1*8d67ca89SAndroid Build Coastguard Worker /*
2*8d67ca89SAndroid Build Coastguard Worker * Copyright (C) 2017 The Android Open Source Project
3*8d67ca89SAndroid Build Coastguard Worker * All rights reserved.
4*8d67ca89SAndroid Build Coastguard Worker *
5*8d67ca89SAndroid Build Coastguard Worker * Redistribution and use in source and binary forms, with or without
6*8d67ca89SAndroid Build Coastguard Worker * modification, are permitted provided that the following conditions
7*8d67ca89SAndroid Build Coastguard Worker * are met:
8*8d67ca89SAndroid Build Coastguard Worker * * Redistributions of source code must retain the above copyright
9*8d67ca89SAndroid Build Coastguard Worker * notice, this list of conditions and the following disclaimer.
10*8d67ca89SAndroid Build Coastguard Worker * * Redistributions in binary form must reproduce the above copyright
11*8d67ca89SAndroid Build Coastguard Worker * notice, this list of conditions and the following disclaimer in
12*8d67ca89SAndroid Build Coastguard Worker * the documentation and/or other materials provided with the
13*8d67ca89SAndroid Build Coastguard Worker * distribution.
14*8d67ca89SAndroid Build Coastguard Worker *
15*8d67ca89SAndroid Build Coastguard Worker * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16*8d67ca89SAndroid Build Coastguard Worker * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17*8d67ca89SAndroid Build Coastguard Worker * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18*8d67ca89SAndroid Build Coastguard Worker * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19*8d67ca89SAndroid Build Coastguard Worker * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20*8d67ca89SAndroid Build Coastguard Worker * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21*8d67ca89SAndroid Build Coastguard Worker * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22*8d67ca89SAndroid Build Coastguard Worker * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23*8d67ca89SAndroid Build Coastguard Worker * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24*8d67ca89SAndroid Build Coastguard Worker * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25*8d67ca89SAndroid Build Coastguard Worker * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26*8d67ca89SAndroid Build Coastguard Worker * SUCH DAMAGE.
27*8d67ca89SAndroid Build Coastguard Worker */
28*8d67ca89SAndroid Build Coastguard Worker
29*8d67ca89SAndroid Build Coastguard Worker #ifndef _STRING_H
30*8d67ca89SAndroid Build Coastguard Worker #error "Never include this file directly; instead, include <string.h>"
31*8d67ca89SAndroid Build Coastguard Worker #endif
32*8d67ca89SAndroid Build Coastguard Worker
33*8d67ca89SAndroid Build Coastguard Worker
34*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_AVAILABILITY_GUARD(23)
35*8d67ca89SAndroid Build Coastguard Worker void* _Nullable __memchr_chk(const void* _Nonnull, int, size_t, size_t) __INTRODUCED_IN(23);
36*8d67ca89SAndroid Build Coastguard Worker void* _Nullable __memrchr_chk(const void* _Nonnull, int, size_t, size_t) __INTRODUCED_IN(23);
37*8d67ca89SAndroid Build Coastguard Worker #endif /* __BIONIC_AVAILABILITY_GUARD(23) */
38*8d67ca89SAndroid Build Coastguard Worker
39*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull __stpncpy_chk2(char* _Nonnull, const char* _Nonnull, size_t, size_t, size_t);
40*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull __strncpy_chk2(char* _Nonnull, const char* _Nonnull, size_t, size_t, size_t);
41*8d67ca89SAndroid Build Coastguard Worker size_t __strlcpy_chk(char* _Nonnull, const char* _Nonnull, size_t, size_t);
42*8d67ca89SAndroid Build Coastguard Worker size_t __strlcat_chk(char* _Nonnull, const char* _Nonnull, size_t, size_t);
43*8d67ca89SAndroid Build Coastguard Worker
44*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC_FORTIFY)
45*8d67ca89SAndroid Build Coastguard Worker void* _Nullable __memrchr_real(const void* _Nonnull, int, size_t) __RENAME(memrchr);
46*8d67ca89SAndroid Build Coastguard Worker
47*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
48*8d67ca89SAndroid Build Coastguard Worker /* No diag -- clang diagnoses misuses of this on its own. */
49*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memcpy(void * _Nonnull const dst __pass_object_size0,const void * _Nonnull src,size_t copy_amount)50*8d67ca89SAndroid Build Coastguard Worker void* _Nonnull memcpy(void* _Nonnull const dst __pass_object_size0, const void* _Nonnull src, size_t copy_amount)
51*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_memcpy, 1, 2, 3)
52*8d67ca89SAndroid Build Coastguard Worker __overloadable {
53*8d67ca89SAndroid Build Coastguard Worker return __builtin___memcpy_chk(dst, src, copy_amount, __bos0(dst));
54*8d67ca89SAndroid Build Coastguard Worker }
55*8d67ca89SAndroid Build Coastguard Worker
56*8d67ca89SAndroid Build Coastguard Worker /* No diag -- clang diagnoses misuses of this on its own. */
57*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memmove(void * _Nonnull const dst __pass_object_size0,const void * _Nonnull src,size_t len)58*8d67ca89SAndroid Build Coastguard Worker void* _Nonnull memmove(void* _Nonnull const dst __pass_object_size0, const void* _Nonnull src, size_t len)
59*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_memmove, 1, 2, 3)
60*8d67ca89SAndroid Build Coastguard Worker __overloadable {
61*8d67ca89SAndroid Build Coastguard Worker return __builtin___memmove_chk(dst, src, len, __bos0(dst));
62*8d67ca89SAndroid Build Coastguard Worker }
63*8d67ca89SAndroid Build Coastguard Worker #endif
64*8d67ca89SAndroid Build Coastguard Worker
65*8d67ca89SAndroid Build Coastguard Worker #if defined(__USE_GNU)
66*8d67ca89SAndroid Build Coastguard Worker #if __ANDROID_API__ >= 30
67*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
mempcpy(void * _Nonnull const dst __pass_object_size0,const void * _Nonnull src,size_t copy_amount)68*8d67ca89SAndroid Build Coastguard Worker void* _Nonnull mempcpy(void* _Nonnull const dst __pass_object_size0, const void* _Nonnull src, size_t copy_amount)
69*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_mempcpy, 1, 2, 3)
70*8d67ca89SAndroid Build Coastguard Worker __overloadable
71*8d67ca89SAndroid Build Coastguard Worker __clang_error_if(__bos_unevaluated_lt(__bos0(dst), copy_amount),
72*8d67ca89SAndroid Build Coastguard Worker "'mempcpy' called with size bigger than buffer") {
73*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
74*8d67ca89SAndroid Build Coastguard Worker size_t bos_dst = __bos0(dst);
75*8d67ca89SAndroid Build Coastguard Worker if (!__bos_trivially_ge(bos_dst, copy_amount)) {
76*8d67ca89SAndroid Build Coastguard Worker return __builtin___mempcpy_chk(dst, src, copy_amount, bos_dst);
77*8d67ca89SAndroid Build Coastguard Worker }
78*8d67ca89SAndroid Build Coastguard Worker #endif
79*8d67ca89SAndroid Build Coastguard Worker return __builtin_mempcpy(dst, src, copy_amount);
80*8d67ca89SAndroid Build Coastguard Worker }
81*8d67ca89SAndroid Build Coastguard Worker #endif /* __ANDROID_API__ >= 30 */
82*8d67ca89SAndroid Build Coastguard Worker #endif /* __USE_GNU */
83*8d67ca89SAndroid Build Coastguard Worker
84*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
stpcpy(char * _Nonnull const dst __pass_object_size,const char * _Nonnull src)85*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull stpcpy(char* _Nonnull const dst __pass_object_size, const char* _Nonnull src)
86*8d67ca89SAndroid Build Coastguard Worker __overloadable
87*8d67ca89SAndroid Build Coastguard Worker __clang_error_if(__bos_unevaluated_le(__bos(dst), __builtin_strlen(src)),
88*8d67ca89SAndroid Build Coastguard Worker "'stpcpy' called with string bigger than buffer") {
89*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
90*8d67ca89SAndroid Build Coastguard Worker return __builtin___stpcpy_chk(dst, src, __bos(dst));
91*8d67ca89SAndroid Build Coastguard Worker #else
92*8d67ca89SAndroid Build Coastguard Worker return __builtin_stpcpy(dst, src);
93*8d67ca89SAndroid Build Coastguard Worker #endif
94*8d67ca89SAndroid Build Coastguard Worker }
95*8d67ca89SAndroid Build Coastguard Worker
96*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strcpy(char * _Nonnull const dst __pass_object_size,const char * _Nonnull src)97*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull strcpy(char* _Nonnull const dst __pass_object_size, const char* _Nonnull src)
98*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_strcpy, 1, 2)
99*8d67ca89SAndroid Build Coastguard Worker __overloadable
100*8d67ca89SAndroid Build Coastguard Worker __clang_error_if(__bos_unevaluated_le(__bos(dst), __builtin_strlen(src)),
101*8d67ca89SAndroid Build Coastguard Worker "'strcpy' called with string bigger than buffer") {
102*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
103*8d67ca89SAndroid Build Coastguard Worker return __builtin___strcpy_chk(dst, src, __bos(dst));
104*8d67ca89SAndroid Build Coastguard Worker #else
105*8d67ca89SAndroid Build Coastguard Worker return __builtin_strcpy(dst, src);
106*8d67ca89SAndroid Build Coastguard Worker #endif
107*8d67ca89SAndroid Build Coastguard Worker }
108*8d67ca89SAndroid Build Coastguard Worker
109*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strcat(char * _Nonnull const dst __pass_object_size,const char * _Nonnull src)110*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull strcat(char* _Nonnull const dst __pass_object_size, const char* _Nonnull src)
111*8d67ca89SAndroid Build Coastguard Worker __overloadable
112*8d67ca89SAndroid Build Coastguard Worker __clang_error_if(__bos_unevaluated_le(__bos(dst), __builtin_strlen(src)),
113*8d67ca89SAndroid Build Coastguard Worker "'strcat' called with string bigger than buffer") {
114*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
115*8d67ca89SAndroid Build Coastguard Worker return __builtin___strcat_chk(dst, src, __bos(dst));
116*8d67ca89SAndroid Build Coastguard Worker #else
117*8d67ca89SAndroid Build Coastguard Worker return __builtin_strcat(dst, src);
118*8d67ca89SAndroid Build Coastguard Worker #endif
119*8d67ca89SAndroid Build Coastguard Worker }
120*8d67ca89SAndroid Build Coastguard Worker
121*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
122*8d67ca89SAndroid Build Coastguard Worker /* No diag -- clang diagnoses misuses of this on its own. */
123*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strncat(char * _Nonnull const dst __pass_object_size,const char * _Nonnull src,size_t n)124*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull strncat(char* _Nonnull const dst __pass_object_size, const char* _Nonnull src, size_t n)
125*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_strncat, 1, 2, 3)
126*8d67ca89SAndroid Build Coastguard Worker __overloadable {
127*8d67ca89SAndroid Build Coastguard Worker return __builtin___strncat_chk(dst, src, n, __bos(dst));
128*8d67ca89SAndroid Build Coastguard Worker }
129*8d67ca89SAndroid Build Coastguard Worker #endif
130*8d67ca89SAndroid Build Coastguard Worker
131*8d67ca89SAndroid Build Coastguard Worker /* No diag -- clang diagnoses misuses of this on its own. */
132*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memset(void * _Nonnull const s __pass_object_size0,int c,size_t n)133*8d67ca89SAndroid Build Coastguard Worker void* _Nonnull memset(void* _Nonnull const s __pass_object_size0, int c, size_t n) __overloadable
134*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_memset, 1, 2, 3)
135*8d67ca89SAndroid Build Coastguard Worker /* If you're a user who wants this warning to go away: use `(&memset)(foo, bar, baz)`. */
136*8d67ca89SAndroid Build Coastguard Worker __clang_warning_if(c && !n, "'memset' will set 0 bytes; maybe the arguments got flipped?") {
137*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
138*8d67ca89SAndroid Build Coastguard Worker return __builtin___memset_chk(s, c, n, __bos0(s));
139*8d67ca89SAndroid Build Coastguard Worker #else
140*8d67ca89SAndroid Build Coastguard Worker return __builtin_memset(s, c, n);
141*8d67ca89SAndroid Build Coastguard Worker #endif
142*8d67ca89SAndroid Build Coastguard Worker }
143*8d67ca89SAndroid Build Coastguard Worker
144*8d67ca89SAndroid Build Coastguard Worker #if __ANDROID_API__ >= 23 && __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
145*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memchr(const void * _Nonnull const s __pass_object_size,int c,size_t n)146*8d67ca89SAndroid Build Coastguard Worker void* _Nullable memchr(const void* _Nonnull const s __pass_object_size, int c, size_t n) __overloadable {
147*8d67ca89SAndroid Build Coastguard Worker size_t bos = __bos(s);
148*8d67ca89SAndroid Build Coastguard Worker
149*8d67ca89SAndroid Build Coastguard Worker if (__bos_trivially_ge(bos, n)) {
150*8d67ca89SAndroid Build Coastguard Worker return __builtin_memchr(s, c, n);
151*8d67ca89SAndroid Build Coastguard Worker }
152*8d67ca89SAndroid Build Coastguard Worker
153*8d67ca89SAndroid Build Coastguard Worker return __memchr_chk(s, c, n, bos);
154*8d67ca89SAndroid Build Coastguard Worker }
155*8d67ca89SAndroid Build Coastguard Worker
156*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
__memrchr_fortify(const void * _Nonnull const __pass_object_size s,int c,size_t n)157*8d67ca89SAndroid Build Coastguard Worker void* _Nullable __memrchr_fortify(const void* _Nonnull const __pass_object_size s, int c, size_t n) __overloadable {
158*8d67ca89SAndroid Build Coastguard Worker size_t bos = __bos(s);
159*8d67ca89SAndroid Build Coastguard Worker
160*8d67ca89SAndroid Build Coastguard Worker if (__bos_trivially_ge(bos, n)) {
161*8d67ca89SAndroid Build Coastguard Worker return __memrchr_real(s, c, n);
162*8d67ca89SAndroid Build Coastguard Worker }
163*8d67ca89SAndroid Build Coastguard Worker
164*8d67ca89SAndroid Build Coastguard Worker return __memrchr_chk(s, c, n, bos);
165*8d67ca89SAndroid Build Coastguard Worker }
166*8d67ca89SAndroid Build Coastguard Worker #endif
167*8d67ca89SAndroid Build Coastguard Worker
168*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
169*8d67ca89SAndroid Build Coastguard Worker /* No diag -- clang diagnoses misuses of this on its own. */
170*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
stpncpy(char * _Nonnull const dst __pass_object_size,const char * _Nonnull const src __pass_object_size,size_t n)171*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull stpncpy(char* _Nonnull const dst __pass_object_size, const char* _Nonnull const src __pass_object_size, size_t n)
172*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_stpncpy, 1, 2, 3)
173*8d67ca89SAndroid Build Coastguard Worker __overloadable {
174*8d67ca89SAndroid Build Coastguard Worker size_t bos_dst = __bos(dst);
175*8d67ca89SAndroid Build Coastguard Worker size_t bos_src = __bos(src);
176*8d67ca89SAndroid Build Coastguard Worker
177*8d67ca89SAndroid Build Coastguard Worker /* Ignore dst size checks; they're handled in strncpy_chk */
178*8d67ca89SAndroid Build Coastguard Worker if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
179*8d67ca89SAndroid Build Coastguard Worker return __builtin___stpncpy_chk(dst, src, n, bos_dst);
180*8d67ca89SAndroid Build Coastguard Worker }
181*8d67ca89SAndroid Build Coastguard Worker
182*8d67ca89SAndroid Build Coastguard Worker return __stpncpy_chk2(dst, src, n, bos_dst, bos_src);
183*8d67ca89SAndroid Build Coastguard Worker }
184*8d67ca89SAndroid Build Coastguard Worker
185*8d67ca89SAndroid Build Coastguard Worker /* No diag -- clang diagnoses misuses of this on its own. */
186*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strncpy(char * _Nonnull const dst __pass_object_size,const char * _Nonnull const src __pass_object_size,size_t n)187*8d67ca89SAndroid Build Coastguard Worker char* _Nonnull strncpy(char* _Nonnull const dst __pass_object_size, const char* _Nonnull const src __pass_object_size, size_t n)
188*8d67ca89SAndroid Build Coastguard Worker __diagnose_as_builtin(__builtin_strncpy, 1, 2, 3)
189*8d67ca89SAndroid Build Coastguard Worker __overloadable {
190*8d67ca89SAndroid Build Coastguard Worker size_t bos_dst = __bos(dst);
191*8d67ca89SAndroid Build Coastguard Worker size_t bos_src = __bos(src);
192*8d67ca89SAndroid Build Coastguard Worker
193*8d67ca89SAndroid Build Coastguard Worker /* Ignore dst size checks; they're handled in strncpy_chk */
194*8d67ca89SAndroid Build Coastguard Worker if (bos_src == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
195*8d67ca89SAndroid Build Coastguard Worker return __builtin___strncpy_chk(dst, src, n, bos_dst);
196*8d67ca89SAndroid Build Coastguard Worker }
197*8d67ca89SAndroid Build Coastguard Worker
198*8d67ca89SAndroid Build Coastguard Worker return __strncpy_chk2(dst, src, n, bos_dst, bos_src);
199*8d67ca89SAndroid Build Coastguard Worker }
200*8d67ca89SAndroid Build Coastguard Worker #endif
201*8d67ca89SAndroid Build Coastguard Worker
202*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strlcpy(char * _Nonnull const dst __pass_object_size,const char * _Nonnull src,size_t size)203*8d67ca89SAndroid Build Coastguard Worker size_t strlcpy(char* _Nonnull const dst __pass_object_size, const char* _Nonnull src, size_t size)
204*8d67ca89SAndroid Build Coastguard Worker __overloadable
205*8d67ca89SAndroid Build Coastguard Worker __clang_error_if(__bos_unevaluated_lt(__bos(dst), size),
206*8d67ca89SAndroid Build Coastguard Worker "'strlcpy' called with size bigger than buffer") {
207*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
208*8d67ca89SAndroid Build Coastguard Worker return __strlcpy_chk(dst, src, size, __bos(dst));
209*8d67ca89SAndroid Build Coastguard Worker #else
210*8d67ca89SAndroid Build Coastguard Worker return __call_bypassing_fortify(strlcpy)(dst, src, size);
211*8d67ca89SAndroid Build Coastguard Worker #endif
212*8d67ca89SAndroid Build Coastguard Worker }
213*8d67ca89SAndroid Build Coastguard Worker
214*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strlcat(char * _Nonnull const dst __pass_object_size,const char * _Nonnull src,size_t size)215*8d67ca89SAndroid Build Coastguard Worker size_t strlcat(char* _Nonnull const dst __pass_object_size, const char* _Nonnull src, size_t size)
216*8d67ca89SAndroid Build Coastguard Worker __overloadable
217*8d67ca89SAndroid Build Coastguard Worker __clang_error_if(__bos_unevaluated_lt(__bos(dst), size),
218*8d67ca89SAndroid Build Coastguard Worker "'strlcat' called with size bigger than buffer") {
219*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
220*8d67ca89SAndroid Build Coastguard Worker return __strlcat_chk(dst, src, size, __bos(dst));
221*8d67ca89SAndroid Build Coastguard Worker #else
222*8d67ca89SAndroid Build Coastguard Worker return __call_bypassing_fortify(strlcat)(dst, src, size);
223*8d67ca89SAndroid Build Coastguard Worker #endif
224*8d67ca89SAndroid Build Coastguard Worker }
225*8d67ca89SAndroid Build Coastguard Worker
226*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
227*8d67ca89SAndroid Build Coastguard Worker /*
228*8d67ca89SAndroid Build Coastguard Worker * Clang, when parsing C, can fold strlen to a constant without LLVM's help.
229*8d67ca89SAndroid Build Coastguard Worker * This doesn't apply to overloads of strlen, so write this differently. We
230*8d67ca89SAndroid Build Coastguard Worker * can't use `__pass_object_size0` here, but that's fine: it doesn't help much
231*8d67ca89SAndroid Build Coastguard Worker * on __always_inline functions.
232*8d67ca89SAndroid Build Coastguard Worker */
strlen(const char * _Nonnull s)233*8d67ca89SAndroid Build Coastguard Worker extern __always_inline __inline__ __attribute__((gnu_inline)) size_t strlen(const char* _Nonnull s) {
234*8d67ca89SAndroid Build Coastguard Worker return __strlen_chk(s, __bos0(s));
235*8d67ca89SAndroid Build Coastguard Worker }
236*8d67ca89SAndroid Build Coastguard Worker #endif
237*8d67ca89SAndroid Build Coastguard Worker
238*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strchr(const char * _Nonnull const s __pass_object_size,int c)239*8d67ca89SAndroid Build Coastguard Worker char* _Nullable strchr(const char* _Nonnull const s __pass_object_size, int c) __overloadable {
240*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
241*8d67ca89SAndroid Build Coastguard Worker size_t bos = __bos(s);
242*8d67ca89SAndroid Build Coastguard Worker
243*8d67ca89SAndroid Build Coastguard Worker if (bos != __BIONIC_FORTIFY_UNKNOWN_SIZE) {
244*8d67ca89SAndroid Build Coastguard Worker return __strchr_chk(s, c, bos);
245*8d67ca89SAndroid Build Coastguard Worker }
246*8d67ca89SAndroid Build Coastguard Worker #endif
247*8d67ca89SAndroid Build Coastguard Worker return __builtin_strchr(s, c);
248*8d67ca89SAndroid Build Coastguard Worker }
249*8d67ca89SAndroid Build Coastguard Worker
250*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
strrchr(const char * _Nonnull const s __pass_object_size,int c)251*8d67ca89SAndroid Build Coastguard Worker char* _Nullable strrchr(const char* _Nonnull const s __pass_object_size, int c) __overloadable {
252*8d67ca89SAndroid Build Coastguard Worker #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
253*8d67ca89SAndroid Build Coastguard Worker size_t bos = __bos(s);
254*8d67ca89SAndroid Build Coastguard Worker
255*8d67ca89SAndroid Build Coastguard Worker if (bos != __BIONIC_FORTIFY_UNKNOWN_SIZE) {
256*8d67ca89SAndroid Build Coastguard Worker return __strrchr_chk(s, c, bos);
257*8d67ca89SAndroid Build Coastguard Worker }
258*8d67ca89SAndroid Build Coastguard Worker #endif
259*8d67ca89SAndroid Build Coastguard Worker return __builtin_strrchr(s, c);
260*8d67ca89SAndroid Build Coastguard Worker }
261*8d67ca89SAndroid Build Coastguard Worker
262*8d67ca89SAndroid Build Coastguard Worker #if __ANDROID_API__ >= 23 && __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
263*8d67ca89SAndroid Build Coastguard Worker #if defined(__cplusplus)
264*8d67ca89SAndroid Build Coastguard Worker extern "C++" {
265*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memrchr(void * _Nonnull const __pass_object_size s,int c,size_t n)266*8d67ca89SAndroid Build Coastguard Worker void* _Nullable memrchr(void* _Nonnull const __pass_object_size s, int c, size_t n) {
267*8d67ca89SAndroid Build Coastguard Worker return __memrchr_fortify(s, c, n);
268*8d67ca89SAndroid Build Coastguard Worker }
269*8d67ca89SAndroid Build Coastguard Worker
270*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memrchr(const void * _Nonnull const __pass_object_size s,int c,size_t n)271*8d67ca89SAndroid Build Coastguard Worker const void* _Nullable memrchr(const void* _Nonnull const __pass_object_size s, int c, size_t n) {
272*8d67ca89SAndroid Build Coastguard Worker return __memrchr_fortify(s, c, n);
273*8d67ca89SAndroid Build Coastguard Worker }
274*8d67ca89SAndroid Build Coastguard Worker }
275*8d67ca89SAndroid Build Coastguard Worker #else
276*8d67ca89SAndroid Build Coastguard Worker __BIONIC_FORTIFY_INLINE
memrchr(const void * _Nonnull const __pass_object_size s,int c,size_t n)277*8d67ca89SAndroid Build Coastguard Worker void* _Nullable memrchr(const void* _Nonnull const __pass_object_size s, int c, size_t n) __overloadable {
278*8d67ca89SAndroid Build Coastguard Worker return __memrchr_fortify(s, c, n);
279*8d67ca89SAndroid Build Coastguard Worker }
280*8d67ca89SAndroid Build Coastguard Worker #endif
281*8d67ca89SAndroid Build Coastguard Worker #endif /* __ANDROID_API__ >= 23 */
282*8d67ca89SAndroid Build Coastguard Worker
283*8d67ca89SAndroid Build Coastguard Worker #endif /* defined(__BIONIC_FORTIFY) */
284