2009-03-04 04:28:35 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
2014-08-19 23:30:30 +02:00
|
|
|
|
|
|
|
#ifndef _STRING_H
|
|
|
|
#define _STRING_H
|
2009-03-04 04:28:35 +01:00
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
#include <stddef.h>
|
2014-07-10 00:51:34 +02:00
|
|
|
#include <xlocale.h>
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-04-07 22:39:49 +02:00
|
|
|
#include <bits/strcasecmp.h>
|
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
__BEGIN_DECLS
|
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
#if defined(__clang__)
|
|
|
|
#pragma clang diagnostic push
|
|
|
|
#pragma clang diagnostic ignored "-Wnullability-completeness"
|
|
|
|
#endif
|
|
|
|
|
2015-01-26 22:34:58 +01:00
|
|
|
#if defined(__USE_BSD)
|
|
|
|
#include <strings.h>
|
|
|
|
#endif
|
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memccpy(void* _Nonnull __restrict, const void* _Nonnull __restrict, int, size_t);
|
2016-09-28 21:29:52 +02:00
|
|
|
void* memchr(const void* _Nonnull, int, size_t) __attribute_pure__;
|
|
|
|
void* memrchr(const void* _Nonnull, int, size_t) __attribute_pure__;
|
|
|
|
int memcmp(const void* _Nonnull, const void* _Nonnull, size_t) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memcpy(void* _Nonnull __restrict, const void* _Nonnull __restrict, size_t);
|
2015-02-19 06:29:13 +01:00
|
|
|
#if defined(__USE_GNU)
|
2016-07-22 20:36:17 +02:00
|
|
|
void* mempcpy(void* _Nonnull __restrict, const void* _Nonnull __restrict, size_t) __INTRODUCED_IN(23);
|
2015-02-19 06:29:13 +01:00
|
|
|
#endif
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memmove(void* _Nonnull, const void* _Nonnull, size_t);
|
|
|
|
void* memset(void* _Nonnull, int, size_t);
|
2016-09-28 21:29:52 +02:00
|
|
|
void* memmem(const void* _Nonnull, size_t, const void* _Nonnull, size_t) __attribute_pure__;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
char* strchr(const char* _Nonnull, int) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* __strchr_chk(const char* _Nonnull, int, size_t) __INTRODUCED_IN(18);
|
2015-08-26 18:59:29 +02:00
|
|
|
#if defined(__USE_GNU)
|
|
|
|
#if defined(__cplusplus)
|
2016-09-28 21:29:52 +02:00
|
|
|
extern "C++" char* strchrnul(char* _Nonnull, int) __RENAME(strchrnul) __attribute_pure__;
|
|
|
|
extern "C++" const char* strchrnul(const char* _Nonnull, int) __RENAME(strchrnul) __attribute_pure__;
|
2015-08-26 18:59:29 +02:00
|
|
|
#else
|
2016-09-28 21:29:52 +02:00
|
|
|
char* strchrnul(const char* _Nonnull, int) __attribute_pure__ __INTRODUCED_IN(24);
|
2015-08-26 18:59:29 +02:00
|
|
|
#endif
|
|
|
|
#endif
|
2013-07-26 14:50:11 +02:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
char* strrchr(const char* _Nonnull, int) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* __strrchr_chk(const char* _Nonnull, int, size_t) __INTRODUCED_IN(18);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
size_t strlen(const char* _Nonnull) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t __strlen_chk(const char* _Nonnull, size_t) __INTRODUCED_IN(17);
|
2016-09-28 21:29:52 +02:00
|
|
|
int strcmp(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* stpcpy(char* _Nonnull __restrict, const char* _Nonnull__restrict) __INTRODUCED_IN(21);
|
|
|
|
char* strcpy(char* _Nonnull __restrict, const char* _Nonnull __restrict);
|
|
|
|
char* strcat(char* _Nonnull __restrict, const char* _Nonnull __restrict);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strdup(const char* _Nonnull);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
char* strstr(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
|
|
char* strcasestr(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strtok(char* __restrict, const char* _Nonnull __restrict);
|
|
|
|
char* strtok_r(char* __restrict, const char* _Nonnull __restrict, char** _Nonnull __restrict);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strerror(int);
|
|
|
|
char* strerror_l(int, locale_t) __INTRODUCED_IN(23);
|
2014-08-19 02:28:32 +02:00
|
|
|
#if defined(__USE_GNU)
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strerror_r(int, char*, size_t) __RENAME(__gnu_strerror_r) __INTRODUCED_IN(23);
|
2014-08-19 02:28:32 +02:00
|
|
|
#else /* POSIX */
|
2016-07-22 20:36:17 +02:00
|
|
|
int strerror_r(int, char*, size_t);
|
2014-08-19 02:28:32 +02:00
|
|
|
#endif
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
size_t strnlen(const char* _Nonnull, size_t) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strncat(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t);
|
|
|
|
char* strndup(const char* _Nonnull, size_t);
|
2016-09-28 21:29:52 +02:00
|
|
|
int strncmp(const char* _Nonnull, const char* _Nonnull, size_t) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* stpncpy(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t) __INTRODUCED_IN(21);
|
|
|
|
char* strncpy(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t strlcat(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t);
|
|
|
|
size_t strlcpy(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
size_t strcspn(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
|
|
char* strpbrk(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strsep(char** _Nonnull __restrict, const char* _Nonnull __restrict);
|
|
|
|
size_t strspn(const char* _Nonnull, const char* _Nonnull);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strsignal(int);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-09-28 21:29:52 +02:00
|
|
|
int strcoll(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t strxfrm(char* __restrict, const char* _Nonnull __restrict, size_t);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
2016-09-28 21:29:52 +02:00
|
|
|
int strcoll_l(const char* _Nonnull, const char* _Nonnull, locale_t) __attribute_pure__ __INTRODUCED_IN(21);
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t strxfrm_l(char* __restrict, const char* _Nonnull __restrict, size_t, locale_t) __INTRODUCED_IN(21);
|
2016-09-23 23:06:05 +02:00
|
|
|
#else
|
|
|
|
// Implemented as static inlines before 21.
|
|
|
|
#endif
|
2014-07-10 00:51:34 +02:00
|
|
|
|
2015-11-04 03:46:02 +01:00
|
|
|
#if defined(__USE_GNU) && !defined(basename)
|
2014-08-19 23:30:30 +02:00
|
|
|
/*
|
|
|
|
* glibc has a basename in <string.h> that's different to the POSIX one in <libgen.h>.
|
|
|
|
* It doesn't modify its argument, and in C++ it's const-correct.
|
|
|
|
*/
|
|
|
|
#if defined(__cplusplus)
|
2015-08-14 01:58:50 +02:00
|
|
|
extern "C++" char* basename(char* _Nonnull) __RENAME(__gnu_basename);
|
|
|
|
extern "C++" const char* basename(const char* _Nonnull) __RENAME(__gnu_basename);
|
2014-08-19 23:30:30 +02:00
|
|
|
#else
|
2016-07-22 20:36:17 +02:00
|
|
|
char* basename(const char* _Nonnull) __RENAME(__gnu_basename) __INTRODUCED_IN(23);
|
2014-08-19 23:30:30 +02:00
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
void* __memchr_chk(const void* _Nonnull, int, size_t, size_t) __INTRODUCED_IN(23);
|
2015-04-18 00:16:57 +02:00
|
|
|
__errordecl(__memchr_buf_size_error, "memchr called with size bigger than buffer");
|
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
void* __memrchr_chk(const void* _Nonnull, int, size_t, size_t) __INTRODUCED_IN(23);
|
2015-04-18 00:16:57 +02:00
|
|
|
__errordecl(__memrchr_buf_size_error, "memrchr called with size bigger than buffer");
|
2016-07-22 20:36:17 +02:00
|
|
|
void* __memrchr_real(const void* _Nonnull, int, size_t) __RENAME(memrchr);
|
2015-04-18 00:16:57 +02:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
char* __stpncpy_chk2(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t, size_t)
|
2016-04-29 21:00:55 +02:00
|
|
|
__INTRODUCED_IN(21);
|
2016-07-22 20:36:17 +02:00
|
|
|
char* __strncpy_chk2(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t, size_t)
|
2016-04-29 21:00:55 +02:00
|
|
|
__INTRODUCED_IN(21);
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t __strlcpy_real(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t) __RENAME(strlcpy);
|
|
|
|
size_t __strlcpy_chk(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t) __INTRODUCED_IN(17);
|
|
|
|
size_t __strlcat_real(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t) __RENAME(strlcat);
|
|
|
|
size_t __strlcat_chk(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t) __INTRODUCED_IN(17);
|
2014-10-07 20:10:36 +02:00
|
|
|
|
2013-03-22 18:58:55 +01:00
|
|
|
#if defined(__BIONIC_FORTIFY)
|
2012-06-05 00:20:25 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_M__
|
2015-04-18 00:16:57 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memchr(const void* s, int c, size_t n) {
|
2015-04-18 00:16:57 +02:00
|
|
|
size_t bos = __bos(s);
|
|
|
|
|
|
|
|
#if !defined(__clang__)
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
|
|
return __builtin_memchr(s, c, n);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (__builtin_constant_p(n) && (n > bos)) {
|
|
|
|
__memchr_buf_size_error();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos)) {
|
|
|
|
return __builtin_memchr(s, c, n);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return __memchr_chk(s, c, n, bos);
|
|
|
|
}
|
|
|
|
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memrchr(const void* s, int c, size_t n) {
|
2015-04-18 00:16:57 +02:00
|
|
|
size_t bos = __bos(s);
|
|
|
|
|
|
|
|
#if !defined(__clang__)
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
|
|
return __memrchr_real(s, c, n);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (__builtin_constant_p(n) && (n > bos)) {
|
|
|
|
__memrchr_buf_size_error();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos)) {
|
|
|
|
return __memrchr_real(s, c, n);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return __memrchr_chk(s, c, n, bos);
|
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_M__ */
|
2015-04-18 00:16:57 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
2012-06-05 00:20:25 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memcpy(void* _Nonnull __restrict dst, const void* _Nonnull __restrict src, size_t copy_amount) {
|
|
|
|
return __builtin___memcpy_chk(dst, src, copy_amount, __bos0(dst));
|
2012-06-05 00:20:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memmove(void* _Nonnull dst, const void* _Nonnull src, size_t len) {
|
|
|
|
return __builtin___memmove_chk(dst, src, len, __bos0(dst));
|
2012-06-05 00:20:25 +02:00
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
2012-06-05 00:20:25 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
2014-04-04 23:38:18 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* stpcpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src) {
|
|
|
|
return __builtin___stpcpy_chk(dst, src, __bos(dst));
|
2014-04-04 23:38:18 +02:00
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
|
2014-04-04 23:38:18 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
2012-06-05 00:20:25 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strcpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src) {
|
|
|
|
return __builtin___strcpy_chk(dst, src, __bos(dst));
|
2012-06-05 00:20:25 +02:00
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
2012-06-05 00:20:25 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
2014-04-04 23:38:18 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* stpncpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t n) {
|
|
|
|
size_t bos_dst = __bos(dst);
|
2014-04-04 23:38:18 +02:00
|
|
|
size_t bos_src = __bos(src);
|
|
|
|
|
|
|
|
if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
2014-04-04 23:38:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos_src)) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
2014-04-04 23:38:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
size_t slen = __builtin_strlen(src);
|
|
|
|
if (__builtin_constant_p(slen)) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
2014-04-04 23:38:18 +02:00
|
|
|
}
|
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
return __stpncpy_chk2(dst, src, n, bos_dst, bos_src);
|
2014-04-04 23:38:18 +02:00
|
|
|
}
|
|
|
|
|
2012-06-05 00:20:25 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strncpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t n) {
|
|
|
|
size_t bos_dst = __bos(dst);
|
2013-08-28 19:47:43 +02:00
|
|
|
size_t bos_src = __bos(src);
|
|
|
|
|
|
|
|
if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __builtin___strncpy_chk(dst, src, n, bos_dst);
|
2013-08-28 19:47:43 +02:00
|
|
|
}
|
|
|
|
|
2013-09-27 22:21:24 +02:00
|
|
|
if (__builtin_constant_p(n) && (n <= bos_src)) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __builtin___strncpy_chk(dst, src, n, bos_dst);
|
2013-09-27 22:21:24 +02:00
|
|
|
}
|
|
|
|
|
2013-08-28 19:47:43 +02:00
|
|
|
size_t slen = __builtin_strlen(src);
|
|
|
|
if (__builtin_constant_p(slen)) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __builtin___strncpy_chk(dst, src, n, bos_dst);
|
2013-08-28 19:47:43 +02:00
|
|
|
}
|
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strncpy_chk2(dst, src, n, bos_dst, bos_src);
|
2012-06-05 00:20:25 +02:00
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
|
2012-06-05 00:20:25 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
2012-06-05 00:20:25 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strcat(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src) {
|
|
|
|
return __builtin___strcat_chk(dst, src, __bos(dst));
|
2012-06-05 00:20:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char *strncat(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t n) {
|
|
|
|
return __builtin___strncat_chk(dst, src, n, __bos(dst));
|
2012-06-05 00:20:25 +02:00
|
|
|
}
|
|
|
|
|
2012-06-07 23:01:26 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
void* memset(void* _Nonnull s, int c, size_t n) {
|
2013-08-28 22:22:52 +02:00
|
|
|
return __builtin___memset_chk(s, c, n, __bos0(s));
|
2012-06-07 23:01:26 +02:00
|
|
|
}
|
|
|
|
|
2012-06-14 01:57:27 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t strlcpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t size) {
|
|
|
|
size_t bos = __bos(dst);
|
2012-06-14 01:57:27 +02:00
|
|
|
|
2013-06-20 21:17:44 +02:00
|
|
|
#if !defined(__clang__)
|
2012-06-14 01:57:27 +02:00
|
|
|
// Compiler doesn't know destination size. Don't call __strlcpy_chk
|
2012-07-13 23:46:36 +02:00
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strlcpy_real(dst, src, size);
|
2012-06-14 01:57:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Compiler can prove, at compile time, that the passed in size
|
|
|
|
// is always <= the actual object size. Don't call __strlcpy_chk
|
|
|
|
if (__builtin_constant_p(size) && (size <= bos)) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strlcpy_real(dst, src, size);
|
2012-06-14 01:57:27 +02:00
|
|
|
}
|
2013-06-20 21:17:44 +02:00
|
|
|
#endif /* !defined(__clang__) */
|
2012-06-14 01:57:27 +02:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strlcpy_chk(dst, src, size, bos);
|
2012-06-14 01:57:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t strlcat(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t size) {
|
|
|
|
size_t bos = __bos(dst);
|
2012-06-14 01:57:27 +02:00
|
|
|
|
2013-06-29 17:15:25 +02:00
|
|
|
#if !defined(__clang__)
|
2012-06-14 01:57:27 +02:00
|
|
|
// Compiler doesn't know destination size. Don't call __strlcat_chk
|
2012-07-13 23:46:36 +02:00
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strlcat_real(dst, src, size);
|
2012-06-14 01:57:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Compiler can prove, at compile time, that the passed in size
|
|
|
|
// is always <= the actual object size. Don't call __strlcat_chk
|
|
|
|
if (__builtin_constant_p(size) && (size <= bos)) {
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strlcat_real(dst, src, size);
|
2012-06-14 01:57:27 +02:00
|
|
|
}
|
2013-06-29 17:15:25 +02:00
|
|
|
#endif /* !defined(__clang__) */
|
2012-06-14 01:57:27 +02:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
return __strlcat_chk(dst, src, size, bos);
|
2012-06-14 01:57:27 +02:00
|
|
|
}
|
|
|
|
|
2012-07-13 20:27:06 +02:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
size_t strlen(const char* _Nonnull s) {
|
2013-04-30 20:31:35 +02:00
|
|
|
size_t bos = __bos(s);
|
2012-07-13 23:46:36 +02:00
|
|
|
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#if !defined(__clang__)
|
2012-07-13 23:46:36 +02:00
|
|
|
// Compiler doesn't know destination size. Don't call __strlen_chk
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2013-01-18 00:41:33 +01:00
|
|
|
return __builtin_strlen(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t slen = __builtin_strlen(s);
|
|
|
|
if (__builtin_constant_p(slen)) {
|
|
|
|
return slen;
|
2012-07-13 20:27:06 +02:00
|
|
|
}
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#endif /* !defined(__clang__) */
|
2012-07-13 23:46:36 +02:00
|
|
|
|
2012-07-13 20:27:06 +02:00
|
|
|
return __strlen_chk(s, bos);
|
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
2012-06-14 01:57:27 +02:00
|
|
|
|
2016-11-16 20:35:43 +01:00
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR2__
|
2012-12-01 00:15:58 +01:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strchr(const char* _Nonnull s, int c) {
|
2013-04-30 20:31:35 +02:00
|
|
|
size_t bos = __bos(s);
|
2012-12-01 00:15:58 +01:00
|
|
|
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#if !defined(__clang__)
|
2012-12-01 00:15:58 +01:00
|
|
|
// Compiler doesn't know destination size. Don't call __strchr_chk
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2013-01-18 00:41:33 +01:00
|
|
|
return __builtin_strchr(s, c);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t slen = __builtin_strlen(s);
|
|
|
|
if (__builtin_constant_p(slen) && (slen < bos)) {
|
|
|
|
return __builtin_strchr(s, c);
|
2012-12-01 00:15:58 +01:00
|
|
|
}
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#endif /* !defined(__clang__) */
|
2012-12-01 00:15:58 +01:00
|
|
|
|
|
|
|
return __strchr_chk(s, c, bos);
|
|
|
|
}
|
|
|
|
|
2012-12-03 19:36:13 +01:00
|
|
|
__BIONIC_FORTIFY_INLINE
|
2016-07-22 20:36:17 +02:00
|
|
|
char* strrchr(const char* _Nonnull s, int c) {
|
2013-04-30 23:19:23 +02:00
|
|
|
size_t bos = __bos(s);
|
2012-12-03 19:36:13 +01:00
|
|
|
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#if !defined(__clang__)
|
2012-12-03 19:36:13 +01:00
|
|
|
// Compiler doesn't know destination size. Don't call __strrchr_chk
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
2013-01-18 00:41:33 +01:00
|
|
|
return __builtin_strrchr(s, c);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t slen = __builtin_strlen(s);
|
|
|
|
if (__builtin_constant_p(slen) && (slen < bos)) {
|
|
|
|
return __builtin_strrchr(s, c);
|
2012-12-03 19:36:13 +01:00
|
|
|
}
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#endif /* !defined(__clang__) */
|
2012-12-03 19:36:13 +01:00
|
|
|
|
|
|
|
return __strrchr_chk(s, c, bos);
|
|
|
|
}
|
2016-11-16 20:35:43 +01:00
|
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR2__ */
|
2012-12-01 00:15:58 +01:00
|
|
|
|
2013-03-22 18:58:55 +01:00
|
|
|
#endif /* defined(__BIONIC_FORTIFY) */
|
2012-06-05 00:20:25 +02:00
|
|
|
|
2016-07-22 20:36:17 +02:00
|
|
|
#if defined(__clang__)
|
|
|
|
#pragma clang diagnostic pop
|
|
|
|
#endif
|
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
__END_DECLS
|
|
|
|
|
2014-08-19 23:30:30 +02:00
|
|
|
#endif /* _STRING_H */
|