freebsd-src/include/ssp/string.h
Kyle Evans 5af6fbd727 ssp: appease -Wgnu-statement-expression-from-macro-expansion
It's a stupid warning, but some ports enable it by default and were
already defining _FORTIFY_SOURCE, thus exposing the new macros
immediately.  This at least fixes the libfido2 build, perhaps others as
well.

While we're here, fix a fresh build of stand w/ FORTIFY_SOURCE enabled
by not pulling in the ssp headers if _STANDALONE is defined.  We do not
have runtime support in libsa as of the time of writing.

Reported by:	netchild
Sponsored by:	Stormshield
Sponsored by:	Klara, Inc.
2024-05-14 18:22:18 -05:00

130 lines
5.5 KiB
C

/* $NetBSD: string.h,v 1.14 2020/09/05 13:37:59 mrg Exp $ */
/*-
*
* SPDX-License-Identifier: BSD-2-Clause
*
* Copyright (c) 2006 The NetBSD Foundation, Inc.
* All rights reserved.
*
* This code is derived from software contributed to The NetBSD Foundation
* by Christos Zoulas.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
#ifndef _SSP_STRING_H_
#define _SSP_STRING_H_
#include <ssp/ssp.h>
__BEGIN_DECLS
void *__memcpy_chk(void *, const void *, size_t, size_t);
void *__memmove_chk(void *, const void *, size_t, size_t);
void *__memset_chk(void *, int, size_t, size_t);
char *__stpcpy_chk(char *, const char *, size_t);
char *__stpncpy_chk(char *, const char *, size_t, size_t);
char *__strcat_chk(char *, const char *, size_t);
char *__strcpy_chk(char *, const char *, size_t);
char *__strncat_chk(char *, const char *, size_t, size_t);
char *__strncpy_chk(char *, const char *, size_t, size_t);
__END_DECLS
#if __SSP_FORTIFY_LEVEL > 0
#define __ssp_bos_check3_typed_var(fun, dsttype, dsrvar, dst, srctype, srcvar, \
src, lenvar, len) __extension__ ({ \
srctype srcvar = (src); \
dsttype dstvar = (dst); \
size_t lenvar = (len); \
((__ssp_bos0(dstvar) != (size_t)-1) ? \
__builtin___ ## fun ## _chk(dstvar, srcvar, lenvar, \
__ssp_bos0(dstvar)) : \
__ ## fun ## _ichk(dstvar, srcvar, lenvar)); \
})
#define __ssp_bos_check3_typed(fun, dsttype, dst, srctype, src, len) \
__ssp_bos_check3_typed_var(fun, dsttype, __ssp_var(dstv), dst, \
srctype, __ssp_var(srcv), src, __ssp_var(lenv), len)
#define __ssp_bos_check3(fun, dst, src, len) \
__ssp_bos_check3_typed_var(fun, void *, __ssp_var(dstv), dst, \
const void *, __ssp_var(srcv), src, __ssp_var(lenv), len)
#define __ssp_bos_check2_var(fun, dstvar, dst, srcvar, src) __extension__ ({ \
const void *srcvar = (src); \
void *dstvar = (dst); \
((__ssp_bos0(dstvar) != (size_t)-1) ? \
__builtin___ ## fun ## _chk(dstvar, srcvar, \
__ssp_bos0(dstvar)) : \
__ ## fun ## _ichk(dstvar, srcvar)); \
})
#define __ssp_bos_check2(fun, dst, src) \
__ssp_bos_check2_var(fun, __ssp_var(dstv), dst, __ssp_var(srcv), src)
#define __ssp_bos_icheck3_restrict(fun, type1, type2) \
static __inline type1 __ ## fun ## _ichk(type1 __restrict, type2 __restrict, size_t); \
static __inline __attribute__((__always_inline__)) type1 \
__ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src, size_t len) { \
return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \
}
#define __ssp_bos_icheck3(fun, type1, type2) \
static __inline type1 __ ## fun ## _ichk(type1, type2, size_t); \
static __inline __attribute__((__always_inline__)) type1 \
__ ## fun ## _ichk(type1 dst, type2 src, size_t len) { \
return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \
}
#define __ssp_bos_icheck2_restrict(fun, type1, type2) \
static __inline type1 __ ## fun ## _ichk(type1, type2); \
static __inline __attribute__((__always_inline__)) type1 \
__ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src) { \
return __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)); \
}
__BEGIN_DECLS
__ssp_bos_icheck3_restrict(memcpy, void *, const void *)
__ssp_bos_icheck3(memmove, void *, const void *)
__ssp_bos_icheck3(memset, void *, int)
__ssp_bos_icheck2_restrict(stpcpy, char *, const char *)
__ssp_bos_icheck3_restrict(stpncpy, char *, const char *)
__ssp_bos_icheck2_restrict(strcpy, char *, const char *)
__ssp_bos_icheck2_restrict(strcat, char *, const char *)
__ssp_bos_icheck3_restrict(strncpy, char *, const char *)
__ssp_bos_icheck3_restrict(strncat, char *, const char *)
__END_DECLS
#define memcpy(dst, src, len) __ssp_bos_check3(memcpy, dst, src, len)
#define memmove(dst, src, len) __ssp_bos_check3(memmove, dst, src, len)
#define memset(dst, val, len) \
__ssp_bos_check3_typed(memset, void *, dst, int, val, len)
#define stpcpy(dst, src) __ssp_bos_check2(stpcpy, dst, src)
#define stpncpy(dst, src, len) __ssp_bos_check3(stpncpy, dst, src, len)
#define strcpy(dst, src) __ssp_bos_check2(strcpy, dst, src)
#define strcat(dst, src) __ssp_bos_check2(strcat, dst, src)
#define strncpy(dst, src, len) __ssp_bos_check3(strncpy, dst, src, len)
#define strncat(dst, src, len) __ssp_bos_check3(strncat, dst, src, len)
#endif /* __SSP_FORTIFY_LEVEL > 0 */
#endif /* _SSP_STRING_H_ */