Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreport/bugreport.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/bugreportz.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/bugreportz.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/bugreportz_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/cmd/cmd.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/cmd/cmd.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/cmd/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateSectionReporter.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateSectionReporter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateUtil.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateUtil.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_smoke_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test_fixture.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/dumpsys.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/dumpsys.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/tests/dumpsys_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Composers.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Flatland.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/GLHelper.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/GLHelper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Renderers.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/CacheItem.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/CacheItem.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/CacheTracker.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/CacheTracker.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/MatchExtensionGen.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/QuotaUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/QuotaUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/art_helper/art_image_values.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/art_helper/art_image_values.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt_return_codes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/file_parsing.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/globals.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/globals.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd_constants.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd_deps.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_chroot.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_utils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/system_properties.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/binder_test_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_otapreopt_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_utils_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/test_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils_default.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/view_compiler.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/view_compiler.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/ip-up-vpn/ip-up-vpn.c
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/Command.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/DebugCommand.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/DebugCommand.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/HelpCommand.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/HelpCommand.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/ListCommand.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/ListCommand.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/Lshal.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/Lshal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/NullableOStream.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/PipeRelay.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/PipeRelay.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/TableEntry.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/TableEntry.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/TextTable.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/TextTable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/Timeout.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/libprocpartition/include/procpartition/procpartition.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/libprocpartition/procpartition.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/utils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/rss_hwm_reset/rss_hwm_reset.cc
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/service/service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/bctest.c
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.c
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/service_manager.c
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/BufferQueueScheduler.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/BufferQueueScheduler.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Color.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Event.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Event.h
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Replayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Replayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/cas/CasAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/cas/DescramblerAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/drm/DrmAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/editor/II420ColorConverter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/CryptoAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/HDCPAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/HardwareAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/MetadataBufferType.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/OMXPluginBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/VideoAPI.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_AsString.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Audio.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_AudioExt.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Component.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_ContentPipe.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Core.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_IVCommon.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Image.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Index.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_IndexExt.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Other.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Video.h
Examining data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_VideoExt.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/asset_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/asset_manager_jni.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/bitmap.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/choreographer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/configuration.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/font.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/font_matcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/hardware_buffer_jni.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/input.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/keycodes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/looper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/multinetwork.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/native_activity.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/native_window_jni.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/obb.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/sensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/sharedmem.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/sharedmem_jni.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/storage_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/surface_control.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/surface_texture.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/surface_texture_jni.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/system_fonts.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/trace.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/android/window.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/audiomanager/AudioManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/audiomanager/IAudioManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/diskusage/dirsize.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/DisplayViewport.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/IInputFlinger.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/ISetInputWindowsListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/Input.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/InputApplication.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/InputDevice.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/InputEventLabels.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/InputTransport.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/InputWindow.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/KeyCharacterMap.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/KeyLayoutMap.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/Keyboard.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/TouchVideoFrame.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/VelocityControl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/VelocityTracker.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/input/VirtualKeyMap.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/powermanager/IPowerManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/powermanager/PowerManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/private/ui/RegionHelper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/include/vr/vr_manager/vr_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/android_runtime_lazy/android_runtime_lazy.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/android_runtime_lazy/include/android_runtime/AndroidRuntime.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/android_runtime_lazy/include/android_util_Binder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/arect/include/android/rect.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ActivityManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/AppOpsManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Binder.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/BpBinder.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/BufferedTextOutput.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IActivityManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IAppOpsCallback.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IAppOpsService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IBatteryStats.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IInterface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IMediaResourceMonitor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IMemory.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IPCThreadState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IPermissionController.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IProcessInfoService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IResultReceiver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IServiceManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IShellCallback.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IUidObserver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IpPrefix.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/MemoryBase.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/MemoryDealer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/MemoryHeapBase.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ParcelFileDescriptor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/PermissionCache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/PermissionController.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/PersistableBundle.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ProcessInfoService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ProcessState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Static.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Status.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/TextOutput.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Value.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/ActivityManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/AppOpsManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Binder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/BinderService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/BpBinder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/BufferedTextOutput.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Debug.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IActivityManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IAppOpsCallback.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IAppOpsService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IBatteryStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IBinder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IInterface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IMediaResourceMonitor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IMemory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IPCThreadState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IPermissionController.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IProcessInfoService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IResultReceiver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IServiceManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IShellCallback.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IUidObserver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/IpPrefix.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Map.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/MemoryBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/MemoryDealer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/MemoryHeapBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/ParcelFileDescriptor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcelable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/PermissionCache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/PermissionController.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/PersistableBundle.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/ProcessInfoService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/ProcessState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Status.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/TextOutput.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Value.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/private/binder/ParcelValTypes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/private/binder/Static.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/private/binder/binder_module.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/ibinder.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/ibinder_internal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/ibinder_jni.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_apex/android/binder_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_apex/android/binder_process.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_auto_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_ibinder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_ibinder_jni.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_interface_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_parcel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_parcel_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/include_ndk/android/binder_status.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/parcel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/parcel_internal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/process.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/service_manager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/status.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/status_internal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/test/iface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/test/include/iface/iface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/test/main_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/test/main_server.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderDriverInterfaceTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderSafeInterfaceTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderTextOutputTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderValueTypeTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binderthreadstate/IPCThreadStateBase.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/binderthreadstate/include/binderthreadstate/IPCThreadStateBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/cputimeinstate/cputimeinstate.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/cputimeinstate/cputimeinstate.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/cputimeinstate/testtimeinstate.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/diskusage/dirsize.c
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/dumputils/dump_utils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/dumputils/include/dumputils/dump_utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/GpuStatsInfo.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/GraphicsEnv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/IGpuService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/include/graphicsenv/GpuStatsInfo.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/include/graphicsenv/GraphicsEnv.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/include/graphicsenv/IGpuService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BitTube.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferHubConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferHubProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferItem.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferItemConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueue.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueThreadState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferSlot.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ConsumerBase.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/CpuConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/DebugEGLImageTracker.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/DisplayEventReceiver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumerUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GuiConfig.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IConsumerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IDisplayEventConnection.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IProducerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IRegionSamplingListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposerClient.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ITransactionCompletedListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerDebugInfo.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerMetadata.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/OccupancyTracker.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/StreamSplitter.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/Surface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/SurfaceComposerClient.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/SurfaceControl.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/SyncFeatures.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/B2HProducerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BProducerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/WProducerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/2.0/B2HGraphicBufferProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/2.0/B2HProducerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/2.0/H2BGraphicBufferProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/2.0/H2BProducerListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/2.0/types.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferHubConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferHubProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferItem.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferItemConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferQueue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferQueueConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferQueueCore.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferQueueDefs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferQueueProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferSlot.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/ConsumerBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/CpuConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/DebugEGLImageTracker.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/DisplayEventReceiver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/FrameTimestamps.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/GLConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/GuiConfig.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/HdrMetadata.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/IConsumerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/IDisplayEventConnection.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/IGraphicBufferConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/IGraphicBufferProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/IProducerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/IRegionSamplingListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/ISurfaceComposer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/ISurfaceComposerClient.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/ITransactionCompletedListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/LayerDebugInfo.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/LayerMetadata.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/LayerState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/OccupancyTracker.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/StreamSplitter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/Surface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/SurfaceComposerClient.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/SurfaceControl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/1.0/B2HProducerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/1.0/Conversion.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/1.0/H2BGraphicBufferProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/1.0/H2BProducerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/1.0/WGraphicBufferProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/1.0/WProducerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/2.0/B2HGraphicBufferProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/2.0/B2HProducerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/2.0/H2BGraphicBufferProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/2.0/H2BProducerListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/bufferqueue/2.0/types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/view/Surface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/private/gui/BitTube.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/private/gui/BufferQueueThreadState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/private/gui/ComposerService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/private/gui/SyncFeatures.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/BufferItemConsumer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/BufferQueue_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/CpuConsumer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/DisconnectWaiter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/DisplayedContentSampling_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/DummyConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/EndToEndNativeInputTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/FillBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/FillBuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/FrameWaiter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/GLTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/GLTest.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/IGraphicBufferProducer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/Malicious.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/MultiTextureConsumer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/RegionSampling_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SamplingDemo.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/StreamSplitter_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceParcelable_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureClient_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureFBO.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureFBO_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGL.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGLThreadToGL.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGLThreadToGL_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGLToGL.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGLToGL_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGL_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureMultiContextGL.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureMultiContextGL_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/Surface_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/TextureRenderer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/TextureRenderer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/gui/view/Surface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/incidentcompanion/include/android/os/IncidentManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/incidentcompanion/src/IncidentManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/IInputFlinger.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/ISetInputWindowsListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/Input.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputApplication.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputDevice.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputTransport.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputWindow.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/KeyCharacterMap.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/KeyLayoutMap.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/Keyboard.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/TouchVideoFrame.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/VelocityControl.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/VelocityTracker.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/VirtualKeyMap.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputChannel_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputDevice_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputEvent_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputPublisherAndConsumer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputWindow_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/StructLayout_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/TestHelpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/TouchVideoFrame_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/VelocityTracker_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/TMatHelpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/TQuatHelpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/TVecHelpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/half.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/mat2.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/mat3.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/mat4.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/quat.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/scalar.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/vec2.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/vec3.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/vec4.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/tests/half_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/tests/mat_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/tests/quat_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/math/tests/vec_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativebase/include/nativebase/nativebase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/AHardwareBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/ANativeWindow.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include-private/private/android/AHardwareBufferHelpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/android/data_space.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/android/hardware_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/android/hdr_metadata.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/android/native_window.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/system/window.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/vndk/hardware_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/include/vndk/window.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/tests/AHardwareBufferTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/tests/c_compatibility.c
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/Description.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/Mesh.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/RenderEngine.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/Texture.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLESRenderEngine.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLESRenderEngine.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLExtensions.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLExtensions.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLFramebuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLFramebuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLImage.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLImage.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/ImageManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/ImageManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/Program.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/Program.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/ProgramCache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/ProgramCache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/DisplaySettings.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/Framebuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/Image.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/LayerSettings.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/Mesh.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/RenderEngine.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/Texture.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/mock/Framebuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/mock/Image.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/mock/RenderEngine.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/include/renderengine/private/Description.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/mock/Framebuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/mock/Image.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/mock/RenderEngine.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/tests/RenderEngineTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/BitTube.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/ISensorEventConnection.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/ISensorServer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/SensorEventQueue.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/SensorManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/BitTube.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/ISensorEventConnection.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/ISensorServer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/Sensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/SensorEventQueue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/SensorManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/tests/SensorEventQueue_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/tests/Sensor_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensorprivacy/SensorPrivacyManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/sensorprivacy/include/sensorprivacy/SensorPrivacyManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/BufferHubBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/BufferHubEventFd.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/BufferHubMetadata.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/ColorSpace.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/DebugUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Fence.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FenceTime.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Gralloc.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Gralloc2.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Gralloc3.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBufferAllocator.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBufferMapper.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/HdrCapabilities.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/PixelFormat.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/PublicFormat.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Rect.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Region.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Size.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Transform.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/UiConfig.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/ANativeObjectBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/BufferHubBuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/BufferHubDefs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/BufferHubEventFd.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/BufferHubMetadata.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/BufferQueueDefs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/ColorSpace.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/ConfigStoreTypes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/DebugUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/DisplayInfo.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/DisplayStatInfo.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/DisplayedFrameStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Fence.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/FenceTime.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/FloatRect.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/FrameStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Gralloc.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Gralloc2.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Gralloc3.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/GraphicBuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/GraphicBufferAllocator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/GraphicBufferMapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/GraphicTypes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/HdrCapabilities.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/PixelFormat.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Point.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/PublicFormat.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Rect.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Region.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Size.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/Transform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include/ui/UiConfig.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/include_vndk/ui/ConfigStoreTypes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/BufferHubBuffer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/BufferHubEventFd_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/BufferHubMetadata_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/GraphicBufferAllocator_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/GraphicBuffer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/Region_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/Size_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/colorspace_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/mock/MockGrallocAllocator.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/mock/MockGrallocAllocator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tools/lutgen.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vibrator/ExternalVibration.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vibrator/include/vibrator/ExternalVibration.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbroadcastring/broadcast_ring_test.cc
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbroadcastring/include/libbroadcastring/broadcast_ring.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/buffer_hub-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/buffer_hub_base.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/buffer_hub_rpc.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/consumer_buffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/buffer_hub_base.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/buffer_hub_defs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/bufferhub_rpc.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/consumer_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/ion_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/native_handle_wrapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/producer_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/ion_buffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/producer_buffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/benchmarks/buffer_transport_benchmark.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/buffer_hub_queue_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/buffer_hub_queue_parcelable.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/include/private/dvr/buffer_hub_queue_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/include/private/dvr/buffer_hub_queue_parcelable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/include/private/dvr/epoll_file_descriptor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/tests/buffer_hub_queue-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/tests/buffer_hub_queue_producer-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/display_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/display_manager_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/display_protocol.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/include/private/dvr/display_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/include/private/dvr/display_manager_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/include/private/dvr/display_protocol.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/include/private/dvr/shared_buffer_helpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/include/private/dvr/vsync_service.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/shared_buffer_helpers.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdisplay/vsync_service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_api.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_buffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_buffer_queue.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_buffer_queue_internal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_configuration_data.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_display_manager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_hardware_composer_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_internal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_performance.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_pose.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_surface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_tracking.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_api.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_api_entries.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_buffer_queue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_config.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_configuration_data.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_deleter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_display_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_display_types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_hardware_composer_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_hardware_composer_types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_performance.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_pose.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_shared_buffers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_surface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_tracking.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_tracking_types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/include/dvr/dvr_vsync.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_api_test.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_buffer_queue-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_display-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_display_manager-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_named_buffer-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_tracking-test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/benchmark.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/clock_ns.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/debug.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/eigen.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/field_of_view.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/log_helpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/matrix_helpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/numeric.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/ortho.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/pose.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/range.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/ring_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/test/test_macros.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/tests/numeric_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/tests/pose_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/client_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/encoder_performance_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/mock_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/channel_handle.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/channel_parcelable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/client_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/client_channel_factory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/file_handle.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/message_reader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/message_writer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/mock_client_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/mock_client_channel_factory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/mock_message_reader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/mock_message_writer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/mock_service_endpoint.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/argument_encoder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/array_wrapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/buffer_wrapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/copy_cv_reference.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/default_initialization_allocator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/encoding.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/enumeration.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/find_replace.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/function_traits.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/macros.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/message_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/payload.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/pointer_wrapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/remote_method.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/remote_method_type.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/sequence.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/serializable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/serialization.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/string_wrapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/thread_local_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/type_operators.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/variant.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/service.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/service_dispatcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/service_endpoint.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/status.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/trace.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/utility.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/serialization_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service_dispatcher.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/status.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/status_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/thread_local_buffer_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/variant_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/pdx_benchmarks.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/pdx_tool.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/pdx/default_transport/service_utility.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/servicefs/pdx/default_transport/channel_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/servicefs/pdx/default_transport/channel_parcelable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/servicefs/pdx/default_transport/client_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/servicefs/pdx/default_transport/client_channel_factory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/servicefs/pdx/default_transport/service_endpoint.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/uds/pdx/default_transport/channel_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/uds/pdx/default_transport/channel_parcelable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/uds/pdx/default_transport/client_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/uds/pdx/default_transport/client_channel_factory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/private/uds/pdx/default_transport/service_endpoint.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/channel_event_set.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/channel_manager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/channel_parcelable.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/client_channel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/client_channel_factory.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/client_channel_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/channel_event_set.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/channel_manager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/channel_parcelable.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/client_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/client_channel_factory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/ipc_helper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/private/uds/service_endpoint.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/remote_method_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/service_endpoint.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/service_framework_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libperformance/include/dvr/performance_client_api.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libperformance/include/private/dvr/performance_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libperformance/include/private/dvr/performance_rpc.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libperformance/performance_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libperformance/performance_rpc.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvr_manager/include/private/dvr/trusted_uids.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvr_manager/trusted_uids.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvr_manager/vr_manager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/acquired_buffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/acquired_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/display_manager_service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/display_manager_service.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/display_service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/display_service.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/display_surface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/display_surface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/epoll_event_dispatcher.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/epoll_event_dispatcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/hardware_composer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/hardware_composer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/hwc_types.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/include/dvr/vr_flinger.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/tests/vrflinger_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/vr_flinger.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrsensor/include/dvr/pose_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrsensor/include/private/dvr/latency_model.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrsensor/include/private/dvr/pose-ipc.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrsensor/include/private/dvr/pose_client_internal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrsensor/latency_model.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrsensor/pose_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/Platform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/egl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/eglext.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/eglext_angle.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/eglplatform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/ETC1/etc1.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/egl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/gl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/glext.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/glplatform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2platform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl3.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl31.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl32.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl3ext.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl3platform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/include/KHR/khrplatform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/BufferObjectManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/BufferObjectManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/TextureObjectManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/TextureObjectManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/TokenManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/TokenManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/Tokenizer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/Tokenizer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/context.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/dxt.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/dxt.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/fp.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/fp.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/light.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/light.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/matrix.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/matrix.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/mipmap.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/primitives.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/primitives.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/state.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/state.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/texture.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/texture.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/vertex.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/vertex.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/CallStack.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/FileBlobCache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/FileBlobCache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/eglApi.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_angle_platform.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_angle_platform.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_cache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_cache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_layers.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_layers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_tls.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_tls.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_trace.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egldefs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/getProcAddress.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/include/private/EGL/cache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/include/private/EGL/display.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/ETC1/etc1.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/GLES2/gl2.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/GLES_CM/gl.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/egl_impl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/hooks.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/EGLTest/EGL_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/EGLTest/egl_cache_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/app-linux.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/app.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/cams.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/demo.c
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/include/GLES/egl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/include/GLES/egltypes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/include/GLES/gl.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/shapes.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/configdump/configdump.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/fillrate/fillrate.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/filter/filter.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/finish/finish.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl2_basic/gl2_basic.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl2_copyTexImage/gl2_copyTexImage.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl2_jni/jni/gl_code.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl2_yuvtex/gl2_yuvtex.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_basic/gl_basic.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_jni/jni/gl_code.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perf/fill_common.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perf/filltest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perf/fragment_shaders.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perf/gl2_perf.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perfapp/jni/gl_code.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_yuvtex/gl_yuvtex.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gldual/jni/gl_code.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gralloc/gralloc.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcColorEquiv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcCommit.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcRects.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcStress.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcTestLib.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcTestLib.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/lib/WindowSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/lib/glTestLib.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/lib/include/EGLUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/lib/include/WindowSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/lib/include/glTestLib.h
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/linetex/linetex.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/swapinterval/swapinterval.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/textures/textures.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/tritex/tritex.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/EGL14cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/EGL15cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/EGLExtcHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglCreateImage.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglCreatePbufferFromClientBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglCreatePixmapSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglCreatePlatformWindowSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglCreateSync.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglCreateWindowSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglGetDisplay.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglGetPlatformDisplay.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/egl/eglQueryString.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES10ExtcHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES10cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES11ExtcHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES11cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES20cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES30cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES31ExtcHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES31cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/GLES32cHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/common.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glBindVertexBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glCreateShaderProgramv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDebugMessageCallback.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDebugMessageCallbackKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDebugMessageInsertKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDispatchComputeIndirect.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDrawArraysIndirect.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDrawElementsIndirect.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDrawElementsInstanced.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glDrawElementsInstancedBaseVertex.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetActiveAttrib.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetActiveUniform.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetActiveUniformBlockName.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetBooleanv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetBufferPointerv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetDebugMessageLog.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetDebugMessageLogKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetFloatv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetIntegerv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetObjectLabel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetObjectLabelKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetObjectPtrLabel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetObjectPtrLabelKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetPointerv.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetPointervKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetProgramInfoLog.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetProgramPipelineInfoLog.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetProgramResourceName.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetShaderInfoLog.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetShaderSource.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetString.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetStringi.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetTransformFeedbackVarying.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glGetUniformIndices.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glMapBufferRange.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glObjectPtrLabel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glObjectPtrLabelKHR.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glShaderSource.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glTransformFeedbackVaryings.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/jsr239/GLCHeader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/jsr239/glGetString.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/audiomanager/IAudioManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/batteryservice/include/batteryservice/BatteryService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/batteryservice/include/batteryservice/BatteryServiceConstants.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferClient.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubIdGenerator.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferNode.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/include/bufferhub/BufferClient.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/include/bufferhub/BufferHubIdGenerator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/include/bufferhub/BufferHubService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/include/bufferhub/BufferNode.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/main_bufferhub.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/tests/BufferHubIdGenerator_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/tests/BufferNode_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/displayservice/DisplayEventReceiver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/displayservice/DisplayService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/displayservice/include/displayservice/DisplayEventReceiver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/displayservice/include/displayservice/DisplayService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/GpuService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/GpuService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/gpustats/GpuStats.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/gpustats/GpuStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/main_gpuservice.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/BlockingQueue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputClassifier.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputClassifier.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputClassifierConverter.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputClassifierConverter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputDispatcher.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputDispatcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReader.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReaderBase.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReaderFactory.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReporter.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/TouchVideoDevice.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/TouchVideoDevice.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/InputDriver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/InputDriver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/InputFlinger.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/InputFlinger.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/InputHost.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/InputHost.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/host/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/include/InputListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/include/InputReaderBase.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/include/InputReaderFactory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/include/InputReporterInterface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/include/PointerControllerInterface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/BlockingQueue_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/InputClassifierConverter_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/InputClassifier_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/InputDispatcher_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/InputReader_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/TestInputListener.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/tests/TestInputListener.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/nativeperms/nativeperms.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/powermanager/IPowerManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/schedulerservice/SchedulingPolicyService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/schedulerservice/include/schedulerservice/SchedulingPolicyService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/BatteryService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/BatteryService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/CorrectedGyroSensor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/CorrectedGyroSensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/Fusion.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/Fusion.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/GravitySensor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/GravitySensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/LinearAccelerationSensor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/LinearAccelerationSensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/OrientationSensor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/OrientationSensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/RecentEventLogger.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/RecentEventLogger.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/RingBuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/RotationVectorSensor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/RotationVectorSensor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDevice.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDevice.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDeviceUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDeviceUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDirectConnection.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDirectConnection.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventAckReceiver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorFusion.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorFusion.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorInterface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorInterface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorList.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorList.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorRecord.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorRecord.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorRegistrationInfo.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorServiceUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorServiceUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorsWrapper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/DirectReportChannel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/DirectReportChannel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/EventQueue.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/EventQueue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/SensorManager.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/include/sensorservicehidl/SensorManager.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/utils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/utils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/main_sensorservice.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/mat.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/quat.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/tests/sensorservicetest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/traits.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/vec.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Barrier.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayerConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayerConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferQueueLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferQueueLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferStateLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferStateLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/ClientCache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/ClientCache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/ColorLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/ColorLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Colorizer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/CompositionEngine.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/Display.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/DisplayColorProfile.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/DisplayColorProfileCreationArgs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/DisplayCreationArgs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/DisplaySurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/Layer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/LayerCreationArgs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/LayerFE.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/LayerFECompositionState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/Output.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/OutputLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/RenderSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/RenderSurfaceCreationArgs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/CompositionEngine.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/Display.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/DisplayColorProfile.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/DumpHelpers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/HwcBufferCache.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/Layer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/LayerCompositionState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/Output.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/OutputCompositionState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/OutputLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/OutputLayerCompositionState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/impl/RenderSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/CompositionEngine.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/Display.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/DisplayColorProfile.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/DisplaySurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/Layer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/LayerFE.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/NativeWindow.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/Output.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/OutputLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/include/compositionengine/mock/RenderSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/CompositionEngine.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/Display.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/DisplayColorProfile.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/DisplaySurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/Layer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/LayerFE.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/NativeWindow.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/Output.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/OutputLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/mock/RenderSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/CompositionEngine.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/Display.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/DisplayColorProfile.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/DisplaySurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/DumpHelpers.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/HwcBufferCache.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/Layer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/LayerCompositionState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/Output.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/OutputCompositionState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/OutputLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/OutputLayerCompositionState.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/src/RenderSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/CompositionEngineTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/DisplayColorProfileTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/DisplayTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/HwcBufferCacheTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/LayerTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/MockHWC2.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/MockHWC2.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/MockHWComposer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/MockHWComposer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/OutputLayerTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/OutputTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/RectMatcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/RegionMatcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/RenderSurfaceTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/CompositionEngine/tests/TransformMatcher.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/ContainerLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/ContainerLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayDevice.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayDevice.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/ComposerHal.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/ComposerHal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/DisplayIdentification.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/DisplayIdentification.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/FramebufferSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/FramebufferSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/HWC2.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/HWC2.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/HWComposer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/HWComposer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/PowerAdvisor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/PowerAdvisor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/VirtualDisplaySurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/VirtualDisplaySurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Effects/Daltonizer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Effects/Daltonizer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/FrameTracker.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/FrameTracker.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Layer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Layer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerProtoHelper.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerProtoHelper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerRejecter.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerRejecter.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerStats.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerVector.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/LayerVector.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/MonitoredProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/MonitoredProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/NativeWindowSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/NativeWindowSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RefreshRateOverlay.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RefreshRateOverlay.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RegionSamplingThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RegionSamplingThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RenderArea.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RenderArea.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/DispSync.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/DispSync.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/DispSyncSource.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/DispSyncSource.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/EventControlThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/EventControlThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/EventThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/EventThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/IdleTimer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/IdleTimer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/InjectVSyncSource.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/LayerHistory.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/LayerHistory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/LayerInfo.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/LayerInfo.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/MessageQueue.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/MessageQueue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/RefreshRateConfigs.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/RefreshRateStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/Scheduler.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/Scheduler.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/SchedulerUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/SchedulerUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/VSyncModulator.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/VSyncModulator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/StartPropertySetThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/StartPropertySetThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlingerFactory.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlingerFactory.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlingerProperties.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlingerProperties.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceInterceptor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceInterceptor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceTracing.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceTracing.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TimeStats/TimeStats.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TimeStats/TimeStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TimeStats/timestatsproto/TimeStatsHelper.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TimeStats/timestatsproto/include/timestatsproto/TimeStatsHelper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TimeStats/timestatsproto/include/timestatsproto/TimeStatsProtoHeader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TransactionCompletedThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/TransactionCompletedThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/layerproto/LayerProtoParser.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/layerproto/include/layerproto/LayerProtoHeader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/layerproto/include/layerproto/LayerProtoParser.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/main_surfaceflinger.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/BufferGenerator.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/BufferGenerator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/BufferGeneratorShader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/Credentials_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/InvalidHandles_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/Stress_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/SurfaceInterceptor_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/Transaction_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/VirtualDisplay_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerClient.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerClient.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/RenderState.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/SFFakeHwc_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2Test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestBuffer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestBuffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestClientTarget.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestClientTarget.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestLayer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestLayer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestLayers.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestLayers.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestPixelComparator.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestPixelComparator.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestProperties.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestProperties.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestVirtualDisplay.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2TestVirtualDisplay.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/AsyncCallRecorder.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/CachingTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/CompositionTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/DispSyncSourceTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/DisplayIdentificationTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/DisplayIdentificationTest.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/DisplayTransactionTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/EventControlThreadTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/EventThreadTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/FakePhaseOffsets.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/IdleTimerTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/LayerHistoryTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/LayerMetadataTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/RefreshRateConfigsTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/RefreshRateStatsTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/RegionSamplingTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/SchedulerTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/SchedulerUtilsTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/TestableScheduler.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/TestableSurfaceFlinger.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/TimeStatsTest.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/libsurfaceflinger_unittest_main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/libsurfaceflinger_unittest_main.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/DisplayHardware/MockComposer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/DisplayHardware/MockComposer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/DisplayHardware/MockDisplay.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/DisplayHardware/MockDisplay.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/DisplayHardware/MockPowerAdvisor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/DisplayHardware/MockPowerAdvisor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockDispSync.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockDispSync.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockEventControlThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockEventControlThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockEventThread.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockEventThread.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockMessageQueue.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockMessageQueue.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockNativeWindowSurface.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockNativeWindowSurface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockSurfaceInterceptor.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockSurfaceInterceptor.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockTimeStats.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/MockTimeStats.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/gui/MockGraphicBufferConsumer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/gui/MockGraphicBufferConsumer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/gui/MockGraphicBufferProducer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/gui/MockGraphicBufferProducer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/system/window/MockNativeWindow.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/mock/system/window/MockNativeWindow.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/vsync/vsync.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/waitforvsync/waitforvsync.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/utils/PriorityDumper.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/utils/include/serviceutils/PriorityDumper.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/utils/tests/PriorityDumper_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/buffer_hub.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/bufferhubd.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/consumer_channel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/consumer_queue_channel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/include/private/dvr/buffer_hub.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/include/private/dvr/consumer_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/include/private/dvr/consumer_queue_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/include/private/dvr/producer_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/include/private/dvr/producer_queue_channel.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/producer_channel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/producer_queue_channel.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_composer_frame.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_composer_frame.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_composer_layer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_composer_layer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_unique_fd.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_unique_fd.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_hwc.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_hwc.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/tests/vr_composer_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/vr_composer.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/vr_composer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/vr_hardware_composer_service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/cpu_set.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/cpu_set.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/directory_reader.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service_tests.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/stdio_filebuf.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/task.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/task.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/unique_file.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/DvrVirtualTouchpadClient.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/EvdevInjector.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/EvdevInjector.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/VirtualTouchpadClient.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/VirtualTouchpadEvdev.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/VirtualTouchpadEvdev.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/VirtualTouchpadService.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/VirtualTouchpadService.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/include/VirtualTouchpad.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/include/VirtualTouchpadClient.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/include/dvr/virtual_touchpad_client.h
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/main.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/tests/VirtualTouchpad_test.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/include/hardware/hwvulkan.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/include/vulkan/vk_android_native_buffer.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/include/vulkan/vk_layer_interface.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api_gen.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api_gen.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver_gen.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver_gen.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/stubhal.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/stubhal.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/swapchain.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/swapchain.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/nulldrv/null_driver.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/nulldrv/null_driver_gen.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/nulldrv/null_driver_gen.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/tools/vkinfo.cpp
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.h
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson_info.cc
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson_instance.cc
Examining data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson_unittest.cc

FINAL RESULTS:

data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:375:17:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t r = readlink(path, linkname, PATH_MAX);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2640:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(path_.c_str(), AID_SHELL, AID_SHELL)) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2654:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(log_path_.c_str(), AID_SHELL, AID_SHELL)) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2669:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(tmp_path_.c_str(), AID_SHELL, AID_SHELL)) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:775:28:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
                } else if (chown(path, AID_SHELL, AID_SHELL)) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:789:33:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
                            if (chmod(p->fts_path, 02771) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:795:29:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
                        if (chown(p->fts_path, -1, expected) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2189:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (chown(pkgdir, AID_INSTALL, AID_INSTALL) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2194:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(pkgdir, 0700) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2230:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(pkgdir, s.st_mode) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2239:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (chown(pkgdir, s.st_uid, s.st_gid) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_chroot.cpp:207:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(kPostinstallApexDir, 0755) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_chroot.cpp:211:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (chown(kPostinstallApexDir, 0, 0) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:112:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    ret = ::chown(path.c_str(), owner, group);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:116:14:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    return ::chmod(path.c_str(), mode);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:832:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        ::chmod(path.c_str(), mode);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:833:11:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        ::chown(path.c_str(), uid, gid);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:1055:18:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    ASSERT_EQ(0, chown(ref_profile_dir.c_str(), kTestAppGid, kTestAppGid));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:1056:18:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    ASSERT_EQ(0, chmod(ref_profile_dir.c_str(), 0700));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:1088:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    ::chown(cur_profile_.c_str(), kTestAppUid + 1, kTestAppGid + 1);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:75:17:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    EXPECT_EQ(::chown(fullPath.c_str(), owner, group), 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:76:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    EXPECT_EQ(::chmod(fullPath.c_str(), mode), 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/test_utils.h:122:11:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (::chown(file.c_str(), uid, gid) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/test_utils.h:126:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (::chmod(file.c_str(), mode) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.cpp:1042:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(p->fts_path, target_mode) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.cpp:1047:17:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
            if (chown(p->fts_path, -1, gid) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/ip-up-vpn/ip-up-vpn.c:134:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(DIR ".tmp", 0444) || rename(DIR ".tmp", DIR "state")) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/ListCommand.cpp:578:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    chown(mFileOutputPath.c_str(), AID_SHELL, AID_SHELL);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:594:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        if (chmod(path, statBuffer.st_mode&(S_IRWXU|S_IRWXG|S_IRWXO)) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:601:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(path, statBuffer.st_uid, statBuffer.st_gid) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:333:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access((g_traceFolder + filename).c_str(), F_OK) != -1;
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:338:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access((g_traceFolder + filename).c_str(), W_OK) != -1;
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1170:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool tracefs = access((tracefs_path + trace_file).c_str(), F_OK) != -1;
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1171:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool debugfs = access((debugfs_path + trace_file).c_str(), F_OK) != -1;
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.h:25:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, __VA_ARGS__); \
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.h:31:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, __VA_ARGS__); \
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.h:37:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, __VA_ARGS__); \
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.h:43:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, __VA_ARGS__); \
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateUtil.cpp:326:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execvp(path, (char**)args.data());
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:484:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(path, "%s%s", trace_path, trace->d_name);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:488:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(buf, "%s", trace->d_name);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:496:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(path, "%s%s", trace_path, buf);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_smoke_test.cpp:179:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    EXPECT_EQ(access(getZipFilePath(), F_OK), 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/GLHelper.cpp:336:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(end, src[i]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:432:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        bool existing = (access(path.c_str(), F_OK) == 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:463:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        bool existing = (access(path.c_str(), F_OK) == 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:564:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(path.c_str(), F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:585:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(path.c_str(), F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:881:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(from_ce.c_str(), F_OK) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:983:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        (access(from_ce.c_str(), F_OK) == 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:985:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        (access(from_de.c_str(), F_OK) == 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:1110:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(from_ce.c_str(), F_OK) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2146:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(boot_marker_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2253:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execl(kIdMapPath, kIdMapPath, "--fd", target_apk, overlay_apk,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2260:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execl(kIdMapPath, kIdMapPath, "--verify", target_apk, overlay_apk,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2823:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (system("/system/bin/migrate_legacy_obb_data.sh") != 0) { // NOLINT(cert-env33-c)
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:227:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv(argv_[0], (char * const *)&argv_[0]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:294:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    bool useDebug = (is_debug_runtime || is_debug_bg_job) && (access(debug_binary, X_OK) == 0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1709:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(dex_path.c_str(), R_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:135:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (access(keychain_added_dir, F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:140:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (access(keychain_removed_dir, F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:148:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (access(keychain_added_dir, F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:151:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (access(keychain_removed_dir, F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:272:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(GetOtaDirectoryPrefix().c_str(), R_OK) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:330:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(dalvik_cache.c_str(), F_OK) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:336:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(isa_path.c_str(), F_OK) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:348:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(art_path.c_str(), F_OK) == 0 && access(oat_path.c_str(), F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:348:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(art_path.c_str(), F_OK) == 0 && access(oat_path.c_str(), F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:360:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(preopted_boot_art_path.c_str(), F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:536:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (access(path.c_str(), F_OK) == 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:548:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(apk_path, F_OK) != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:769:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, new_path.c_str());
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:800:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, assembled_path.c_str());
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_utils.cpp:57:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv(program, &args[0]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:86:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return ::access(fullPath, F_OK);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:126:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system("mkdir -p /data/local/tmp/user/0");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:131:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system("rm -rf /data/local/tmp/user");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:87:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(cmd.c_str());
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:92:18:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE* file = popen(cmd.c_str(), "r");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:373:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(expected_access, access(odex.c_str(), R_OK));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:374:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(expected_access, access(vdex.c_str(), R_OK));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:375:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(-1, access(art.c_str(), R_OK));  // empty profiles do not generate an image.
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:406:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(expected_access, access(odex.c_str(), F_OK));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:407:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(expected_access, access(vdex.c_str(), F_OK));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:408:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(-1, access(art.c_str(), R_OK));  // empty profiles do not generate an image.
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:933:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ASSERT_EQ(-1, access(code_path_ref_profile.c_str(), R_OK));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:111:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system("mkdir -p /data/local/tmp/user/0");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:118:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system("rm -rf /data/local/tmp/user");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_utils_test.cpp:607:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("mkdir -p /data/local/tmp/user/0");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/view_compiler.cpp:87:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv("/system/bin/viewcompiler", argv);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:82:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nameBuffer, path);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:101:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filenameOffset, de->d_name);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:151:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(nameBuffer, path);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:290:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fullPath, srcPath);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:292:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fullPath+srcLen+1, de->d_name);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IMemory.cpp:343:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                access |= PROT_WRITE;
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IMemory.cpp:346:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            mBase = mmap(nullptr, size, access, MAP_SHARED, fd, offset);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ProcessState.cpp:96:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(driver, R_OK) == -1) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:110:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv(binderservername, childargv);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/EndToEndNativeInputTest.cpp:256:9:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execlp("input", "input", "tap", buf1, buf2, NULL);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputDevice.cpp:102:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (!access(path.c_str(), R_OK)) {
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputDevice.cpp:122:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!access(path.c_str(), R_OK)) {
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/benchmark.h:68:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(log_message, kLogMessageLength, "#btrace#%s|%" PRId64, name, data);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/trace.h:26:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer.data(), buffer.size(), format,
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/pdx_tool.cpp:46:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(fmt, ##__VA_ARGS__);         \
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:448:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(current.c_str(), F_OK) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:471:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      ret = access(current.c_str(), F_OK);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/hardware_composer.cpp:109:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer.data(), buffer.size(), format, std::forward<Args>(args)...);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/hardware_composer.cpp:1264:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  ret = sscanf(data.data(), "VSYNC=%" PRIu64,
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/glext.h:330:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFEROESPROC) (GLenum target, GLenum access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/glext.h:334:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_API void *GL_APIENTRY glMapBufferOES (GLenum target, GLenum access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/glext.h:623:120:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEEXTPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES/glext.h:626:109:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_API void *GL_APIENTRY glMapBufferRangeEXT (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h:426:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFEROESPROC) (GLenum target, GLenum access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h:430:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferOES (GLenum target, GLenum access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h:1456:120:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEEXTPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h:1459:113:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRangeEXT (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h:2418:89:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (GL_APIENTRYP PFNGLMAKEIMAGEHANDLERESIDENTNVPROC) (GLuint64 handle, GLenum access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES2/gl2ext.h:2432:82:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glMakeImageHandleResidentNV (GLuint64 handle, GLenum access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl3.h:1021:117:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl3.h:1126:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl31.h:1023:117:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl31.h:1128:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl31.h:1438:137:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (GL_APIENTRYP PFNGLBINDIMAGETEXTUREPROC) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl31.h:1507:130:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl32.h:1023:117:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(GL_APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl32.h:1128:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void *GL_APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl32.h:1438:137:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (GL_APIENTRYP PFNGLBINDIMAGETEXTUREPROC) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/GLES3/gl32.h:1507:130:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GL_APICALL void GL_APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:170:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const bool has_vendor_lib = (access(vendor_lib_path, R_OK) == 0);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:464:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (!access(absolutePath.c_str(), R_OK)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perf/fill_common.cpp:294:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(gCurrentTestName, "%s, %i, %i, 1", gFragmentTests[pgmNum]->name, pgmNum, tex);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glMapBufferRange.cpp:4:77:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  (JNIEnv *_env, jobject _this, jint target, jint offset, jint length, jint access) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/tools/glgen/stubs/gles11/glMapBufferRange.cpp:6:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            (GLintptr)offset, (GLsizeiptr)length, (GLbitfield)access);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1630:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(path.c_str(), R_OK)) {
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1869:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(devname, dirname);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1877:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, de->d_name);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/Stress_test.cpp:100:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(cmd.c_str());
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/Stress_test.cpp:106:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(cmd.c_str());
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/SurfaceInterceptor_test.cpp:94:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("service call SurfaceFlinger 1020 i32 1 > /dev/null");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/SurfaceInterceptor_test.cpp:98:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("service call SurfaceFlinger 1020 i32 0 > /dev/null");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/SurfaceInterceptor_test.cpp:130:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system("setenforce 0");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:133:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("start surfaceflinger");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:146:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("stop surfaceflinger");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:160:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("setenforce 0");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:161:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("stop");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:176:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("stop");
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.cpp:108:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    int len = vsnprintf(buf, sizeof(buf), format, ap);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.h:102:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__((format(printf, (fmt) + 1, (args) + 1)))
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.h:152:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    __attribute__((format(printf, (fmt) + 1, 0)))
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:162:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(name, kLibFormat, subname_len, subname);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.cpp:331:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name, layer.properties.layerName);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.cpp:332:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(name + layer_name_len, gpa_name);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.cpp:335:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(name + 2, gpa_name);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc:859:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(string, sizeof(string), "0x%016" PRIx64, value);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc:961:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      std::sscanf(json_value->asString().c_str(), "0x%016" PRIx64, value);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1294:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        ret = getopt_long(argc, argv, "a:b:cf:k:ns:t:zo:",
data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/main.cpp:49:21:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ((c = getopt(argc, argv, "hpv")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2375:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((c = getopt(argc, argv, "dho:svqzpPBRSV:w")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/main.cpp:33:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((c = getopt(argc, argv, "wdho:svqzpPBRSV:")) != -1 && !do_wait) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/dumpsys.cpp:138:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        c = getopt_long(argc, argv, "+t:T:l", longOptions, &optionIndex);
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Main.cpp:744:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        ret = getopt_long(argc, argv, "ds:",
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:341:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* dex2oat_bootclasspath = getenv("DEX2OATBOOTCLASSPATH");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/globals.cpp:64:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* data_path = getenv("ANDROID_DATA");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/globals.cpp:69:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* root_path = getenv("ANDROID_ROOT");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/globals.cpp:105:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    android_asec_dir = ensure_trailing_slash(getenv(ASEC_MOUNTPOINT_ENV_NAME));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_chroot.cpp:223:9:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
    if (chroot(".")  != 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:1145:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* boot_classpath = getenv("BOOTCLASSPATH");
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:1158:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* boot_classpath = getenv("BOOTCLASSPATH");
data/android-platform-frameworks-native-10.0.0+r36/cmds/ip-up-vpn/ip-up-vpn.c:37:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *value = getenv(name);
data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/ListCommand.cpp:1112:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        c = getopt_long(arg.argc, arg.argv,
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:691:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        ret = getopt(argc, argv, "ah");
data/android-platform-frameworks-native-10.0.0+r36/cmds/service/service.cpp:75:18:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        int ic = getopt(argc, argv, "h?");
data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Main.cpp:68:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "mt:s:nlh?")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Replayer.cpp:62:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(RAND_COLOR_SEED);
data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Replayer.cpp:93:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(RAND_COLOR_SEED);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:192:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(num);
data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/GraphicsEnv.cpp:121:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    static const char* androidRootEnv = getenv("ANDROID_ROOT");
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/GLTest.cpp:52:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* displaySecsEnv = getenv("GLTEST_DISPLAY_SECS");
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputDevice.cpp:90:57:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *rootsForPartition[] {"/odm", "/vendor", getenv("ANDROID_ROOT")};
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputDevice.cpp:113:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *androidData = getenv("ANDROID_DATA");
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/Region_test.cpp:140:5:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srandom(12345);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tests/Region_test.cpp:146:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                if (random() % 2) {
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/tools/lutgen.cpp:98:19:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt_long(argc, argv, OPTSTR, OPTIONS, &index)) >= 0) {
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/pdx_benchmarks.cpp:1022:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
              getopt_long(argc, argv, "", long_options, &option_index)) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_default_transport/pdx_tool.cpp:216:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
              getopt_long(argc, argv, "", long_options, &option_index)) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:46:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(now);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:288:12:  [3] (random) nrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return nrand48(mRandState);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcColorEquiv.cpp:180:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "vs:e:r:D:?h")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcCommit.cpp:350:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "s:v?h")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcRects.cpp:213:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "D:v?h")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcStress.cpp:251:19:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((opt = getopt(argc, argv, "vp:d:D:n:s:e:t:?h")) != -1) {
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service_tests.cpp:259:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* trusted_uid_env = std::getenv(kTrustedUidEnvironmentVariable);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:154:7:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
void* LoadLibrary(const android_dlextinfo& dlextinfo,
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:184:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            so = LoadLibrary(dlextinfo, prop, prop_len);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:362:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(fullFilename.c_str(), flags);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:396:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:398:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open((g_traceFolder + k_traceMarkerPath).c_str(), O_WRONLY);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[32] = "1";
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:829:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (Tokenizer::open(String8(categories_file), &tokenizer) != NO_ERROR) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:975:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char trace_data[4096];
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:976:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int traceFD = open((g_traceFolder + k_traceStreamPath).c_str(), O_RDWR);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1001:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int traceFD = open((g_traceFolder + k_tracePath).c_str(), O_RDWR);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1085:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1313:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                g_traceBufferSizeKB = atoi(optarg);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1333:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                g_initialSleepSecs = atoi(optarg);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1337:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                g_traceDurationSeconds = atoi(optarg);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1449:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                outFd = open(g_outputFile, O_WRONLY | O_CREAT | O_TRUNC, 0644);
data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreport/bugreport.cpp:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[65536];
data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/bugreportz.cpp:48:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[65536];
data/android-platform-frameworks-native-10.0.0+r36/cmds/cmd/cmd.cpp:72:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cwd[256];
data/android-platform-frameworks-native-10.0.0+r36/cmds/cmd/cmd.cpp:102:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(fullPath.string(), flags, S_IRWXU|S_IRWXG);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.cpp:140:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char stamp[80];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.cpp:173:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[65536];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateUtil.cpp:206:52:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateUtil.cpp:393:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (!(pid = atoi(ps->d_name))) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:103:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cmdline_buf[16384] = "(unknown)";
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:156:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = TEMP_FAILURE_RETRY(open(path.c_str(), flags, mode));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4096];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:303:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            TEMP_FAILURE_RETRY(open(abs_path.c_str(), O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:369:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linkname[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:406:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:432:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[50], path[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:458:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%u", pid);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:751:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char date[80];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:888:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1290:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    TEMP_FAILURE_RETRY(open(path.c_str(),
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1690:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(file_name_buf.get(), temp_file_pattern.c_str(), buf_size);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1729:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int pid = atoi(d->d_name);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1837:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            open(paths[i].c_str(), O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC | O_NOFOLLOW,
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1937:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char date[80];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1981:52:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(filepath.c_str(), O_RDONLY | O_NONBLOCK
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2007:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hash_buffer[SHA256_DIGEST_LENGTH * 2 + 1];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2009:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(hash_buffer + (i * 2), "%02x", hash[i]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2060:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char date[80];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2096:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        ds.zip_file.reset(fopen(ds.path_.c_str(), "wb"));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2505:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* oom_adj = fopen("/proc/self/oom_score_adj", "we");
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2511:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        oom_adj = fopen("/proc/self/oom_adj", "we");
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2619:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *cmdline = fopen("/proc/cmdline", "re");
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_smoke_test.cpp:53:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return TEMP_FAILURE_RETRY(open(filename.c_str(),
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test.cpp:772:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int pid = atoi(lines[0].c_str());
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test.cpp:1378:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = TEMP_FAILURE_RETRY(open(path_.c_str(),
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test.cpp:1566:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int pid = atoi(lines[0].c_str());
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test_fixture.cpp:69:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            return atoi(argv[2]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/tests/dumpstate_test_fixture.cpp:90:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                int napTime = atoi(argv[index + 1]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:263:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (de->d_type != DT_DIR || !(userid = atoi(de->d_name))) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:291:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cmdpath[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:292:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cmdline[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:294:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (!(pid = atoi(de->d_name))) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:301:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = TEMP_FAILURE_RETRY(open(cmdpath, O_RDONLY | O_CLOEXEC))) >= 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:312:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = TEMP_FAILURE_RETRY(open(cmdpath, O_RDONLY | O_CLOEXEC))) >= 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:323:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(cmdline, "N/A");
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char taskpath[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:369:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char commpath[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:370:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char comm[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:372:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (!(tid = atoi(de->d_name))) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:381:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = TEMP_FAILURE_RETRY(open(commpath, O_RDONLY | O_CLOEXEC))) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:382:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(comm, "N/A");
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:415:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name_buffer[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:420:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC))) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:457:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[16];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[16];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:480:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1023];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:486:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC))) < 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char arg[255];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:590:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:596:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[50];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:606:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *output = atoi(buffer);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:665:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(newpath, O_RDONLY | O_NONBLOCK | O_CLOEXEC)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:787:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = TEMP_FAILURE_RETRY(open(path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:813:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fp = fopen(RT_TABLES_PATH, "re");
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:818:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char table[16];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:911:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[2];
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/dumpsys.cpp:406:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4096];
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Main.cpp:757:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                g_SleepBetweenSamplesMs = atoi(optarg);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:1409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dex_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2145:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char boot_marker_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2267:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int idmap_fd = open(idmap_path, O_RDWR);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char idmap_path[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2371:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        idmap_fd = open(idmap_path, O_RDWR | O_CREAT | O_EXCL, 0644);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2373:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        idmap_fd = open(idmap_path, O_RDWR);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2437:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char idmap_path[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oat_instr_dir[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char from_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char to_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2621:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ::android::base::unique_fd wfd(open(filePath.c_str(), O_WRONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2677:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ::android::base::unique_fd rfd(open(filePath.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2699:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ::android::base::unique_fd fd(open(filePath.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2710:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(config->digest, expectedHash.data(), kSha256Size);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:106:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd ufd(open(profile.c_str(), O_WRONLY | O_NOFOLLOW | O_CLOEXEC));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:608:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd fd(TEMP_FAILURE_RETRY(open(profile.c_str(), flags, 0600)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:637:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd.reset(TEMP_FAILURE_RETRY(open(profile.c_str(), flags)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:926:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd output_fd(open(out_file_name.c_str(),
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:935:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd apk_fd(open(code_path.c_str(), O_RDONLY | O_NOFOLLOW));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:964:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd in_fd(open(system_profile.c_str(), O_RDONLY | O_NOFOLLOW | O_CLOEXEC));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1007:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[kBufferSize];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1071:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return open(file_name, flags, permissions);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1363:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char in_odex_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1406:39:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            in_vdex_wrapper_fd->reset(open(in_vdex_path_str.c_str(), O_RDWR, 0));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1412:39:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            in_vdex_wrapper_fd->reset(open(in_vdex_path_str.c_str(), O_RDONLY, 0));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1477:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oat_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1487:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    oat_file_fd->reset(open(oat_path, O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1493:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    vdex_file_fd->reset(open(vdex_filename.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oat_dir[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1837:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        zip_fds->emplace_back(open(dex_path.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1884:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oat_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1885:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oat_dir[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1886:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oat_isa_dir[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1907:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        zip_fd.reset(open(dex_path.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2071:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd input_fd(open(dex_path, O_RDONLY, 0));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2086:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_oat_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2130:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        dex_metadata_fd.reset(TEMP_FAILURE_RETRY(open(dex_metadata_path, O_RDONLY | O_NOFOLLOW)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2282:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char oat_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2283:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char oat_dir[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2284:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char oat_isa_dir[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2394:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        unique_fd fd(TEMP_FAILURE_RETRY(open(dex_path.c_str(), O_RDONLY | O_CLOEXEC | O_NOFOLLOW)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char a_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2565:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_path[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2616:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path_default(char path[PKG_PATH_MAX], const char *oat_dir,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2645:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path_default(char path[PKG_PATH_MAX], const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2664:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path_default(char path[PKG_PATH_MAX], const char *src,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2694:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        unique_fd fd(TEMP_FAILURE_RETRY(open(elem.c_str(), O_RDONLY)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2881:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            open(dex_metadata->c_str(), O_RDONLY | O_NOFOLLOW)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2882:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd apk_fd(TEMP_FAILURE_RETRY(open(code_path.c_str(), O_RDONLY | O_NOFOLLOW)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.h:120:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path_default(char path[PKG_PATH_MAX], const char *oat_dir,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.h:123:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path_default(char path[PKG_PATH_MAX], const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.h:126:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path_default(char path[PKG_PATH_MAX], const char *src,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:54:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir, const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:59:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:64:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path(char path[PKG_PATH_MAX], const char *src, const char *instruction_set) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char version_path[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:98:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char misc_dir[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char keychain_added_dir[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:104:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char keychain_removed_dir[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:127:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char misc_added_dir[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd.cpp:130:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char misc_removed_dir[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd_deps.h:40:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern bool calculate_oat_file_path(char path[PKG_PATH_MAX],
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd_deps.h:51:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern bool calculate_odex_file_path(char path[PKG_PATH_MAX],
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/installd_deps.h:56:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern bool create_cache_path(char path[PKG_PATH_MAX],
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:704:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:743:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:773:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path(char path[PKG_PATH_MAX],
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp:169:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                uid = atoi(param);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp:204:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                int input = atoi(param);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp:296:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                uid = atoi(param);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp:308:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                dexopt_needed = atoi(param);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp:316:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                dexopt_flags = atoi(param);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt_parameters.cpp:344:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                target_sdk_version = atoi(param);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:50:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path(char path[PKG_PATH_MAX] ATTRIBUTE_UNUSED,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:57:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path(char path[PKG_PATH_MAX] ATTRIBUTE_UNUSED,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:63:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path(char path[PKG_PATH_MAX] ATTRIBUTE_UNUSED,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_cache_test.cpp:76:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = ::open(fullPath, O_RDWR | O_CREAT, 0644);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:72:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir, const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:77:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:82:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path(char path[PKG_PATH_MAX], const char *src, const char *instruction_set) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:727:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        first_compilation_odex_fd_.reset(open(odex.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:728:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        first_compilation_vdex_fd_.reset(open(vdex.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:875:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            unique_fd fd(open(snap_profile_.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:953:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        unique_fd fd(open(file.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_dexopt_test.cpp:1132:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            unique_fd fd(open(boot_profile.c_str(), O_RDONLY));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_otapreopt_test.cpp:60:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ASSERT_EQ(params.uid, static_cast<uid_t>(atoi(args[i++])));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_otapreopt_test.cpp:63:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ASSERT_EQ(params.dexopt_needed, atoi(args[i++]));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_otapreopt_test.cpp:65:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const int dexopt_flags = atoi(args[i++]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_otapreopt_test.cpp:80:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            ASSERT_EQ(params.target_sdk_version, atoi(args[i++]));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:54:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir, const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:59:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:64:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool create_cache_path(char path[PKG_PATH_MAX], const char *src, const char *instruction_set) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:80:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = ::open(get_full_path(path).c_str(), O_RDWR | O_CREAT, mode);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/installd_service_test.cpp:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PKG_PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/tests/test_utils.h:103:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(file.c_str(), O_WRONLY | O_CREAT, S_IRUSR | S_IWUSR);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.cpp:665:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[8192];
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.h:110:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int create_user_config_path(char path[PKG_PATH_MAX], userid_t userid);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/view_compiler.cpp:48:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd infd{open(apk_path, O_RDONLY)}; // NOLINT(android-cloexec-open)
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/view_compiler.cpp:56:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd outfd{open(out_dex_file, O_CREAT | O_TRUNC | O_WRONLY | O_CLOEXEC, 0644)};
data/android-platform-frameworks-native-10.0.0+r36/cmds/ip-up-vpn/ip-up-vpn.c:69:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *state = fopen(DIR ".tmp", "wb");
data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/PipeRelay.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/test.cpp:289:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return atoi(instance.c_str());
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char nameBuffer[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char copyBuffer[8192];
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:345:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE* src = fopen(fullPath, "r");
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:376:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fh = fopen(destPath, "w");
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:506:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fh = fopen(srcPath, "r");
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:572:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE* dest = fopen(path, "w");
data/android-platform-frameworks-native-10.0.0+r36/cmds/service/service.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ch8[2];
data/android-platform-frameworks-native-10.0.0+r36/cmds/service/service.cpp:133:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                int32_t code = atoi(argv[optind++]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/service/service.cpp:150:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                            data.writeInt32(atoi(argv[optind++]));
data/android-platform-frameworks-native-10.0.0+r36/cmds/service/service.cpp:226:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        			launchFlags = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.c:108:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bs->fd = open(driver, O_RDWR | O_CLOEXEC);
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.c:263:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&txn, (void*) ptr, sizeof(struct binder_transaction_data_secctx));
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.c:270:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&txn.transaction_data, (void*) ptr, sizeof(struct binder_transaction_data));
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.c:589:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, str, len);
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/service_manager.c:34:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[128];
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/service_manager.c:239:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(si->name, s, (len + 1) * sizeof(uint16_t));
data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Main.cpp:74:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                numThreads = atoi(optarg);
data/android-platform-frameworks-native-10.0.0+r36/cmds/surfacereplayer/replayer/Main.cpp:77:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                stopHere = atol(optarg);
data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/openmax/OMX_Types.h:259:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char OMX_UUIDTYPE[128];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/BufferedTextOutput.cpp:60:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer+bufferPos, txt, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[4];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp:188:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp:189:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "(bad length: %zu)", length);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp:194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Debug.cpp:215:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(c, "0x%08x: ", (int)offset);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IServiceManager.cpp:153:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char bootCompleted[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IpPrefix.cpp:81:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void*)&mUnion.mIn6Addr, &byte_vector[0], sizeof(mUnion.mIn6Addr));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IpPrefix.cpp:85:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void*)&mUnion.mInAddr, &byte_vector[0], sizeof(mUnion.mInAddr));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/MemoryDealer.cpp:452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[SIZE];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/MemoryHeapBase.cpp:68:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(device, open_flags);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:459:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(const_cast<uint8_t*>(data()), buffer, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:513:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mData + mDataPos, data + offset, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:737:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(mData+mDataPos, data, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:756:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d, data, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:861:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, val.data(), val.size());
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:1125:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(data, str, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:1610:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(outData, mData+mDataPos, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:2801:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(data, mData, mDataSize < desired ? mDataSize : desired);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:2804:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(objects, mObjects, objectsSize*sizeof(binder_size_t));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ProcessState.cpp:398:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(driver, O_RDWR | O_CLOEXEC);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/parcel.cpp:81:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, array, size);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/parcel.cpp:130:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(array, data, size);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderDriverInterfaceTest.cpp:37:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            m_binderFd = open(BINDER_DEV_NAME, O_RDWR | O_NONBLOCK | O_CLOEXEC);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderDriverInterfaceTest.cpp:153:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int binderFd = open(BINDER_DEV_NAME, O_RDWR | O_NONBLOCK | O_CLOEXEC);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stri[16];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strpipefd1[16];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char usepoll[2];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:1501:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        return run_server(atoi(argv[2]), atoi(argv[3]), atoi(argv[4]) == 1);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:1501:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        return run_server(atoi(argv[2]), atoi(argv[3]), atoi(argv[4]) == 1);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:1501:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        return run_server(atoi(argv[2]), atoi(argv[3]), atoi(argv[4]) == 1);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderTextOutputTest.cpp:106:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char buf[16] = {0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15};
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderTextOutputTest.cpp:112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char buf[4] = {0x11,0x22,0x33,0x44};
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char num_str[32];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:355:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            workers = atoi(argv[i+1]);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:360:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            iterations = atoi(argv[i+1]);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:365:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            payload_size = atoi(argv[i+1]);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:382:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if (atoi(argv[i+1]) > 0) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:58:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file.open(trace_path + "/tracing_on", ios::in);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:67:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  file.open(trace_path + "/tracing_on", ios::out | ios::trunc);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char num_str[32];
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:427:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      iterations = atoi(argv[i + 1]);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:432:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      no_process = 2 * atoi(argv[i + 1]);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:437:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      deadline_us = atoi(argv[i + 1]);
data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/GraphicsEnv.cpp:346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char manufacturer[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/GraphicsEnv.cpp:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char model[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ConsumerBase.cpp:411:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fenceName[32] = {};
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/DebugEGLImageTracker.cpp:60:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/DebugEGLImageTracker.cpp:62:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        const bool enabled = static_cast<bool>(atoi(value));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumer.cpp:716:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mtx, mCurrentTransformMatrix, sizeof(mCurrentTransformMatrix));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumerUtils.cpp:122:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(outTransform, xform.asArray(), sizeof(xform));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp:52:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer, hdr10plus.data(), metadataSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp:89:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hdr10plus.data(), buffer, metadataSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:366:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(configs->editItemAt(c)),
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:383:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(stats,
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:475:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&primaries, reply.readInplace(sizeof(ui::DisplayPrimaries)),
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1197:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(reply->writeInplace(sizeof(DisplayInfo)),
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1210:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(reply->writeInplace(sizeof(DisplayStatInfo)),
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1263:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(reply->writeInplace(sizeof(ui::DisplayPrimaries)), &primaries,
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerMetadata.cpp:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data.data(), p.data(), p.dataSize());
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:86:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output.writeInplace(16 * sizeof(float)),
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/Surface.cpp:468:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[64];
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/Surface.cpp:510:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char message[64];
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/Surface.cpp:1786:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(d, s, size);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/BufferQueueCore.h:46:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ___traceBuf[1024];                                                        \
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/GLTest.cpp:54:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        mDisplaySecs = atoi(displaySecsEnv);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputTransport.cpp:205:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&msg->body.motion.pointers[i].coords.values[0],
data/android-platform-frameworks-native-10.0.0+r36/libs/input/KeyCharacterMap.cpp:114:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    status_t status = Tokenizer::open(String8(filename.c_str()), &tokenizer);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/KeyLayoutMap.cpp:56:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    status_t status = Tokenizer::open(String8(filename.c_str()), &tokenizer);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/VelocityTracker.cpp:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/input/VirtualKeyMap.cpp:47:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    status_t status = Tokenizer::open(String8(filename.c_str()), &t);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/TestHelpers.h:55:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1];
data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/AHardwareBuffer.cpp:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[CMSG_SPACE(kFdBufferSize)];
data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/AHardwareBuffer.cpp:280:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(fdData, fds.get(), sizeof(int) * fdCount);
data/android-platform-frameworks-native-10.0.0+r36/libs/nativewindow/AHardwareBuffer.cpp:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fdBuf[CMSG_SPACE(kFdBufferSize)];
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/RenderEngine.cpp:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLESRenderEngine.cpp:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLESRenderEngine.cpp:422:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(value)) {
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLESRenderEngine.cpp:1540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[64];
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLESRenderEngine.cpp:1568:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char name[64];
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:579:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(static_cast<char*>(buffer), string8.string(), len);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/SensorEventQueue.cpp:77:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(events, mRecBuffer + mConsumed, count * sizeof(ASensorEvent));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/BufferHubBuffer.cpp:76:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&desc, &aDesc, sizeof(HardwareBufferDescription));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/BufferHubBuffer.cpp:226:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mBufferDesc, &bufferTraits.bufferDesc, sizeof(AHardwareBuffer_Desc));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:43:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(timestamps, &refreshPeriodNano, timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:46:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(timestamps, desiredPresentTimesNano.array(), frameCount * timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:49:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(timestamps, actualPresentTimesNano.array(), frameCount * timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(timestamps, frameReadyTimesNano.array(), frameCount * timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:67:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&refreshPeriodNano, timestamps, timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:71:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(desiredPresentTimesNano.editArray(), timestamps, frameCount * timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(actualPresentTimesNano.editArray(), timestamps, frameCount * timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FrameStats.cpp:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(frameReadyTimesNano.editArray(), timestamps, frameCount * timestampSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp:425:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(fds, handle->data, static_cast<size_t>(mTransportNumFds) * sizeof(int));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp:426:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + 13, handle->data + handle->numFds,
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp:522:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(h->data, fds, numFds * sizeof(int));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp:523:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(h->data + numFds, buf + flattenWordCount, numInts * sizeof(int));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp:591:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf + 2, tokenHandle->handle()->data, static_cast<size_t>(numIntsInToken) * sizeof(int));
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/GraphicBuffer.cpp:610:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(importToken->data, buf + 2, static_cast<size_t>(buf[1]) * sizeof(int));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbroadcastring/broadcast_ring_test.cc:16:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char v[N];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbroadcastring/broadcast_ring_test.cc:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char v[sizeof(Aligned<N>)];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbroadcastring/include/libbroadcastring/broadcast_ring.h:513:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, in, sizeof(*in));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbroadcastring/include/libbroadcastring/broadcast_ring.h:530:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, &data, sizeof(*out));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/consumer_buffer.cpp:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(out_meta, metadata_ptr, sizeof(DvrNativeBufferMetadata));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/consumer_buffer.cpp:113:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(meta, metadata_src, user_metadata_size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/consumer_buffer.cpp:172:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(user_metadata_ptr_, metadata_src, meta->user_metadata_size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/include/private/dvr/native_handle_wrapper.h:87:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&handle->data[handle->numFds], ints.data(),
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/ion_buffer.cpp:146:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(handle->data, fd_array, sizeof(int) * fd_count);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/ion_buffer.cpp:147:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(handle->data + fd_count, int_array, sizeof(int) * int_count);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/ion_buffer.cpp:182:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(handle->data + fd_count, other->handle()->data + fd_count,
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/producer_buffer.cpp:118:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(metadata_ptr, meta, sizeof(DvrNativeBufferMetadata));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhub/producer_buffer.cpp:122:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(user_metadata_ptr_, metadata_src, meta->user_metadata_size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/buffer_hub_queue_client.cpp:774:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(meta, metadata_src, user_metadata_size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/dvr_hardware_composer_client.cpp:148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(out_matrix, frame->frame.color_transform,
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_display-test.cpp:330:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(reinterpret_cast<void*>(reinterpret_cast<int64_t>(buffer_data) +
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvr/tests/dvr_display-test.cpp:340:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<void*>(reinterpret_cast<int64_t>(buffer_data) +
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/benchmark.h:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char log_message[kLogMessageLength];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libdvrcommon/include/private/dvr/benchmark.h:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char log_message[kLogMessageLength];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/encoder_performance_test.cpp:165:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(writer->GetNextWriteBufferSection(dummy_data.size()),
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/encoder_performance_test.cpp:182:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(writer->GetNextWriteBufferSection(dummy_data.size()),
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/encoder_performance_test.cpp:188:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dummy_data.data(), section.first, dummy_data.size());
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/file_handle.h:34:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd_ = open(path.c_str(), flags, mode);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/serialization.h:459:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/serialization.h:1095:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, start, remaining_size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/serialization.h:1104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, start, size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/serialization.h:1123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, start, size);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/utility.h:25:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data_, other.data(), other.size());
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/utility.h:32:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data_, other.data(), other.size());
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service_tests.cpp:519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer1[10];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service_tests.cpp:520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer2[20];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service_tests.cpp:549:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer1[10];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/service_tests.cpp:550:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer2[20];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/status.cpp:10:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[1024] = {};
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/client_channel.cpp:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/client_channel.cpp:174:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(request.impulse_payload.data(), buffer, length);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:218:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(CMSG_DATA(control), cred, sizeof(ucred));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:226:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(CMSG_DATA(control), file_handles_.data(), fd_bytes);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:316:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cred, CMSG_DATA(cmsg), sizeof(ucred));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:484:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char buffer[sizeof(inotify_event) + NAME_MAX + 1];
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/service_endpoint.cpp:111:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(vector[i].iov_base, request_data.data() + request_data_read_pos,
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/service_endpoint.cpp:533:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(info.impulse, request.impulse_payload.data(),
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/Platform.h:298:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
constexpr const char *const g_PlatformMethodNames[g_NumPlatformMethods] = {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, c->current.color.v, sizeof(vec4_t));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:140:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, c->currentNormal.v, sizeof(vec3_t));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, c->current.texture[c->arrays.tmu].v, sizeof(vec4_t));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, p, 2*sizeof(GLfixed));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:175:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, p, 3*sizeof(GLfixed));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:195:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, p, 4*sizeof(GLfixed));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:1502:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bo->data, data, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/array.cpp:1529:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bo->data + offset, data, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:502:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, s, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/matrix.cpp:533:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(inverse, gIdentityf, sizeof(gIdentityf));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/matrix.cpp:534:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, src, sizeof(GLfloat)*16);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/state.cpp:462:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( params,
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/state.cpp:467:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( params,
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/state.cpp:472:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( params,
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/texture.cpp:280:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst.data, src.data, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/texture.cpp:1011:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(textureObject->crop_rect, params, 4*sizeof(GLint));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/vertex.cpp:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(equation.v, equ, sizeof(vec4_t));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:155:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(value, valueBlob->getData(), valueBlobSize);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buildId[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:190:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header->mBuildId, buildId, header->mBuildIdLength);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:212:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(eheader->mData, keyBlob->getData(), keySize);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:213:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(eheader->mData + keySize, valueBlob->getData(), valueSize);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buildId[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache.cpp:312:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(const_cast<void*>(mData), data, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:56:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:66:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[2] = { 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:78:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[6] = { 0xee, 0xee, 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:90:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[3] = { 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[MAX_VALUE_SIZE+1] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[MAX_KEY_SIZE+1];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_VALUE_SIZE+1];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[MAX_KEY_SIZE];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[bufSize];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[MAX_KEY_SIZE];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_VALUE_SIZE];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[MAX_KEY_SIZE];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[bufSize];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:226:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1] = { 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:294:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:362:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:379:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:398:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/BlobCache_test.cpp:417:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4] = { 0xee, 0xee, 0xee, 0xee };
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/FileBlobCache.cpp:55:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(mFilename.c_str(), O_RDONLY, 0);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/FileBlobCache.cpp:125:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(fname, O_CREAT | O_EXCL | O_RDWR, 0);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/FileBlobCache.cpp:136:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                fd = open(fname, O_CREAT | O_EXCL | O_RDWR, 0);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/FileBlobCache.cpp:167:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, cacheFileMagic, 4);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:152:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(prop) != 1) return;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:155:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(prop) == 1) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:249:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void* Loader::open(egl_connection_t* cnx)
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:286:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prop[PROPERTY_VALUE_MAX + 1];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scrap[SIZE];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:564:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:571:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        switch (atoi(prop)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:587:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char prop[PROPERTY_VALUE_MAX + 1];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:619:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prop[PROPERTY_VALUE_MAX + 1];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.h:53:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void* open(egl_connection_t* cnx);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl.cpp:63:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl.cpp:65:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(value)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl.cpp:192:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    cnx->dso = loader.open(cnx);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl.cpp:230:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl.cpp:232:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(value)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:148:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:151:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            attrs.push_back(atoi(prop));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:410:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:412:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(value)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:417:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(value)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_layers.cpp:160:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:386:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:425:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&aaAttribs[4], attrib_list, attribCount * sizeof(EGLint));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1323:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[64];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1364:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char name[64];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_tls.cpp:99:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_tls.cpp:101:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if (atoi(value)) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/ETC1/etc1.cpp:542:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(q, p, xEnd * 3);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/ETC1/etc1.cpp:554:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pOut, encoded, sizeof(encoded));
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/ETC1/etc1.cpp:595:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(p, q, xEnd * 3);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/ETC1/etc1.cpp:634:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pHeader, kMagic, sizeof(kMagic));
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/app-linux.cpp:188:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        samples = atoi( argv[1] );
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/filter/filter.cpp:22:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int test = atoi(argv[1]);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/finish/finish.cpp:91:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(dst, texels, 320*480*2);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perf/fill_common.cpp:22:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gCurrentTestName[1024];
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gl_perfapp/jni/gl_code.cpp:85:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            fOut = fopen(fileName, "w");
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gralloc/gralloc.cpp:73:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(temp, temp2, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gralloc/gralloc.cpp:79:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(temp, vaddr, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/gralloc/gralloc.cpp:85:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(vaddr, temp, size);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcColorEquiv.cpp:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[MAXCMD];
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcCommit.cpp:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[MAXCMD];
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcRects.cpp:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[MAXCMD];
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/hwc/hwcStress.cpp:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[MAXCMD];
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/tritex/tritex.cpp:111:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    render(argc==2 ? atoi(argv[1]) : ITERATIONS);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/tritex/tritex.cpp:248:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(indices+(sizeof(quadIndices)/sizeof(indices[0]))*i, quadIndices, sizeof(quadIndices));
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:50:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&desc, &description, sizeof(AHardwareBuffer_Desc));
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:81:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&allocatedBufferDesc, &node->bufferDesc(), sizeof(AHardwareBuffer_Desc));
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:166:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&bufferDesc, &node->bufferDesc(), sizeof(HardwareBufferDescription));
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:336:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&handle->data[1], hmac.data(), hmacSize);
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:344:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(hmacVec.data(), hmac.data(), hmacSize);
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:374:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&infoHandle->data[3], &clientBitMask, sizeof(clientBitMask));
data/android-platform-frameworks-native-10.0.0+r36/services/bufferhub/BufferHubService.cpp:375:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&infoHandle->data[4], &userMetadataSize, sizeof(userMetadataSize));
data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/GpuService.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stableGameDriver[PROPERTY_VALUE_MAX] = {};
data/android-platform-frameworks-native-10.0.0+r36/services/gpuservice/GpuService.cpp:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char preReleaseGameDriver[PROPERTY_VALUE_MAX] = {};
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:222:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(path.c_str(), O_RDWR | O_CLOEXEC | O_NONBLOCK);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:905:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char buffer[16];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[80];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1194:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(devicePath, O_RDWR | O_CLOEXEC | O_NONBLOCK);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char event_buf[512];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1862:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[PATH_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputDispatcher.cpp:4082:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timestr[64];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputDispatcher.cpp:4452:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char counterName[40];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputDispatcher.cpp:4460:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char counterName[40];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReader.cpp:1042:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char name[32];
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReader.cpp:2111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mPattern, pattern, patternSize * sizeof(nsecs_t));
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/TouchVideoDevice.cpp:49:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    unique_fd fd(open(devicePath.c_str(), O_RDWR | O_NONBLOCK));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:406:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(eventCache_new, mEventCache, mCacheSize * sizeof(sensors_event_t));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:407:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&eventCache_new[mCacheSize], scratch, count * sizeof(sensors_event_t));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:424:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mEventCache[mCacheSize], events, count * sizeof(sensors_event_t));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:466:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mEventCache[mCacheSize], &events[newEventsToDrop],
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:657:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[sizeof(sensors_event_t)];
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:669:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&sensor_event, buf, sizeof(sensors_event_t));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorEventConnection.cpp:684:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&numAcks, buf, numBytesRead);
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:99:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(SENSOR_SERVICE_HMAC_KEY_FILE, O_RDONLY|O_CLOEXEC);
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:117:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(SENSOR_SERVICE_HMAC_KEY_FILE, O_WRONLY|O_CREAT|O_EXCL|O_CLOEXEC,
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:257:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *fp = fopen("/proc/sys/net/core/wmem_max", "r");
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:258:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char line[128];
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:608:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        userId = atoi(String8(args[4]));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:629:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        userId = atoi(String8(args[3]));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:650:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        userId = atoi(String8(args[3]));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:1007:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uuidAndApp, &uuid, sizeof(uuid));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:1008:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uuidAndApp + sizeof(uuid), &appUserId, sizeof(appUserId));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:1057:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:1059:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const Vector<Sensor>& initialSensorList = (atoi(value)) ?
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Barrier.h:32:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void open() {
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayer.cpp:585:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[PROPERTY_VALUE_MAX] = {};
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayer.cpp:587:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        latch = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferLayerConsumer.cpp:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mtx, mCurrentTransformMatrix, sizeof(mCurrentTransformMatrix));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.cpp:100:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mStorage[mPos + 1], &value, sizeof(value));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.cpp:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mStorage[mPos + 1], &value, sizeof(value));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.cpp:125:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mStorage[mPos + 1], &stringLen, sizeof(int32_t));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.cpp:126:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&mStorage[mPos + 5], value.string(), stringLen);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/EventLog/EventLog.h:53:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char mStorage[STORAGE_MAX_SIZE];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RegionSamplingThread.cpp:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX] = {};
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RegionSamplingThread.cpp:69:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int const samplingOffsetNsRaw = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RegionSamplingThread.cpp:73:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int const samplingPeriodNsRaw = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/RegionSamplingThread.cpp:77:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int const samplingTimerTimeoutNsRaw = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/DispSync.cpp:470:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/DispSync.cpp:472:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mTraceDetailedInfo = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/LayerHistory.cpp:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/LayerHistory.cpp:43:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mTraceEnabled = bool(atoi(value));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/MessageQueue.cpp:44:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    barrier.open();
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:39:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int earlySfOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:42:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int earlyGlSfOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:45:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int earlyAppOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:48:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int earlyGlAppOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:51:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int highFpsEarlySfOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:54:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int highFpsEarlyGlSfOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:57:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int highFpsEarlyAppOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:60:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int highFpsEarlyGlAppOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:64:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int highFpsLateAppOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:67:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int highFpsLateSfOffsetNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/PhaseOffsets.cpp:74:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int phaseOffsetThresholdForNextVsyncNs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/Scheduler.cpp:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/Scheduler.cpp:83:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int int_value = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/Scheduler.cpp:85:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        mSetIdleTimerMs = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/VSyncModulator.cpp:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/Scheduler/VSyncModulator.cpp:33:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mTraceDetailedInfo = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX] = {};
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX] = {};
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:345:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mGpuToCpuSupported = !atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:348:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mDebugRegion = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:354:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int debugDdms = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:358:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mPropagateBackpressure = !atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:362:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mPropagateBackpressureClientComposition = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:367:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mUseHwcVirtualDisplays = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:371:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mLayerTripleBufferingDisabled = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:381:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int int_value = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:387:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mLumaSampling = atoi(value);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:755:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:763:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mDisplayColorSetting = static_cast<DisplayColorSetting>(atoi(value));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:766:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    mForceColorMode = static_cast<ColorMode>(atoi(value));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:838:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char property[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:1133:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&primaries, &mInternalDisplayPrimaries, sizeof(ui::DisplayPrimaries));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/layerproto/LayerProtoParser.cpp:127:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(outData.data(), dataStr.data(), dataStr.size());
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/SurfaceInterceptor_test.cpp:81:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(DEFAULT_FILENAME, O_RDONLY);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:164:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/fakehwc/FakeComposerUtils.cpp:166:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        LOG_FATAL_IF(atoi(value) != 1, "boot skip not set");
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/unittests/TestableSurfaceFlinger.h:203:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mFlinger->mInternalDisplayPrimaries, &primaries, sizeof(ui::DisplayPrimaries));
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/waitforvsync/waitforvsync.cpp:33:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/dev/graphics/fb0", O_RDWR);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/cpu_set.cpp:39:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  base::unique_fd root_cpuset_fd(open(path.c_str(), kDirectoryFlags));
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service_tests.cpp:39:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  UniqueFile file{fopen(stream.str().c_str(), "r")};
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service_tests.cpp:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char partition[PATH_MAX + 1];
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/performance_service_tests.cpp:261:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    trusted_uid = std::atoi(trusted_uid_env);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/stdio_filebuf.h:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __extbuf[__limit];
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/stdio_filebuf.h:191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char __extbuf[__limit];
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/task.cpp:27:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      open(stream.str().c_str(), O_RDONLY | O_DIRECTORY));
data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/EvdevInjector.cpp:16:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd_.reset(open("/dev/uinput", O_WRONLY | O_NONBLOCK));
data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/tests/VirtualTouchpad_test.cpp:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out[2 * count + 1];
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api.cpp:161:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api.cpp:195:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            priority = atoi(key);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.cpp:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/debug_report.cpp:112:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + sizeof(buf) - 4, "...", 4);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prop[PROPERTY_VALUE_MAX];
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:270:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        module->common.methods->open(&module->common, HWVULKAN_DEVICE_0,
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:681:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_ptr, ptr, std::min(old_size, size));
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/driver.cpp:984:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prop.extensionName, VK_KHR_SWAPCHAIN_EXTENSION_NAME,
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.cpp:334:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "vk");
data/android-platform-frameworks-native-10.0.0+r36/vulkan/nulldrv/null_driver.cpp:227:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_ptr, ptr, std::min(old_size, size));
data/android-platform-frameworks-native-10.0.0+r36/vulkan/nulldrv/null_driver.cpp:405:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(properties->deviceName, "Android Vulkan Null Driver");
data/android-platform-frameworks-native-10.0.0+r36/vulkan/tools/vkinfo.cpp:536:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char flags_str[5];
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc:858:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char string[19] = {0};  // "0x" + 16 digits + terminal \0
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc:1006:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
inline bool AsValue(Json::Value* json_value, char (*value)[N]) {
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc:1011:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*value, json_value->asString().c_str(), len);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson_info.cc:140:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(output_file.c_str(), "w");
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson_unittest.cc:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(device.properties.deviceName, name, sizeof(name));
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:370:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssize_t len = strlen(str);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:983:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t bytes_read = read(traceFD, trace_data, 4096);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1037:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                result = read(traceFD, in.get(), bufSize);
data/android-platform-frameworks-native-10.0.0+r36/cmds/atrace/atrace.cpp:1087:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        while ((rc = TEMP_FAILURE_RETRY(read(traceFD, buf, sizeof(buf)))) > 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreport/bugreport.cpp:67:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t bytes_read = TEMP_FAILURE_RETRY(read(s, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/bugreportz/bugreportz.cpp:49:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t bytes_read = TEMP_FAILURE_RETRY(read(s, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.cpp:136:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t path_len = strlen(path);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/DumpstateInternal.cpp:174:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:171:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((byte_count = TEMP_FAILURE_RETRY(read(in_fd, buf, sizeof(buf)))) > 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:528:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(path);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:632:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(buffer);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:862:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), buffer.size()));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:1993:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), buffer.size()));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/dumpstate.cpp:2748:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep((75 + 50) * 1000);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:302:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            TEMP_FAILURE_RETRY(read(fd, cmdline, sizeof(cmdline) - 2));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:313:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            TEMP_FAILURE_RETRY(read(fd, cmdline + 1, sizeof(cmdline) - 4));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:385:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            TEMP_FAILURE_RETRY(read(fd, comm, sizeof(comm) - 2));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:425:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:461:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t offset = strlen(buffer);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:471:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t offset = strlen(buffer);
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:491:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:597:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:630:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (dir[strlen(dir) - 1] == '/') {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpstate/utils.cpp:822:31:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    for (int i = 0; i < 64 && fscanf(fp, " %10s %*s", table) == 1; ++i) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/dumpsys.cpp:407:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rc = TEMP_FAILURE_RETRY(read(redirectFd_.get(), buf, sizeof(buf)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/dumpsys/tests/dumpsys_test.cpp:556:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    EXPECT_THAT(bytesWritten, Eq(strlen(dumpContents)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/GLHelper.cpp:330:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len += strlen(src[i]) + 1;
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/GLHelper.cpp:337:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end += strlen(src[i]);
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Main.cpp:653:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(g_SleepBetweenSamplesMs  * 1000);
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Main.cpp:684:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(scenario);
data/android-platform-frameworks-native-10.0.0+r36/cmds/flatland/Main.cpp:712:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(b.name);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:1821:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(1);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2315:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len_overlay_path = strlen(overlay_path);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2320:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len_idmap_root = strlen(prefix);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/InstalldNativeService.cpp:2321:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len_suffix = strlen(suffix);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1009:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ssize_t bytes = read(in_fd.get(), buffer, kBufferSize);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1031:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    new_path.replace(new_path.length() - strlen(".dex"), strlen(".dex"), new_ext);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1031:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    new_path.replace(new_path.length() - strlen(".dex"), strlen(".dex"), new_ext);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:1041:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    new_path.replace(odex_pos, strlen(".odex"), new_ext);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2024:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (class_loader_context != nullptr && strlen(class_loader_context) > PKG_PATH_MAX) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2409:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), buffer.size()));
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2636:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(res) >= PKG_PATH_MAX) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/dexopt.cpp:2681:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(res) >= PKG_PATH_MAX) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:162:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return strlen(default_value);// TODO: Need to truncate?
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:327:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask(0);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/otapreopt.cpp:776:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t srclen = strlen(src);
data/android-platform-frameworks-native-10.0.0+r36/cmds/installd/utils.cpp:667:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            while ((size = read(fsfd, buf, sizeof(buf))) > 0) {
data/android-platform-frameworks-native-10.0.0+r36/cmds/ip-up-vpn/ip-up-vpn.c:95:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ifr.ifr_name, interface, IFNAMSIZ);
data/android-platform-frameworks-native-10.0.0+r36/cmds/lshal/PipeRelay.cpp:83:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t n = TEMP_FAILURE_RETRY(read(mFd, buffer, sizeof(buffer)));
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:83:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(nameBuffer, "/");
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:85:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filenameOffset = nameBuffer + strlen(nameBuffer);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:152:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(nameBuffer, "/");
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:237:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int pathLen = strlen(path);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:260:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int srcLen = strlen(srcPath);
data/android-platform-frameworks-native-10.0.0+r36/cmds/rawbu/backup.cpp:289:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fullPath = (char*)malloc(srcLen + strlen(de->d_name) + 2);
data/android-platform-frameworks-native-10.0.0+r36/cmds/servicemanager/binder.c:603:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(_str);
data/android-platform-frameworks-native-10.0.0+r36/headers/media_plugin/media/hardware/VideoAPI.h:260:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (j == MediaImage2::MEDIA_IMAGE_TYPE_UNKNOWN || planes == NULL || i >= strlen(planes)) {
data/android-platform-frameworks-native-10.0.0+r36/include/input/InputApplication.h:40:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    static InputApplicationInfo read(const Parcel& from);
data/android-platform-frameworks-native-10.0.0+r36/include/input/InputTransport.h:206:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t read(const Parcel& from);
data/android-platform-frameworks-native-10.0.0+r36/include/input/InputWindow.h:188:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    static InputWindowInfo read(const Parcel& from);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ActivityManager.cpp:49:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep(25000);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/BufferedTextOutput.cpp:183:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                err = b->append(prefix, strlen(prefix));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IPCThreadState.cpp:874:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                err = mIn.read(&tr, sizeof(tr));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IPCThreadState.cpp:1154:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                result = mIn.read(&tr_secctx, sizeof(tr_secctx));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IPCThreadState.cpp:1156:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                result = mIn.read(&tr, sizeof(tr));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IProcessInfoService.cpp:46:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (replyLen > 0 && (err = reply.read(states, length * sizeof(*states))) != NO_ERROR) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IProcessInfoService.cpp:71:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (replyLen > 0 && (err = reply.read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IProcessInfoService.cpp:79:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (replyLen > 0 && (err = reply.read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/IServiceManager.cpp:165:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep(1000*sleepTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:1087:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return write(str, strlen(str)+1);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:1591:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t Parcel::read(void* outData, size_t len) const
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:2277:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    err = read(h->data + numFds, sizeof(int)*numInts);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/Parcel.cpp:2409:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t Parcel::read(FlattenableHelperInterface& val) const
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/TextOutput.cpp:42:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ((TextOutput*)cookie)->print(txt, strlen(txt));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:250:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t            read(void* outData, size_t len) const;
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:337:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t            read(Flattenable<T>& val) const;
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:340:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t            read(LightFlattenable<T>& val) const;
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:565:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t read(FlattenableHelperInterface& val) const;
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:620:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t Parcel::read(Flattenable<T>& val) const {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:622:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(helper);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/Parcel.h:626:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t Parcel::read(LightFlattenable<T>& val) const {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:43:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t read(const Parcel& parcel, bool* b) const {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:50:69:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_enum<E>::value, status_t>::type read(const Parcel& parcel,
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:53:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        status_t result = read(parcel, &u);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:63:88:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_base_of<Flattenable<T>, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:65:70:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return callParcel("read(Flattenable)", [&]() { return parcel.read(*t); });
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:73:88:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_base_of<Flattenable<T>, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:76:74:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return callParcel("read(sp<Flattenable>)", [&]() { return parcel.read(*(t->get())); });
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:84:93:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_base_of<LightFlattenable<T>, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:86:75:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return callParcel("read(LightFlattenable)", [&]() { return parcel.read(*t); });
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:94:88:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_same<NH, sp<NativeHandle>>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:106:84:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_base_of<Parcelable, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:115:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t read(const Parcel& parcel, String8* str) const {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:122:78:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_same<IBinder, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:134:84:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_base_of<IInterface, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:145:84:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_base_of<Parcelable, T>::value, status_t>::type read(
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:155:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t read(const Parcel& parcel, float* f) const {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:169:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        static status_t read(const ParcelHandler& handler, const Parcel& parcel, I* i) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:178:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        static status_t read(const ParcelHandler& handler, const Parcel& parcel, I* i) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:187:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        static status_t read(const ParcelHandler& handler, const Parcel& parcel, I* i) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:196:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        static status_t read(const ParcelHandler& handler, const Parcel& parcel, I* i) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:204:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    typename std::enable_if<std::is_integral<I>::value, status_t>::type read(const Parcel& parcel,
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:206:67:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return HandleInt<std::is_signed<I>::value, sizeof(I), I>::read(*this, parcel, i);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:420:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return SafeInterface::ParcelHandler{mLogTag}.read(reply, std::forward<T>(t));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/include/binder/SafeInterface.h:586:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            return SafeInterface::ParcelHandler{mLogTag}.read(data, &std::get<I>(*args));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/parcel.cpp:187:69:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                          ArraySetter<T> setter, status_t (Parcel::*read)(T*) const) {
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/ndk/parcel.cpp:202:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        status = (rawParcel->*read)(&readTarget);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:117:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = read(pipefd[0], &status, sizeof(status));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:758:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = read(pipefd[0], buf, sizeof(buf));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:764:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = read(pipefd[0], buf, sizeof(buf));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:797:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    EXPECT_EQ(datasize, read(read_end.get(), readbuf.data(), datasize));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:802:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    EXPECT_EQ(0, read(read_end.get(), readbuf.data(), datasize));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderLibTest.cpp:1202:21:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                    usleep(delayUs);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderSafeInterfaceTest.cpp:93:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        FlattenableUtils::read(buffer, size, value);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderSafeInterfaceTest.cpp:123:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        FlattenableUtils::read(buffer, size, value);
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:79:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int error = read(m_readFd, &val, sizeof(val));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/binderThroughputTest.cpp:87:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int error = read(m_readFd, &v, sizeof(T));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:178:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int error = read(m_readFd, &val, sizeof(val));
data/android-platform-frameworks-native-10.0.0+r36/libs/binder/tests/schd-dbg.cpp:188:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int error = read(m_readFd, &v, sizeof(T));
data/android-platform-frameworks-native-10.0.0+r36/libs/graphicsenv/GraphicsEnv.cpp:487:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t numBytesRead = read(rulesFd, mRulesBuffer.data(), rulesLength);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BitTube.cpp:99:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t BitTube::read(void* vaddr, size_t size) {
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BitTube.cpp:148:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t size = tube->read(vaddr, count * objSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferItem.cpp:190:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, value);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferItem.cpp:201:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, flags);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:348:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:352:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:357:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:361:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:366:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:371:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:375:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:379:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:383:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:388:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:393:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:397:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:402:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:406:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:410:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:416:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:420:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:425:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:430:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:434:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/BufferQueueCore.cpp:439:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep(PAUSE_TIME);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:586:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mFrameNumber);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:590:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp16);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:596:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp8);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:598:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp8);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:601:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mPostedTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:602:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mRequestedPresentTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:603:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mLatchTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:604:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mFirstRefreshStartTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:605:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mLastRefreshStartTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:606:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mDequeueReadyTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:682:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mCompositorTiming);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/FrameTimestamps.cpp:685:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, deltaCount);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumer.cpp:88:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t cropExtLen = strlen(PROT_CONTENT_EXT_STR);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumer.cpp:89:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t extsLen = strlen(exts);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/GLConsumer.cpp:95:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal || atStart || atEnd || inMiddle;
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp:63:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, validTypes);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp:68:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        FlattenableUtils::read(buffer, size, smpte2086);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp:74:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        FlattenableUtils::read(buffer, size, cta8613);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/HdrMetadata.cpp:82:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        FlattenableUtils::read(buffer, size, metadataSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:99:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            result = reply.read(**buf);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:157:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        result = reply.read(**fence);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:174:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            result = reply.read(*outTimestamps);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:217:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                result = reply.read(**outBuffer);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:226:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                result = reply.read(**outFence);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:271:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        result = reply.read(*output);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:322:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reply.read(*output);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:473:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            result = reply.read(*buffer);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:475:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                result = reply.read(outTransformMatrix, sizeof(float) * 16);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:483:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        result = reply.read(*fence);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:506:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        result = reply.read(*outDelta);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:850:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            status_t result = data.read(*buffer.get());
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:875:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            status_t result = data.read(*fence.get());
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1060:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    parcel.read(*this);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1120:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, timestamp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1121:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, isAutoTimestamp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1122:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, dataSpace);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1123:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, crop);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1124:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, scalingMode);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1125:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, transform);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1126:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, stickyTransform);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1127:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, getFrameTimestamps);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1184:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, width);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1185:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, height);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1186:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, transformHint);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1187:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numPendingBuffers);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1188:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, nextFrameNumber);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/IGraphicBufferProducer.cpp:1189:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, bufferReplaced);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:139:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reply.read(**outBuffer);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:163:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reply.read(**outBuffer);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:197:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reply.read(**outBuffer);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:546:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reply.read(*outStats);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:567:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            result = reply.read(*outCapabilities);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1011:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if (s.read(data) == BAD_VALUE) {
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1025:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if (d.read(data) == BAD_VALUE) {
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1034:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            inputWindowCommands.read(data);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1068:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            data.read(sourceCrop);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1109:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            data.read(sourceCrop);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ISurfaceComposer.cpp:1508:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            status_t result = data.read(samplingArea);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ITransactionCompletedListener.cpp:70:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        err = input->read(*previousReleaseFence);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/ITransactionCompletedListener.cpp:118:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        err = input->read(*presentFence);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerDebugInfo.cpp:74:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RETURN_ON_ERROR(parcel->read(mTransparentRegion));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerDebugInfo.cpp:75:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RETURN_ON_ERROR(parcel->read(mVisibleRegion));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerDebugInfo.cpp:76:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RETURN_ON_ERROR(parcel->read(mSurfaceDamageRegion));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerDebugInfo.cpp:83:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RETURN_ON_ERROR(parcel->read(mCrop));
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:101:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t layer_state_t::read(const Parcel& input)
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:120:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(crop_legacy);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:133:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    inputInfo = InputWindowInfo::read(input);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:136:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(transparentRegion);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:139:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(crop);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:140:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(frame);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:143:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        input.read(*buffer);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:147:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        input.read(*acquireFence);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:150:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(hdrMetadata);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:151:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(surfaceDamageRegion);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:176:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t ComposerState::read(const Parcel& input) {
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:178:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return state.read(input);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:205:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t DisplayState::read(const Parcel& input) {
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:211:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(viewport);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:212:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    input.read(frame);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/LayerState.cpp:425:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void InputWindowCommands::read(const Parcel& input) {
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/SurfaceComposerClient.cpp:70:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(250000);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:380:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numFdsInHandle);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:643:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, state);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:656:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            FlattenableUtils::read(buffer, size, t->signalTimeNs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:737:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->frameNumber);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:741:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:748:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:750:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:752:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, temp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:755:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->postedTimeNs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:756:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->requestedPresentTimeNs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:757:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->latchTimeNs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:758:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->firstRefreshStartTimeNs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:759:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->lastRefreshStartTimeNs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:760:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->dequeueReadyTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:900:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->compositorTiming);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:903:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, deltaCount);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1078:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numRects);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1310:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->timestamp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1312:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lIsAutoTimestamp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1315:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lDataSpace);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1318:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lCrop);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1325:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lScalingMode);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1327:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->transform);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1328:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->stickyTransform);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/Conversion.cpp:1329:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->getFrameTimestamps);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:242:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numFdsInHandle);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:422:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numRects);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:492:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->timestamp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:494:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lIsAutoTimestamp);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:497:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lDataSpace);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:500:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lCrop);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:507:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, lScalingMode);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:509:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->transform);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:510:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->stickyTransform);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/bufferqueue/1.0/H2BGraphicBufferProducer.cpp:511:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, t->getFrameTimestamps);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/LayerState.h:258:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    status_t read(const Parcel& input);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/gui/LayerState.h:273:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    void read(const Parcel& input);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/include/private/gui/BitTube.h:86:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t read(void* vaddr, size_t size);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/BufferItemConsumer_test.cpp:145:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(kFrameSleepUs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/BufferItemConsumer_test.cpp:168:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(kFrameSleepUs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/BufferItemConsumer_test.cpp:185:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(kFrameSleepUs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/BufferItemConsumer_test.cpp:202:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(kFrameSleepUs);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/CpuConsumer_test.cpp:708:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(1000);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/EndToEndNativeInputTest.cpp:244:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(mBufferPostDelay);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureClient_test.cpp:530:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep(20000);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGLThreadToGL_test.cpp:171:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/android-platform-frameworks-native-10.0.0+r36/libs/gui/tests/SurfaceTextureGL_test.cpp:690:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/IInputFlinger.cpp:76:48:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            handles.push_back(InputWindowInfo::read(data));
data/android-platform-frameworks-native-10.0.0+r36/libs/input/IInputFlinger.cpp:86:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        channel->read(data);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/IInputFlinger.cpp:93:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        channel->read(data);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputApplication.cpp:33:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
InputApplicationInfo InputApplicationInfo::read(const Parcel& from) {
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputTransport.cpp:384:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
status_t InputChannel::read(const Parcel& from) {
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputWindow.cpp:106:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
InputWindowInfo InputWindowInfo::read(const Parcel& from) {
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputWindow.cpp:142:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret.applicationInfo = InputApplicationInfo::read(from);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputWindow.cpp:143:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    from.read(ret.touchableRegion);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/InputWindow.cpp:151:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    *this = read(from);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/KeyCharacterMap.cpp:1156:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(modifiers[i].label) == len
data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputWindow_test.cpp:35:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    InputWindowInfo i2 = InputWindowInfo::read(p);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/InputWindow_test.cpp:73:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    InputWindowInfo i2 = InputWindowInfo::read(p);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/TestHelpers.h:56:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t nRead = ::read(receiveFd, buf, 1);
data/android-platform-frameworks-native-10.0.0+r36/libs/input/tests/TestHelpers.h:73:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(mDelayMillis * 1000);
data/android-platform-frameworks-native-10.0.0+r36/libs/math/include/math/TVecHelpers.h:326:33:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    CONSTEXPR VECTOR<bool> PURE equal(const VECTOR<T>& lv, const VECTOR<RT>& rv) {
data/android-platform-frameworks-native-10.0.0+r36/libs/math/tests/vec_test.cpp:194:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    EXPECT_TRUE(all(equal(v0, v0)));
data/android-platform-frameworks-native-10.0.0+r36/libs/math/tests/vec_test.cpp:197:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    EXPECT_FALSE(any(equal(v0, v1)));
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/gl/GLExtensions.cpp:41:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t len = head ? head - curr : strlen(curr);
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/tests/RenderEngineTest.cpp:88:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                EXPECT_TRUE(equal)
data/android-platform-frameworks-native-10.0.0+r36/libs/renderengine/tests/RenderEngineTest.cpp:97:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
                if (!equal && ++fails >= maxFails) {
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/BitTube.cpp:116:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t BitTube::read(void* vaddr, size_t size)
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/BitTube.cpp:162:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t size = tube->read(vaddr, count*objSize);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/ISensorServer.cpp:69:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            reply.read(s);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/ISensorServer.cpp:87:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            reply.read(s);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:542:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mVersion);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:543:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mHandle);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:544:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mType);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:545:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mMinValue);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:546:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mMaxValue);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:547:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mResolution);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:548:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mPower);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:549:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mMinDelay);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:550:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mFifoReservedEventCount);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:551:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mFifoMaxEventCount);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:567:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mRequiredPermissionRuntime);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:568:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mRequiredAppOp);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:569:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mMaxDelay);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:570:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mFlags);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:571:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, mUuid);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/Sensor.cpp:589:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, len);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/SensorEventQueue.cpp:66:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t SensorEventQueue::read(ASensorEvent* events, size_t numEvents) {
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/SensorEventQueue.cpp:165:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep(100000);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/BitTube.h:77:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t read(void* vaddr, size_t size);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensor/include/sensor/SensorEventQueue.h:77:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t read(ASensorEvent* events, size_t numEvents);
data/android-platform-frameworks-native-10.0.0+r36/libs/sensorprivacy/SensorPrivacyManager.cpp:49:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
            usleep(25000);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Fence.cpp:167:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numFds);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FenceTime.cpp:241:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, state);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/FenceTime.cpp:252:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            FlattenableUtils::read(buffer, size, signalTime);
data/android-platform-frameworks-native-10.0.0+r36/libs/ui/Region.cpp:826:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FlattenableUtils::read(buffer, size, numRects);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libbufferhubqueue/tests/buffer_hub_queue-test.cpp:518:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(10000);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx/private/pdx/rpc/string_wrapper.h:43:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      : StringWrapper(buffer, std::strlen(buffer)) {}
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/client_channel_factory.cpp:89:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(remote.sun_path, endpoint_path_.c_str(), sizeof(remote.sun_path));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/ipc_helper.cpp:486:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          ret = read(fd.Get(), buffer, sizeof(buffer));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/remote_method_tests.cpp:515:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const int ret = read(fd.Get(), return_value.second.data(), length);
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/remote_method_tests.cpp:665:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  EXPECT_EQ(10, read(fd.Get(), buffer.data(), buffer.size()));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/remote_method_tests.cpp:674:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  EXPECT_EQ(10, read(fd.Get(), buffer.data(), buffer.size()));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libpdx_uds/service_endpoint.cpp:160:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(local.sun_path, endpoint_path_.c_str(), sizeof(local.sun_path));
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/hardware_composer.cpp:1253:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ret = read(event_fd.Get(), data.data(), data.size());
data/android-platform-frameworks-native-10.0.0+r36/libs/vr/libvrflinger/vr_flinger.cpp:69:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(0000);
data/android-platform-frameworks-native-10.0.0+r36/opengl/include/EGL/egl.h:137:91:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
EGLAPI EGLBoolean EGLAPIENTRY eglMakeCurrent (EGLDisplay dpy, EGLSurface draw, EGLSurface read, EGLContext ctx);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:150:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    EGLSurface          read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1748:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                            EGLSurface read, EGLContext ctx)
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1760:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read && read!=draw) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1760:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read && read!=draw) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1761:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        egl_surface_t* s = (egl_surface_t*)read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1774:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((read != EGL_NO_SURFACE || draw != EGL_NO_SURFACE) && (ctx == EGL_NO_CONTEXT))
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1782:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        egl_surface_t* r = (egl_surface_t*)read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1795:48:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            egl_surface_t* r = (egl_surface_t*)read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1804:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (c->read) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1809:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            c->read = read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1841:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                egl_surface_t* r = (egl_surface_t*)c->read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/egl.cpp:1878:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        return c->read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libagl/texture.cpp:1501:65:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    const GGLSurface& readSurface = c->rasterizer.state.buffers.read.s;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:394:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ssize_t index = ssize_t(strlen(name)) - 3;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:396:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(scrap, name, index);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:404:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ssize_t index = ssize_t(strlen(name)) - 3;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/Loader.cpp:483:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if (!strcmp(e->d_name + strlen(e->d_name) - 3, ".so")) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/eglApi.cpp:183:71:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
EGLBoolean eglMakeCurrent(EGLDisplay dpy, EGLSurface draw, EGLSurface read, EGLContext ctx) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/eglApi.cpp:187:52:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return cnx->platform.eglMakeCurrent(dpy, draw, read, ctx);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_cache.cpp:85:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t bcExtLen = strlen(BC_EXT_STR);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_cache.cpp:86:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t extsLen = strlen(exts);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_cache.cpp:92:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (equal || atStart || atEnd || inMiddle) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:63:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            nameLen = strlen(name);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:520:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    SurfaceRef _cur_r(cur_c ? get_surface(cur_c->read) : nullptr);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:538:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        EGLSurface draw, EGLSurface read, EGLContext /*ctx*/,
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:546:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    SurfaceRef _cur_r(cur_c ? get_surface(cur_c->read) : nullptr);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:555:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                c->onMakeCurrent(draw, read);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.cpp:580:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nameLen = strlen(name);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_display.h:80:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            EGLSurface draw, EGLSurface read, EGLContext ctx,
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.cpp:284:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            config(config), read(nullptr), draw(nullptr), cnx(cnx), version(version) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.cpp:292:63:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void egl_context_t::onMakeCurrent(EGLSurface draw, EGLSurface read) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.cpp:293:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    this->read = read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.h:199:52:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    void onMakeCurrent(EGLSurface draw, EGLSurface read);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_object.h:204:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    EGLSurface read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1020:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                EGLSurface read, EGLContext ctx)
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1028:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( (ctx != EGL_NO_CONTEXT) || (read != EGL_NO_SURFACE) ||
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1036:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    SurfaceRef _r(dp.get(), read);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1062:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (draw != EGL_NO_SURFACE || read != EGL_NO_SURFACE) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1081:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read != EGL_NO_SURFACE) {
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1083:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = get_surface(read);
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1089:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            draw, read, ctx,
data/android-platform-frameworks-native-10.0.0+r36/opengl/libs/EGL/egl_platform_entries.cpp:1144:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            case EGL_READ: return c->read;
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/EGLTest/EGL_test.cpp:33:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t cropExtLen = strlen(extensionName);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/EGLTest/EGL_test.cpp:34:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t extsLen = strlen(exts);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/EGLTest/EGL_test.cpp:42:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal || atStart || atEnd || inMiddle;
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/angeles/include/GLES/egl.h:214:87:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
GLAPI EGLBoolean APIENTRY eglMakeCurrent (EGLDisplay dpy, EGLSurface draw, EGLSurface read, EGLContext ctx);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/lib/include/EGLUtils.h:293:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nameLen = strlen(name);
data/android-platform-frameworks-native-10.0.0+r36/opengl/tests/linetex/linetex.cpp:112:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
     usleep(5*1000000);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:908:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                        nRead = read(mWakeReadPipeFd, buffer, sizeof(buffer));
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:946:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                int32_t readSize = read(device->fd, readBuffer,
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1047:17:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                usleep(100000);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1818:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    res = read(mINotifyFd, event_buf, sizeof(event_buf));
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/EventHub.cpp:1870:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filename = devname + strlen(devname);
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputListener.cpp:149:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!equal) {
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputListener.cpp:157:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (!equal) {
data/android-platform-frameworks-native-10.0.0+r36/services/inputflinger/InputReader.cpp:1044:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(name, label, sizeof(name));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorDevice.cpp:486:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (mEventQueue->read(mEventBuffer.data(), eventsToRead)) {
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/SensorService.cpp:101:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int result = read(fd, sHmacGlobalKey, sizeof(sHmacGlobalKey));
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/hidl/EventQueue.cpp:45:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        while ((actual = internalQueue->read(&event, 1 /* count */)) > 0) {
data/android-platform-frameworks-native-10.0.0+r36/services/sensorservice/tests/sensorservicetest.cpp:37:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((n = q->read(buffer, 8)) > 0) {
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/BufferQueueLayer.cpp:438:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(16000);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/ComposerHal.cpp:1245:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    auto location = read();
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/ComposerHal.cpp:1283:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    mCurrentReturnData->displayRequests = read();
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/ComposerHal.cpp:1290:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        auto layerRequestMask = read();
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/ComposerHal.cpp:1344:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    mCurrentReturnData->presentOrValidateState = read();
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/DisplayHardware/DisplayIdentification.cpp:81:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            std::equal(std::begin(kMagic), std::end(kMagic), data.begin());
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/SurfaceFlinger.cpp:2006:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(mDebugRegion * 1000);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/Transaction_test.cpp:579:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(mBufferPostDelay);
data/android-platform-frameworks-native-10.0.0+r36/services/surfaceflinger/tests/hwc2/Hwc2Test.cpp:2559:26:  [1] (buffer) is_permutation:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        EXPECT_TRUE(std::is_permutation(configs1.begin(), configs1.end(),
data/android-platform-frameworks-native-10.0.0+r36/services/vr/bufferhubd/bufferhubd.cpp:16:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(0000);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/aidl/android/dvr/parcelable_composer_layer.cpp:121:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ret = parcel->read(*layer_.buffer);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp:74:66:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  auto err = mVrHal.setLayerInfo(mCurrentDisplay, mCurrentLayer, read(), read());
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp:74:74:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  auto err = mVrHal.setLayerInfo(mCurrentDisplay, mCurrentLayer, read(), read());
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp:110:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    .width = read(),
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp:111:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    .height = read(),
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp:112:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    .stride = read(),
data/android-platform-frameworks-native-10.0.0+r36/services/vr/hardware_composer/impl/vr_composer_client.cpp:113:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    .layerCount = read(),
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/main.cpp:36:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(0000);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/stdio_filebuf.h:130:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int __c = getc(__file_);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/performanced/stdio_filebuf.h:154:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            int __c = getc(__file_);
data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/EvdevInjector.cpp:70:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!device_name || strlen(device_name) >= UINPUT_MAX_NAME_SIZE) {
data/android-platform-frameworks-native-10.0.0+r36/services/vr/virtual_touchpad/EvdevInjector.cpp:88:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(uidev_.name, device_name, UINPUT_MAX_NAME_SIZE);
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api.cpp:179:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AddImplicitLayer(prio, p, strlen(p));
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/api.cpp:205:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        override_layers.AddImplicitLayer(priority, val, strlen(val));
data/android-platform-frameworks-native-10.0.0+r36/vulkan/libvulkan/layers_extensions.cpp:329:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        std::max(size_t{2}, strlen(layer.properties.layerName));
data/android-platform-frameworks-native-10.0.0+r36/vulkan/vkjson/vkjson.cc:883:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(value) < N);

ANALYSIS SUMMARY:

Hits = 1183
Lines analyzed = 402043 in approximately 9.67 seconds (41562 lines/second)
Physical Source Lines of Code (SLOC) = 278250
Hits@level = [0] 796 [1] 419 [2] 569 [3]  39 [4] 126 [5]  30
Hits@level+ = [0+] 1979 [1+] 1183 [2+] 764 [3+] 195 [4+] 156 [5+]  30
Hits/KSLOC@level+ = [0+] 7.11231 [1+] 4.25157 [2+] 2.74573 [3+] 0.700809 [4+] 0.560647 [5+] 0.107817
Symlinks skipped = 33 (--allowlink overrides but see doc for security issue)
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.