mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-22 04:50:07 +00:00
ec307a1086
It improve fortify checks for read, pread, pread64, readlink, readlinkat, getcwd, getwd, confstr, getgroups, ttyname_r, getlogin_r, gethostname, and getdomainname. The compile and runtime checks have similar coverage as with GCC. Checked on aarch64, armhf, x86_64, and i686. Reviewed-by: Carlos O'Donell <carlos@redhat.com> Tested-by: Carlos O'Donell <carlos@redhat.com>
215 lines
7.3 KiB
C
215 lines
7.3 KiB
C
/* Checking macros for unistd functions.
|
|
Copyright (C) 2005-2024 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#ifndef _UNISTD_H
|
|
# error "Never include <bits/unistd.h> directly; use <unistd.h> instead."
|
|
#endif
|
|
|
|
# include <bits/unistd-decl.h>
|
|
|
|
__fortify_function __attribute_overloadable__ __wur ssize_t
|
|
read (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf), size_t __nbytes)
|
|
__fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
|
|
"read called with bigger length than "
|
|
"size of the destination buffer")
|
|
|
|
{
|
|
return __glibc_fortify (read, __nbytes, sizeof (char),
|
|
__glibc_objsize0 (__buf),
|
|
__fd, __buf, __nbytes);
|
|
}
|
|
|
|
#if defined __USE_UNIX98 || defined __USE_XOPEN2K8
|
|
# ifndef __USE_FILE_OFFSET64
|
|
__fortify_function __attribute_overloadable__ __wur ssize_t
|
|
pread (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf),
|
|
size_t __nbytes, __off_t __offset)
|
|
__fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
|
|
"pread called with bigger length than "
|
|
"size of the destination buffer")
|
|
{
|
|
return __glibc_fortify (pread, __nbytes, sizeof (char),
|
|
__glibc_objsize0 (__buf),
|
|
__fd, __buf, __nbytes, __offset);
|
|
}
|
|
# else
|
|
__fortify_function __attribute_overloadable__ __wur ssize_t
|
|
pread (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf),
|
|
size_t __nbytes, __off64_t __offset)
|
|
__fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
|
|
"pread called with bigger length than "
|
|
"size of the destination buffer")
|
|
{
|
|
return __glibc_fortify (pread64, __nbytes, sizeof (char),
|
|
__glibc_objsize0 (__buf),
|
|
__fd, __buf, __nbytes, __offset);
|
|
}
|
|
# endif
|
|
|
|
# ifdef __USE_LARGEFILE64
|
|
__fortify_function __attribute_overloadable__ __wur ssize_t
|
|
pread64 (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf),
|
|
size_t __nbytes, __off64_t __offset)
|
|
__fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
|
|
"pread64 called with bigger length than "
|
|
"size of the destination buffer")
|
|
{
|
|
return __glibc_fortify (pread64, __nbytes, sizeof (char),
|
|
__glibc_objsize0 (__buf),
|
|
__fd, __buf, __nbytes, __offset);
|
|
}
|
|
# endif
|
|
#endif
|
|
|
|
#if defined __USE_XOPEN_EXTENDED || defined __USE_XOPEN2K
|
|
__fortify_function __attribute_overloadable__ __nonnull ((1, 2)) __wur ssize_t
|
|
__NTH (readlink (const char *__restrict __path,
|
|
__fortify_clang_overload_arg0 (char *, __restrict, __buf),
|
|
size_t __len))
|
|
__fortify_clang_warning_only_if_bos_lt (__len, __buf,
|
|
"readlink called with bigger length "
|
|
"than size of destination buffer")
|
|
|
|
{
|
|
return __glibc_fortify (readlink, __len, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__path, __buf, __len);
|
|
}
|
|
#endif
|
|
|
|
#ifdef __USE_ATFILE
|
|
__fortify_function __attribute_overloadable__ __nonnull ((2, 3)) __wur ssize_t
|
|
__NTH (readlinkat (int __fd, const char *__restrict __path,
|
|
__fortify_clang_overload_arg0 (char *, __restrict, __buf),
|
|
size_t __len))
|
|
__fortify_clang_warning_only_if_bos_lt (__len, __buf,
|
|
"readlinkat called with bigger length "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify (readlinkat, __len, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__fd, __path, __buf, __len);
|
|
}
|
|
#endif
|
|
|
|
__fortify_function __attribute_overloadable__ __wur char *
|
|
__NTH (getcwd (__fortify_clang_overload_arg (char *, , __buf), size_t __size))
|
|
__fortify_clang_warning_only_if_bos_lt (__size, __buf,
|
|
"getcwd called with bigger length "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify (getcwd, __size, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__buf, __size);
|
|
}
|
|
|
|
#if defined __USE_MISC || defined __USE_XOPEN_EXTENDED
|
|
__fortify_function __attribute_overloadable__ __nonnull ((1))
|
|
__attribute_deprecated__ __wur char *
|
|
__NTH (getwd (__fortify_clang_overload_arg (char *,, __buf)))
|
|
{
|
|
if (__glibc_objsize (__buf) != (size_t) -1)
|
|
return __getwd_chk (__buf, __glibc_objsize (__buf));
|
|
return __getwd_warn (__buf);
|
|
}
|
|
#endif
|
|
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (confstr (int __name, __fortify_clang_overload_arg (char *, ,__buf),
|
|
size_t __len))
|
|
__fortify_clang_warning_only_if_bos_lt (__len, __buf,
|
|
"confstr called with bigger length than "
|
|
"size of destination buffer")
|
|
{
|
|
return __glibc_fortify (confstr, __len, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__name, __buf, __len);
|
|
}
|
|
|
|
|
|
__fortify_function __attribute_overloadable__ int
|
|
__NTH (getgroups (int __size,
|
|
__fortify_clang_overload_arg (__gid_t *, , __list)))
|
|
__fortify_clang_warning_only_if_bos_lt (__size * sizeof (__gid_t), __list,
|
|
"getgroups called with bigger group "
|
|
"count than what can fit into "
|
|
"destination buffer")
|
|
{
|
|
return __glibc_fortify (getgroups, __size, sizeof (__gid_t),
|
|
__glibc_objsize (__list),
|
|
__size, __list);
|
|
}
|
|
|
|
|
|
__fortify_function __attribute_overloadable__ int
|
|
__NTH (ttyname_r (int __fd,
|
|
__fortify_clang_overload_arg (char *, ,__buf),
|
|
size_t __buflen))
|
|
__fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
|
|
"ttyname_r called with bigger buflen "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify (ttyname_r, __buflen, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__fd, __buf, __buflen);
|
|
}
|
|
|
|
|
|
#ifdef __USE_POSIX199506
|
|
__fortify_function __attribute_overloadable__ int
|
|
getlogin_r (__fortify_clang_overload_arg (char *, ,__buf), size_t __buflen)
|
|
__fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
|
|
"getlogin_r called with bigger buflen "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify (getlogin_r, __buflen, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__buf, __buflen);
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined __USE_MISC || defined __USE_UNIX98
|
|
__fortify_function __attribute_overloadable__ int
|
|
__NTH (gethostname (__fortify_clang_overload_arg (char *, ,__buf),
|
|
size_t __buflen))
|
|
__fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
|
|
"gethostname called with bigger buflen "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify (gethostname, __buflen, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__buf, __buflen);
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined __USE_MISC || (defined __USE_XOPEN && !defined __USE_UNIX98)
|
|
__fortify_function __attribute_overloadable__ int
|
|
__NTH (getdomainname (__fortify_clang_overload_arg (char *, ,__buf),
|
|
size_t __buflen))
|
|
__fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
|
|
"getdomainname called with bigger "
|
|
"buflen than size of destination buffer")
|
|
{
|
|
return __glibc_fortify (getdomainname, __buflen, sizeof (char),
|
|
__glibc_objsize (__buf),
|
|
__buf, __buflen);
|
|
}
|
|
#endif
|