1 /*
2 * Copyright (C) 2017 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29 #ifndef _POLL_H_
30 #error "Never include this file directly; instead, include <poll.h>"
31 #endif
32
33 int __poll_chk(struct pollfd*, nfds_t, int, size_t) __INTRODUCED_IN(23);
34 int __ppoll_chk(struct pollfd*, nfds_t, const struct timespec*, const sigset_t*, size_t) __INTRODUCED_IN(23);
35 int __ppoll64_chk(struct pollfd*, nfds_t, const struct timespec*, const sigset64_t*, size_t) __INTRODUCED_IN(28);
36
37 #if defined(__BIONIC_FORTIFY)
38 #define __bos_fd_count_trivially_safe(bos_val, fds, fd_count) \
39 __bos_dynamic_check_impl_and((bos_val), >=, (sizeof(*fds) * (fd_count)), \
40 (fd_count) <= __BIONIC_CAST(static_cast, nfds_t, -1) / sizeof(*fds))
41
42 __BIONIC_FORTIFY_INLINE
poll(struct pollfd * const fds __pass_object_size,nfds_t fd_count,int timeout)43 int poll(struct pollfd* const fds __pass_object_size, nfds_t fd_count, int timeout)
44 __overloadable
45 __clang_error_if(__bos_unevaluated_lt(__bos(fds), sizeof(*fds) * fd_count),
46 "in call to 'poll', fd_count is larger than the given buffer") {
47 #if __ANDROID_API__ >= 23 && __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
48 size_t bos_fds = __bos(fds);
49
50 if (!__bos_fd_count_trivially_safe(bos_fds, fds, fd_count)) {
51 return __poll_chk(fds, fd_count, timeout, bos_fds);
52 }
53 #endif
54 return __call_bypassing_fortify(poll)(fds, fd_count, timeout);
55 }
56
57 #if __ANDROID_API__ >= 21
58 __BIONIC_FORTIFY_INLINE
ppoll(struct pollfd * const fds __pass_object_size,nfds_t fd_count,const struct timespec * timeout,const sigset_t * mask)59 int ppoll(struct pollfd* const fds __pass_object_size, nfds_t fd_count, const struct timespec* timeout, const sigset_t* mask)
60 __overloadable
61 __clang_error_if(__bos_unevaluated_lt(__bos(fds), sizeof(*fds) * fd_count),
62 "in call to 'ppoll', fd_count is larger than the given buffer") {
63 #if __ANDROID_API__ >= 23 && __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
64 size_t bos_fds = __bos(fds);
65
66 if (!__bos_fd_count_trivially_safe(bos_fds, fds, fd_count)) {
67 return __ppoll_chk(fds, fd_count, timeout, mask, bos_fds);
68 }
69 #endif
70 return __call_bypassing_fortify(ppoll)(fds, fd_count, timeout, mask);
71 }
72 #endif /* __ANDROID_API__ >= 21 */
73
74 #if __ANDROID_API__ >= 28
75 __BIONIC_FORTIFY_INLINE
ppoll64(struct pollfd * const fds __pass_object_size,nfds_t fd_count,const struct timespec * timeout,const sigset64_t * mask)76 int ppoll64(struct pollfd* const fds __pass_object_size, nfds_t fd_count, const struct timespec* timeout, const sigset64_t* mask)
77 __overloadable
78 __clang_error_if(__bos_unevaluated_lt(__bos(fds), sizeof(*fds) * fd_count),
79 "in call to 'ppoll64', fd_count is larger than the given buffer") {
80 #if __BIONIC_FORTIFY_RUNTIME_CHECKS_ENABLED
81 size_t bos_fds = __bos(fds);
82
83 if (!__bos_fd_count_trivially_safe(bos_fds, fds, fd_count)) {
84 return __ppoll64_chk(fds, fd_count, timeout, mask, bos_fds);
85 }
86 #endif
87 return __call_bypassing_fortify(ppoll64)(fds, fd_count, timeout, mask);
88 }
89 #endif /* __ANDROID_API__ >= 28 */
90
91 #undef __bos_fd_count_trivially_safe
92
93 #endif /* defined(__BIONIC_FORTIFY) */
94