diff options
| author | sin | 2015-01-30 16:25:13 +0000 |
|---|---|---|
| committer | sin | 2015-01-30 16:25:13 +0000 |
| commit | e4fe187649888bfa54dd92e4c6b85683579058e8 (patch) | |
| tree | 15680c478430d3426315227c52bbc425e60725b9 /include/string.h | |
| parent | e6837a7874a40d5fe78dd3edd5f6dab68d87a962 (diff) | |
Remove __restrict
Diffstat (limited to '')
| -rw-r--r-- | include/string.h | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/include/string.h b/include/string.h index 962701d..eb3f652 100644 --- a/include/string.h +++ b/include/string.h | |||
| @@ -11,7 +11,7 @@ | |||
| 11 | __errordecl(__memcpy_error, "memcpy: buffer overflow detected"); | 11 | __errordecl(__memcpy_error, "memcpy: buffer overflow detected"); |
| 12 | static inline __attribute__ ((always_inline)) | 12 | static inline __attribute__ ((always_inline)) |
| 13 | void * | 13 | void * |
| 14 | __fortify_memcpy(void *__restrict dest, const void *__restrict src, size_t n) | 14 | __fortify_memcpy(void *dest, const void *src, size_t n) |
| 15 | { | 15 | { |
| 16 | size_t bos = __builtin_object_size(dest, 0); | 16 | size_t bos = __builtin_object_size(dest, 0); |
| 17 | char *d = dest; | 17 | char *d = dest; |
| @@ -32,7 +32,7 @@ __fortify_memcpy(void *__restrict dest, const void *__restrict src, size_t n) | |||
| 32 | __errordecl(__memmove_error, "memmove: buffer overflow detected"); | 32 | __errordecl(__memmove_error, "memmove: buffer overflow detected"); |
| 33 | static inline __attribute__ ((always_inline)) | 33 | static inline __attribute__ ((always_inline)) |
| 34 | void * | 34 | void * |
| 35 | __fortify_memmove(void *__restrict dest, const void *__restrict src, size_t n) | 35 | __fortify_memmove(void *dest, const void *src, size_t n) |
| 36 | { | 36 | { |
| 37 | size_t bos = __builtin_object_size(dest, 0); | 37 | size_t bos = __builtin_object_size(dest, 0); |
| 38 | 38 | ||
| @@ -61,7 +61,7 @@ __fortify_memset(void *dest, int c, size_t n) | |||
| 61 | 61 | ||
| 62 | static inline __attribute__ ((always_inline)) | 62 | static inline __attribute__ ((always_inline)) |
| 63 | char * | 63 | char * |
| 64 | __fortify_stpcpy(char *__restrict dest, const char *__restrict src) | 64 | __fortify_stpcpy(char *dest, const char *src) |
| 65 | { | 65 | { |
| 66 | size_t bos = __builtin_object_size(dest, 0); | 66 | size_t bos = __builtin_object_size(dest, 0); |
| 67 | 67 | ||
| @@ -73,7 +73,7 @@ __fortify_stpcpy(char *__restrict dest, const char *__restrict src) | |||
| 73 | __errordecl(__stpncpy_error, "stpncpy: buffer overflow detected"); | 73 | __errordecl(__stpncpy_error, "stpncpy: buffer overflow detected"); |
| 74 | static inline __attribute__ ((always_inline)) | 74 | static inline __attribute__ ((always_inline)) |
| 75 | char * | 75 | char * |
| 76 | __fortify_stpncpy(char *__restrict dest, const char *__restrict src, size_t n) | 76 | __fortify_stpncpy(char *dest, const char *src, size_t n) |
| 77 | { | 77 | { |
| 78 | size_t bos = __builtin_object_size(dest, 0); | 78 | size_t bos = __builtin_object_size(dest, 0); |
| 79 | 79 | ||
| @@ -87,7 +87,7 @@ __fortify_stpncpy(char *__restrict dest, const char *__restrict src, size_t n) | |||
| 87 | 87 | ||
| 88 | static inline __attribute__ ((always_inline)) | 88 | static inline __attribute__ ((always_inline)) |
| 89 | char * | 89 | char * |
| 90 | __fortify_strcat(char *__restrict dest, const char *__restrict src) | 90 | __fortify_strcat(char *dest, const char *src) |
| 91 | { | 91 | { |
| 92 | size_t bos = __builtin_object_size(dest, 0); | 92 | size_t bos = __builtin_object_size(dest, 0); |
| 93 | 93 | ||
| @@ -98,7 +98,7 @@ __fortify_strcat(char *__restrict dest, const char *__restrict src) | |||
| 98 | 98 | ||
| 99 | static inline __attribute__ ((always_inline)) | 99 | static inline __attribute__ ((always_inline)) |
| 100 | char * | 100 | char * |
| 101 | __fortify_strcpy(char *__restrict dest, const char *__restrict src) | 101 | __fortify_strcpy(char *dest, const char *src) |
| 102 | { | 102 | { |
| 103 | size_t bos = __builtin_object_size(dest, 0); | 103 | size_t bos = __builtin_object_size(dest, 0); |
| 104 | 104 | ||
| @@ -110,7 +110,7 @@ __fortify_strcpy(char *__restrict dest, const char *__restrict src) | |||
| 110 | __errordecl(__strncat_error, "strncat: buffer overflow detected"); | 110 | __errordecl(__strncat_error, "strncat: buffer overflow detected"); |
| 111 | static inline __attribute__ ((always_inline)) | 111 | static inline __attribute__ ((always_inline)) |
| 112 | char * | 112 | char * |
| 113 | __fortify_strncat(char *__restrict dest, const char *__restrict src, size_t n) | 113 | __fortify_strncat(char *dest, const char *src, size_t n) |
| 114 | { | 114 | { |
| 115 | size_t bos = __builtin_object_size(dest, 0); | 115 | size_t bos = __builtin_object_size(dest, 0); |
| 116 | size_t slen, dlen; | 116 | size_t slen, dlen; |
| @@ -132,7 +132,7 @@ __fortify_strncat(char *__restrict dest, const char *__restrict src, size_t n) | |||
| 132 | __errordecl(__strncpy_error, "strncpy: buffer overflow detected"); | 132 | __errordecl(__strncpy_error, "strncpy: buffer overflow detected"); |
| 133 | static inline __attribute__ ((always_inline)) | 133 | static inline __attribute__ ((always_inline)) |
| 134 | char * | 134 | char * |
| 135 | __fortify_strncpy(char *__restrict dest, const char *__restrict src, size_t n) | 135 | __fortify_strncpy(char *dest, const char *src, size_t n) |
| 136 | { | 136 | { |
| 137 | size_t bos = __builtin_object_size(dest, 0); | 137 | size_t bos = __builtin_object_size(dest, 0); |
| 138 | 138 | ||
| @@ -148,7 +148,7 @@ __fortify_strncpy(char *__restrict dest, const char *__restrict src, size_t n) | |||
| 148 | __errordecl(__mempcpy_error, "mempcpy: buffer overflow detected"); | 148 | __errordecl(__mempcpy_error, "mempcpy: buffer overflow detected"); |
| 149 | static inline __attribute__ ((always_inline)) | 149 | static inline __attribute__ ((always_inline)) |
| 150 | void * | 150 | void * |
| 151 | __fortify_mempcpy(void *__restrict dest, const void *__restrict src, size_t n) | 151 | __fortify_mempcpy(void *dest, const void *src, size_t n) |
| 152 | { | 152 | { |
| 153 | size_t bos = __builtin_object_size(dest, 0); | 153 | size_t bos = __builtin_object_size(dest, 0); |
| 154 | 154 | ||
| @@ -165,7 +165,7 @@ __fortify_mempcpy(void *__restrict dest, const void *__restrict src, size_t n) | |||
| 165 | __errordecl(__strlcat_error, "strlcat: buffer overflow detected"); | 165 | __errordecl(__strlcat_error, "strlcat: buffer overflow detected"); |
| 166 | static inline __attribute__ ((always_inline)) | 166 | static inline __attribute__ ((always_inline)) |
| 167 | size_t | 167 | size_t |
| 168 | __fortify_strlcat(char *__restrict dest, const char *__restrict src, size_t n) | 168 | __fortify_strlcat(char *dest, const char *src, size_t n) |
| 169 | { | 169 | { |
| 170 | size_t bos = __builtin_object_size(dest, 0); | 170 | size_t bos = __builtin_object_size(dest, 0); |
| 171 | 171 | ||
| @@ -180,7 +180,7 @@ __fortify_strlcat(char *__restrict dest, const char *__restrict src, size_t n) | |||
| 180 | __errordecl(__strlcpy_error, "strlcpy: buffer overflow detected"); | 180 | __errordecl(__strlcpy_error, "strlcpy: buffer overflow detected"); |
| 181 | static inline __attribute__ ((always_inline)) | 181 | static inline __attribute__ ((always_inline)) |
| 182 | size_t | 182 | size_t |
| 183 | __fortify_strlcpy(char *__restrict dest, const char *__restrict src, size_t n) | 183 | __fortify_strlcpy(char *dest, const char *src, size_t n) |
| 184 | { | 184 | { |
| 185 | size_t bos = __builtin_object_size(dest, 0); | 185 | size_t bos = __builtin_object_size(dest, 0); |
| 186 | 186 | ||
