• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*	$OpenBSD: stdio.h,v 1.35 2006/01/13 18:10:09 miod Exp $	*/
2 /*	$NetBSD: stdio.h,v 1.18 1996/04/25 18:29:21 jtc Exp $	*/
3 
4 /*-
5  * Copyright (c) 1990 The Regents of the University of California.
6  * All rights reserved.
7  *
8  * This code is derived from software contributed to Berkeley by
9  * Chris Torek.
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  * 3. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  *
35  *	@(#)stdio.h	5.17 (Berkeley) 6/3/91
36  */
37 
38 #ifndef	_STDIO_H_
39 #define	_STDIO_H_
40 
41 #include <sys/cdefs.h>
42 #include <sys/types.h>
43 
44 #include <stdarg.h>
45 #include <stddef.h>
46 
47 #define __need_NULL
48 #include <stddef.h>
49 
50 #include <bits/seek_constants.h>
51 
52 #if __ANDROID_API__ < __ANDROID_API_N__
53 #include <bits/struct_file.h>
54 #endif
55 
56 __BEGIN_DECLS
57 
58 #if defined(__clang__)
59 #pragma clang diagnostic push
60 #pragma clang diagnostic ignored "-Wnullability-completeness"
61 #endif
62 
63 typedef off_t fpos_t;
64 typedef off64_t fpos64_t;
65 
66 struct __sFILE;
67 typedef struct __sFILE FILE;
68 
69 #if __ANDROID_API__ >= __ANDROID_API_M__
70 extern FILE* stdin __INTRODUCED_IN(23);
71 extern FILE* stdout __INTRODUCED_IN(23);
72 extern FILE* stderr __INTRODUCED_IN(23);
73 
74 /* C99 and earlier plus current C++ standards say these must be macros. */
75 #define stdin stdin
76 #define stdout stdout
77 #define stderr stderr
78 #else
79 /* Before M the actual symbols for stdin and friends had different names. */
80 extern FILE __sF[] __REMOVED_IN(23);
81 
82 #define stdin (&__sF[0])
83 #define stdout (&__sF[1])
84 #define stderr (&__sF[2])
85 #endif
86 
87 /*
88  * The following three definitions are for ANSI C, which took them
89  * from System V, which brilliantly took internal interface macros and
90  * made them official arguments to setvbuf(), without renaming them.
91  * Hence, these ugly _IOxxx names are *supposed* to appear in user code.
92  *
93  * Although numbered as their counterparts above, the implementation
94  * does not rely on this.
95  */
96 #define	_IOFBF	0		/* setvbuf should set fully buffered */
97 #define	_IOLBF	1		/* setvbuf should set line buffered */
98 #define	_IONBF	2		/* setvbuf should set unbuffered */
99 
100 #define	BUFSIZ	1024		/* size of buffer used by setbuf */
101 #define	EOF	(-1)
102 
103 /*
104  * FOPEN_MAX is a minimum maximum, and is the number of streams that
105  * stdio can provide without attempting to allocate further resources
106  * (which could fail).  Do not use this for anything.
107  */
108 
109 #define	FOPEN_MAX	20	/* must be <= OPEN_MAX <sys/syslimits.h> */
110 #define	FILENAME_MAX	1024	/* must be <= PATH_MAX <sys/syslimits.h> */
111 
112 #define	L_tmpnam	1024	/* XXX must be == PATH_MAX */
113 #define	TMP_MAX		308915776
114 
115 /*
116  * Functions defined in ANSI C standard.
117  */
118 void	 clearerr(FILE *);
119 int	 fclose(FILE *);
120 int	 feof(FILE *);
121 int	 ferror(FILE *);
122 int	 fflush(FILE *);
123 int	 fgetc(FILE *);
124 char	*fgets(char * __restrict, int, FILE * __restrict) __overloadable
125   __RENAME_CLANG(fgets);
126 int	 fprintf(FILE * __restrict , const char * __restrict _Nonnull, ...) __printflike(2, 3);
127 int	 fputc(int, FILE *);
128 int	 fputs(const char * __restrict, FILE * __restrict);
129 size_t	 fread(void * __restrict, size_t, size_t, FILE * __restrict)
130       __overloadable __RENAME_CLANG(fread);
131 int	 fscanf(FILE * __restrict, const char * __restrict _Nonnull, ...) __scanflike(2, 3);
132 size_t	 fwrite(const void * __restrict, size_t, size_t, FILE * __restrict)
133     __overloadable __RENAME_CLANG(fwrite);
134 int	 getc(FILE *);
135 int	 getchar(void);
136 ssize_t getdelim(char** __restrict, size_t* __restrict, int, FILE* __restrict) __INTRODUCED_IN(18);
137 ssize_t getline(char** __restrict, size_t* __restrict, FILE* __restrict) __INTRODUCED_IN(18);
138 
139 void	 perror(const char *);
140 int	 printf(const char * __restrict _Nonnull, ...) __printflike(1, 2);
141 int	 putc(int, FILE *);
142 int	 putchar(int);
143 int	 puts(const char *);
144 int	 remove(const char *);
145 void	 rewind(FILE *);
146 int	 scanf(const char * __restrict _Nonnull, ...) __scanflike(1, 2);
147 void	 setbuf(FILE * __restrict, char * __restrict);
148 int	 setvbuf(FILE * __restrict, char * __restrict, int, size_t);
149 int	 sscanf(const char * __restrict, const char * __restrict _Nonnull, ...) __scanflike(2, 3);
150 int	 ungetc(int, FILE *);
151 int	 vfprintf(FILE * __restrict, const char * __restrict _Nonnull, __va_list) __printflike(2, 0);
152 int	 vprintf(const char * __restrict _Nonnull, __va_list) __printflike(1, 0);
153 
154 int dprintf(int, const char* __restrict _Nonnull, ...) __printflike(2, 3) __INTRODUCED_IN(21);
155 int vdprintf(int, const char* __restrict _Nonnull, __va_list) __printflike(2, 0) __INTRODUCED_IN(21);
156 
157 #if (defined(__STDC_VERSION__) && __STDC_VERSION__ < 201112L) || \
158     (defined(__cplusplus) && __cplusplus <= 201103L)
159 char* gets(char*) __attribute__((deprecated("gets is unsafe, use fgets instead")));
160 #endif
161 int sprintf(char* __restrict, const char* __restrict _Nonnull, ...)
162     __printflike(2, 3) __warnattr_strict("sprintf is often misused; please use snprintf")
163     __overloadable __RENAME_CLANG(sprintf);
164 int vsprintf(char* __restrict, const char* __restrict _Nonnull, __va_list)
165     __overloadable __printflike(2, 0) __RENAME_CLANG(vsprintf)
166     __warnattr_strict("vsprintf is often misused; please use vsnprintf");
167 char* tmpnam(char*)
168     __warnattr("tempnam is unsafe, use mkstemp or tmpfile instead");
169 #define P_tmpdir "/tmp/" /* deprecated */
170 char* tempnam(const char*, const char*)
171     __warnattr("tempnam is unsafe, use mkstemp or tmpfile instead");
172 
173 int rename(const char*, const char*);
174 int renameat(int, const char*, int, const char*);
175 
176 int fseek(FILE*, long, int);
177 long ftell(FILE*);
178 
179 #if defined(__USE_FILE_OFFSET64)
180 int fgetpos(FILE*, fpos_t*) __RENAME(fgetpos64) __INTRODUCED_IN(24);
181 int fsetpos(FILE*, const fpos_t*) __RENAME(fsetpos64) __INTRODUCED_IN(24);
182 int fseeko(FILE*, off_t, int) __RENAME(fseeko64) __INTRODUCED_IN(24);
183 off_t ftello(FILE*) __RENAME(ftello64) __INTRODUCED_IN(24);
184 #  if defined(__USE_BSD)
185 FILE* funopen(const void*,
186               int (*)(void*, char*, int),
187               int (*)(void*, const char*, int),
188               fpos_t (*)(void*, fpos_t, int),
189               int (*)(void*)) __RENAME(funopen64) __INTRODUCED_IN(24);
190 #  endif
191 #else
192 int fgetpos(FILE*, fpos_t*);
193 int fsetpos(FILE*, const fpos_t*);
194 int fseeko(FILE*, off_t, int);
195 off_t ftello(FILE*);
196 #  if defined(__USE_BSD)
197 FILE* funopen(const void*,
198               int (*)(void*, char*, int),
199               int (*)(void*, const char*, int),
200               fpos_t (*)(void*, fpos_t, int),
201               int (*)(void*));
202 #  endif
203 #endif
204 int fgetpos64(FILE*, fpos64_t*) __INTRODUCED_IN(24);
205 int fsetpos64(FILE*, const fpos64_t*) __INTRODUCED_IN(24);
206 int fseeko64(FILE*, off64_t, int) __INTRODUCED_IN(24);
207 off64_t ftello64(FILE*) __INTRODUCED_IN(24);
208 #if defined(__USE_BSD)
209 FILE* funopen64(const void*, int (*)(void*, char*, int), int (*)(void*, const char*, int),
210                 fpos64_t (*)(void*, fpos64_t, int), int (*)(void*)) __INTRODUCED_IN(24);
211 #endif
212 
213 FILE* fopen(const char* __restrict, const char* __restrict);
214 FILE* fopen64(const char* __restrict, const char* __restrict) __INTRODUCED_IN(24);
215 FILE* freopen(const char* __restrict, const char* __restrict, FILE* __restrict);
216 FILE* freopen64(const char* __restrict, const char* __restrict, FILE* __restrict)
217   __INTRODUCED_IN(24);
218 FILE* tmpfile(void);
219 FILE* tmpfile64(void) __INTRODUCED_IN(24);
220 
221 int snprintf(char* __restrict, size_t, const char* __restrict _Nonnull, ...)
222     __printflike(3, 4) __overloadable __RENAME_CLANG(snprintf);
223 int vfscanf(FILE* __restrict, const char* __restrict _Nonnull, __va_list) __scanflike(2, 0);
224 int vscanf(const char* _Nonnull , __va_list) __scanflike(1, 0);
225 int vsnprintf(char* __restrict, size_t, const char* __restrict _Nonnull, __va_list)
226     __printflike(3, 0) __overloadable __RENAME_CLANG(vsnprintf);
227 int vsscanf(const char* __restrict _Nonnull, const char* __restrict _Nonnull, __va_list) __scanflike(2, 0);
228 
229 #define L_ctermid 1024 /* size for ctermid() */
230 char* ctermid(char*) __INTRODUCED_IN(26);
231 
232 FILE* fdopen(int, const char*);
233 int fileno(FILE*);
234 int pclose(FILE*);
235 FILE* popen(const char*, const char*);
236 void flockfile(FILE*);
237 int ftrylockfile(FILE*);
238 void funlockfile(FILE*);
239 int getc_unlocked(FILE*);
240 int getchar_unlocked(void);
241 int putc_unlocked(int, FILE*);
242 int putchar_unlocked(int);
243 
244 FILE* fmemopen(void*, size_t, const char*) __INTRODUCED_IN(23);
245 FILE* open_memstream(char**, size_t*) __INTRODUCED_IN(23);
246 
247 #if defined(__USE_BSD) || defined(__BIONIC__) /* Historically bionic exposed these. */
248 int  asprintf(char** __restrict, const char* __restrict _Nonnull, ...) __printflike(2, 3);
249 char* fgetln(FILE* __restrict, size_t* __restrict);
250 int fpurge(FILE*);
251 void setbuffer(FILE*, char*, int);
252 int setlinebuf(FILE*);
253 int vasprintf(char** __restrict, const char* __restrict _Nonnull, __va_list) __printflike(2, 0);
254 void clearerr_unlocked(FILE*) __INTRODUCED_IN(23);
255 int feof_unlocked(FILE*) __INTRODUCED_IN(23);
256 int ferror_unlocked(FILE*) __INTRODUCED_IN(23);
257 int fileno_unlocked(FILE*) __INTRODUCED_IN(24);
258 #define fropen(cookie, fn) funopen(cookie, fn, 0, 0, 0)
259 #define fwopen(cookie, fn) funopen(cookie, 0, fn, 0, 0)
260 #endif /* __USE_BSD */
261 
262 char* __fgets_chk(char*, int, FILE*, size_t) __INTRODUCED_IN(17);
263 size_t __fread_chk(void* __restrict, size_t, size_t, FILE* __restrict, size_t)
264     __INTRODUCED_IN(24);
265 size_t __fwrite_chk(const void* __restrict, size_t, size_t, FILE* __restrict, size_t)
266     __INTRODUCED_IN(24);
267 
268 #if defined(__BIONIC_FORTIFY) && !defined(__BIONIC_NO_STDIO_FORTIFY)
269 
270 #if __ANDROID_API__ >= __ANDROID_API_J_MR1__
271 __BIONIC_FORTIFY_INLINE __printflike(3, 0)
vsnprintf(char * const __pass_object_size dest,size_t size,const char * _Nonnull format,__va_list ap)272 int vsnprintf(char *const __pass_object_size dest, size_t size,
273               const char *_Nonnull format, __va_list ap) __overloadable {
274     return __builtin___vsnprintf_chk(dest, size, 0, __bos(dest), format, ap);
275 }
276 
277 __BIONIC_FORTIFY_INLINE __printflike(2, 0)
vsprintf(char * const __pass_object_size dest,const char * _Nonnull format,__va_list ap)278 int vsprintf(char *const __pass_object_size dest, const char *_Nonnull format,
279              __va_list ap) __overloadable {
280     return __builtin___vsprintf_chk(dest, 0, __bos(dest), format, ap);
281 }
282 #endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
283 
284 #if defined(__clang__)
285 #if __ANDROID_API__ >= __ANDROID_API_J_MR1__
286 /*
287  * Simple case: `format` can't have format specifiers, so we can just compare
288  * its length to the length of `dest`
289  */
290 __BIONIC_ERROR_FUNCTION_VISIBILITY
291 int snprintf(char *__restrict dest, size_t size, const char *__restrict format)
292     __overloadable
293     __enable_if(__bos(dest) != __BIONIC_FORTIFY_UNKNOWN_SIZE &&
294                 __bos(dest) < __builtin_strlen(format),
295                 "format string will always overflow destination buffer")
296     __errorattr("format string will always overflow destination buffer");
297 
298 __BIONIC_FORTIFY_INLINE
299 __printflike(3, 4)
snprintf(char * __restrict const __pass_object_size dest,size_t size,const char * __restrict format,...)300 int snprintf(char *__restrict const __pass_object_size dest,
301              size_t size, const char *__restrict format, ...) __overloadable {
302     va_list va;
303     va_start(va, format);
304     int result = __builtin___vsnprintf_chk(dest, size, 0, __bos(dest), format, va);
305     va_end(va);
306     return result;
307 }
308 
309 __BIONIC_ERROR_FUNCTION_VISIBILITY
310 int sprintf(char *__restrict dest, const char *__restrict format) __overloadable
311     __enable_if(__bos(dest) != __BIONIC_FORTIFY_UNKNOWN_SIZE &&
312                 __bos(dest) < __builtin_strlen(format),
313                 "format string will always overflow destination buffer")
314     __errorattr("format string will always overflow destination buffer");
315 
316 __BIONIC_FORTIFY_INLINE
317 __printflike(2, 3)
sprintf(char * __restrict const __pass_object_size dest,const char * __restrict format,...)318 int sprintf(char *__restrict const __pass_object_size dest,
319         const char *__restrict format, ...) __overloadable {
320     va_list va;
321     va_start(va, format);
322     int result = __builtin___vsprintf_chk(dest, 0, __bos(dest), format, va);
323     va_end(va);
324     return result;
325 }
326 #endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
327 
328 #if __ANDROID_API__ >= __ANDROID_API_N__
329 __BIONIC_FORTIFY_INLINE
330 size_t fread(void *__restrict buf, size_t size, size_t count,
331              FILE *__restrict stream) __overloadable
332         __enable_if(__unsafe_check_mul_overflow(size, count), "size * count overflows")
333         __errorattr("size * count overflows");
334 
335 __BIONIC_FORTIFY_INLINE
336 size_t fread(void *__restrict buf, size_t size, size_t count,
337              FILE *__restrict stream) __overloadable
338     __enable_if(!__unsafe_check_mul_overflow(size, count), "no overflow")
339     __enable_if(__bos(buf) != __BIONIC_FORTIFY_UNKNOWN_SIZE &&
340                 size * count > __bos(buf), "size * count is too large")
341     __errorattr("size * count is too large");
342 
343 __BIONIC_FORTIFY_INLINE
fread(void * __restrict const __pass_object_size0 buf,size_t size,size_t count,FILE * __restrict stream)344 size_t fread(void *__restrict const __pass_object_size0 buf, size_t size,
345              size_t count, FILE *__restrict stream) __overloadable {
346     size_t bos = __bos0(buf);
347 
348     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
349         return __call_bypassing_fortify(fread)(buf, size, count, stream);
350     }
351 
352     return __fread_chk(buf, size, count, stream, bos);
353 }
354 
355 size_t fwrite(const void * __restrict buf, size_t size,
356               size_t count, FILE * __restrict stream) __overloadable
357     __enable_if(__unsafe_check_mul_overflow(size, count),
358                 "size * count overflows")
359     __errorattr("size * count overflows");
360 
361 size_t fwrite(const void * __restrict buf, size_t size,
362               size_t count, FILE * __restrict stream) __overloadable
363     __enable_if(!__unsafe_check_mul_overflow(size, count), "no overflow")
364     __enable_if(__bos(buf) != __BIONIC_FORTIFY_UNKNOWN_SIZE &&
365                 size * count > __bos(buf), "size * count is too large")
366     __errorattr("size * count is too large");
367 
368 __BIONIC_FORTIFY_INLINE
fwrite(const void * __restrict const __pass_object_size0 buf,size_t size,size_t count,FILE * __restrict stream)369 size_t fwrite(const void * __restrict const __pass_object_size0 buf,
370               size_t size, size_t count, FILE * __restrict stream)
371         __overloadable {
372     size_t bos = __bos0(buf);
373 
374     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
375         return __call_bypassing_fortify(fwrite)(buf, size, count, stream);
376     }
377 
378     return __fwrite_chk(buf, size, count, stream, bos);
379 }
380 #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */
381 
382 #if __ANDROID_API__ >= __ANDROID_API_J_MR1__
383 __BIONIC_ERROR_FUNCTION_VISIBILITY
384 char *fgets(char* __restrict dest, int size, FILE* stream) __overloadable
385     __enable_if(size < 0, "size is negative")
386     __errorattr("size is negative");
387 
388 __BIONIC_ERROR_FUNCTION_VISIBILITY
389 char *fgets(char* dest, int size, FILE* stream) __overloadable
390     __enable_if(size >= 0 && size > __bos(dest),
391                 "size is larger than the destination buffer")
392     __errorattr("size is larger than the destination buffer");
393 
394 __BIONIC_FORTIFY_INLINE
fgets(char * __restrict const __pass_object_size dest,int size,FILE * stream)395 char *fgets(char* __restrict const __pass_object_size dest,
396         int size, FILE* stream) __overloadable {
397     size_t bos = __bos(dest);
398 
399     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
400         return __call_bypassing_fortify(fgets)(dest, size, stream);
401     }
402 
403     return __fgets_chk(dest, size, stream, bos);
404 }
405 #endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
406 
407 #else /* defined(__clang__) */
408 
409 size_t __fread_real(void * __restrict, size_t, size_t, FILE * __restrict) __RENAME(fread);
410 __errordecl(__fread_too_big_error, "fread called with size * count bigger than buffer");
411 __errordecl(__fread_overflow, "fread called with overflowing size * count");
412 
413 char* __fgets_real(char*, int, FILE*) __RENAME(fgets);
414 __errordecl(__fgets_too_big_error, "fgets called with size bigger than buffer");
415 __errordecl(__fgets_too_small_error, "fgets called with size less than zero");
416 
417 size_t __fwrite_real(const void * __restrict, size_t, size_t, FILE * __restrict) __RENAME(fwrite);
418 __errordecl(__fwrite_too_big_error, "fwrite called with size * count bigger than buffer");
419 __errordecl(__fwrite_overflow, "fwrite called with overflowing size * count");
420 
421 
422 #if __ANDROID_API__ >= __ANDROID_API_J_MR1__
423 __BIONIC_FORTIFY_INLINE __printflike(3, 4)
snprintf(char * __restrict dest,size_t size,const char * _Nonnull format,...)424 int snprintf(char *__restrict dest, size_t size, const char* _Nonnull format, ...)
425 {
426     return __builtin___snprintf_chk(dest, size, 0, __bos(dest), format,
427                                     __builtin_va_arg_pack());
428 }
429 
430 __BIONIC_FORTIFY_INLINE __printflike(2, 3)
sprintf(char * __restrict dest,const char * _Nonnull format,...)431 int sprintf(char *__restrict dest, const char* _Nonnull format, ...) {
432     return __builtin___sprintf_chk(dest, 0, __bos(dest), format,
433                                    __builtin_va_arg_pack());
434 }
435 #endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
436 
437 #if __ANDROID_API__ >= __ANDROID_API_N__
438 __BIONIC_FORTIFY_INLINE
fread(void * __restrict buf,size_t size,size_t count,FILE * __restrict stream)439 size_t fread(void *__restrict buf, size_t size, size_t count, FILE * __restrict stream) {
440     size_t bos = __bos0(buf);
441 
442     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
443         return __fread_real(buf, size, count, stream);
444     }
445 
446     if (__builtin_constant_p(size) && __builtin_constant_p(count)) {
447         size_t total;
448         if (__size_mul_overflow(size, count, &total)) {
449             __fread_overflow();
450         }
451 
452         if (total > bos) {
453             __fread_too_big_error();
454         }
455 
456         return __fread_real(buf, size, count, stream);
457     }
458 
459     return __fread_chk(buf, size, count, stream, bos);
460 }
461 
462 __BIONIC_FORTIFY_INLINE
fwrite(const void * __restrict buf,size_t size,size_t count,FILE * __restrict stream)463 size_t fwrite(const void * __restrict buf, size_t size, size_t count, FILE * __restrict stream) {
464     size_t bos = __bos0(buf);
465 
466     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
467         return __fwrite_real(buf, size, count, stream);
468     }
469 
470     if (__builtin_constant_p(size) && __builtin_constant_p(count)) {
471         size_t total;
472         if (__size_mul_overflow(size, count, &total)) {
473             __fwrite_overflow();
474         }
475 
476         if (total > bos) {
477             __fwrite_too_big_error();
478         }
479 
480         return __fwrite_real(buf, size, count, stream);
481     }
482 
483     return __fwrite_chk(buf, size, count, stream, bos);
484 }
485 #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */
486 
487 #if __ANDROID_API__ >= __ANDROID_API_J_MR1__
488 __BIONIC_FORTIFY_INLINE
fgets(char * dest,int size,FILE * stream)489 char *fgets(char* dest, int size, FILE* stream) {
490     size_t bos = __bos(dest);
491 
492     // Compiler can prove, at compile time, that the passed in size
493     // is always negative. Force a compiler error.
494     if (__builtin_constant_p(size) && (size < 0)) {
495         __fgets_too_small_error();
496     }
497 
498     // Compiler doesn't know destination size. Don't call __fgets_chk
499     if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) {
500         return __fgets_real(dest, size, stream);
501     }
502 
503     // Compiler can prove, at compile time, that the passed in size
504     // is always <= the actual object size. Don't call __fgets_chk
505     if (__builtin_constant_p(size) && (size <= (int) bos)) {
506         return __fgets_real(dest, size, stream);
507     }
508 
509     // Compiler can prove, at compile time, that the passed in size
510     // is always > the actual object size. Force a compiler error.
511     if (__builtin_constant_p(size) && (size > (int) bos)) {
512         __fgets_too_big_error();
513     }
514 
515     return __fgets_chk(dest, size, stream, bos);
516 }
517 #endif /* __ANDROID_API__ >= __ANDROID_API_J_MR1__ */
518 
519 #endif /* defined(__clang__) */
520 #endif /* defined(__BIONIC_FORTIFY) */
521 
522 #if defined(__clang__)
523 #pragma clang diagnostic pop
524 #endif
525 
526 __END_DECLS
527 
528 #endif /* _STDIO_H_ */
529