index.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/posix_types_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ldt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/svm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/hw_breakpoint.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/unistd_64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/posix_types_x32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/sigcontext32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/msr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/vmx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/ptrace-abi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/boot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/vm86.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/mce.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/debugreg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/machine/asm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/machine/setjmp.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/machine/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/machine/fenv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/machine/exec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/i386/elf_machdep.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/posix_types_64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/prctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/sockios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/stat.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/vsyscall.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/sigcontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/shmbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/sembuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ptrace.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/errno.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/hyperv.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/mtrr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/processor-flags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/e820.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/bootparam.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/perf_regs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/unistd_x32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/unistd_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/mman.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ucontext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/swab.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/kvm_para.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/msr-index.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/posix_types_32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/socket.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/signal.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/siginfo.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/param.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ist.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ldt.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ioctl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/svm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/termbits.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/poll.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ipcbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/setup.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/hw_breakpoint.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/unistd_64.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/kvm.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/posix_types.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/posix_types_x32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/fcntl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ioctls.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/sigcontext32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/byteorder.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/resource.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/msr.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/vmx.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/a.out.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/termios.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/ptrace-abi.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/statfs.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/boot.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/msgbuf.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/vm86.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/mce.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/debugreg.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/auxvec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/unistd.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/bitsperlong.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/android/native_window_jni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/android/rect.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/android/configuration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/vulkan/vulkan.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/vulkan/vk_platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/media/NdkMediaCodec.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/media/NdkImageReader.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/media/NdkMediaError.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/media/NdkImage.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/EGL/egl.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/EGL/eglext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/EGL/eglplatform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/SLES/OpenSLES_Android.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/SLES/OpenSLES_Platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/SLES/OpenSLES_AndroidConfiguration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/SLES/OpenSLES.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/SLES/OpenSLES_AndroidMetadata.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl32.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl31.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl3ext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl3platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl3.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCaptureRequest.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCameraMetadata.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCameraDevice.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCameraMetadataTags.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCameraManager.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCameraCaptureSession.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/camera/NdkCameraError.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/android/choreographer.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2platform.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/native_window_jni.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/input.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/keycodes.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/asset_manager.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/native_activity.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/tts.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/android/configuration.h
Examining data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/math.h
Examining data/android-platform-development-8.1.0+r23/ndk/tests/dlclose-destruction/jni/main.c
Examining data/android-platform-development-8.1.0+r23/ndk/tests/dlclose-destruction/jni/libtest1.cpp
Examining data/android-platform-development-8.1.0+r23/ndk/tests/dlclose-destruction/jni/libtest1.h
Examining data/android-platform-development-8.1.0+r23/ndk/tests/prebuilt-library/jni/foo/foo.c
Examining data/android-platform-development-8.1.0+r23/ndk/tests/prebuilt-library/jni/foo/foo.h
Examining data/android-platform-development-8.1.0+r23/ndk/tests/prebuilt-library/jni/foo-user.c
Examining data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c
Examining data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp
Examining data/android-platform-development-8.1.0+r23/tutorials/ReverseDebug/main.c
Examining data/android-platform-development-8.1.0+r23/tutorials/MoarRam/jni/df.c
Examining data/android-platform-development-8.1.0+r23/tutorials/MoarRam/jni/foo.c
Examining data/android-platform-development-8.1.0+r23/tutorials/MoarRam/jni/baz.c
Examining data/android-platform-development-8.1.0+r23/tutorials/MoarRam/jni/bar.c
Examining data/android-platform-development-8.1.0+r23/vndk/tools/vtable-dumper/vndk_vtable_dumper.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/vtable-dumper/elf_handling.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/vtable-dumper/tests/test1.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/vtable-dumper/elf_handling.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/header_abi_diff.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/example1.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/func_decl_two_args.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/example2.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/example3.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/func_decl_no_args.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/example1.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/func_decl_one_arg_ret.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/input/func_decl_one_arg.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-linker/src/header_abi_linker.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/merge-abi-diff/src/merge_abi_diff.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/header_checker.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/frontend_action_factory.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/frontend_action.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/ast_processing.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/frontend_action_factory.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/ast_processing.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/frontend_action.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-util/include/header_abi_util.h
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-util/src/version_script_parser.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-util/src/collect_exported_headers.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-util/src/so_file_parser.cpp
Examining data/android-platform-development-8.1.0+r23/vndk/tools/definition-tool/tests/testdata/test_elfdump/input/main.c
Examining data/android-platform-development-8.1.0+r23/vndk/tools/definition-tool/tests/testdata/test_elfdump/input/test.c

FINAL RESULTS:

data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/sys/stat.h:115:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
extern int    chmod(const char *, mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:121:12:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
extern int readlink(const char *, char *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:122:12:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
extern int chown(const char *, uid_t, gid_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/stat.h:115:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
extern int    chmod(const char *, mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:272:7:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
char* gets(char*) __warnattr("gets is very unsafe; consider using fgets");
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h:146:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
extern int chmod(const char*, mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:116:16:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
extern ssize_t readlink(const char*, char*, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:118:12:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
extern int chown(const char *, uid_t, gid_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs_xdr.h:512:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
 int (*readlink)(struct inode *, struct page *, unsigned int,
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:234:7:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
char	*gets(char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/stat.h:115:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
extern int    chmod(const char *, mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:121:12:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
extern int readlink(const char *, char *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:122:12:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
extern int chown(const char *, uid_t, gid_t);
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:50:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        chmod(argv[i], S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP);
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api_private_defines.h:82:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(info->device_name, device_name().c_str());
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface.cpp:52:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(reinterpret_cast<wchar_t*>(buffer), interface_name().c_str());
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_interface.cpp:155:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(reinterpret_cast<wchar_t*>(buffer), serial_number);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:65:12:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execv(const char *, char * const *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:66:12:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execvp(const char *, char * const *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:68:12:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execl(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:69:12:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execlp(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:70:12:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execle(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:96:14:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
extern char* getlogin(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:109:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern int access(const char *, int);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:61:14:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
extern char *mktemp (char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:100:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int system(const char * string);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/GLES3/gl3.h:978:119:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL GLvoid*        GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2ext.h:269:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFEROESPROC) (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2ext.h:273:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferOES (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2ext.h:938:120:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEEXTPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES2/gl2ext.h:941:113:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRangeEXT (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES3/gl3.h:855:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES3/gl31.h:855:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/GLES3/gl31.h:1164:130:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/err.h:45:51:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define __errlike(x, y) __attribute__((__format__(printf, x, y)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:228:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 fprintf(FILE * __restrict , const char * __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:235:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 fscanf(FILE * __restrict, const char * __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:247:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 printf(const char * __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:254:6:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 scanf(const char * __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:258:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 sscanf(const char * __restrict, const char * __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:262:6:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 vfprintf(FILE * __restrict, const char * __restrict, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:264:6:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 vprintf(const char * __restrict, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:274:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char* __restrict, const char* __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:277:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vsprintf(char* __restrict, const char* __restrict, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:295:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int	 snprintf(char * __restrict, size_t, const char * __restrict, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:297:6:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 vfscanf(FILE * __restrict, const char * __restrict, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:299:6:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 vscanf(const char *, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:301:6:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int	 vsnprintf(char * __restrict, size_t, const char * __restrict, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:303:6:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 vsscanf(const char * __restrict, const char * __restrict, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:322:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE	*popen(const char *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:380:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int vsnprintf(char *dest, size_t size, const char *format, __va_list ap)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:387:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int vsprintf(char *dest, const char *format, __va_list ap)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:393:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  #if !defined(snprintf)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:395:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    #define snprintf(...) __wrap_snprintf(__VA_ARGS__)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:400:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int snprintf(char *dest, size_t size, const char *format, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:408:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  #if !defined(sprintf)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:410:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    #define sprintf(...) __wrap_sprintf(__VA_ARGS__)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:415:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int sprintf(char *dest, const char *format, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:61:14:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
extern char* mktemp(char*) __warnattr("mktemp possibly used unsafely; consider using mkstemp");
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:91:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int system(const char * string);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:57:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char*  strcpy(char* __restrict, const char* __restrict);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:58:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char*  strcat(char* __restrict, const char* __restrict);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:118:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char* strcpy(char* __restrict dest, const char* __restrict src) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:169:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
char* strcat(char* __restrict dest, const char* __restrict src) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/cdefs.h:234:54:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define __printflike(x, y) __attribute__((__format__(printf, x, y))) __nonnull((x))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/cdefs.h:235:53:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define __scanflike(x, y) __attribute__((__format__(scanf, x, y))) __nonnull((x))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/syslog.h:90:6:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
void syslog(int, const char*, ...) __printflike(2, 3);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:66:12:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execv(const char *, char * const *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:67:12:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execvp(const char *, char * const *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:70:12:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execl(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:71:12:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execlp(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:72:12:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execle(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:92:14:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
extern char* getlogin(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:100:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern int access(const char*, int);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:72:26:  [4] (format) fwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int               fwprintf(FILE *, const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:73:26:  [4] (buffer) fwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int               fwscanf(FILE *, const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:102:26:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int               swprintf(wchar_t *, size_t, const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:107:12:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int vfwprintf(FILE*, const wchar_t*, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:108:12:  [4] (buffer) vfwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vfwscanf(FILE*, const wchar_t*, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:109:12:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int vswprintf(wchar_t*, size_t, const wchar_t*, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:110:12:  [4] (buffer) vswscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vswscanf(const wchar_t*, const wchar_t*, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:111:12:  [4] (format) vwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int vwprintf(const wchar_t*, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:112:12:  [4] (buffer) vwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vwscanf(const wchar_t*, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:115:26:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
extern wchar_t          *wcscat(wchar_t *, const wchar_t *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:119:26:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
extern wchar_t          *wcscpy(wchar_t *, const wchar_t *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:151:26:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int               wprintf(const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:152:26:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int               wscanf(const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h:420:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFEROESPROC) (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h:424:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferOES (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h:1346:120:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEEXTPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h:1349:113:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRangeEXT (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h:2010:89:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (GL_APIENTRYP PFNGLMAKEIMAGEHANDLERESIDENTNVPROC) (GLuint64 handle, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES2/gl2ext.h:2024:82:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glMakeImageHandleResidentNV (GLuint64 handle, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl3.h:1023:117:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl3.h:1128:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl31.h:1023:117:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl31.h:1128:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl31.h:1438:137:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (GL_APIENTRYP PFNGLBINDIMAGETEXTUREPROC) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl31.h:1507:130:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl32.h:1023:117:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl32.h:1128:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl32.h:1438:137:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (GL_APIENTRYP PFNGLBINDIMAGETEXTUREPROC) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/GLES3/gl32.h:1507:130:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:57:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
 system, processor, cache, adapter, controller, peripheral, memory
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:351:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
 int (*printf)(const char *fmt, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/sn0/hubmd.h:439:2:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
 access: 2,
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/machine/asm.h:292:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	jal	printf; \
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES/glext.h:653:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_API void* GL_APIENTRY glMapBufferOES (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES/glext.h:657:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void* (GL_APIENTRYP PFNGLMAPBUFFEROESPROC) (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES2/gl2ext.h:451:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void* GL_APIENTRY glMapBufferOES (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/GLES2/gl2ext.h:455:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void* (GL_APIENTRYP PFNGLMAPBUFFEROESPROC) (GLenum target, GLenum access);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/log.h:101:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__ ((format(printf, 3, 4)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/android/log.h:120:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__ ((format(printf, 3, 4)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:51:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 3)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:53:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:55:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 3)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:57:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:59:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 2)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:61:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:63:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 2)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:65:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:72:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 3)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:74:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:76:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 3)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:78:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 2, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:80:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 2)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:82:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:84:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 2)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/err.h:86:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			__attribute__((__format__ (printf, 1, 0)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kernel_stat.h:25:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
 cputime64_t system;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs_xdr.h:355:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
 __u32 access;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs_xdr.h:425:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
 __u32 access;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs_xdr.h:511:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
 int (*access) (struct inode *, struct nfs_access_entry *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:220:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 fprintf(FILE *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:225:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 fscanf(FILE *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:242:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 printf(const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:249:6:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 scanf(const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:252:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int	 sprintf(char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:253:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 sscanf(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:257:6:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 vfprintf(FILE *, const char *, __va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:258:6:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int	 vprintf(const char *, __va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:259:6:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
int	 vsprintf(char *, const char *, __va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:262:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int	 snprintf(char *, size_t, const char *, ...)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:263:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		__attribute__((__format__ (printf, 3, 4)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:265:6:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 vfscanf(FILE *, const char *, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:266:30:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		__attribute__((__format__ (scanf, 2, 0)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:268:6:  [4] (buffer) vscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 vscanf(const char *, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:269:30:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		__attribute__((__format__ (scanf, 1, 0)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:271:6:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int	 vsnprintf(char *, size_t, const char *, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:272:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		__attribute__((__format__ (printf, 3, 0)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:274:6:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
int	 vsscanf(const char *, const char *, __va_list)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:275:30:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		__attribute__((__format__ (scanf, 2, 0)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:292:7:  [4] (misc) cuserid:
  Exactly what cuserid() does is poorly defined (e.g., some systems use the
  effective uid, like Linux, while others like System V use the real uid).
  Thus, you can't trust what it does. It's certainly not portable (The
  cuserid function was included in the 1988 version of POSIX, but removed
  from the 1990 version). Also, if passed a non-null parameter, there's a
  risk of a buffer overflow if the passed-in buffer is not at least L_cuserid
  characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired
  information instead.
char	*cuserid(char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:299:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
FILE	*popen(const char *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:330:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		__attribute__((__format__ (printf, 2, 3)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:339:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		__attribute__((__format__ (printf, 2, 0)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:61:14:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
extern char *mktemp (char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:97:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int system(const char * string);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h:54:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char*  strcpy(char *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h:55:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char*  strcat(char *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/cdefs.h:240:54:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define __printflike(x, y) __attribute__((__format__(printf, x, y))) __nonnull((x))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/cdefs.h:241:53:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define __scanflike(x, y) __attribute__((__format__(scanf, x, y))) __nonnull((x))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/syslog.h:106:13:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
extern void	syslog(int, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:65:12:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execv(const char *, char * const *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:66:12:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execvp(const char *, char * const *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:68:12:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execl(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:69:12:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execlp(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:70:12:  [4] (shell) execle:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
extern int execle(const char *, const char *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:96:14:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
extern char* getlogin(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:109:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern int access(const char *, int);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:71:26:  [4] (format) fwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int               fwprintf(FILE *, const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:72:26:  [4] (buffer) fwscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int               fwscanf(FILE *, const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:99:26:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int               swprintf(wchar_t *, size_t, const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:104:26:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int               vfwprintf(FILE *, const wchar_t *, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:105:26:  [4] (format) vwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int               vwprintf(const wchar_t *, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:106:26:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
extern int               vswprintf(wchar_t *, size_t, const wchar_t *, va_list);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:108:26:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
extern wchar_t          *wcscat(wchar_t *, const wchar_t *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:112:26:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
extern wchar_t          *wcscpy(wchar_t *, const wchar_t *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:140:26:  [4] (format) wprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
extern int               wprintf(const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:141:26:  [4] (buffer) wscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int               wscanf(const wchar_t *, ...);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:35:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, message, ap);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:87:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(pPath + pathLen, pExtension);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:90:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(pPath + index, pExtension);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:96:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(pPath + pathLen, pExtension);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:567:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pOutputFileBuff, pInput);
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:82:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(node->buf, buf);
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:86:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(node->buf, buf2);
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp:109:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      IsAccessDownGraded(old_element.basic_abi().access(),
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp:110:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         new_element.basic_abi().access());
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp:137:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      old_element.basic_abi().access() != new_element.basic_abi().access() ||
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp:137:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      old_element.basic_abi().access() != new_element.basic_abi().access() ||
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp:233:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      IsAccessDownGraded(old.access(), new_.access())) {
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-diff/src/abi_diff_wrappers.cpp:233:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      IsAccessDownGraded(old.access(), new_.access())) {
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.cpp:105:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const clang::AccessSpecifier &access, std::string key,
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.cpp:110:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  abi_dump::AccessSpecifier access_dump = AccessClangToDump(access);
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.h:62:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      const clang::AccessSpecifier &access, std::string key,
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:9:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:20:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:31:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:45:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:56:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:67:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:98:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:109:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:120:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:144:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:155:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:166:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:190:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:201:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:215:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:226:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:240:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:251:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:262:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:276:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:287:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:298:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:307:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:317:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:349:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:360:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: protected_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:384:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:395:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: protected_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:419:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:433:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:446:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:460:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:473:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:487:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:500:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:513:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:526:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:558:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:571:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:583:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:596:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:610:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:622:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:634:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:648:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:659:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:672:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:687:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:698:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:711:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:726:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:739:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:752:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:765:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:778:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example1.h:791:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:9:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:20:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:31:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:45:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:56:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:67:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:98:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:109:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:120:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:144:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:155:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:166:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:190:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:201:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:215:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:226:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: private_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:240:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:254:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:267:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:281:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:294:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:308:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:321:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:334:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:347:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:379:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:392:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:404:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:417:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:431:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:442:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:455:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:470:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:481:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:494:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:509:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:522:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:535:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/example2.h:548:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:7:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:21:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:35:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:49:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:63:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:77:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:91:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:105:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:119:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:133:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:147:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:161:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:175:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_no_args.h:189:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:7:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:20:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:32:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:45:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:57:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:70:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:82:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:95:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:107:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:120:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:132:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:145:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:157:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:170:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:182:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:195:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:207:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:220:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:232:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:245:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:257:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:270:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:282:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:295:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:307:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg.h:320:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:9:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:22:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:36:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:49:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:63:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:76:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:90:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:103:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:117:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:130:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:144:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:157:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:171:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:184:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:198:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:211:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:225:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:238:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:252:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:265:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:279:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:292:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:306:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:319:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:333:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_one_arg_ret.h:346:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:7:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:20:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:33:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:45:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:58:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:71:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:83:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:96:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:109:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:121:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:134:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:147:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:159:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:172:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:185:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:197:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:210:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:223:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:235:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:248:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:261:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:273:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:286:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:299:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:311:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:324:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:337:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:349:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:362:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:375:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:387:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:400:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:413:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:425:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:438:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:451:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:463:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:476:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/tests/expected/func_decl_two_args.h:489:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access: public_access
data/android-platform-development-8.1.0+r23/host/windows/usb/api/AdbWinApi.cpp:83:28:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    adbwinusbapi_handle_ = LoadLibrary(L"AdbWinUsbApi.dll");
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:119:12:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
extern int chroot(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:164:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt(int, char * const *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/OMXAL/OpenMAXAL.h:682:16:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    XAresult (*EnterCriticalSection) (
data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/SLES/OpenSLES.h:2730:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	SLresult (*EnterCriticalSection) (
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:54:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *getenv(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:99:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
extern char * realpath(const char *path, char *resolved);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:108:13:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long jrand48(unsigned short *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:109:13:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long mrand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:110:13:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long nrand48(unsigned short *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:111:13:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long lrand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:112:24:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern unsigned short *seed48(unsigned short*);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:113:15:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double erand48(unsigned short xsubi[3]);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:114:15:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double drand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:122:17:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return (int)lrand48();
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:124:24:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static __inline__ void srand(unsigned int __s) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:127:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static __inline__ long random(void)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:129:12:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return lrand48();
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:131:24:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static __inline__ void srandom(unsigned int __s)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/SLES/OpenSLES.h:2730:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	SLresult (*EnterCriticalSection) (
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/getopt.h:61:5:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	getopt_long(int, char * const *, const char *,
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/getopt.h:67:6:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	 getopt(int, char * const [], const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_statistic.h:44:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 } random;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:276:7:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
char* tmpnam(char*) __warnattr("tmpnam possibly used unsafely; consider using mkstemp");
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:280:7:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
char* tempnam(const char*, const char*)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:54:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char* getenv(const char*);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:90:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
extern char * realpath(const char *path, char *resolved);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:99:13:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long jrand48(unsigned short *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:100:13:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long mrand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:101:13:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long nrand48(unsigned short *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:102:13:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long lrand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:103:24:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern unsigned short *seed48(unsigned short*);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:104:15:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double erand48(unsigned short xsubi[3]);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:105:15:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double drand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:116:6:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void srand(unsigned int);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:119:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
long random(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:120:7:  [3] (random) setstate:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
char* setstate(char*);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:121:6:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void srandom(unsigned int);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:113:12:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
extern int chroot(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:163:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt(int, char * const *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/SLES/OpenSLES.h:2730:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	SLresult (*EnterCriticalSection) (
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/SLES/OpenSLES.h:2730:13:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	SLresult (*EnterCriticalSection) (
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/getopt.h:67:6:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	 getopt_long(int, char * const *, const char *,
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/getopt.h:73:6:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int	 getopt(int, char * const *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_statistic.h:33:4:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 } random;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:255:7:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
char	*tmpnam(char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:318:7:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
char	*tempnam(const char *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:54:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *getenv(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:96:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
extern char * realpath(const char *path, char *resolved);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:105:13:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long jrand48(unsigned short *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:106:13:  [3] (random) mrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long mrand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:107:13:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long nrand48(unsigned short *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:108:13:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern long lrand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:109:24:  [3] (random) seed48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern unsigned short *seed48(unsigned short*);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:110:15:  [3] (random) erand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double erand48(unsigned short xsubi[3]);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:111:15:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
extern double drand48(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:119:17:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return (int)lrand48();
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:121:24:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static __inline__ void srand(unsigned int __s) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:124:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static __inline__ long random(void)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:126:12:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return lrand48();
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:128:24:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static __inline__ void srandom(unsigned int __s)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:119:12:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
extern int chroot(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:161:12:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
extern int getopt(int, char * const *, const char *);
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.cpp:50:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (realpath(file_name.str().c_str(), file_abs_path) == nullptr) {
data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4096];
data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp:173:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[4096];
data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ser_num[1024];
data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp:463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char interf_name[512];
data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp:673:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/android-platform-development-8.1.0+r23/host/windows/usb/adb_winapi_test/adb_winapi_test.cpp:699:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4096];
data/android-platform-development-8.1.0+r23/host/windows/usb/api/AdbWinApi.cpp:66:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t path_to_winusb_dll[MAX_PATH+1];
data/android-platform-development-8.1.0+r23/host/windows/usb/api/AdbWinApi.cpp:70:5:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
    wcscat(path_to_winusb_dll, L"\\WINUSB.DLL");
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.cpp:172:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t match_name[64];
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.cpp:175:5:  [2] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    swprintf(match_name, L"\\\\?\\usb#vid_%04x&pid_%04x#",
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.cpp:179:5:  [2] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    swprintf(match_name, L"\\\\?\\usb#vid_%04x&pid_%04x&mi_%02x#",
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.h:189:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t       device_name[1];
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface.cpp:79:3:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  CopyMemory(desc, usb_device_descriptor(), sizeof(USB_DEVICE_DESCRIPTOR));
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface.cpp:96:3:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  CopyMemory(desc, usb_config_descriptor(),
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_interface.cpp:114:3:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  CopyMemory(desc, usb_interface_descriptor(), sizeof(USB_INTERFACE_DESCRIPTOR));
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_io_completion.cpp:82:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(ovl_data, overlapped(), sizeof(OVERLAPPED));
data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_interface.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char small_buffer[64];
data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_interface.cpp:227:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(buffer, ser_num->bString, bytes_written);
data/android-platform-development-8.1.0+r23/host/windows/usb/winusb/adb_winusb_io_completion.cpp:90:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(ovl_data, overlapped(), sizeof(OVERLAPPED));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/sys/stat.h:79:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/sys/stat.h:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/sys/stat.h:142:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern int utimensat(int fd, const char *path, const struct timespec times[2], int flags);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:55:15:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
extern pid_t  vfork(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/math.h:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-13/include/math.h:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[sizeof(float)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:62:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
extern int mkstemp (char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:78:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int atoi(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-16/include/stdlib.h:79:13:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern long atol(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/math.h:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/math.h:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[sizeof(float)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/stat.h:79:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/stat.h:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/stat.h:142:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern int utimensat(int fd, const char *path, const struct timespec times[2], int flags);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/setup.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cmdline[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/stat.h:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-arm/include/asm/stat.h:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/inst.h:830:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char byte[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/siginfo.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad[sizeof( __ARCH_SI_UID_T) - sizeof(int)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips/include/asm/termios.h:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c_cc[NCCS];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/inst.h:830:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char byte[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/siginfo.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad[sizeof( __ARCH_SI_UID_T) - sizeof(int)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-mips64/include/asm/termios.h:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c_cc[NCCS];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/kvm.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char regs[KVM_APIC_REG_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/stat.h:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/stat.h:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/asm/vm86.h:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vm86dbg_intxxtab[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86/include/machine/fenv.h:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       __other[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/kvm.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char regs[KVM_APIC_REG_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/stat.h:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/stat.h:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/arch-x86_64/include/asm/vm86.h:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vm86dbg_intxxtab[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_name[16];		/* name */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_date[12];		/* modification time */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_uid[6];			/* user id */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_gid[6];			/* group id */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_mode[8];		/* octal file permissions */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_size[10];		/* size in bytes */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/ar.h:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ar_fmag[2];		/* consistency check */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/nameser.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[NS_MAXDNAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/nameser.h:258:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[NS_MAXDNAME], alg[NS_MAXDNAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/nameser.h:271:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sig[NS_PACKETSZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/arpa/telnet.h:123:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *telopts[NTELOPTS+1] = {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/ipcbuf.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad1[4 - sizeof(__kernel_mode_t)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/siginfo.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad[sizeof( __ARCH_SI_UID_T) - sizeof(int)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/asm-generic/termios.h:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c_cc[NCC];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/dirent.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             d_name[256]; \
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fcntl.h:73:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern int open(const char*, int, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fcntl.h:96:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int open(const char* pathname, int flags, ...) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/fts.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fts_name[1];		/* file name */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/acct.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ac_comm[ACCT_COMM + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/acct.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ac_comm[ACCT_COMM];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rdb_DiskVendor[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rdb_DiskProduct[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rdb_DiskRevision[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rdb_ControllerVendor[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rdb_ControllerProduct[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/affs_hardblocks.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rdb_ControllerRevision[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atalk.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sat_zero[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm.h:162:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char prv[ATM_ESA_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atm.h:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pub[ATM_E164_LEN+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmapi.h:27:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char _[8]; } __ATM_API_ALIGN atm_kptr_t;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmbr2684.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifname[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmbr2684.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifname[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmlec.h:77:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mac_addr[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmlec.h:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char atm_addr[ATM_ESA_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmlec.h:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mac_addr[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmlec.h:91:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char atm_addr[ATM_ESA_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmlec.h:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char atm_addr[ATM_ESA_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmsap.h:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char snap[5];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/atmsap.h:115:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char hl_info[ATM_MAX_HLI];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/audit.h:381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auto_fs.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NAME_MAX+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auto_fs.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NAME_MAX+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auto_fs4.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NAME_MAX+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/auto_fs4.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NAME_MAX+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ax25.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ax25_call[7];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bcache.h:47:32:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bkey_copy(_dest, _src) memcpy(_dest, _src, bkey_bytes(_src))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bcm933xx_hcs.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char filename[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bfs_fs.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[BFS_NAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bfs_fs.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_fsname[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bfs_fs.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_volume[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/blkpg.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char devname[BLKPG_DEVNAMELTH];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/blkpg.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volname[BLKPG_VOLNAMELTH];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/blktrace_api.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[BLKTRACE_BDEV_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bpqether.h:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char destination[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/bpqether.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char accept[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/btrfs.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[BTRFS_PATH_NAME_MAX + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/btrfs.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[BTRFS_SUBVOL_NAME_MAX + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/btrfs.h:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[BTRFS_INO_LOOKUP_PATH_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/btrfs.h:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[BTRFS_SEARCH_ARGS_BUFSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/btrfs.h:384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char uuid[BTRFS_UUID_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/caif/caif_socket.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char service[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/caif/caif_socket.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/can/netlink.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cciss_ioctl.h:41:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char NodeName_type[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cciss_ioctl.h:50:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char FirmwareVer_type[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cdrom.h:200:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cmd[CDROM_PACKET_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cvp_label1[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cvp_label2[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cvp_label3[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cvp_label4[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cge_pvoltag[36];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cge_avoltag[36];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/chio.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char csv_voltag[36];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cm4000_cs.h:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char atr[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cn_proc.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char comm[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coda.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char d_name[CODA_MAXNAMLEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_magic[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_nscns[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_timdat[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_symptr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_nsyms[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_opthdr[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_flags[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char magic[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char vstamp[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tsize[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char dsize[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char bsize[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char entry[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char text_start[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data_start[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_name[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_paddr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_vaddr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_size[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_scnptr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_relptr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_lnnoptr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_nreloc[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_nlnno[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_flags[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sl_entsz[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sl_pathndx[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char l_symndx[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char l_paddr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char l_lnno[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_name[E_SYMNMLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_zeroes[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_offset[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_value[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_scnum[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_type[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_sclass[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char e_numaux[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_tagndx[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_lnno[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_size[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_fsize[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_lnnoptr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_endndx[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_dimen[E_DIMNUM][2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_tvndx[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_fname[E_FILNMLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:205:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_zeroes[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_offset[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_scnlen[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_nreloc[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_nlinno[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_tvfill[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_tvlen[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x_tvran[2][2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char r_vaddr[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char r_symndx[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/coff.h:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char r_type[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cyclades.h:362:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char intr_code[QUEUE_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cycx_cfm.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char signature[80];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cycx_cfm.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char descr[CFM_DESCR_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/cycx_cfm.h:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char image[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_device.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char lvb[DLM_USER_LVB_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_device.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_device.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dlm_netlink.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char resource_name[DLM_RESNAME_MAXLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[DM_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char uuid[DM_UUID_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[7];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char target_type[DM_MAX_TYPE_NAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-ioctl.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char message[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-log-userspace.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char uuid[DM_UUID_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-log-userspace.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char padding[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dm-log-userspace.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dqblk_xfs.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char d_padding4[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/ca.h:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char msg[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/ca.h:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cw[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/dvb/frontend.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/efs_fs_sb.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fs_fname[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/efs_fs_sb.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fs_fpack[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/efs_fs_sb.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fs_spare[20];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elf.h:209:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char e_ident[EI_NIDENT];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elf.h:229:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char e_ident[EI_NIDENT];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elfcore.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pr_fname[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/elfcore.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pr_psargs[ELF_PRARGSZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fw_version[ETHTOOL_FWVERS_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char bus_info[ETHTOOL_BUSINFO_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reserved1[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reserved2[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:292:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char h_dest[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ethtool.h:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[ETHTOOL_FLASH_MAX_FILENAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fb.h:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fd.h:87:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char floppy_drive_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fd.h:191:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char track[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fd.h:240:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cmd[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fd.h:242:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reply[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/flat.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char magic[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/genwqe/genwqe_card.h:257:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver_version[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/gfs2_ondisk.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sb_lockproto[GFS2_LOCKNAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/gfs2_ondisk.h:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sb_locktable[GFS2_LOCKNAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdlc/ioctl.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char master[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdlcdrv.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char modename[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdlcdrv.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char drivername[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdreg.h:389:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char serial_no[20];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdreg.h:394:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char fw_rev[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hdreg.h:395:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char model[40];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/hiddev.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char value[HID_STRING_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/i2o-dev.h:105:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char evt_data[I2O_EVT_DATA_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/i2o-dev.h:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char product_id[24];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if.h:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifrn_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifru_slave[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if.h:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifru_newname[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_arp.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char arp_dev[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_bonding.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char slave_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_eql.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char master_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_eql.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char slave_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_eql.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char slave_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_ether.h:127:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char h_dest[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_ether.h:129:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char h_source[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_frad.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char devname[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_packet.h:25:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char spkt_device[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_packet.h:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sll_addr[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_packet.h:254:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mr_address[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppox.h:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char remote[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppox.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char dev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_pppox.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tag_data[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_tunnel.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_vlan.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device1[24];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/if_vlan.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device2[24];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/in.h:217:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad[__SOCK_SIZE__ - sizeof(short int) -
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/inotify.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip6_tunnel.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip6_tunnel.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip_vs.h:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sched_name[IP_VS_SCHEDNAME_MAXLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip_vs.h:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sched_name[IP_VS_SCHEDNAME_MAXLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ip_vs.h:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mcast_ifn[IP_VS_IFNAME_MAXLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipmi.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[IPMI_MAX_ADDR_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sipx_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_router_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_device[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_router_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ipx.h:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_device[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irda.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sir_name[25];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irda.h:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char info[22];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irda.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char irda_class_name[IAS_EXPORT_CLASSNAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irda.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char irda_attrib_name[IAS_EXPORT_ATTRIBNAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/irda.h:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifrn_name[IRNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char drvid[25];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[10];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char phone[ISDN_MSNLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[10];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char master[10];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char slave[10];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char eaz[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn.h:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char drvid[25];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn_ppp.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char local_num[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn_ppp.h:31:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char remote_num[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/isdn_ppp.h:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char options[ISDN_PPP_COMP_MAX_OPTIONS];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type[ISODCL(1,1)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[ISODCL(2,6)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[ISODCL(7,7)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[ISODCL(8,2048)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type [ISODCL ( 1, 1)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id [ISODCL ( 2, 6)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version [ISODCL ( 7, 7)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused1 [ISODCL ( 8, 8)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char system_id [ISODCL ( 9, 40)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_id [ISODCL ( 41, 72)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused2 [ISODCL ( 73, 80)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_space_size [ISODCL ( 81, 88)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused3 [ISODCL ( 89, 120)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_set_size [ISODCL (121, 124)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_sequence_number [ISODCL (125, 128)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char logical_block_size [ISODCL (129, 132)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char path_table_size [ISODCL (133, 140)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type_l_path_table [ISODCL (141, 144)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char opt_type_l_path_table [ISODCL (145, 148)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type_m_path_table [ISODCL (149, 152)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char opt_type_m_path_table [ISODCL (153, 156)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char root_directory_record [ISODCL (157, 190)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_set_id [ISODCL (191, 318)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char publisher_id [ISODCL (319, 446)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char preparer_id [ISODCL (447, 574)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char application_id [ISODCL (575, 702)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char copyright_file_id [ISODCL (703, 739)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char abstract_file_id [ISODCL (740, 776)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char bibliographic_file_id [ISODCL (777, 813)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char creation_date [ISODCL (814, 830)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char modification_date [ISODCL (831, 847)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char expiration_date [ISODCL (848, 864)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char effective_date [ISODCL (865, 881)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char file_structure_version [ISODCL (882, 882)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused4 [ISODCL (883, 883)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char application_data [ISODCL (884, 1395)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused5 [ISODCL (1396, 2048)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type [ISODCL ( 1, 1)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id [ISODCL ( 2, 6)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version [ISODCL ( 7, 7)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char flags [ISODCL ( 8, 8)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char system_id [ISODCL ( 9, 40)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_id [ISODCL ( 41, 72)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused2 [ISODCL ( 73, 80)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_space_size [ISODCL ( 81, 88)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char escape [ISODCL ( 89, 120)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_set_size [ISODCL (121, 124)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_sequence_number [ISODCL (125, 128)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char logical_block_size [ISODCL (129, 132)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char path_table_size [ISODCL (133, 140)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type_l_path_table [ISODCL (141, 144)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char opt_type_l_path_table [ISODCL (145, 148)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type_m_path_table [ISODCL (149, 152)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char opt_type_m_path_table [ISODCL (153, 156)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char root_directory_record [ISODCL (157, 190)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_set_id [ISODCL (191, 318)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char publisher_id [ISODCL (319, 446)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char preparer_id [ISODCL (447, 574)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char application_id [ISODCL (575, 702)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char copyright_file_id [ISODCL (703, 739)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char abstract_file_id [ISODCL (740, 776)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char bibliographic_file_id [ISODCL (777, 813)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char creation_date [ISODCL (814, 830)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char modification_date [ISODCL (831, 847)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char expiration_date [ISODCL (848, 864)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char effective_date [ISODCL (865, 881)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char file_structure_version [ISODCL (882, 882)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused4 [ISODCL (883, 883)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char application_data [ISODCL (884, 1395)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused5 [ISODCL (1396, 2048)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char foo [ISODCL ( 1, 8)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type [ISODCL ( 9, 9)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id [ISODCL ( 10, 14)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version [ISODCL ( 15, 15)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[ISODCL(16,2048)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char foo [ISODCL ( 1, 8)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type [ISODCL ( 9, 9)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id [ISODCL ( 10, 14)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version [ISODCL ( 15, 15)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused1 [ISODCL ( 16, 16)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char system_id [ISODCL ( 17, 48)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_id [ISODCL ( 49, 80)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused2 [ISODCL ( 81, 88)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_space_size [ISODCL ( 89, 96)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused3 [ISODCL ( 97, 128)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_set_size [ISODCL (129, 132)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_sequence_number [ISODCL (133, 136)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char logical_block_size [ISODCL (137, 140)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char path_table_size [ISODCL (141, 148)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type_l_path_table [ISODCL (149, 152)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char unused4 [ISODCL (153, 180)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char root_directory_record [ISODCL (181, 214)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:160:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char name_len[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char extent[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char parent[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char length [ISODCL (1, 1)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ext_attr_length [ISODCL (2, 2)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char extent [ISODCL (3, 10)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char size [ISODCL (11, 18)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char date [ISODCL (19, 25)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char flags [ISODCL (26, 26)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char file_unit_size [ISODCL (27, 27)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char interleave [ISODCL (28, 28)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_sequence_number [ISODCL (29, 32)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:179:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char name_len [ISODCL (33, 33)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/iso_fs.h:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name [0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kd.h:134:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char kb_string[512];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kernelcapi.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kvm.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char dummy[512];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kvm.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char padding[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/kvm.h:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char padding[1024];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/l2tp.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad[sizeof(struct sockaddr) -
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/llc.h:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sllc_mac[IFHWADDRLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/llc.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad[__LLC_SOCK_SIZE__ -
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/llc.h:94:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char lpi_mac[IFHWADDRLEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/loop.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char lo_name[LO_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/loop.h:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char lo_encrypt_key[LO_KEY_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/loop.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reserved[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/map_to_7segment.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char table[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/media.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/media.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char model[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/media.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char serial[40];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/media.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char bus_info[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/media.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/minix_fs.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/minix_fs.h:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mroute.h:81:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mfcc_ttls[MAXVIFS];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/mroute6.h:67:23:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define IF_COPY(f, t) bcopy(f, t, sizeof(*(f)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/msdos_fs.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char d_name[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/msg.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mtext[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nbd.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char handle[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nbd.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char handle[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_name[NCP_VOLNAME_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_fs.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sign_root[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_fs.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sign_last[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_fs.h:112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char codepage[NCP_IOCSNAME_LEN+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_fs.h:114:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iocharset[NCP_IOCSNAME_LEN+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/ncp_mount.h:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/ipset/ip_set.h:246:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IPSET_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_EXTENSION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_EXTENSION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:62:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char errorname[XT_FUNCTION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_EXTENSION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/x_tables.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CT.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char helper[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CT.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char helper[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_CT.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char timeout[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_IDLETIMER.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char label[MAX_IDLETIMER_LABEL_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_LED.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[27];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_LOG.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_NFLOG.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_RATEEST.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_SECMARK.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char secctx[SECMARK_SECCTX_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_TEE.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char oif[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_comment.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char comment[XT_MAX_COMMENT_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_hashlimit.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name [IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_hashlimit.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_helper.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_mac.h:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char srcaddr[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_nfacct.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NFACCT_NAME_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_osf.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char genre[MAXGENRELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_osf.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char genre[MAXGENRELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_osf.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[MAXGENRELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_osf.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char subtype[MAXGENRELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_physdev.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char physindev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_physdev.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char in_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_physdev.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char physoutdev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_physdev.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char out_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_rateest.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name1[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_rateest.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name2[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_recent.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_RECENT_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_recent.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_RECENT_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_sctp.h:59:47:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define SCTP_CHUNKMAP_COPY(destmap, srcmap)   memcpy((destmap), (srcmap), sizeof(srcmap))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_string.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char algo[XT_STRING_MAX_ALGO_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter/xt_string.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pattern[XT_STRING_MAX_PATTERN_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char addr[ARPT_DEV_ADDR_LEN_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mask[ARPT_DEV_ADDR_LEN_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char iniface[IFNAMSIZ], outiface[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iniface_mask[IFNAMSIZ], outiface_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arp_tables.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arpt_mangle.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char src_devaddr[ARPT_DEV_ADDR_LEN_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_arp/arpt_mangle.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tgt_devaddr[ARPT_DEV_ADDR_LEN_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arp.h:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char smaddr[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arp.h:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char smmsk[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arp.h:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char dmaddr[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arp.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char dmmsk[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_arpreply.h:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mac[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_nat.h:24:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mac[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_nflog.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[EBT_NFLOG_PREFIX_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_stp.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char root_addr[6], root_addrmsk[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_stp.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sender_addr[6], sender_addrmsk[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[EBT_ULOG_PREFIX_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char indev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char outdev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char physindev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char physoutdev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[EBT_ULOG_PREFIX_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebt_ulog.h:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0] __attribute__
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EBT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EBT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EBT_CHAIN_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EBT_FUNCTION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:104:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EBT_FUNCTION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:114:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EBT_FUNCTION_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char in[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char logical_in[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char out[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char logical_out[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:142:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sourcemac[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:144:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sourcemsk[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:145:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char destmac[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:146:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char destmsk[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_bridge/ebtables.h:151:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char iniface[IFNAMSIZ], outiface[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iniface_mask[IFNAMSIZ], outiface_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h:96:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ip_tables.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_LOG.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[ULOG_PREFIX_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char indev_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char outdev_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[ULOG_PREFIX_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mac[ULOG_MAC_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv4/ipt_ULOG.h:52:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char payload[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char iniface[IFNAMSIZ], outiface[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iniface_mask[IFNAMSIZ], outiface_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h:99:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6_tables.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netfilter_ipv6/ip6t_LOG.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netrom.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/netrom.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mnemonic[7];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfc.h:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char service_name[NFC_LLCP_MAX_SERVICE_NAME];  ;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs2.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[NFS2_FHSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs3.h:85:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[NFS3_FHSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs_idmap.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char im_name[IDMAP_NAMESZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs_mount.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char hostname[NFS_MAXNAMLEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfs_mount.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char context[NFS_MAX_CONTEXT_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nfsd/cld.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cn_id[NFS4_OPAQUE_LIMIT];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nvme.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sn[20];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nvme.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mn[40];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/nvme.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fr[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pg.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char packet[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/pg.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pad[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/qnx4_fs.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char di_fname[QNX4_SHORT_NAME_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/qnx4_fs.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char dl_fname[QNX4_NAME_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/qnx4_fs.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char xblk_signature[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/raid/md_p.h:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char set_name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/raid/md_u.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pathname[4096];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/romfs_fs.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/romfs_fs.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rose.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rose_addr[5];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/rose.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/serial.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reserved_char[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/socket.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char __data[_K_SS_MAXSIZE - sizeof(unsigned short)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[4000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:142:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char arr[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char env_rate[ 6 ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:216:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char env_offset[ 6 ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:242:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:322:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char sbi_instr_data[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:382:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:542:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[4000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:556:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[4000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:731:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:736:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char mixer_record[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:750:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/soundcard.h:796:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define SEQ_DEFINEBUF(len) unsigned char _seqbuf[len]; int _seqbuflen = len;int _seqbufptr = 0
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sw_sync.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sync.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sync.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char obj_name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sync.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver_name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sync.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/sysinfo.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _f[20-2*sizeof(__kernel_ulong_t)-sizeof(__u32)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/taskstats.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ac_comm[TS_COMM_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tc_ematch/tc_em_text.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char algo[TC_EM_TEXT_ALGOSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char desc[80];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char month[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char day[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char hour[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char min[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char number[11];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/telephony.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[80];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char usr_handle[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc_config.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char str[TIPC_MAX_LINK_NAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc_config.h:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[TIPC_MAX_BEARER_NAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc_config.h:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[TIPC_MAX_LINK_NAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/tipc_config.h:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tcm_reserved[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/uinput.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[UINPUT_MAX_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/un.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sun_path[UNIX_PATH_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usbdevice_fs.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[USBDEVFS_MAXDRIVERNAME + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usbdevice_fs.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char port [127];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/usbdevice_fs.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[USBDEVFS_MAXDRIVERNAME + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sysname[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nodename[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char release[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char machine[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sysname[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nodename[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char release[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char machine[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sysname[__NEW_UTS_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nodename[__NEW_UTS_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char release[__NEW_UTS_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[__NEW_UTS_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char machine[__NEW_UTS_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/utsname.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char domainname[__NEW_UTS_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vhost.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char vhost_wwpn[224];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/videodev2.h:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char APP_data[60];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/videodev2.h:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char COM_data[60];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/videodev2.h:1286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/videodev2.h:1302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/vm_sockets.h:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char svm_zero[sizeof(struct sockaddr) -
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wimax/i2400m.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char payload[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wireless.h:451:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wireless.h:480:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifrn_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/wireless.h:549:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/x25.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x25_addr[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/x25.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device[200-sizeof(unsigned long)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/x25.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device[200];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/x25.h:105:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cuddata[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ctx_str[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char alg_name[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char alg_key[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char alg_name[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char alg_key[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char alg_name[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/xfrm.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char alg_key[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/math.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/math.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[sizeof(float)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pthread.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __reserved[36];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pthread.h:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __reserved[44];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pthread.h:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __reserved[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pthread.h:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __reserved[36];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/pthread.h:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __reserved[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _ubuf[3];	/* guarantee an ungetc() buffer */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:137:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _nbuf[1];	/* guarantee a getc() buffer */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:227:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE	*fopen(const char * __restrict , const char * __restrict);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:260:7:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
FILE	*tmpfile(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:62:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
extern int mkstemp(char*);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:82:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int atoi(const char*) __purefunc;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdlib.h:83:13:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern long atol(const char*) __purefunc;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:42:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
extern void*  memcpy(void* __restrict, const void* __restrict, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:98:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void* memcpy(void* __restrict dest, const void* __restrict src, size_t copy_amount) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/strings.h:47:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(b1, b2, len) \
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/strings.h:52:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(b1, b2, len) (void)(__builtin_memmove((b2), (b1), (len)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/socket.h:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sa_data[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h:109:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char __pad0[4]; \
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h:116:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char __pad3[4]; \
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h:190:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern int utimensat(int fd, const char *path, const struct timespec times[2], int flags);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ucontext.h:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __padding[120];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/ucontext.h:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __padding[128 - sizeof(sigset_t)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/user.h:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/user.h:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/user.h:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/user.h:200:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ftype[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/user.h:227:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  sysname   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  nodename  [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  release   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  version   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  machine   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/utsname.h:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  domainname[SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:55:15:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
extern pid_t  vfork(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ll_line[UT_LINESIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ll_host[UT_HOSTSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_line[UT_LINESIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_id[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_user[UT_NAMESIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_host[UT_HOSTSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/utmp.h:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unsed[20];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __reserved[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/vulkan/vulkan.h:1408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                                deviceName[VK_MAX_PHYSICAL_DEVICE_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/vulkan/vulkan.h:1461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        extensionName[VK_MAX_EXTENSION_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/vulkan/vulkan.h:1466:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        layerName[VK_MAX_EXTENSION_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/vulkan/vulkan.h:1469:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        description[VK_MAX_DESCRIPTION_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char panel_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ctrl_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char part_table[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reason_str[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char component[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/arch/board.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/cacheflush.h:77:69:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_to_user_page(vma, page, vaddr, dst, src, len)   do {   memcpy(dst, src, len);   flush_ptrace_access(vma, page, vaddr, dst, len, 1);  } while (0)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/cacheflush.h:79:71:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_from_user_page(vma, page, vaddr, dst, src, len)   do {   memcpy(dst, src, len);   } while (0)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/stat.h:64:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/stat.h:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/termios.h:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c_cc[NCC];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/uaccess.h:70:38:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define __copy_from_user(to,from,n) (memcpy(to, (void __force *)from, n), 0)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/asm/uaccess.h:71:36:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define __copy_to_user(to,from,n) (memcpy((void __force *)to, from, n), 0)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-arm/include/sys/_types.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __mbstate8[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:86:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 volatile unsigned char b[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad0[0x10000 - sizeof(struct mace_audio)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad1[0x10000 - sizeof(struct mace_isactrl)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad2[0x10000 - sizeof(struct mace_ps2)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad3[0x10000 - sizeof(struct mace_i2c)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad4[0x10000 - sizeof(struct mace_timers)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad1[0x8000 - sizeof(struct mace_parallel)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad2[0x8000 - sizeof(struct mace_ecp1284)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad3[0x8000 - sizeof(struct mace_serial)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad4[0x8000 - sizeof(struct mace_serial)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:327:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 volatile unsigned char rtc[0x10000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _reserved[0x80000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad0[0x80000 - sizeof(struct mace_pci)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad1[0x80000 - sizeof(struct mace_video)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad2[0x80000 - sizeof(struct mace_video)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad3[0x80000 - sizeof(struct mace_video)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad4[0x80000 - sizeof(struct mace_ethernet)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad5[0x80000 - sizeof(struct mace_perif)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/ip32/mace.h:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad6[0x80000 - sizeof(struct mace_isa)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/jazz.h:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char pad0[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/jazz.h:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char pad1[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char hwaddr[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char print_partno[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char print_serial[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char prod_partno[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char prod_serial[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char passwd_hash[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:56:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reserved[11];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char hwaddr0[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char hwaddr1[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char print_partno[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char print_serial[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:77:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char prod_partno[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char prod_serial[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:82:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char passwd_hash[24];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reserved[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:181:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char li_bmstr[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:182:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char li_namestr[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/lasat/lasat.h:184:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char li_typestr[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pci/bridge.h:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad_000300[0x10000 - 0x000300];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pci/bridge.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad_010400[0x11000 - 0x010400];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pci/bridge.h:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad_011400[0x20000 - 0x011400];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pci/bridge.h:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad_029000[0x007000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/pci/bridge.h:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad_100000[0x200000-0x100000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char vend[8], prod[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fname[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:219:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 LONG open;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:317:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char _unused[446];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:340:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char jmpinfo[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:341:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char manuf_name[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/siginfo.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad[sizeof( __ARCH_SI_UID_T) - sizeof(int)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sn/kldir.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char rsvd[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/termios.h:69:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c_cc[NCCS];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/vga.h:30:30:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define scr_memcpyw(d, s, c) memcpy(d, s, c)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/sys/_types.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __mbstate8[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cacheflush.h:39:62:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_to_user_page(vma, page, vaddr, dst, src, len)   memcpy(dst, src, len)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/cacheflush.h:40:64:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define copy_from_user_page(vma, page, vaddr, dst, src, len)   memcpy(dst, src, len)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mpf_signature[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mpc_signature[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mpc_oem[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mpc_productid[12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:91:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mpc_bustype[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char oem_signature[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/mpspec_def.h:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mpc_oem[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/processor_32.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x86_vendor_id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/processor_32.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char x86_model_id[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/stat.h:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/stat.h:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/termios.h:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c_cc[NCC];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/user32.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/user_32.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/asm/vm86.h:111:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vm86dbg_intxxtab[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/fenv.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		__other[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-x86/include/sys/_types.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char __mbstate8[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/arpa/telnet.h:123:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *telopts[NTELOPTS+1] = {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/asm-generic/siginfo.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _pad[sizeof( __ARCH_SI_UID_T) - sizeof(int)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/dirent.h:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             d_name[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/fcntl.h:46:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
extern int  open(const char*  path, int  mode, ...);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/fts.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fts_name[1];		/* file name */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/android_pmem.h:45:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 int (*open) (struct inode *, struct file *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atm.h:152:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char prv[ATM_ESA_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atm.h:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pub[ATM_E164_LEN+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmapi.h:22:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct { unsigned char _[8]; } __ATM_API_ALIGN atm_kptr_t;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmsap.h:96:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char snap[5];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/atmsap.h:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char hl_info[ATM_MAX_HLI];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/auto_fs.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NAME_MAX+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/auto_fs.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[NAME_MAX+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/blkdev.h:163:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cmd[BLK_MAX_CDB];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/blkpg.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char devname[BLKPG_DEVNAMELTH];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/blkpg.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volname[BLKPG_VOLNAMELTH];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/cdrom.h:183:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cmd[CDROM_PACKET_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/coda.h:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char d_name[CODA_MAXNAMLEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/console_struct.h:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vc_palette[16*3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/device.h:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char class_id[BUS_ID_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/device.h:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char bus_id[BUS_ID_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dirent.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char d_name[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dirent.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char d_name[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[DM_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char uuid[DM_UUID_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[7];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char target_type[DM_MAX_TYPE_NAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/dm-ioctl.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char message[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_dir.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_dir.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char space[EFS_DIRBSIZE - EFS_DIRBLK_HEADERSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_fs_i.h:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char raw[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_fs_sb.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fs_fname[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_fs_sb.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fs_fpack[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/efs_fs_sb.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char fs_spare[20];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/elevator.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char elevator_name[ELV_NAME_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/elf.h:175:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char e_ident[EI_NIDENT];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/elf.h:192:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char e_ident[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext2_fs.h:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_volume_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext2_fs.h:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s_last_mounted[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext2_fs.h:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EXT2_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext2_fs.h:359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EXT2_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext3_fs.h:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s_volume_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext3_fs.h:326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s_last_mounted[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext3_fs.h:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EXT3_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ext3_fs.h:422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[EXT3_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fb.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fd.h:85:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char floppy_drive_name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fd.h:189:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char track[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fd.h:242:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cmd[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/fd.h:244:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reply[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdlc/ioctl.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char master[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdreg.h:354:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char serial_no[20];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdreg.h:358:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char fw_rev[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdreg.h:359:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char model[40];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:26:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char raw[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reserved_374_385 [12];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vendor_specific_386_509 [125];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reserved[10];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reserved[149];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char extended_error[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:92:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char reserved[53];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:102:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vendorspecific[15];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:108:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char vendorspecific[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/hdsmart.h:110:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char resevered[2];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifrn_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifru_slave[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifru_newname[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_arp.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char arp_dev[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_ether.h:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char h_dest[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_ether.h:77:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char h_source[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_packet.h:18:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char spkt_device[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_packet.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sll_addr[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_packet.h:89:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mr_address[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_vlan.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device1[24];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/if_vlan.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char device2[24];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/in.h:164:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char __pad[__SOCK_SIZE__ - sizeof(short int) -
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/inotify.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipmi_smi.h:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[IPMI_MAX_MSG_LENGTH];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipmi_smi.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char rsp[IPMI_MAX_MSG_LENGTH];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipmi_smi.h:70:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char aux_firmware_revision[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sipx_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_router_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_device[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h:53:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h:65:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_router_node[IPX_NODE_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ipx.h:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ipx_device[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kd.h:122:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char kb_string[512];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kernel.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char _f[20-2*sizeof(long)-sizeof(int)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/kernelcapi.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/lockd/xdr.h:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[NLM_MAXCOOKIELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/loop.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char lo_name[LO_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/loop.h:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char lo_encrypt_key[LO_KEY_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/loop.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char reserved[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mca.h:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char pos[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mca.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mca.h:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mmc/card.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prod_name[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mod_devicetable.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mod_devicetable.h:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mod_devicetable.h:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char compatible[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mod_devicetable.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char type[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mod_devicetable.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char compat[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/module.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[MODULE_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msg.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mtext[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/msm_audio.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[64];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/blktrans.h:50:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 int (*open)(struct mtd_blktrans_dev *dev);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtio.h:178:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char ft_parms[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ncp.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char volume_name[NCP_VOLNAME_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/ncp_mount.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_FUNCTION_MAXNAMELEN-1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_FUNCTION_MAXNAMELEN-1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_FUNCTION_MAXNAMELEN-1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/x_tables.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[XT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_SECMARK.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char selctx[SECMARK_SELCTX_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_comment.h:18:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char comment[XT_MAX_COMMENT_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_helper.h:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_mac.h:16:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char srcaddr[ETH_ALEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_physdev.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char physindev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_physdev.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char in_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_physdev.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char physoutdev[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_physdev.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char out_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_string.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char algo[XT_STRING_MAX_ALGO_NAME_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter/xt_string.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pattern[XT_STRING_MAX_PATTERN_SIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char addr[ARPT_DEV_ADDR_LEN_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char mask[ARPT_DEV_ADDR_LEN_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char iniface[IFNAMSIZ], outiface[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iniface_mask[IFNAMSIZ], outiface_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:84:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[ARPT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[ARPT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_arp/arp_tables.h:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[ARPT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_queue.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char indev_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_queue.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char outdev_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_queue.h:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char hw_addr[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_queue.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char payload[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_queue.h:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char payload[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char iniface[IFNAMSIZ], outiface[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iniface_mask[IFNAMSIZ], outiface_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IPT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IPT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ip_tables.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IPT_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_LOG.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[ULOG_PREFIX_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char indev_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char outdev_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[ULOG_PREFIX_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char mac[ULOG_MAC_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_ULOG.h:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char payload[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_hashlimit.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name [IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_owner.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char comm[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv4/ipt_recent.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IPT_RECENT_NAME_LEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char iniface[IFNAMSIZ], outiface[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char iniface_mask[IFNAMSIZ], outiface_mask[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char elems[0];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IP6T_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IP6T_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6_tables.h:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IP6T_TABLE_MAXNAMELEN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/netfilter_ipv6/ip6t_LOG.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char prefix[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs2.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[NFS2_FHSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs3.h:69:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[NFS3_FHSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md_k.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char clevel[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md_k.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char uuid[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/raid/md_u.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char pathname[4096];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/skbuff.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cb[48];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/socket.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char __data[_K_SS_MAXSIZE - sizeof(unsigned short)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/socket.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sa_data[14];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[4000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char arr[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:194:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char env_rate[ 6 ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:195:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char env_offset[ 6 ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char data[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:221:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:299:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char sbi_instr_data[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:356:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:504:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[4000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:517:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char data[4000];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:675:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char id[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:676:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:682:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char mixer_record[128];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:697:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/soundcard.h:759:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define SEQ_DEFINEBUF(len) unsigned char _seqbuf[len]; int _seqbuflen = len;int _seqbufptr = 0
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/clnt.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cl_nodename[UNX_MAXNODENAME];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/clnt.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cl_pathname[30];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sunrpc/clnt.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char cl_inline_name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char desc[80];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char month[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char day[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char hour[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char min[3];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char number[11];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/telephony.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[80];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/types.h:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_fname[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/types.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char f_fpack[6];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/un.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sun_path[UNIX_PATH_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/usbdevice_fs.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char driver[USBDEVFS_MAXDRIVERNAME + 1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/usbdevice_fs.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char port [127];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sysname[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nodename[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char release[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char machine[9];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sysname[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nodename[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char release[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char machine[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char sysname[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nodename[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char release[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char version[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char machine[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/utsname.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char domainname[65];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev.h:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char loadwhat[16];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev2.h:241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char APP_data[60];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/videodev2.h:244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char COM_data[60];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/vt_buffer.h:18:30:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define scr_memcpyw(d, s, c) memcpy(d, s, c)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char S514_CPU_no[1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[WAN_IFNAME_SZ+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char addr[WAN_ADDRESS_SZ+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char usedby[USED_BY_FIELD];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char local_addr[WAN_ADDRESS_SZ+1];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:317:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char userid[511];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:318:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char passwd[511];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wanrouter.h:319:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char sysname[31];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wireless.h:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wireless.h:445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ifrn_name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/wireless.h:520:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char name[IFNAMSIZ];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/math.h:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/math.h:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	__uc[sizeof(float)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:129:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _ubuf[3];	/* guarantee an ungetc() buffer */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:130:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char _nbuf[1];	/* guarantee a getc() buffer */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:219:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE	*fopen(const char *, const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:254:7:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
FILE	*tmpfile(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:62:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
extern int mkstemp (char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:75:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern int atoi(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdlib.h:76:13:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
extern long atol(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h:41:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
extern void*  memcpy(void *, const void *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/strings.h:46:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(b1, b2, len) (void)(__builtin_memmove((b2), (b1), (len)))
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_system_properties.h:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[PROP_NAME_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_system_properties.h:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROP_VALUE_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_system_properties.h:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[PROP_NAME_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/_system_properties.h:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROP_VALUE_MAX];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/dirent.h:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char              d_name[256];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/exec_elf.h:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	e_ident[EI_NIDENT]; /* ELF Identification */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/exec_elf.h:144:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	e_ident[EI_NIDENT];	/* Id bytes */
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/stat.h:79:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       __pad0[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/stat.h:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char       __pad3[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ucontext.h:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __padding[120];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/ucontext.h:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __padding[128 - sizeof(sigset_t)];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/user.h:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/user.h:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/user.h:181:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/user.h:198:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ftype[8];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/user.h:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char u_comm[32];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  sysname   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  nodename  [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  release   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  version   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  machine   [SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/utsname.h:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  domainname[SYS_NMLN];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:55:15:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
extern pid_t  vfork(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ll_line[UT_LINESIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ll_host[UT_HOSTSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_line[UT_LINESIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_id[4];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_user[UT_NAMESIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ut_host[UT_HOSTSIZE];
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/utmp.h:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unsed[20];
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:149:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pIn = fopen(pInput, "rb")) == NULL) {
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pSourceImage + y * stride, row_pointers[y], stride);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:247:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pIn = fopen(pInput, "rb")) == NULL) {
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:337:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pOut = fopen(pOutput, "wb")) == NULL) {
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:423:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((pOut = fopen(pOutput, "wb")) == NULL) {
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSIZE*2+3];
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:52:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(argv[i], O_RDWR);
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:71:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[BUFSIZE+2];
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:84:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char buf2[(BUFSIZE*2)+3];
data/android-platform-development-8.1.0+r23/vndk/tools/header-checker/header-abi-dumper/src/abi_wrappers.cpp:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_abs_path[PATH_MAX];
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_api.cpp:182:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t match_len = wcslen(match_name);
data/android-platform-development-8.1.0+r23/host/windows/usb/api/adb_legacy_interface.cpp:145:32:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    static_cast<unsigned long>(wcslen(serial_number) + 1);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/sys/stat.h:123:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
extern mode_t umask(mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:134:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern ssize_t read(int, void *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-12/include/unistd.h:154:12:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
extern int usleep(unsigned long);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-14/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-18/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-19/include/sys/stat.h:123:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
extern mode_t umask(mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fuse.h:241:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
 uint32_t umask;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fuse.h:247:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
 uint32_t umask;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/linux/fuse.h:289:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
 uint32_t umask;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/malloc.h:35:14:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
extern void* memalign(size_t alignment, size_t byte_count) __mallocfunc __wur __attribute__((alloc_size(2)));
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:225:6:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	 fgetc(FILE *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:240:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	 getc(FILE *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/stdio.h:241:6:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	 getchar(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:53:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern size_t strlen(const char *) __purefunc;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:73:15:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
extern char*  strncat(char* __restrict, const char* __restrict, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:77:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char*  strncpy(char* __restrict, const char* __restrict, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:148:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
char* strncpy(char* __restrict dest, const char* __restrict src, size_t n) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:174:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
char *strncat(char* __restrict dest, const char* __restrict src, size_t n) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/string.h:233:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen(const char *s) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h:160:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
extern mode_t umask(mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/sys/stat.h:169:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
mode_t umask(mode_t mode) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:132:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern ssize_t read(int, void *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:155:12:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
extern int usleep(useconds_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/unistd.h:203:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t read(int fd, void* buf, size_t count) {
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:122:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern size_t            wcslen(const wchar_t *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:124:26:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
extern wchar_t          *wcsncat(wchar_t *, const wchar_t *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-21/include/wchar.h:126:26:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern wchar_t          *wcsncpy(wchar_t *, const wchar_t *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-23/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-24/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/io.h:76:835:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define __BUILD_MEMORY_SINGLE(pfx, bwlq, type, irq)    static inline void pfx##write##bwlq(type val,   volatile void __iomem *mem)  {   volatile type *__mem;   type __val;     __mem = (void *)__swizzle_addr_##bwlq((unsigned long)(mem));     __val = pfx##ioswab##bwlq(__mem, val);     if (sizeof(type) != sizeof(u64) || sizeof(u64) == sizeof(long))   *__mem = __val;   else if (cpu_has_64bits) {   unsigned long __flags;   type __tmp;     if (irq)   local_irq_save(__flags);   __asm__ __volatile__(   ".set	mips3" "\t\t# __writeq""\n\t"   "dsll32	%L0, %L0, 0" "\n\t"   "dsrl32	%L0, %L0, 0" "\n\t"   "dsll32	%M0, %M0, 0" "\n\t"   "or	%L0, %L0, %M0" "\n\t"   "sd	%L0, %2" "\n\t"   ".set	mips0" "\n"   : "=r" (__tmp)   : "0" (__val), "m" (*__mem));   if (irq)   local_irq_restore(__flags);   } else   BUG();  }    static inline type pfx##read##bwlq(const volatile void __iomem *mem)  {   volatile type *__mem;   type __val;     __mem = (void *)__swizzle_addr_##bwlq((unsigned long)(mem));     if (sizeof(type) != sizeof(u64) || sizeof(u64) == sizeof(long))   __val = *__mem;   else if (cpu_has_64bits) {   unsigned long __flags;     if (irq)   local_irq_save(__flags);   __asm__ __volatile__(   ".set	mips3" "\t\t# __readq" "\n\t"   "ld	%L0, %1" "\n\t"   "dsra32	%M0, %L0, 0" "\n\t"   "sll	%L0, %L0, 0" "\n\t"   ".set	mips0" "\n"   : "=r" (__val)   : "m" (*__mem));   if (irq)   local_irq_restore(__flags);   } else {   __val = 0;   BUG();   }     return pfx##ioswab##bwlq(__mem, __val);  }
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgi/ioc.h:157:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 volatile u8 read;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/arch-mips/include/asm/sgiarcs.h:221:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 LONG read;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/EGL/egl.h:302:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			  EGLSurface read, EGLContext ctx);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/android_pmem.h:46:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 ssize_t (*read) (struct file *, char __user *, size_t, long long *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/mtd/mtd.h:104:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 int (*read) (struct mtd_info *mtd, loff_t from, size_t len, size_t *retlen, u_char *buf);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfs_xdr.h:514:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 int (*read) (struct nfs_read_data *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/nfsd/xdr.h:130:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 struct nfsd_readargs read;
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/linux/sysfs.h:45:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 ssize_t (*read)(struct kobject *, char *, loff_t, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/malloc.h:35:15:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
extern void*  memalign(size_t  alignment, size_t  bytesize);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:216:6:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	 fgetc(FILE *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:232:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	 getc(FILE *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:233:6:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int	 getchar(void);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:378:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	getchar()	getc(stdin)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/stdio.h:378:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	getchar()	getc(stdin)
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h:52:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern size_t strlen(const char *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h:70:15:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
extern char*  strncat(char *, const char *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/string.h:73:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char*  strncpy(char *, const char *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/sys/stat.h:123:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
extern mode_t umask(mode_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:134:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
extern ssize_t read(int, void *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/unistd.h:151:12:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
extern int usleep(unsigned long);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:115:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern size_t            wcslen(const wchar_t *);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:116:26:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
extern wchar_t          *wcsncat(wchar_t *, const wchar_t *, size_t);
data/android-platform-development-8.1.0+r23/ndk/platforms/android-9/include/wchar.h:118:26:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern wchar_t          *wcsncpy(wchar_t *, const wchar_t *, size_t);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:67:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t pathLen = strlen(pPath);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:68:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t extensionLen = strlen(pExtension);
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:122:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((a = fgetc(pIn)) == EOF) {
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:125:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((b = fgetc(pIn)) == EOF) {
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:565:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t buffSize = strlen(pInput) + strlen(kDefaultExtension) + 1;
data/android-platform-development-8.1.0+r23/tools/etc1tool/etc1tool.cpp:565:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t buffSize = strlen(pInput) + strlen(kDefaultExtension) + 1;
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:74:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                amt = read(fd, buf, amt2);
data/android-platform-development-8.1.0+r23/tools/line_endings/line_endings.c:94:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ssize_t amt2 = strlen(root->buf);
data/android-platform-development-8.1.0+r23/vndk/tools/vtable-dumper/elf_handling.cpp:44:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
using llvm::support::endian::read;
data/android-platform-development-8.1.0+r23/vndk/tools/vtable-dumper/elf_handling.cpp:356:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    uintX_t Addend = read<uintX_t, ELFT::TargetEndianness>(Bytes);

ANALYSIS SUMMARY:

Hits = 1597
Lines analyzed = 299612 in approximately 9.43 seconds (31788 lines/second)
Physical Source Lines of Code (SLOC) = 192423
Hits@level = [0] 193 [1]  67 [2] 1070 [3]  64 [4] 382 [5]  14
Hits@level+ = [0+] 1790 [1+] 1597 [2+] 1530 [3+] 460 [4+] 396 [5+]  14
Hits/KSLOC@level+ = [0+] 9.30242 [1+] 8.29942 [2+] 7.95123 [3+] 2.39057 [4+] 2.05797 [5+] 0.0727564
Symlinks skipped = 6 (--allowlink overrides but see doc for security issue)
Dot directories skipped = 3 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.