1 /* 2 * Copyright (C) 2017 The Android Open Source Project 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * * Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * * Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in 12 * the documentation and/or other materials provided with the 13 * distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26 * SUCH DAMAGE. 27 */ 28 29 #ifndef _SYS_SOCKET_H_ 30 #error "Never include this file directly; instead, include <sys/socket.h>" 31 #endif 32 33 extern ssize_t __sendto_chk(int, const void*, size_t, size_t, int, const struct sockaddr*, 34 socklen_t) __INTRODUCED_IN(26); 35 ssize_t __recvfrom_chk(int, void*, size_t, size_t, int, struct sockaddr*, 36 socklen_t*) __INTRODUCED_IN(21); 37 38 #if defined(__BIONIC_FORTIFY) 39 40 #define __recvfrom_bad_size "'recvfrom' called with size bigger than buffer" 41 #define __sendto_bad_size "'sendto' called with size bigger than buffer" 42 43 #if __ANDROID_API__ >= __ANDROID_API_N__ 44 __BIONIC_FORTIFY_INLINE 45 ssize_t recvfrom(int fd, void* const buf __pass_object_size0, size_t len, int flags, struct sockaddr* src_addr, socklen_t* addr_len) 46 __overloadable 47 __clang_error_if(__bos(buf) != __BIONIC_FORTIFY_UNKNOWN_SIZE && __bos(buf) < len, 48 __recvfrom_bad_size) { 49 size_t bos = __bos0(buf); 50 51 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { 52 return __call_bypassing_fortify(recvfrom)(fd, buf, len, flags, src_addr, addr_len); 53 } 54 return __recvfrom_chk(fd, buf, len, bos, flags, src_addr, addr_len); 55 } 56 #endif /* __ANDROID_API__ >= __ANDROID_API_N__ */ 57 58 #if __ANDROID_API__ >= __ANDROID_API_N_MR1__ 59 __BIONIC_FORTIFY_INLINE 60 ssize_t sendto(int fd, const void* const buf __pass_object_size0, size_t len, int flags, const struct sockaddr* dest_addr, socklen_t addr_len) 61 __overloadable 62 __clang_error_if(__bos0(buf) != __BIONIC_FORTIFY_UNKNOWN_SIZE && __bos0(buf) < len, 63 __sendto_bad_size) { 64 size_t bos = __bos0(buf); 65 66 if (bos == __BIONIC_FORTIFY_UNKNOWN_SIZE) { 67 return __call_bypassing_fortify(sendto)(fd, buf, len, flags, dest_addr, addr_len); 68 } 69 return __sendto_chk(fd, buf, len, bos, flags, dest_addr, addr_len); 70 } 71 #endif /* __ANDROID_API__ >= __ANDROID_API_N_MR1__ */ 72 73 __BIONIC_FORTIFY_INLINE 74 ssize_t recv(int socket, void* const buf __pass_object_size0, size_t len, int flags) 75 __overloadable 76 __clang_error_if(__bos0(buf) != __BIONIC_FORTIFY_UNKNOWN_SIZE && __bos0(buf) < len, 77 "'recv' called with size bigger than buffer") { 78 return recvfrom(socket, buf, len, flags, NULL, 0); 79 } 80 81 __BIONIC_FORTIFY_INLINE 82 ssize_t send(int socket, const void* const buf __pass_object_size0, size_t len, int flags) 83 __overloadable 84 __clang_error_if(__bos0(buf) != __BIONIC_FORTIFY_UNKNOWN_SIZE && __bos0(buf) < len, 85 "'send' called with size bigger than buffer") { 86 return sendto(socket, buf, len, flags, NULL, 0); 87 } 88 89 #undef __recvfrom_bad_size 90 #undef __sendto_bad_size 91 #endif /* __BIONIC_FORTIFY */ 92