| /* | 
 |  * Copyright (C) 2008 The Android Open Source Project | 
 |  * All rights reserved. | 
 |  * | 
 |  * Redistribution and use in source and binary forms, with or without | 
 |  * modification, are permitted provided that the following conditions | 
 |  * are met: | 
 |  *  * Redistributions of source code must retain the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer. | 
 |  *  * Redistributions in binary form must reproduce the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer in | 
 |  *    the documentation and/or other materials provided with the | 
 |  *    distribution. | 
 |  * | 
 |  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | 
 |  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | 
 |  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS | 
 |  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE | 
 |  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, | 
 |  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, | 
 |  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS | 
 |  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED | 
 |  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | 
 |  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | 
 |  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
 |  * SUCH DAMAGE. | 
 |  */ | 
 |  | 
 | #ifndef _UNISTD_H_ | 
 | #define _UNISTD_H_ | 
 |  | 
 | #include <stddef.h> | 
 | #include <sys/cdefs.h> | 
 | #include <sys/types.h> | 
 | #include <sys/select.h> | 
 |  | 
 | #include <bits/fcntl.h> | 
 | #include <bits/getopt.h> | 
 | #include <bits/ioctl.h> | 
 | #include <bits/lockf.h> | 
 | #include <bits/posix_limits.h> | 
 | #include <bits/seek_constants.h> | 
 | #include <bits/sysconf.h> | 
 |  | 
 | __BEGIN_DECLS | 
 |  | 
 | #define STDIN_FILENO	0 | 
 | #define STDOUT_FILENO	1 | 
 | #define STDERR_FILENO	2 | 
 |  | 
 | #define F_OK 0 | 
 | #define X_OK 1 | 
 | #define W_OK 2 | 
 | #define R_OK 4 | 
 |  | 
 | #define _PC_FILESIZEBITS 0 | 
 | #define _PC_LINK_MAX 1 | 
 | #define _PC_MAX_CANON 2 | 
 | #define _PC_MAX_INPUT 3 | 
 | #define _PC_NAME_MAX 4 | 
 | #define _PC_PATH_MAX 5 | 
 | #define _PC_PIPE_BUF 6 | 
 | #define _PC_2_SYMLINKS 7 | 
 | #define _PC_ALLOC_SIZE_MIN 8 | 
 | #define _PC_REC_INCR_XFER_SIZE 9 | 
 | #define _PC_REC_MAX_XFER_SIZE 10 | 
 | #define _PC_REC_MIN_XFER_SIZE 11 | 
 | #define _PC_REC_XFER_ALIGN 12 | 
 | #define _PC_SYMLINK_MAX 13 | 
 | #define _PC_CHOWN_RESTRICTED 14 | 
 | #define _PC_NO_TRUNC 15 | 
 | #define _PC_VDISABLE 16 | 
 | #define _PC_ASYNC_IO 17 | 
 | #define _PC_PRIO_IO 18 | 
 | #define _PC_SYNC_IO 19 | 
 |  | 
 | extern char** environ; | 
 |  | 
 | __noreturn void _exit(int __status); | 
 |  | 
 | pid_t  fork(void); | 
 | pid_t  vfork(void); | 
 | pid_t  getpid(void); | 
 | pid_t  gettid(void) __attribute_const__; | 
 | pid_t  getpgid(pid_t __pid); | 
 | int    setpgid(pid_t __pid, pid_t __pgid); | 
 | pid_t  getppid(void); | 
 | pid_t  getpgrp(void); | 
 | int    setpgrp(void); | 
 | pid_t  getsid(pid_t __pid) __INTRODUCED_IN(17); | 
 | pid_t  setsid(void); | 
 |  | 
 | int execv(const char* __path, char* const* __argv); | 
 | int execvp(const char* __file, char* const* __argv); | 
 | int execvpe(const char* __file, char* const* __argv, char* const* __envp) __INTRODUCED_IN(21); | 
 | int execve(const char* __file, char* const* __argv, char* const* __envp); | 
 | int execl(const char* __path, const char* __arg0, ...) __attribute__((__sentinel__)); | 
 | int execlp(const char* __file, const char* __arg0, ...) __attribute__((__sentinel__)); | 
 | int execle(const char* __path, const char* __arg0, ... /*,  char* const* __envp */) | 
 |     __attribute__((__sentinel__(1))); | 
 |  | 
 | int nice(int __incr); | 
 |  | 
 | int setuid(uid_t __uid); | 
 | uid_t getuid(void); | 
 | int seteuid(uid_t __uid); | 
 | uid_t geteuid(void); | 
 | int setgid(gid_t __gid); | 
 | gid_t getgid(void); | 
 | int setegid(gid_t __gid); | 
 | gid_t getegid(void); | 
 | int getgroups(int __size, gid_t* __list); | 
 | int setgroups(size_t __size, const gid_t* __list); | 
 | int setreuid(uid_t __ruid, uid_t __euid); | 
 | int setregid(gid_t __rgid, gid_t __egid); | 
 | int setresuid(uid_t __ruid, uid_t __euid, uid_t __suid); | 
 | int setresgid(gid_t __rgid, gid_t __egid, gid_t __sgid); | 
 | int getresuid(uid_t* __ruid, uid_t* __euid, uid_t* __suid); | 
 | int getresgid(gid_t* __rgid, gid_t* __egid, gid_t* __sgid); | 
 | char* getlogin(void); | 
 |  | 
 | long fpathconf(int __fd, int __name); | 
 | long pathconf(const char* __path, int __name); | 
 |  | 
 | int access(const char* __path, int __mode); | 
 | int faccessat(int __dirfd, const char* __path, int __mode, int __flags) __INTRODUCED_IN(16); | 
 | int link(const char* __oldpath, const char* __newpath); | 
 | int linkat(int __olddirfd, const char* __oldpath, int __newdirfd, | 
 |            const char* __newpath, int __flags) __INTRODUCED_IN(21); | 
 | int unlink(const char* __path); | 
 | int unlinkat(int __dirfd, const char* __path, int __flags); | 
 | int chdir(const char* __path); | 
 | int fchdir(int __fd); | 
 | int rmdir(const char* __path); | 
 | int pipe(int* __pipefd); | 
 | #if defined(__USE_GNU) | 
 | int pipe2(int* __pipefd, int __flags) __INTRODUCED_IN(9); | 
 | #endif | 
 | int chroot(const char* __path); | 
 | int symlink(const char* __oldpath, const char* __newpath); | 
 | int symlinkat(const char* __oldpath, int __newdirfd, const char* __newpath) __INTRODUCED_IN(21); | 
 | ssize_t readlink(const char* __path, char* __buf, size_t __bufsiz) | 
 |     __overloadable __RENAME_CLANG(readlink); | 
 | ssize_t readlinkat(int __dirfd, const char* __path, char* __buf, | 
 |                    size_t __bufsiz) | 
 |     __INTRODUCED_IN(21) __overloadable __RENAME_CLANG(readlinkat); | 
 | int chown(const char* __path, uid_t __owner, gid_t __group); | 
 | int fchown(int __fd, uid_t __owner, gid_t __group); | 
 | int fchownat(int __dirfd, const char* __path, uid_t __owner, gid_t __group, int __flags); | 
 | int lchown(const char* __path, uid_t __owner, gid_t __group); | 
 | char* getcwd(char* __buf, size_t __size) __overloadable __RENAME_CLANG(getcwd); | 
 |  | 
 | void sync(void); | 
 |  | 
 | int close(int __fd); | 
 |  | 
 | ssize_t read(int __fd, void* __buf, size_t __count) __overloadable | 
 |     __RENAME_CLANG(read); | 
 | ssize_t write(int __fd, const void* __buf, size_t __count) __overloadable | 
 |     __RENAME_CLANG(write); | 
 |  | 
 | int dup(int __oldfd); | 
 | int dup2(int __oldfd, int __newfd); | 
 | int dup3(int __oldfd, int __newfd, int __flags) __INTRODUCED_IN(21); | 
 | int fsync(int __fd); | 
 | int fdatasync(int __fd) __INTRODUCED_IN(9); | 
 |  | 
 | #if defined(__USE_FILE_OFFSET64) | 
 | off_t lseek(int __fd, off_t __offset, int __whence) __RENAME(lseek64); | 
 | #else | 
 | off_t lseek(int __fd, off_t __offset, int __whence); | 
 | #endif | 
 |  | 
 | off64_t lseek64(int __fd, off64_t __offset, int __whence); | 
 |  | 
 | #if defined(__USE_FILE_OFFSET64) && __ANDROID_API__ >= __ANDROID_API_L__ | 
 | int truncate(const char* __path, off_t __length) __RENAME(truncate64) __INTRODUCED_IN(21); | 
 | ssize_t pread(int __fd, void* __buf, size_t __count, off_t __offset) | 
 |   __overloadable __RENAME(pread64) __INTRODUCED_IN(12); | 
 | ssize_t pwrite(int __fd, const void* __buf, size_t __count, off_t __offset) | 
 |   __overloadable __RENAME(pwrite64) __INTRODUCED_IN(12); | 
 | int ftruncate(int __fd, off_t __length) __RENAME(ftruncate64) __INTRODUCED_IN(12); | 
 | #else | 
 | int truncate(const char* __path, off_t __length); | 
 | ssize_t pread(int __fd, void* __buf, size_t __count, off_t __offset) | 
 |     __overloadable __RENAME_CLANG(pread); | 
 | ssize_t pwrite(int __fd, const void* __buf, size_t __count, off_t __offset) | 
 |     __overloadable __RENAME_CLANG(pwrite); | 
 | int ftruncate(int __fd, off_t __length); | 
 | #endif | 
 |  | 
 | int truncate64(const char* __path, off64_t __length) __INTRODUCED_IN(21); | 
 | ssize_t pread64(int __fd, void* __buf, size_t __count, off64_t __offset) | 
 |     __INTRODUCED_IN(12) __overloadable __RENAME_CLANG(pread64); | 
 | ssize_t pwrite64(int __fd, const void* __buf, size_t __count, off64_t __offset) | 
 |     __INTRODUCED_IN(12) __overloadable __RENAME_CLANG(pwrite64); | 
 | int ftruncate64(int __fd, off64_t __length) __INTRODUCED_IN(12); | 
 |  | 
 | int pause(void); | 
 | unsigned int alarm(unsigned int __seconds); | 
 | unsigned int sleep(unsigned int __seconds); | 
 | int usleep(useconds_t __usec); | 
 |  | 
 | int gethostname(char* __name, size_t __len); | 
 | int sethostname(const char* __name, size_t __len) __INTRODUCED_IN(23); | 
 |  | 
 | int brk(void* __addr); | 
 | void* sbrk(ptrdiff_t __increment); | 
 |  | 
 | int isatty(int __fd); | 
 | char* ttyname(int __fd); | 
 | int ttyname_r(int __fd, char* __buf, size_t __buflen) __INTRODUCED_IN(8); | 
 |  | 
 | int acct(const char* __filepath); | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_L__ | 
 | int getpagesize(void) __INTRODUCED_IN(21); | 
 | #else | 
 | static __inline__ int getpagesize(void) { | 
 |   return sysconf(_SC_PAGESIZE); | 
 | } | 
 | #endif | 
 |  | 
 | long syscall(long __number, ...); | 
 |  | 
 | int daemon(int __nochdir, int __noclose); | 
 |  | 
 | #if defined(__arm__) || (defined(__mips__) && !defined(__LP64__)) | 
 | int cacheflush(long __addr, long __nbytes, long __cache); | 
 |     /* __attribute__((deprecated("use __builtin___clear_cache instead"))); */ | 
 | #endif | 
 |  | 
 | pid_t tcgetpgrp(int __fd); | 
 | int tcsetpgrp(int __fd, pid_t __pid); | 
 |  | 
 | /* Used to retry syscalls that can return EINTR. */ | 
 | #define TEMP_FAILURE_RETRY(exp) ({         \ | 
 |     __typeof__(exp) _rc;                   \ | 
 |     do {                                   \ | 
 |         _rc = (exp);                       \ | 
 |     } while (_rc == -1 && errno == EINTR); \ | 
 |     _rc; }) | 
 |  | 
 | /* TODO(unified-headers): Factor out all the FORTIFY features. */ | 
 | char* __getcwd_chk(char*, size_t, size_t) __INTRODUCED_IN(24); | 
 |  | 
 | ssize_t __pread_chk(int, void*, size_t, off_t, size_t) __INTRODUCED_IN(23); | 
 | ssize_t __pread_real(int, void*, size_t, off_t) __RENAME(pread); | 
 |  | 
 | ssize_t __pread64_chk(int, void*, size_t, off64_t, size_t) __INTRODUCED_IN(23); | 
 | ssize_t __pread64_real(int, void*, size_t, off64_t) __RENAME(pread64) __INTRODUCED_IN(12); | 
 |  | 
 | ssize_t __pwrite_chk(int, const void*, size_t, off_t, size_t) __INTRODUCED_IN(24); | 
 | ssize_t __pwrite_real(int, const void*, size_t, off_t) __RENAME(pwrite); | 
 |  | 
 | ssize_t __pwrite64_chk(int, const void*, size_t, off64_t, size_t) __INTRODUCED_IN(24); | 
 | ssize_t __pwrite64_real(int, const void*, size_t, off64_t) __RENAME(pwrite64) | 
 |   __INTRODUCED_IN(12); | 
 |  | 
 | ssize_t __read_chk(int, void*, size_t, size_t) __INTRODUCED_IN(21); | 
 | ssize_t __write_chk(int, const void*, size_t, size_t) __INTRODUCED_IN(24); | 
 | ssize_t __readlink_chk(const char*, char*, size_t, size_t) __INTRODUCED_IN(23); | 
 | ssize_t __readlinkat_chk(int dirfd, const char*, char*, size_t, size_t) __INTRODUCED_IN(23); | 
 |  | 
 | int getdomainname(char*, size_t) __INTRODUCED_IN(26); | 
 | int setdomainname(const char*, size_t) __INTRODUCED_IN(26); | 
 |  | 
 | #if defined(__BIONIC_FORTIFY) | 
 |  | 
 | #if defined(__USE_FILE_OFFSET64) | 
 | #define __PREAD_PREFIX(x) __pread64_ ## x | 
 | #define __PWRITE_PREFIX(x) __pwrite64_ ## x | 
 | #else | 
 | #define __PREAD_PREFIX(x) __pread_ ## x | 
 | #define __PWRITE_PREFIX(x) __pwrite_ ## x | 
 | #endif | 
 |  | 
 | #if defined(__clang__) | 
 | #define __error_if_overflows_ssizet(what) \ | 
 |     __enable_if(what > SSIZE_MAX, #what " must be <= SSIZE_MAX") \ | 
 |     __errorattr(#what " must be <= SSIZE_MAX") | 
 |  | 
 | #define __enable_if_no_overflow_ssizet(what) \ | 
 |     __enable_if((what) <= SSIZE_MAX, "enabled if " #what " <= SSIZE_MAX") | 
 |  | 
 | #define __error_if_overflows_objectsize(what, objsize) \ | 
 |     __enable_if((objsize) != __BIONIC_FORTIFY_UNKNOWN_SIZE && \ | 
 |                     (what) > (objsize), \ | 
 |                 "'" #what "' bytes overflows the given object") \ | 
 |     __errorattr("'" #what "' bytes overflows the given object") | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | char* getcwd(char* buf, size_t size) __overloadable | 
 |         __error_if_overflows_objectsize(size, __bos(buf)); | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_N__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | char* getcwd(char* const __pass_object_size buf, size_t size) __overloadable { | 
 |     size_t bos = __bos(buf); | 
 |  | 
 |     /* | 
 |      * Clang responds bos==0 if buf==NULL | 
 |      * (https://llvm.org/bugs/show_bug.cgi?id=23277). Given that NULL is a valid | 
 |      * value, we need to handle that. | 
 |      */ | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE || buf == NULL) { | 
 |         return __call_bypassing_fortify(getcwd)(buf, size); | 
 |     } | 
 |  | 
 |     return __getcwd_chk(buf, size, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_M__ | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pread(int fd, void* buf, size_t count, off_t offset) __overloadable | 
 |         __error_if_overflows_ssizet(count); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pread(int fd, void* buf, size_t count, off_t offset) __overloadable | 
 |         __enable_if_no_overflow_ssizet(count) | 
 |         __error_if_overflows_objectsize(count, __bos0(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pread(int fd, void* const __pass_object_size0 buf, size_t count, | 
 |               off_t offset) __overloadable { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (count == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __PREAD_PREFIX(real)(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __PREAD_PREFIX(chk)(fd, buf, count, offset, bos); | 
 | } | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pread64(int fd, void* buf, size_t count, off64_t offset) __overloadable | 
 |         __error_if_overflows_ssizet(count); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pread64(int fd, void* buf, size_t count, off64_t offset) __overloadable | 
 |         __enable_if_no_overflow_ssizet(count) | 
 |         __error_if_overflows_objectsize(count, __bos0(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pread64(int fd, void* const __pass_object_size0 buf, size_t count, | 
 |                 off64_t offset) __overloadable { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __pread64_real(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __pread64_chk(fd, buf, count, offset, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_M__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_N__ | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pwrite(int fd, const void* buf, size_t count, off_t offset) | 
 |         __overloadable | 
 |         __error_if_overflows_ssizet(count); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pwrite(int fd, const void* buf, size_t count, off_t offset) | 
 |         __overloadable | 
 |         __enable_if_no_overflow_ssizet(count) | 
 |         __error_if_overflows_objectsize(count, __bos0(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pwrite(int fd, const void* const __pass_object_size0 buf, size_t count, | 
 |                off_t offset) __overloadable { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __PWRITE_PREFIX(real)(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __PWRITE_PREFIX(chk)(fd, buf, count, offset, bos); | 
 | } | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pwrite64(int fd, const void* buf, size_t count, off64_t offset) | 
 |         __overloadable | 
 |         __error_if_overflows_ssizet(count); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t pwrite64(int fd, const void* buf, size_t count, off64_t offset) | 
 |         __overloadable | 
 |         __enable_if_no_overflow_ssizet(count) | 
 |         __error_if_overflows_objectsize(count, __bos0(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pwrite64(int fd, const void* const __pass_object_size0 buf, | 
 |                  size_t count, off64_t offset) __overloadable { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __pwrite64_real(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __pwrite64_chk(fd, buf, count, offset, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_L__ | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t read(int fd, void* buf, size_t count) __overloadable | 
 |         __error_if_overflows_ssizet(count); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t read(int fd, void* buf, size_t count) __overloadable | 
 |         __enable_if_no_overflow_ssizet(count) | 
 |         __error_if_overflows_objectsize(count, __bos0(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t read(int fd, void* const __pass_object_size0 buf, size_t count) | 
 |         __overloadable { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __call_bypassing_fortify(read)(fd, buf, count); | 
 |     } | 
 |  | 
 |     return __read_chk(fd, buf, count, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_L__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_N__ | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t write(int fd, const void* buf, size_t count) __overloadable | 
 |         __error_if_overflows_ssizet(count); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t write(int fd, const void* buf, size_t count) __overloadable | 
 |         __enable_if_no_overflow_ssizet(count) | 
 |         __error_if_overflows_objectsize(count, __bos0(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t write(int fd, const void* const __pass_object_size0 buf, size_t count) | 
 |         __overloadable { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __call_bypassing_fortify(write)(fd, buf, count); | 
 |     } | 
 |  | 
 |     return __write_chk(fd, buf, count, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_M__ | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t readlink(const char* path, char* buf, size_t size) __overloadable | 
 |         __error_if_overflows_ssizet(size); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t readlink(const char* path, char* buf, size_t size) __overloadable | 
 |         __enable_if_no_overflow_ssizet(size) | 
 |         __error_if_overflows_objectsize(size, __bos(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t readlink(const char* path, char* const __pass_object_size buf, | 
 |                  size_t size) __overloadable { | 
 |     size_t bos = __bos(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __call_bypassing_fortify(readlink)(path, buf, size); | 
 |     } | 
 |  | 
 |     return __readlink_chk(path, buf, size, bos); | 
 | } | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t readlinkat(int dirfd, const char* path, char* buf, size_t size) | 
 |         __overloadable | 
 |         __error_if_overflows_ssizet(size); | 
 |  | 
 | __BIONIC_ERROR_FUNCTION_VISIBILITY | 
 | ssize_t readlinkat(int dirfd, const char* path, char* buf, size_t size) | 
 |         __overloadable | 
 |         __enable_if_no_overflow_ssizet(size) | 
 |         __error_if_overflows_objectsize(size, __bos(buf)); | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t readlinkat(int dirfd, const char* path, | 
 |                    char* const __pass_object_size buf, size_t size) | 
 |         __overloadable { | 
 |     size_t bos = __bos(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __call_bypassing_fortify(readlinkat)(dirfd, path, buf, size); | 
 |     } | 
 |  | 
 |     return __readlinkat_chk(dirfd, path, buf, size, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_M__ */ | 
 |  | 
 | #undef __enable_if_no_overflow_ssizet | 
 | #undef __error_if_overflows_objectsize | 
 | #undef __error_if_overflows_ssizet | 
 | #else /* defined(__clang__) */ | 
 |  | 
 | char* __getcwd_real(char*, size_t) __RENAME(getcwd); | 
 | ssize_t __read_real(int, void*, size_t) __RENAME(read); | 
 | ssize_t __write_real(int, const void*, size_t) __RENAME(write); | 
 | ssize_t __readlink_real(const char*, char*, size_t) __RENAME(readlink); | 
 | ssize_t __readlinkat_real(int dirfd, const char*, char*, size_t) __RENAME(readlinkat); | 
 |  | 
 | __errordecl(__getcwd_dest_size_error, "getcwd called with size bigger than destination"); | 
 | __errordecl(__pread_dest_size_error, "pread called with size bigger than destination"); | 
 | __errordecl(__pread_count_toobig_error, "pread called with count > SSIZE_MAX"); | 
 | __errordecl(__pread64_dest_size_error, "pread64 called with size bigger than destination"); | 
 | __errordecl(__pread64_count_toobig_error, "pread64 called with count > SSIZE_MAX"); | 
 | __errordecl(__pwrite_dest_size_error, "pwrite called with size bigger than destination"); | 
 | __errordecl(__pwrite_count_toobig_error, "pwrite called with count > SSIZE_MAX"); | 
 | __errordecl(__pwrite64_dest_size_error, "pwrite64 called with size bigger than destination"); | 
 | __errordecl(__pwrite64_count_toobig_error, "pwrite64 called with count > SSIZE_MAX"); | 
 | __errordecl(__read_dest_size_error, "read called with size bigger than destination"); | 
 | __errordecl(__read_count_toobig_error, "read called with count > SSIZE_MAX"); | 
 | __errordecl(__write_dest_size_error, "write called with size bigger than destination"); | 
 | __errordecl(__write_count_toobig_error, "write called with count > SSIZE_MAX"); | 
 | __errordecl(__readlink_dest_size_error, "readlink called with size bigger than destination"); | 
 | __errordecl(__readlink_size_toobig_error, "readlink called with size > SSIZE_MAX"); | 
 | __errordecl(__readlinkat_dest_size_error, "readlinkat called with size bigger than destination"); | 
 | __errordecl(__readlinkat_size_toobig_error, "readlinkat called with size > SSIZE_MAX"); | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_N__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | char* getcwd(char* buf, size_t size) __overloadable { | 
 |     size_t bos = __bos(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __getcwd_real(buf, size); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(size) && (size > bos)) { | 
 |         __getcwd_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(size) && (size <= bos)) { | 
 |         return __getcwd_real(buf, size); | 
 |     } | 
 |  | 
 |     return __getcwd_chk(buf, size, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_M__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pread(int fd, void* buf, size_t count, off_t offset) { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > SSIZE_MAX)) { | 
 |         __PREAD_PREFIX(count_toobig_error)(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __PREAD_PREFIX(real)(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > bos)) { | 
 |         __PREAD_PREFIX(dest_size_error)(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count <= bos)) { | 
 |         return __PREAD_PREFIX(real)(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __PREAD_PREFIX(chk)(fd, buf, count, offset, bos); | 
 | } | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pread64(int fd, void* buf, size_t count, off64_t offset) { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > SSIZE_MAX)) { | 
 |         __pread64_count_toobig_error(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __pread64_real(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > bos)) { | 
 |         __pread64_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count <= bos)) { | 
 |         return __pread64_real(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __pread64_chk(fd, buf, count, offset, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_M__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_N__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pwrite(int fd, const void* buf, size_t count, off_t offset) { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > SSIZE_MAX)) { | 
 |         __PWRITE_PREFIX(count_toobig_error)(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __PWRITE_PREFIX(real)(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > bos)) { | 
 |         __PWRITE_PREFIX(dest_size_error)(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count <= bos)) { | 
 |         return __PWRITE_PREFIX(real)(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __PWRITE_PREFIX(chk)(fd, buf, count, offset, bos); | 
 | } | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t pwrite64(int fd, const void* buf, size_t count, off64_t offset) { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > SSIZE_MAX)) { | 
 |         __pwrite64_count_toobig_error(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __pwrite64_real(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > bos)) { | 
 |         __pwrite64_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count <= bos)) { | 
 |         return __pwrite64_real(fd, buf, count, offset); | 
 |     } | 
 |  | 
 |     return __pwrite64_chk(fd, buf, count, offset, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_L__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t read(int fd, void* buf, size_t count) { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > SSIZE_MAX)) { | 
 |         __read_count_toobig_error(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __read_real(fd, buf, count); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > bos)) { | 
 |         __read_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count <= bos)) { | 
 |         return __read_real(fd, buf, count); | 
 |     } | 
 |  | 
 |     return __read_chk(fd, buf, count, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_L__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_N__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t write(int fd, const void* buf, size_t count) { | 
 |     size_t bos = __bos0(buf); | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __write_real(fd, buf, count); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count > bos)) { | 
 |         __write_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(count) && (count <= bos)) { | 
 |         return __write_real(fd, buf, count); | 
 |     } | 
 |  | 
 |     return __write_chk(fd, buf, count, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ | 
 |  | 
 | #if __ANDROID_API__ >= __ANDROID_API_M__ | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t readlink(const char* path, char* buf, size_t size) { | 
 |     size_t bos = __bos(buf); | 
 |  | 
 |     if (__builtin_constant_p(size) && (size > SSIZE_MAX)) { | 
 |         __readlink_size_toobig_error(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __readlink_real(path, buf, size); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(size) && (size > bos)) { | 
 |         __readlink_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(size) && (size <= bos)) { | 
 |         return __readlink_real(path, buf, size); | 
 |     } | 
 |  | 
 |     return __readlink_chk(path, buf, size, bos); | 
 | } | 
 |  | 
 | __BIONIC_FORTIFY_INLINE | 
 | ssize_t readlinkat(int dirfd, const char* path, char* buf, size_t size) { | 
 |     size_t bos = __bos(buf); | 
 |  | 
 |     if (__builtin_constant_p(size) && (size > SSIZE_MAX)) { | 
 |         __readlinkat_size_toobig_error(); | 
 |     } | 
 |  | 
 |     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { | 
 |         return __readlinkat_real(dirfd, path, buf, size); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(size) && (size > bos)) { | 
 |         __readlinkat_dest_size_error(); | 
 |     } | 
 |  | 
 |     if (__builtin_constant_p(size) && (size <= bos)) { | 
 |         return __readlinkat_real(dirfd, path, buf, size); | 
 |     } | 
 |  | 
 |     return __readlinkat_chk(dirfd, path, buf, size, bos); | 
 | } | 
 | #endif /* __ANDROID_API__ >= __ANDROID_API_M__ */ | 
 | #endif /* defined(__clang__) */ | 
 | #undef __PREAD_PREFIX | 
 | #undef __PWRITE_PREFIX | 
 | #endif /* defined(__BIONIC_FORTIFY) */ | 
 |  | 
 | __END_DECLS | 
 |  | 
 | #endif /* _UNISTD_H_ */ |