31e5a35f3d
Apparently __strncpy_real redirects to strcpy instead of strncpy for GCC builds. This is bad, and it confused a project compiled by GCC that uses strcpy. I audited all of the FORTIFY-related __RENAMEs both manually and with a script I hacked together; they all look correct aside from this one. FWIW, with the cleaned up clang FORTIFY, lots of the `void foo() __RENAME(foo)` will just become `void foo()` if this last thing I'm working on gets through review. Bug: 35329524 Test: Previously broken project now seems to work. Bullhead and Ryu both build + boot. Change-Id: Ib18ee3535ae31eb7e8ae846dc012f9b64cac80bf
694 lines
24 KiB
C
694 lines
24 KiB
C
/*
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#ifndef _STRING_H
|
|
#define _STRING_H
|
|
|
|
#include <sys/cdefs.h>
|
|
#include <stddef.h>
|
|
#include <xlocale.h>
|
|
|
|
#include <bits/strcasecmp.h>
|
|
|
|
__BEGIN_DECLS
|
|
|
|
#if defined(__clang__)
|
|
#pragma clang diagnostic push
|
|
#pragma clang diagnostic ignored "-Wnullability-completeness"
|
|
#endif
|
|
|
|
#if defined(__USE_BSD)
|
|
#include <strings.h>
|
|
#endif
|
|
|
|
void* memccpy(void* _Nonnull __restrict, const void* _Nonnull __restrict, int, size_t);
|
|
void* memchr(const void* _Nonnull, int, size_t) __attribute_pure__ __overloadable
|
|
__RENAME_CLANG(memchr);
|
|
void* memrchr(const void* _Nonnull, int, size_t) __attribute_pure__ __overloadable
|
|
__RENAME_CLANG(memrchr);
|
|
int memcmp(const void* _Nonnull, const void* _Nonnull, size_t) __attribute_pure__;
|
|
void* memcpy(void* _Nonnull __restrict, const void* _Nonnull __restrict, size_t)
|
|
__overloadable __RENAME_CLANG(memcpy);
|
|
#if defined(__USE_GNU)
|
|
void* mempcpy(void* _Nonnull __restrict, const void* _Nonnull __restrict, size_t) __INTRODUCED_IN(23);
|
|
#endif
|
|
void* memmove(void* _Nonnull, const void* _Nonnull, size_t) __overloadable
|
|
__RENAME_CLANG(memmove);
|
|
void* memset(void* _Nonnull, int, size_t) __overloadable __RENAME_CLANG(memset);
|
|
void* memmem(const void* _Nonnull, size_t, const void* _Nonnull, size_t) __attribute_pure__;
|
|
|
|
char* strchr(const char* _Nonnull, int) __attribute_pure__ __overloadable
|
|
__RENAME_CLANG(strchr);
|
|
char* __strchr_chk(const char* _Nonnull, int, size_t) __INTRODUCED_IN(18);
|
|
#if defined(__USE_GNU)
|
|
#if defined(__cplusplus)
|
|
extern "C++" char* strchrnul(char* _Nonnull, int) __RENAME(strchrnul) __attribute_pure__;
|
|
extern "C++" const char* strchrnul(const char* _Nonnull, int) __RENAME(strchrnul) __attribute_pure__;
|
|
#else
|
|
char* strchrnul(const char* _Nonnull, int) __attribute_pure__ __INTRODUCED_IN(24);
|
|
#endif
|
|
#endif
|
|
|
|
char* strrchr(const char* _Nonnull, int) __attribute_pure__ __overloadable
|
|
__RENAME_CLANG(strrchr);
|
|
char* __strrchr_chk(const char* _Nonnull, int, size_t) __INTRODUCED_IN(18);
|
|
|
|
size_t strlen(const char* _Nonnull) __attribute_pure__ __overloadable
|
|
__RENAME_CLANG(strlen);
|
|
size_t __strlen_chk(const char* _Nonnull, size_t) __INTRODUCED_IN(17);
|
|
|
|
int strcmp(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
char* stpcpy(char* _Nonnull __restrict, const char* _Nonnull __restrict)
|
|
__overloadable __RENAME_CLANG(stpcpy) __INTRODUCED_IN(21);
|
|
char* strcpy(char* _Nonnull __restrict, const char* _Nonnull __restrict)
|
|
__overloadable __RENAME_CLANG(strcpy);
|
|
char* strcat(char* _Nonnull __restrict, const char* _Nonnull __restrict)
|
|
__overloadable __RENAME_CLANG(strcat);
|
|
char* strdup(const char* _Nonnull);
|
|
|
|
char* strstr(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
char* strcasestr(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
char* strtok(char* __restrict, const char* _Nonnull __restrict);
|
|
char* strtok_r(char* __restrict, const char* _Nonnull __restrict, char** _Nonnull __restrict);
|
|
|
|
char* strerror(int);
|
|
char* strerror_l(int, locale_t) __INTRODUCED_IN(23);
|
|
#if defined(__USE_GNU) && __ANDROID_API__ >= 23
|
|
char* strerror_r(int, char*, size_t) __RENAME(__gnu_strerror_r) __INTRODUCED_IN(23);
|
|
#else /* POSIX */
|
|
int strerror_r(int, char*, size_t);
|
|
#endif
|
|
|
|
size_t strnlen(const char* _Nonnull, size_t) __attribute_pure__;
|
|
char* strncat(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t)
|
|
__overloadable __RENAME_CLANG(strncat);
|
|
char* strndup(const char* _Nonnull, size_t);
|
|
int strncmp(const char* _Nonnull, const char* _Nonnull, size_t) __attribute_pure__;
|
|
char* stpncpy(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t)
|
|
__overloadable __RENAME_CLANG(stpncpy) __INTRODUCED_IN(21);
|
|
char* strncpy(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t)
|
|
__overloadable __RENAME_CLANG(strncpy);
|
|
|
|
size_t strlcat(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t)
|
|
__overloadable __RENAME_CLANG(strlcat);
|
|
size_t strlcpy(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t)
|
|
__overloadable __RENAME_CLANG(strlcpy);
|
|
|
|
size_t strcspn(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
char* strpbrk(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
char* strsep(char** _Nonnull __restrict, const char* _Nonnull __restrict);
|
|
size_t strspn(const char* _Nonnull, const char* _Nonnull);
|
|
|
|
char* strsignal(int);
|
|
|
|
int strcoll(const char* _Nonnull, const char* _Nonnull) __attribute_pure__;
|
|
size_t strxfrm(char* __restrict, const char* _Nonnull __restrict, size_t);
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
|
int strcoll_l(const char* _Nonnull, const char* _Nonnull, locale_t) __attribute_pure__ __INTRODUCED_IN(21);
|
|
size_t strxfrm_l(char* __restrict, const char* _Nonnull __restrict, size_t, locale_t) __INTRODUCED_IN(21);
|
|
#else
|
|
// Implemented as static inlines before 21.
|
|
#endif
|
|
|
|
#if defined(__USE_GNU) && !defined(basename)
|
|
/*
|
|
* glibc has a basename in <string.h> that's different to the POSIX one in <libgen.h>.
|
|
* It doesn't modify its argument, and in C++ it's const-correct.
|
|
*/
|
|
#if defined(__cplusplus)
|
|
extern "C++" char* basename(char* _Nonnull) __RENAME(__gnu_basename);
|
|
extern "C++" const char* basename(const char* _Nonnull) __RENAME(__gnu_basename);
|
|
#else
|
|
char* basename(const char* _Nonnull) __RENAME(__gnu_basename) __INTRODUCED_IN(23);
|
|
#endif
|
|
#endif
|
|
|
|
void* __memchr_chk(const void* _Nonnull, int, size_t, size_t) __INTRODUCED_IN(23);
|
|
void* __memrchr_chk(const void* _Nonnull, int, size_t, size_t) __INTRODUCED_IN(23);
|
|
char* __stpncpy_chk2(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t, size_t)
|
|
__INTRODUCED_IN(21);
|
|
char* __strncpy_chk2(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t, size_t)
|
|
__INTRODUCED_IN(21);
|
|
size_t __strlcpy_chk(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t) __INTRODUCED_IN(17);
|
|
size_t __strlcat_chk(char* _Nonnull __restrict, const char* _Nonnull __restrict, size_t, size_t) __INTRODUCED_IN(17);
|
|
|
|
/* Only used with FORTIFY, but some headers that need it undef FORTIFY, so we
|
|
* have the definition out here.
|
|
*/
|
|
struct __bionic_zero_size_is_okay_t {};
|
|
|
|
#if defined(__BIONIC_FORTIFY)
|
|
// These can share their implementation between gcc and clang with minimal
|
|
// trickery...
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memcpy(void* _Nonnull __restrict const dst __pass_object_size0, const void* _Nonnull __restrict src, size_t copy_amount)
|
|
__overloadable {
|
|
return __builtin___memcpy_chk(dst, src, copy_amount, __bos0(dst));
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memmove(void* const _Nonnull dst __pass_object_size0, const void* _Nonnull src, size_t len)
|
|
__overloadable {
|
|
return __builtin___memmove_chk(dst, src, len, __bos0(dst));
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* stpcpy(char* _Nonnull __restrict const dst __pass_object_size, const char* _Nonnull __restrict src)
|
|
__overloadable {
|
|
return __builtin___stpcpy_chk(dst, src, __bos(dst));
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strcpy(char* _Nonnull __restrict const dst __pass_object_size, const char* _Nonnull __restrict src)
|
|
__overloadable {
|
|
return __builtin___strcpy_chk(dst, src, __bos(dst));
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strcat(char* _Nonnull __restrict const dst __pass_object_size, const char* _Nonnull __restrict src)
|
|
__overloadable {
|
|
return __builtin___strcat_chk(dst, src, __bos(dst));
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strncat(char* const _Nonnull __restrict dst __pass_object_size, const char* _Nonnull __restrict src, size_t n)
|
|
__overloadable {
|
|
return __builtin___strncat_chk(dst, src, n, __bos(dst));
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memset(void* const _Nonnull s __pass_object_size0, int c, size_t n) __overloadable {
|
|
return __builtin___memset_chk(s, c, n, __bos0(s));
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
|
|
|
|
|
#if defined(__clang__)
|
|
|
|
#define __error_if_overflows_dst(name, dst, n, what) \
|
|
__enable_if(__bos0(dst) != __BIONIC_FORTIFY_UNKNOWN_SIZE && \
|
|
__bos0(dst) < (n), "selected when the buffer is too small") \
|
|
__errorattr(#name " called with " what " bigger than buffer")
|
|
|
|
/*
|
|
* N.B. _Nonnull isn't necessary on params, since these functions just emit
|
|
* errors.
|
|
*/
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
void* memcpy(void* dst, const void* src, size_t copy_amount) __overloadable
|
|
__error_if_overflows_dst(memcpy, dst, copy_amount, "size");
|
|
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
void* memmove(void *dst, const void* src, size_t len) __overloadable
|
|
__error_if_overflows_dst(memmove, dst, len, "size");
|
|
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
void* memset(void* s, int c, size_t n) __overloadable
|
|
__error_if_overflows_dst(memset, s, n, "size");
|
|
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
char* stpcpy(char* dst, const char* src) __overloadable
|
|
__error_if_overflows_dst(stpcpy, dst, __builtin_strlen(src), "string");
|
|
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
char* strcpy(char* dst, const char* src) __overloadable
|
|
__error_if_overflows_dst(strcpy, dst, __builtin_strlen(src), "string");
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_M__
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memchr(const void* const _Nonnull s __pass_object_size, int c, size_t n)
|
|
__overloadable {
|
|
size_t bos = __bos(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_memchr(s, c, n);
|
|
}
|
|
|
|
return __memchr_chk(s, c, n, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memrchr(const void* const _Nonnull s __pass_object_size, int c, size_t n)
|
|
__overloadable {
|
|
size_t bos = __bos(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __call_bypassing_fortify(memrchr)(s, c, n);
|
|
}
|
|
|
|
return __memrchr_chk(s, c, n, bos);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_M__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* stpncpy(char* __restrict const _Nonnull dst __pass_object_size, const char* __restrict const _Nonnull src __pass_object_size, size_t n)
|
|
__overloadable {
|
|
size_t bos_dst = __bos(dst);
|
|
size_t bos_src = __bos(src);
|
|
|
|
/* Ignore dst size checks; they're handled in strncpy_chk */
|
|
if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
return __stpncpy_chk2(dst, src, n, bos_dst, bos_src);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strncpy(char* __restrict const _Nonnull dst __pass_object_size, const char* __restrict const _Nonnull src __pass_object_size, size_t n)
|
|
__overloadable {
|
|
size_t bos_dst = __bos(dst);
|
|
size_t bos_src = __bos(src);
|
|
|
|
/* Ignore dst size checks; they're handled in strncpy_chk */
|
|
if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin___strncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
return __strncpy_chk2(dst, src, n, bos_dst, bos_src);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlcpy(char* const _Nonnull __restrict dst __pass_object_size, const char *_Nonnull __restrict src, size_t size)
|
|
__overloadable {
|
|
size_t bos = __bos(dst);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __call_bypassing_fortify(strlcpy)(dst, src, size);
|
|
}
|
|
|
|
return __strlcpy_chk(dst, src, size, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlcat(char* const _Nonnull __restrict dst __pass_object_size, const char* _Nonnull __restrict src, size_t size)
|
|
__overloadable {
|
|
size_t bos = __bos(dst);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __call_bypassing_fortify(strlcat)(dst, src, size);
|
|
}
|
|
|
|
return __strlcat_chk(dst, src, size, bos);
|
|
}
|
|
|
|
/*
|
|
* If we can evaluate the size of s at compile-time, just call __builtin_strlen
|
|
* on it directly. This makes it way easier for compilers to fold things like
|
|
* strlen("Foo") into a constant, as users would expect. -1ULL is chosen simply
|
|
* because it's large.
|
|
*/
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlen(const char* const _Nonnull s __pass_object_size)
|
|
__overloadable __enable_if(__builtin_strlen(s) != -1ULL,
|
|
"enabled if s is a known good string.") {
|
|
return __builtin_strlen(s);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlen(const char* const _Nonnull s __pass_object_size0)
|
|
__overloadable {
|
|
size_t bos = __bos0(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_strlen(s);
|
|
}
|
|
|
|
// return __builtin_strlen(s);
|
|
return __strlen_chk(s, bos);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR2__
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strchr(const char* const _Nonnull s __pass_object_size, int c)
|
|
__overloadable {
|
|
size_t bos = __bos(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_strchr(s, c);
|
|
}
|
|
|
|
return __strchr_chk(s, c, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strrchr(const char* const _Nonnull s __pass_object_size, int c)
|
|
__overloadable {
|
|
size_t bos = __bos(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_strrchr(s, c);
|
|
}
|
|
|
|
return __strrchr_chk(s, c, bos);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR2__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
|
/* In *many* cases, memset(foo, sizeof(foo), 0) is a mistake where the user has
|
|
* flipped the size + value arguments. However, there may be cases (e.g. with
|
|
* macros) where it's okay for the size to fold to zero. We should warn on this,
|
|
* but we should also provide a FORTIFY'ed escape hatch.
|
|
*/
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
void* memset(void* _Nonnull s, int c, size_t n, struct __bionic_zero_size_is_okay_t ok)
|
|
__overloadable
|
|
__error_if_overflows_dst(memset, s, n, "size");
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memset(void* const _Nonnull s __pass_object_size0, int c, size_t n, struct __bionic_zero_size_is_okay_t ok __attribute__((unused)))
|
|
__overloadable {
|
|
return __builtin___memset_chk(s, c, n, __bos0(s));
|
|
}
|
|
|
|
extern struct __bionic_zero_size_is_okay_t __bionic_zero_size_is_okay;
|
|
/* We verify that `c` is non-zero, because as pointless as memset(foo, 0, 0) is,
|
|
* flipping size + count will do nothing.
|
|
*/
|
|
__BIONIC_ERROR_FUNCTION_VISIBILITY
|
|
void* memset(void* _Nonnull s, int c, size_t n) __overloadable
|
|
__enable_if(c && !n, "selected when we'll set zero bytes")
|
|
__RENAME_CLANG(memset)
|
|
__warnattr_real("will set 0 bytes; maybe the arguments got flipped? "
|
|
"(Add __bionic_zero_size_is_okay as a fourth argument "
|
|
"to silence this.)");
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
|
|
|
#undef __error_zero_size
|
|
#undef __error_if_overflows_dst
|
|
#else // defined(__clang__)
|
|
extern char* __strncpy_real(char* __restrict, const char*, size_t) __RENAME(strncpy);
|
|
extern void* __memrchr_real(const void*, int, size_t) __RENAME(memrchr);
|
|
extern size_t __strlcpy_real(char* __restrict, const char* __restrict, size_t)
|
|
__RENAME(strlcpy);
|
|
extern size_t __strlcat_real(char* __restrict, const char* __restrict, size_t)
|
|
__RENAME(strlcat);
|
|
|
|
__errordecl(__memchr_buf_size_error, "memchr called with size bigger than buffer");
|
|
__errordecl(__memrchr_buf_size_error, "memrchr called with size bigger than buffer");
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_M__
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memchr(const void *_Nonnull s __pass_object_size, int c, size_t n) {
|
|
size_t bos = __bos(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_memchr(s, c, n);
|
|
}
|
|
|
|
if (__builtin_constant_p(n) && (n > bos)) {
|
|
__memchr_buf_size_error();
|
|
}
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos)) {
|
|
return __builtin_memchr(s, c, n);
|
|
}
|
|
|
|
return __memchr_chk(s, c, n, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
void* memrchr(const void* s, int c, size_t n) {
|
|
size_t bos = __bos(s);
|
|
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __memrchr_real(s, c, n);
|
|
}
|
|
|
|
if (__builtin_constant_p(n) && (n > bos)) {
|
|
__memrchr_buf_size_error();
|
|
}
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos)) {
|
|
return __memrchr_real(s, c, n);
|
|
}
|
|
|
|
return __memrchr_chk(s, c, n, bos);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_M__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_L__
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* stpncpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t n) {
|
|
size_t bos_dst = __bos(dst);
|
|
size_t bos_src = __bos(src);
|
|
|
|
if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos_src)) {
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
size_t slen = __builtin_strlen(src);
|
|
if (__builtin_constant_p(slen)) {
|
|
return __builtin___stpncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
return __stpncpy_chk2(dst, src, n, bos_dst, bos_src);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strncpy(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t n) {
|
|
size_t bos_dst = __bos(dst);
|
|
size_t bos_src = __bos(src);
|
|
|
|
if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __strncpy_real(dst, src, n);
|
|
}
|
|
|
|
if (__builtin_constant_p(n) && (n <= bos_src)) {
|
|
return __builtin___strncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
size_t slen = __builtin_strlen(src);
|
|
if (__builtin_constant_p(slen)) {
|
|
return __builtin___strncpy_chk(dst, src, n, bos_dst);
|
|
}
|
|
|
|
return __strncpy_chk2(dst, src, n, bos_dst, bos_src);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlcpy(char* _Nonnull __restrict dst __pass_object_size, const char* _Nonnull __restrict src, size_t size) {
|
|
size_t bos = __bos(dst);
|
|
|
|
// Compiler doesn't know destination size. Don't call __strlcpy_chk
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __strlcpy_real(dst, src, size);
|
|
}
|
|
|
|
// Compiler can prove, at compile time, that the passed in size
|
|
// is always <= the actual object size. Don't call __strlcpy_chk
|
|
if (__builtin_constant_p(size) && (size <= bos)) {
|
|
return __strlcpy_real(dst, src, size);
|
|
}
|
|
|
|
return __strlcpy_chk(dst, src, size, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlcat(char* _Nonnull __restrict dst, const char* _Nonnull __restrict src, size_t size) {
|
|
size_t bos = __bos(dst);
|
|
|
|
// Compiler doesn't know destination size. Don't call __strlcat_chk
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __strlcat_real(dst, src, size);
|
|
}
|
|
|
|
// Compiler can prove, at compile time, that the passed in size
|
|
// is always <= the actual object size. Don't call __strlcat_chk
|
|
if (__builtin_constant_p(size) && (size <= bos)) {
|
|
return __strlcat_real(dst, src, size);
|
|
}
|
|
|
|
return __strlcat_chk(dst, src, size, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
size_t strlen(const char* _Nonnull s) __overloadable {
|
|
size_t bos = __bos(s);
|
|
|
|
// Compiler doesn't know destination size. Don't call __strlen_chk
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_strlen(s);
|
|
}
|
|
|
|
size_t slen = __builtin_strlen(s);
|
|
if (__builtin_constant_p(slen)) {
|
|
return slen;
|
|
}
|
|
|
|
return __strlen_chk(s, bos);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
|
|
|
|
#if __ANDROID_API__ >= __ANDROID_API_J_MR2__
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strchr(const char* _Nonnull s, int c) {
|
|
size_t bos = __bos(s);
|
|
|
|
// Compiler doesn't know destination size. Don't call __strchr_chk
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_strchr(s, c);
|
|
}
|
|
|
|
size_t slen = __builtin_strlen(s);
|
|
if (__builtin_constant_p(slen) && (slen < bos)) {
|
|
return __builtin_strchr(s, c);
|
|
}
|
|
|
|
return __strchr_chk(s, c, bos);
|
|
}
|
|
|
|
__BIONIC_FORTIFY_INLINE
|
|
char* strrchr(const char* _Nonnull s, int c) {
|
|
size_t bos = __bos(s);
|
|
|
|
// Compiler doesn't know destination size. Don't call __strrchr_chk
|
|
if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
|
|
return __builtin_strrchr(s, c);
|
|
}
|
|
|
|
size_t slen = __builtin_strlen(s);
|
|
if (__builtin_constant_p(slen) && (slen < bos)) {
|
|
return __builtin_strrchr(s, c);
|
|
}
|
|
|
|
return __strrchr_chk(s, c, bos);
|
|
}
|
|
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR2__ */
|
|
#endif /* defined(__clang__) */
|
|
#endif /* defined(__BIONIC_FORTIFY) */
|
|
|
|
/* Const-correct overloads. Placed after FORTIFY so we call those functions, if possible. */
|
|
#if defined(__cplusplus) && defined(__clang__)
|
|
/*
|
|
* Use two enable_ifs so these overloads don't conflict with + are preferred over libcxx's. This can
|
|
* be reduced to 1 after libcxx recognizes that we have const-correct overloads.
|
|
*/
|
|
#define __prefer_this_overload __enable_if(true, "preferred overload") __enable_if(true, "")
|
|
extern "C++" {
|
|
inline __always_inline
|
|
void* __bionic_memchr(const void* const _Nonnull s __pass_object_size, int c, size_t n) {
|
|
return memchr(s, c, n);
|
|
}
|
|
|
|
inline __always_inline
|
|
const void* memchr(const void* const _Nonnull s __pass_object_size, int c, size_t n)
|
|
__prefer_this_overload {
|
|
return __bionic_memchr(s, c, n);
|
|
}
|
|
|
|
inline __always_inline
|
|
void* memchr(void* const _Nonnull s __pass_object_size, int c, size_t n) __prefer_this_overload {
|
|
return __bionic_memchr(s, c, n);
|
|
}
|
|
|
|
inline __always_inline
|
|
char* __bionic_strchr(const char* const _Nonnull s __pass_object_size, int c) {
|
|
return strchr(s, c);
|
|
}
|
|
|
|
inline __always_inline
|
|
const char* strchr(const char* const _Nonnull s __pass_object_size, int c)
|
|
__prefer_this_overload {
|
|
return __bionic_strchr(s, c);
|
|
}
|
|
|
|
inline __always_inline
|
|
char* strchr(char* const _Nonnull s __pass_object_size, int c)
|
|
__prefer_this_overload {
|
|
return __bionic_strchr(s, c);
|
|
}
|
|
|
|
inline __always_inline
|
|
char* __bionic_strrchr(const char* const _Nonnull s __pass_object_size, int c) {
|
|
return strrchr(s, c);
|
|
}
|
|
|
|
inline __always_inline
|
|
const char* strrchr(const char* const _Nonnull s __pass_object_size, int c) __prefer_this_overload {
|
|
return __bionic_strrchr(s, c);
|
|
}
|
|
|
|
inline __always_inline
|
|
char* strrchr(char* const _Nonnull s __pass_object_size, int c) __prefer_this_overload {
|
|
return __bionic_strrchr(s, c);
|
|
}
|
|
|
|
/* Functions with no FORTIFY counterpart. */
|
|
inline __always_inline
|
|
char* __bionic_strstr(const char* _Nonnull h, const char* _Nonnull n) { return strstr(h, n); }
|
|
|
|
inline __always_inline
|
|
const char* strstr(const char* _Nonnull h, const char* _Nonnull n) __prefer_this_overload {
|
|
return __bionic_strstr(h, n);
|
|
}
|
|
|
|
inline __always_inline
|
|
char* strstr(char* _Nonnull h, const char* _Nonnull n) __prefer_this_overload {
|
|
return __bionic_strstr(h, n);
|
|
}
|
|
|
|
inline __always_inline
|
|
char* __bionic_strpbrk(const char* _Nonnull h, const char* _Nonnull n) { return strpbrk(h, n); }
|
|
|
|
inline __always_inline
|
|
char* strpbrk(char* _Nonnull h, const char* _Nonnull n) __prefer_this_overload {
|
|
return __bionic_strpbrk(h, n);
|
|
}
|
|
|
|
inline __always_inline
|
|
const char* strpbrk(const char* _Nonnull h, const char* _Nonnull n) __prefer_this_overload {
|
|
return __bionic_strpbrk(h, n);
|
|
}
|
|
}
|
|
#undef __prefer_this_overload
|
|
#endif
|
|
|
|
#if defined(__clang__)
|
|
#pragma clang diagnostic pop
|
|
#endif
|
|
|
|
__END_DECLS
|
|
|
|
#endif /* _STRING_H */
|