fortify(strings): emit diagnostics regardless of API level
Bug: 141267932
Test: m checkbuild on internal-master
Change-Id: Ief185320f93ec31f4d0a8035c450a7ab7b4e02b4
diff --git a/libc/include/bits/fortify/strings.h b/libc/include/bits/fortify/strings.h
index 385cf77..cc268db 100644
--- a/libc/include/bits/fortify/strings.h
+++ b/libc/include/bits/fortify/strings.h
@@ -28,18 +28,19 @@
#if defined(__BIONIC_FORTIFY)
-#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
__BIONIC_FORTIFY_INLINE
void __bionic_bcopy(const void *src, void* const dst __pass_object_size0, size_t len)
__overloadable
__clang_error_if(__bos_unevaluated_lt(__bos0(dst), len),
"'bcopy' called with size bigger than buffer") {
+#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
size_t bos = __bos0(dst);
- if (__bos_trivially_not_lt(bos, len)) {
- __builtin_memmove(dst, src, len);
- } else {
+ if (!__bos_trivially_ge(bos, len)) {
__builtin___memmove_chk(dst, src, len, bos);
+ return;
}
+#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
+ __builtin_memmove(dst, src, len);
}
__BIONIC_FORTIFY_INLINE
@@ -47,13 +48,14 @@
__overloadable
__clang_error_if(__bos_unevaluated_lt(__bos0(b), len),
"'bzero' called with size bigger than buffer") {
+#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
size_t bos = __bos0(b);
- if (__bos_trivially_not_lt(bos, len)) {
- __builtin_memset(b, 0, len);
- } else {
+ if (!__bos_trivially_ge(bos, len)) {
__builtin___memset_chk(b, 0, len, bos);
+ return;
}
-}
#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
+ __builtin_memset(b, 0, len);
+}
#endif /* defined(__BIONIC_FORTIFY) */