diff options
author | Martin Sebor <msebor@redhat.com> | 2021-05-06 10:56:25 -0600 |
---|---|---|
committer | Martin Sebor <msebor@redhat.com> | 2021-05-06 11:01:05 -0600 |
commit | 26492c0a14966c32c43cd6ca1d0dca5e62c6cfef (patch) | |
tree | 1d2aceda8438c17113e02f86f2c8c31d58ac7f79 /io/bits | |
parent | 3f0808ef4c872afeade0e323c024ac59ec90fc2b (diff) | |
download | glibc-26492c0a14966c32c43cd6ca1d0dca5e62c6cfef.tar glibc-26492c0a14966c32c43cd6ca1d0dca5e62c6cfef.tar.gz glibc-26492c0a14966c32c43cd6ca1d0dca5e62c6cfef.tar.bz2 glibc-26492c0a14966c32c43cd6ca1d0dca5e62c6cfef.zip |
Annotate additional APIs with GCC attribute access.
This change continues the improvements to compile-time out of bounds
checking by decorating more APIs with either attribute access, or by
explicitly providing the array bound in APIs such as tmpnam() that
expect arrays of some minimum size as arguments. (The latter feature
is new in GCC 11.)
The only effects of the attribute and/or the array bound is to check
and diagnose calls to the functions that fail to provide a sufficient
number of elements, and the definitions of the functions that access
elements outside the specified bounds. (There is no interplay with
_FORTIFY_SOURCE here yet.)
Tested with GCC 7 through 11 on x86_64-linux.
Diffstat (limited to 'io/bits')
-rw-r--r-- | io/bits/poll2.h | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/io/bits/poll2.h b/io/bits/poll2.h index 882fcc9ea2..a623678c09 100644 --- a/io/bits/poll2.h +++ b/io/bits/poll2.h @@ -26,13 +26,14 @@ __BEGIN_DECLS extern int __REDIRECT (__poll_alias, (struct pollfd *__fds, nfds_t __nfds, int __timeout), poll); extern int __poll_chk (struct pollfd *__fds, nfds_t __nfds, int __timeout, - __SIZE_TYPE__ __fdslen); + __SIZE_TYPE__ __fdslen) + __attr_access ((__write_only__, 1, 2)); extern int __REDIRECT (__poll_chk_warn, (struct pollfd *__fds, nfds_t __nfds, int __timeout, __SIZE_TYPE__ __fdslen), __poll_chk) __warnattr ("poll called with fds buffer too small file nfds entries"); -__fortify_function int +__fortify_function __attr_access ((__write_only__, 1, 2)) int poll (struct pollfd *__fds, nfds_t __nfds, int __timeout) { if (__glibc_objsize (__fds) != (__SIZE_TYPE__) -1) @@ -54,7 +55,8 @@ extern int __REDIRECT (__ppoll_alias, (struct pollfd *__fds, nfds_t __nfds, const __sigset_t *__ss), ppoll); extern int __ppoll_chk (struct pollfd *__fds, nfds_t __nfds, const struct timespec *__timeout, - const __sigset_t *__ss, __SIZE_TYPE__ __fdslen); + const __sigset_t *__ss, __SIZE_TYPE__ __fdslen) + __attr_access ((__write_only__, 1, 2)); extern int __REDIRECT (__ppoll_chk_warn, (struct pollfd *__fds, nfds_t __nfds, const struct timespec *__timeout, const __sigset_t *__ss, @@ -62,7 +64,7 @@ extern int __REDIRECT (__ppoll_chk_warn, (struct pollfd *__fds, nfds_t __nfds, __ppoll_chk) __warnattr ("ppoll called with fds buffer too small file nfds entries"); -__fortify_function int +__fortify_function __attr_access ((__write_only__, 1, 2)) int ppoll (struct pollfd *__fds, nfds_t __nfds, const struct timespec *__timeout, const __sigset_t *__ss) { |