mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-23 21:40:12 +00:00
06febd8c67
Adds the access attribute newly introduced in GCC 10 to the subset of function declarations that are already covered by _FORTIFY_SOURCE and that don't have corresponding GCC built-in equivalents. Reviewed-by: DJ Delorie <dj@redhat.com>
398 lines
14 KiB
C
398 lines
14 KiB
C
/* Checking macros for unistd functions.
|
|
Copyright (C) 2005-2020 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#ifndef _UNISTD_H
|
|
# error "Never include <bits/unistd.h> directly; use <unistd.h> instead."
|
|
#endif
|
|
|
|
extern ssize_t __read_chk (int __fd, void *__buf, size_t __nbytes,
|
|
size_t __buflen)
|
|
__wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT (__read_alias, (int __fd, void *__buf,
|
|
size_t __nbytes), read)
|
|
__wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT (__read_chk_warn,
|
|
(int __fd, void *__buf, size_t __nbytes,
|
|
size_t __buflen), __read_chk)
|
|
__wur __warnattr ("read called with bigger length than size of "
|
|
"the destination buffer");
|
|
|
|
__fortify_function __wur ssize_t
|
|
read (int __fd, void *__buf, size_t __nbytes)
|
|
{
|
|
if (__bos0 (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__nbytes))
|
|
return __read_chk (__fd, __buf, __nbytes, __bos0 (__buf));
|
|
|
|
if (__nbytes > __bos0 (__buf))
|
|
return __read_chk_warn (__fd, __buf, __nbytes, __bos0 (__buf));
|
|
}
|
|
return __read_alias (__fd, __buf, __nbytes);
|
|
}
|
|
|
|
#ifdef __USE_UNIX98
|
|
extern ssize_t __pread_chk (int __fd, void *__buf, size_t __nbytes,
|
|
__off_t __offset, size_t __bufsize)
|
|
__wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __pread64_chk (int __fd, void *__buf, size_t __nbytes,
|
|
__off64_t __offset, size_t __bufsize)
|
|
__wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT (__pread_alias,
|
|
(int __fd, void *__buf, size_t __nbytes,
|
|
__off_t __offset), pread)
|
|
__wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT (__pread64_alias,
|
|
(int __fd, void *__buf, size_t __nbytes,
|
|
__off64_t __offset), pread64)
|
|
__wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT (__pread_chk_warn,
|
|
(int __fd, void *__buf, size_t __nbytes,
|
|
__off_t __offset, size_t __bufsize), __pread_chk)
|
|
__wur __warnattr ("pread called with bigger length than size of "
|
|
"the destination buffer");
|
|
extern ssize_t __REDIRECT (__pread64_chk_warn,
|
|
(int __fd, void *__buf, size_t __nbytes,
|
|
__off64_t __offset, size_t __bufsize),
|
|
__pread64_chk)
|
|
__wur __warnattr ("pread64 called with bigger length than size of "
|
|
"the destination buffer");
|
|
|
|
# ifndef __USE_FILE_OFFSET64
|
|
__fortify_function __wur ssize_t
|
|
pread (int __fd, void *__buf, size_t __nbytes, __off_t __offset)
|
|
{
|
|
if (__bos0 (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__nbytes))
|
|
return __pread_chk (__fd, __buf, __nbytes, __offset, __bos0 (__buf));
|
|
|
|
if ( __nbytes > __bos0 (__buf))
|
|
return __pread_chk_warn (__fd, __buf, __nbytes, __offset,
|
|
__bos0 (__buf));
|
|
}
|
|
return __pread_alias (__fd, __buf, __nbytes, __offset);
|
|
}
|
|
# else
|
|
__fortify_function __wur ssize_t
|
|
pread (int __fd, void *__buf, size_t __nbytes, __off64_t __offset)
|
|
{
|
|
if (__bos0 (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__nbytes))
|
|
return __pread64_chk (__fd, __buf, __nbytes, __offset, __bos0 (__buf));
|
|
|
|
if ( __nbytes > __bos0 (__buf))
|
|
return __pread64_chk_warn (__fd, __buf, __nbytes, __offset,
|
|
__bos0 (__buf));
|
|
}
|
|
|
|
return __pread64_alias (__fd, __buf, __nbytes, __offset);
|
|
}
|
|
# endif
|
|
|
|
# ifdef __USE_LARGEFILE64
|
|
__fortify_function __wur ssize_t
|
|
pread64 (int __fd, void *__buf, size_t __nbytes, __off64_t __offset)
|
|
{
|
|
if (__bos0 (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__nbytes))
|
|
return __pread64_chk (__fd, __buf, __nbytes, __offset, __bos0 (__buf));
|
|
|
|
if ( __nbytes > __bos0 (__buf))
|
|
return __pread64_chk_warn (__fd, __buf, __nbytes, __offset,
|
|
__bos0 (__buf));
|
|
}
|
|
|
|
return __pread64_alias (__fd, __buf, __nbytes, __offset);
|
|
}
|
|
# endif
|
|
#endif
|
|
|
|
#if defined __USE_XOPEN_EXTENDED || defined __USE_XOPEN2K
|
|
extern ssize_t __readlink_chk (const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len,
|
|
size_t __buflen)
|
|
__THROW __nonnull ((1, 2)) __wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT_NTH (__readlink_alias,
|
|
(const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len), readlink)
|
|
__nonnull ((1, 2)) __wur __attr_access ((__write_only__, 2, 3));
|
|
extern ssize_t __REDIRECT_NTH (__readlink_chk_warn,
|
|
(const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len,
|
|
size_t __buflen), __readlink_chk)
|
|
__nonnull ((1, 2)) __wur __warnattr ("readlink called with bigger length "
|
|
"than size of destination buffer");
|
|
|
|
__fortify_function __nonnull ((1, 2)) __wur ssize_t
|
|
__NTH (readlink (const char *__restrict __path, char *__restrict __buf,
|
|
size_t __len))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__len))
|
|
return __readlink_chk (__path, __buf, __len, __bos (__buf));
|
|
|
|
if ( __len > __bos (__buf))
|
|
return __readlink_chk_warn (__path, __buf, __len, __bos (__buf));
|
|
}
|
|
return __readlink_alias (__path, __buf, __len);
|
|
}
|
|
#endif
|
|
|
|
#ifdef __USE_ATFILE
|
|
extern ssize_t __readlinkat_chk (int __fd, const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len,
|
|
size_t __buflen)
|
|
__THROW __nonnull ((2, 3)) __wur __attr_access ((__write_only__, 3, 4));
|
|
extern ssize_t __REDIRECT_NTH (__readlinkat_alias,
|
|
(int __fd, const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len),
|
|
readlinkat)
|
|
__nonnull ((2, 3)) __wur __attr_access ((__write_only__, 3, 4));
|
|
extern ssize_t __REDIRECT_NTH (__readlinkat_chk_warn,
|
|
(int __fd, const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len,
|
|
size_t __buflen), __readlinkat_chk)
|
|
__nonnull ((2, 3)) __wur __warnattr ("readlinkat called with bigger "
|
|
"length than size of destination "
|
|
"buffer");
|
|
|
|
__fortify_function __nonnull ((2, 3)) __wur ssize_t
|
|
__NTH (readlinkat (int __fd, const char *__restrict __path,
|
|
char *__restrict __buf, size_t __len))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__len))
|
|
return __readlinkat_chk (__fd, __path, __buf, __len, __bos (__buf));
|
|
|
|
if (__len > __bos (__buf))
|
|
return __readlinkat_chk_warn (__fd, __path, __buf, __len,
|
|
__bos (__buf));
|
|
}
|
|
return __readlinkat_alias (__fd, __path, __buf, __len);
|
|
}
|
|
#endif
|
|
|
|
extern char *__getcwd_chk (char *__buf, size_t __size, size_t __buflen)
|
|
__THROW __wur __attr_access ((__write_only__, 1, 2));
|
|
extern char *__REDIRECT_NTH (__getcwd_alias,
|
|
(char *__buf, size_t __size), getcwd)
|
|
__wur __attr_access ((__write_only__, 1, 2));
|
|
extern char *__REDIRECT_NTH (__getcwd_chk_warn,
|
|
(char *__buf, size_t __size, size_t __buflen),
|
|
__getcwd_chk)
|
|
__wur __warnattr ("getcwd caller with bigger length than size of "
|
|
"destination buffer");
|
|
|
|
__fortify_function __wur char *
|
|
__NTH (getcwd (char *__buf, size_t __size))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__size))
|
|
return __getcwd_chk (__buf, __size, __bos (__buf));
|
|
|
|
if (__size > __bos (__buf))
|
|
return __getcwd_chk_warn (__buf, __size, __bos (__buf));
|
|
}
|
|
return __getcwd_alias (__buf, __size);
|
|
}
|
|
|
|
#if defined __USE_MISC || defined __USE_XOPEN_EXTENDED
|
|
extern char *__getwd_chk (char *__buf, size_t buflen)
|
|
__THROW __nonnull ((1)) __wur __attr_access ((__write_only__, 1, 2));
|
|
extern char *__REDIRECT_NTH (__getwd_warn, (char *__buf), getwd)
|
|
__nonnull ((1)) __wur __warnattr ("please use getcwd instead, as getwd "
|
|
"doesn't specify buffer size");
|
|
|
|
__fortify_function __nonnull ((1)) __attribute_deprecated__ __wur char *
|
|
__NTH (getwd (char *__buf))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
return __getwd_chk (__buf, __bos (__buf));
|
|
return __getwd_warn (__buf);
|
|
}
|
|
#endif
|
|
|
|
extern size_t __confstr_chk (int __name, char *__buf, size_t __len,
|
|
size_t __buflen) __THROW
|
|
__attr_access ((__write_only__, 2, 3));
|
|
extern size_t __REDIRECT_NTH (__confstr_alias, (int __name, char *__buf,
|
|
size_t __len), confstr)
|
|
__attr_access ((__write_only__, 2, 3));
|
|
extern size_t __REDIRECT_NTH (__confstr_chk_warn,
|
|
(int __name, char *__buf, size_t __len,
|
|
size_t __buflen), __confstr_chk)
|
|
__warnattr ("confstr called with bigger length than size of destination "
|
|
"buffer");
|
|
|
|
__fortify_function size_t
|
|
__NTH (confstr (int __name, char *__buf, size_t __len))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__len))
|
|
return __confstr_chk (__name, __buf, __len, __bos (__buf));
|
|
|
|
if (__bos (__buf) < __len)
|
|
return __confstr_chk_warn (__name, __buf, __len, __bos (__buf));
|
|
}
|
|
return __confstr_alias (__name, __buf, __len);
|
|
}
|
|
|
|
|
|
extern int __getgroups_chk (int __size, __gid_t __list[], size_t __listlen)
|
|
__THROW __wur __attr_access ((__write_only__, 2, 1));
|
|
extern int __REDIRECT_NTH (__getgroups_alias, (int __size, __gid_t __list[]),
|
|
getgroups) __wur __attr_access ((__write_only__, 2, 1));
|
|
extern int __REDIRECT_NTH (__getgroups_chk_warn,
|
|
(int __size, __gid_t __list[], size_t __listlen),
|
|
__getgroups_chk)
|
|
__wur __warnattr ("getgroups called with bigger group count than what "
|
|
"can fit into destination buffer");
|
|
|
|
__fortify_function int
|
|
__NTH (getgroups (int __size, __gid_t __list[]))
|
|
{
|
|
if (__bos (__list) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__size) || __size < 0)
|
|
return __getgroups_chk (__size, __list, __bos (__list));
|
|
|
|
if (__size * sizeof (__gid_t) > __bos (__list))
|
|
return __getgroups_chk_warn (__size, __list, __bos (__list));
|
|
}
|
|
return __getgroups_alias (__size, __list);
|
|
}
|
|
|
|
|
|
extern int __ttyname_r_chk (int __fd, char *__buf, size_t __buflen,
|
|
size_t __nreal) __THROW __nonnull ((2))
|
|
__attr_access ((__write_only__, 2, 3));
|
|
extern int __REDIRECT_NTH (__ttyname_r_alias, (int __fd, char *__buf,
|
|
size_t __buflen), ttyname_r)
|
|
__nonnull ((2));
|
|
extern int __REDIRECT_NTH (__ttyname_r_chk_warn,
|
|
(int __fd, char *__buf, size_t __buflen,
|
|
size_t __nreal), __ttyname_r_chk)
|
|
__nonnull ((2)) __warnattr ("ttyname_r called with bigger buflen than "
|
|
"size of destination buffer");
|
|
|
|
__fortify_function int
|
|
__NTH (ttyname_r (int __fd, char *__buf, size_t __buflen))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__buflen))
|
|
return __ttyname_r_chk (__fd, __buf, __buflen, __bos (__buf));
|
|
|
|
if (__buflen > __bos (__buf))
|
|
return __ttyname_r_chk_warn (__fd, __buf, __buflen, __bos (__buf));
|
|
}
|
|
return __ttyname_r_alias (__fd, __buf, __buflen);
|
|
}
|
|
|
|
|
|
#ifdef __USE_POSIX199506
|
|
extern int __getlogin_r_chk (char *__buf, size_t __buflen, size_t __nreal)
|
|
__nonnull ((1)) __attr_access ((__write_only__, 1, 2));
|
|
extern int __REDIRECT (__getlogin_r_alias, (char *__buf, size_t __buflen),
|
|
getlogin_r) __nonnull ((1));
|
|
extern int __REDIRECT (__getlogin_r_chk_warn,
|
|
(char *__buf, size_t __buflen, size_t __nreal),
|
|
__getlogin_r_chk)
|
|
__nonnull ((1)) __warnattr ("getlogin_r called with bigger buflen than "
|
|
"size of destination buffer");
|
|
|
|
__fortify_function int
|
|
getlogin_r (char *__buf, size_t __buflen)
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__buflen))
|
|
return __getlogin_r_chk (__buf, __buflen, __bos (__buf));
|
|
|
|
if (__buflen > __bos (__buf))
|
|
return __getlogin_r_chk_warn (__buf, __buflen, __bos (__buf));
|
|
}
|
|
return __getlogin_r_alias (__buf, __buflen);
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined __USE_MISC || defined __USE_UNIX98
|
|
extern int __gethostname_chk (char *__buf, size_t __buflen, size_t __nreal)
|
|
__THROW __nonnull ((1)) __attr_access ((__write_only__, 1, 2));
|
|
extern int __REDIRECT_NTH (__gethostname_alias, (char *__buf, size_t __buflen),
|
|
gethostname)
|
|
__nonnull ((1)) __attr_access ((__write_only__, 1, 2));
|
|
extern int __REDIRECT_NTH (__gethostname_chk_warn,
|
|
(char *__buf, size_t __buflen, size_t __nreal),
|
|
__gethostname_chk)
|
|
__nonnull ((1)) __warnattr ("gethostname called with bigger buflen than "
|
|
"size of destination buffer");
|
|
|
|
__fortify_function int
|
|
__NTH (gethostname (char *__buf, size_t __buflen))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__buflen))
|
|
return __gethostname_chk (__buf, __buflen, __bos (__buf));
|
|
|
|
if (__buflen > __bos (__buf))
|
|
return __gethostname_chk_warn (__buf, __buflen, __bos (__buf));
|
|
}
|
|
return __gethostname_alias (__buf, __buflen);
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined __USE_MISC || (defined __USE_XOPEN && !defined __USE_UNIX98)
|
|
extern int __getdomainname_chk (char *__buf, size_t __buflen, size_t __nreal)
|
|
__THROW __nonnull ((1)) __wur __attr_access ((__write_only__, 1, 2));
|
|
extern int __REDIRECT_NTH (__getdomainname_alias, (char *__buf,
|
|
size_t __buflen),
|
|
getdomainname) __nonnull ((1))
|
|
__wur __attr_access ((__write_only__, 1, 2));
|
|
extern int __REDIRECT_NTH (__getdomainname_chk_warn,
|
|
(char *__buf, size_t __buflen, size_t __nreal),
|
|
__getdomainname_chk)
|
|
__nonnull ((1)) __wur __warnattr ("getdomainname called with bigger "
|
|
"buflen than size of destination "
|
|
"buffer");
|
|
|
|
__fortify_function int
|
|
__NTH (getdomainname (char *__buf, size_t __buflen))
|
|
{
|
|
if (__bos (__buf) != (size_t) -1)
|
|
{
|
|
if (!__builtin_constant_p (__buflen))
|
|
return __getdomainname_chk (__buf, __buflen, __bos (__buf));
|
|
|
|
if (__buflen > __bos (__buf))
|
|
return __getdomainname_chk_warn (__buf, __buflen, __bos (__buf));
|
|
}
|
|
return __getdomainname_alias (__buf, __buflen);
|
|
}
|
|
#endif
|