master
1/* Checking macros for unistd functions.
2 Copyright (C) 2005-2025 Free Software Foundation, Inc.
3 This file is part of the GNU C Library.
4
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
9
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
14
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, see
17 <https://www.gnu.org/licenses/>. */
18
19#ifndef _UNISTD_H
20# error "Never include <bits/unistd.h> directly; use <unistd.h> instead."
21#endif
22
23# include <bits/unistd-decl.h>
24
25__fortify_function __attribute_overloadable__ __wur ssize_t
26read (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf), size_t __nbytes)
27 __fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
28 "read called with bigger length than "
29 "size of the destination buffer")
30
31{
32 return __glibc_fortify (read, __nbytes, sizeof (char),
33 __glibc_objsize0 (__buf),
34 __fd, __buf, __nbytes);
35}
36
37#if defined __USE_UNIX98 || defined __USE_XOPEN2K8
38# ifndef __USE_FILE_OFFSET64
39__fortify_function __attribute_overloadable__ __wur ssize_t
40pread (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf),
41 size_t __nbytes, __off_t __offset)
42 __fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
43 "pread called with bigger length than "
44 "size of the destination buffer")
45{
46 return __glibc_fortify (pread, __nbytes, sizeof (char),
47 __glibc_objsize0 (__buf),
48 __fd, __buf, __nbytes, __offset);
49}
50# else
51__fortify_function __attribute_overloadable__ __wur ssize_t
52pread (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf),
53 size_t __nbytes, __off64_t __offset)
54 __fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
55 "pread called with bigger length than "
56 "size of the destination buffer")
57{
58 return __glibc_fortify (pread64, __nbytes, sizeof (char),
59 __glibc_objsize0 (__buf),
60 __fd, __buf, __nbytes, __offset);
61}
62# endif
63
64# ifdef __USE_LARGEFILE64
65__fortify_function __attribute_overloadable__ __wur ssize_t
66pread64 (int __fd, __fortify_clang_overload_arg0 (void *, ,__buf),
67 size_t __nbytes, __off64_t __offset)
68 __fortify_clang_warning_only_if_bos0_lt (__nbytes, __buf,
69 "pread64 called with bigger length than "
70 "size of the destination buffer")
71{
72 return __glibc_fortify (pread64, __nbytes, sizeof (char),
73 __glibc_objsize0 (__buf),
74 __fd, __buf, __nbytes, __offset);
75}
76# endif
77#endif
78
79#if defined __USE_XOPEN_EXTENDED || defined __USE_XOPEN2K
80__fortify_function __attribute_overloadable__ __nonnull ((1, 2)) __wur ssize_t
81__NTH (readlink (const char *__restrict __path,
82 __fortify_clang_overload_arg0 (char *, __restrict, __buf),
83 size_t __len))
84 __fortify_clang_warning_only_if_bos_lt (__len, __buf,
85 "readlink called with bigger length "
86 "than size of destination buffer")
87
88{
89 return __glibc_fortify (readlink, __len, sizeof (char),
90 __glibc_objsize (__buf),
91 __path, __buf, __len);
92}
93#endif
94
95#ifdef __USE_ATFILE
96__fortify_function __attribute_overloadable__ __nonnull ((2, 3)) __wur ssize_t
97__NTH (readlinkat (int __fd, const char *__restrict __path,
98 __fortify_clang_overload_arg0 (char *, __restrict, __buf),
99 size_t __len))
100 __fortify_clang_warning_only_if_bos_lt (__len, __buf,
101 "readlinkat called with bigger length "
102 "than size of destination buffer")
103{
104 return __glibc_fortify (readlinkat, __len, sizeof (char),
105 __glibc_objsize (__buf),
106 __fd, __path, __buf, __len);
107}
108#endif
109
110__fortify_function __attribute_overloadable__ __wur char *
111__NTH (getcwd (__fortify_clang_overload_arg (char *, , __buf), size_t __size))
112 __fortify_clang_warning_only_if_bos_lt (__size, __buf,
113 "getcwd called with bigger length "
114 "than size of destination buffer")
115{
116 return __glibc_fortify (getcwd, __size, sizeof (char),
117 __glibc_objsize (__buf),
118 __buf, __size);
119}
120
121#if defined __USE_MISC || defined __USE_XOPEN_EXTENDED
122__fortify_function __attribute_overloadable__ __nonnull ((1))
123__attribute_deprecated__ __wur char *
124__NTH (getwd (__fortify_clang_overload_arg (char *,, __buf)))
125{
126 if (__glibc_objsize (__buf) != (size_t) -1)
127 return __getwd_chk (__buf, __glibc_objsize (__buf));
128 return __getwd_warn (__buf);
129}
130#endif
131
132__fortify_function __attribute_overloadable__ size_t
133__NTH (confstr (int __name, __fortify_clang_overload_arg (char *, ,__buf),
134 size_t __len))
135 __fortify_clang_warning_only_if_bos_lt (__len, __buf,
136 "confstr called with bigger length than "
137 "size of destination buffer")
138{
139 return __glibc_fortify (confstr, __len, sizeof (char),
140 __glibc_objsize (__buf),
141 __name, __buf, __len);
142}
143
144
145__fortify_function __attribute_overloadable__ int
146__NTH (getgroups (int __size,
147 __fortify_clang_overload_arg (__gid_t *, , __list)))
148 __fortify_clang_warning_only_if_bos_lt (__size * sizeof (__gid_t), __list,
149 "getgroups called with bigger group "
150 "count than what can fit into "
151 "destination buffer")
152{
153 return __glibc_fortify (getgroups, __size, sizeof (__gid_t),
154 __glibc_objsize (__list),
155 __size, __list);
156}
157
158
159__fortify_function __attribute_overloadable__ int
160__NTH (ttyname_r (int __fd,
161 __fortify_clang_overload_arg (char *, ,__buf),
162 size_t __buflen))
163 __fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
164 "ttyname_r called with bigger buflen "
165 "than size of destination buffer")
166{
167 return __glibc_fortify (ttyname_r, __buflen, sizeof (char),
168 __glibc_objsize (__buf),
169 __fd, __buf, __buflen);
170}
171
172
173#ifdef __USE_POSIX199506
174__fortify_function __attribute_overloadable__ int
175getlogin_r (__fortify_clang_overload_arg (char *, ,__buf), size_t __buflen)
176 __fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
177 "getlogin_r called with bigger buflen "
178 "than size of destination buffer")
179{
180 return __glibc_fortify (getlogin_r, __buflen, sizeof (char),
181 __glibc_objsize (__buf),
182 __buf, __buflen);
183}
184#endif
185
186
187#if defined __USE_MISC || defined __USE_UNIX98
188__fortify_function __attribute_overloadable__ int
189__NTH (gethostname (__fortify_clang_overload_arg (char *, ,__buf),
190 size_t __buflen))
191 __fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
192 "gethostname called with bigger buflen "
193 "than size of destination buffer")
194{
195 return __glibc_fortify (gethostname, __buflen, sizeof (char),
196 __glibc_objsize (__buf),
197 __buf, __buflen);
198}
199#endif
200
201
202#if defined __USE_MISC || (defined __USE_XOPEN && !defined __USE_UNIX98)
203__fortify_function __attribute_overloadable__ int
204__NTH (getdomainname (__fortify_clang_overload_arg (char *, ,__buf),
205 size_t __buflen))
206 __fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
207 "getdomainname called with bigger "
208 "buflen than size of destination buffer")
209{
210 return __glibc_fortify (getdomainname, __buflen, sizeof (char),
211 __glibc_objsize (__buf),
212 __buf, __buflen);
213}
214#endif