blob: 426076ea1a3a0b4dfdd6dc6b15352cc18bedaf88 [file] [log] [blame]
George Burgess IVb97049c2017-07-24 15:05:05 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29#ifndef _STRING_H
30#error "Never include this file directly; instead, include <string.h>"
31#endif
32
Elliott Hughes3f66e742017-08-01 13:24:40 -070033void* __memchr_chk(const void*, int, size_t, size_t) __INTRODUCED_IN(23);
34void* __memrchr_chk(const void*, int, size_t, size_t) __INTRODUCED_IN(23);
35char* __stpncpy_chk2(char*, const char*, size_t, size_t, size_t) __INTRODUCED_IN(21);
36char* __strncpy_chk2(char*, const char*, size_t, size_t, size_t) __INTRODUCED_IN(21);
37size_t __strlcpy_chk(char*, const char*, size_t, size_t) __INTRODUCED_IN(17);
38size_t __strlcat_chk(char*, const char*, size_t, size_t) __INTRODUCED_IN(17);
George Burgess IVb97049c2017-07-24 15:05:05 -070039
George Burgess IVb97049c2017-07-24 15:05:05 -070040#if defined(__BIONIC_FORTIFY)
Elliott Hughesdf9a4892017-08-23 14:34:03 -070041extern void* __memrchr_real(const void*, int, size_t) __RENAME(memrchr);
42
George Burgess IVb97049c2017-07-24 15:05:05 -070043#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
44__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -070045void* memcpy(void* const dst __pass_object_size0, const void* src, size_t copy_amount)
46 __overloadable
George Burgess IV5273dc52019-05-09 13:46:57 -070047 __clang_error_if(__bos_unevaluated_lt(__bos0(dst), copy_amount),
George Burgess IVb6300462017-07-31 21:29:42 -070048 "'memcpy' called with size bigger than buffer") {
George Burgess IV5da5dd52019-05-09 14:32:43 -070049 size_t bos_dst = __bos0(dst);
50 if (__bos_trivially_not_lt(bos_dst, copy_amount)) {
51 return __builtin_memcpy(dst, src, copy_amount);
52 }
53 return __builtin___memcpy_chk(dst, src, copy_amount, bos_dst);
George Burgess IVb97049c2017-07-24 15:05:05 -070054}
55
56__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -070057void* memmove(void* const dst __pass_object_size0, const void* src, size_t len)
58 __overloadable
George Burgess IV5273dc52019-05-09 13:46:57 -070059 __clang_error_if(__bos_unevaluated_lt(__bos0(dst), len),
George Burgess IVb6300462017-07-31 21:29:42 -070060 "'memmove' called with size bigger than buffer") {
George Burgess IV5da5dd52019-05-09 14:32:43 -070061 size_t bos_dst = __bos0(dst);
62 if (__bos_trivially_not_lt(bos_dst, len)) {
63 return __builtin_memmove(dst, src, len);
64 }
65 return __builtin___memmove_chk(dst, src, len, bos_dst);
George Burgess IVb97049c2017-07-24 15:05:05 -070066}
67#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
68
69#if __ANDROID_API__ >= __ANDROID_API_L__
70__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -070071char* stpcpy(char* const dst __pass_object_size, const char* src)
72 __overloadable
George Burgess IV5273dc52019-05-09 13:46:57 -070073 __clang_error_if(__bos_unevaluated_leq(__bos(dst), __builtin_strlen(src)),
George Burgess IVb6300462017-07-31 21:29:42 -070074 "'stpcpy' called with string bigger than buffer") {
George Burgess IV5da5dd52019-05-09 14:32:43 -070075 size_t bos_dst = __bos(dst);
76 if (__bos_trivially_not_leq(bos_dst, __builtin_strlen(src))) {
77 return __builtin_stpcpy(dst, src);
78 }
79 return __builtin___stpcpy_chk(dst, src, bos_dst);
George Burgess IVb97049c2017-07-24 15:05:05 -070080}
81#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
82
83#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
84__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -070085char* strcpy(char* const dst __pass_object_size, const char* src)
86 __overloadable
George Burgess IV5273dc52019-05-09 13:46:57 -070087 __clang_error_if(__bos_unevaluated_leq(__bos(dst), __builtin_strlen(src)),
George Burgess IVb6300462017-07-31 21:29:42 -070088 "'strcpy' called with string bigger than buffer") {
George Burgess IV5da5dd52019-05-09 14:32:43 -070089 size_t bos_dst = __bos(dst);
90 if (__bos_trivially_not_leq(bos_dst, __builtin_strlen(src))) {
91 return __builtin_strcpy(dst, src);
92 }
93 return __builtin___strcpy_chk(dst, src, bos_dst);
George Burgess IVb97049c2017-07-24 15:05:05 -070094}
95
96__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -070097char* strcat(char* const dst __pass_object_size, const char* src) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -070098 return __builtin___strcat_chk(dst, src, __bos(dst));
99}
100
101__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -0700102char* strncat(char* const dst __pass_object_size, const char* src, size_t n) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700103 return __builtin___strncat_chk(dst, src, n, __bos(dst));
104}
105
106__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -0700107void* memset(void* const s __pass_object_size0, int c, size_t n)
108 __overloadable
George Burgess IV5273dc52019-05-09 13:46:57 -0700109 __clang_error_if(__bos_unevaluated_lt(__bos0(s), n),
George Burgess IVb6300462017-07-31 21:29:42 -0700110 "'memset' called with size bigger than buffer")
111 /* If you're a user who wants this warning to go away: use `(&memset)(foo, bar, baz)`. */
112 __clang_warning_if(c && !n, "'memset' will set 0 bytes; maybe the arguments got flipped?") {
George Burgess IV5da5dd52019-05-09 14:32:43 -0700113 size_t bos = __bos0(s);
114 if (__bos_trivially_not_lt(bos, n)) {
115 return __builtin_memset(s, c, n);
116 }
117 return __builtin___memset_chk(s, c, n, bos);
George Burgess IVb97049c2017-07-24 15:05:05 -0700118}
119#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
120
George Burgess IVb97049c2017-07-24 15:05:05 -0700121#if __ANDROID_API__ >= __ANDROID_API_M__
122__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -0700123void* memchr(const void* const s __pass_object_size, int c, size_t n) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700124 size_t bos = __bos(s);
125
126 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
127 return __builtin_memchr(s, c, n);
128 }
129
130 return __memchr_chk(s, c, n, bos);
131}
132
133__BIONIC_FORTIFY_INLINE
Elliott Hughesdf9a4892017-08-23 14:34:03 -0700134void* __memrchr_fortify(const void* const __pass_object_size s, int c, size_t n) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700135 size_t bos = __bos(s);
136
137 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
Elliott Hughesdf9a4892017-08-23 14:34:03 -0700138 return __memrchr_real(s, c, n);
George Burgess IVb97049c2017-07-24 15:05:05 -0700139 }
140
141 return __memrchr_chk(s, c, n, bos);
142}
143#endif /* __ANDROID_API__ >= __ANDROID_API_M__ */
144
145#if __ANDROID_API__ >= __ANDROID_API_L__
146__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -0700147char* stpncpy(char* const dst __pass_object_size, const char* const src __pass_object_size, size_t n)
George Burgess IVb97049c2017-07-24 15:05:05 -0700148 __overloadable {
149 size_t bos_dst = __bos(dst);
150 size_t bos_src = __bos(src);
151
152 /* Ignore dst size checks; they're handled in strncpy_chk */
153 if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
154 return __builtin___stpncpy_chk(dst, src, n, bos_dst);
155 }
156
157 return __stpncpy_chk2(dst, src, n, bos_dst, bos_src);
158}
159
160__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -0700161char* strncpy(char* const dst __pass_object_size, const char* const src __pass_object_size, size_t n)
George Burgess IVb97049c2017-07-24 15:05:05 -0700162 __overloadable {
163 size_t bos_dst = __bos(dst);
164 size_t bos_src = __bos(src);
165
166 /* Ignore dst size checks; they're handled in strncpy_chk */
167 if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
168 return __builtin___strncpy_chk(dst, src, n, bos_dst);
169 }
170
171 return __strncpy_chk2(dst, src, n, bos_dst, bos_src);
172}
173#endif /* __ANDROID_API__ >= __ANDROID_API_L__ */
174
175#if __ANDROID_API__ >= __ANDROID_API_J_MR1__
176__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -0700177size_t strlcpy(char* const dst __pass_object_size, const char* src, size_t size) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700178 size_t bos = __bos(dst);
179
180 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
181 return __call_bypassing_fortify(strlcpy)(dst, src, size);
182 }
183
184 return __strlcpy_chk(dst, src, size, bos);
185}
186
187__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -0700188size_t strlcat(char* const dst __pass_object_size, const char* src, size_t size) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700189 size_t bos = __bos(dst);
190
191 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
192 return __call_bypassing_fortify(strlcat)(dst, src, size);
193 }
194
195 return __strlcat_chk(dst, src, size, bos);
196}
197
198/*
199 * If we can evaluate the size of s at compile-time, just call __builtin_strlen
200 * on it directly. This makes it way easier for compilers to fold things like
201 * strlen("Foo") into a constant, as users would expect. -1ULL is chosen simply
202 * because it's large.
203 */
204__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -0700205size_t strlen(const char* const s __pass_object_size)
George Burgess IVb97049c2017-07-24 15:05:05 -0700206 __overloadable __enable_if(__builtin_strlen(s) != -1ULL,
207 "enabled if s is a known good string.") {
208 return __builtin_strlen(s);
209}
210
211__BIONIC_FORTIFY_INLINE
George Burgess IVb6300462017-07-31 21:29:42 -0700212size_t strlen(const char* const s __pass_object_size0) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700213 size_t bos = __bos0(s);
214
215 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
216 return __builtin_strlen(s);
217 }
218
George Burgess IVb97049c2017-07-24 15:05:05 -0700219 return __strlen_chk(s, bos);
220}
221#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
222
223#if __ANDROID_API__ >= __ANDROID_API_J_MR2__
224__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -0700225char* strchr(const char* const s __pass_object_size, int c) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700226 size_t bos = __bos(s);
227
228 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
229 return __builtin_strchr(s, c);
230 }
231
232 return __strchr_chk(s, c, bos);
233}
234
235__BIONIC_FORTIFY_INLINE
Elliott Hughes3f66e742017-08-01 13:24:40 -0700236char* strrchr(const char* const s __pass_object_size, int c) __overloadable {
George Burgess IVb97049c2017-07-24 15:05:05 -0700237 size_t bos = __bos(s);
238
239 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
240 return __builtin_strrchr(s, c);
241 }
242
243 return __strrchr_chk(s, c, bos);
244}
245#endif /* __ANDROID_API__ >= __ANDROID_API_J_MR2__ */
246
Elliott Hughesdf9a4892017-08-23 14:34:03 -0700247#if __ANDROID_API__ >= __ANDROID_API_M__
248#if defined(__cplusplus)
249extern "C++" {
250__BIONIC_FORTIFY_INLINE
251void* memrchr(void* const __pass_object_size s, int c, size_t n) {
252 return __memrchr_fortify(s, c, n);
253}
254
255__BIONIC_FORTIFY_INLINE
256const void* memrchr(const void* const __pass_object_size s, int c, size_t n) {
257 return __memrchr_fortify(s, c, n);
258}
259}
260#else
261__BIONIC_FORTIFY_INLINE
262void* memrchr(const void* const __pass_object_size s, int c, size_t n) __overloadable {
263 return __memrchr_fortify(s, c, n);
264}
265#endif
266#endif /* __ANDROID_API__ >= __ANDROID_API_M__ */
267
George Burgess IVb97049c2017-07-24 15:05:05 -0700268#endif /* defined(__BIONIC_FORTIFY) */