summaryrefslogtreecommitdiff
path: root/include/unistd.h (follow)
AgeCommit message (Collapse)Author
2023-12-15Rename some macros to be more namespace-friendlyq66
2023-12-15Remove superfluous includesjvoisin
This should fix #32
2023-09-22Add more __diagnose_as_builtin annotationsjvoisin
2023-09-21Properly enable diagnose_as_builtin attributejvoisin
2023-08-22Add hardening for pwritejvoisin
2023-08-20Make use of __diagnose_as_builtinjvoisin
2023-07-09Add access annotations to unistd.hjvoisin
2023-06-25add initial clang supportDaniel Kolesa
2023-06-25avoid __extension__ with clangDaniel Kolesa
It seems useless and triggers 'error: expected external declaration'
2023-04-13Make use of __builtin_dynamic_object_sizejvoisin
GCC and Clang provide __builtin_dynamic_object_size (see documentation: https://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html), so we should make use of it when its available.
2019-03-13getgroups: do not trap on non-positive gidsetsizeinfo@mobile-stream.com
First, we should never check the size of __s if __l == 0 since the array is not going to be modified in that case. Second, negative __l is a well-defined error case (EINVAL) and we should never trap on a conforming code like this: r = getgroups(-1, NULL); if (r == -1) ... An example of non-desired behaviour for negative __l is the gnulib configure script which checks for getgroups(-1, ...) to catch some ancient FreeBSD kernel bug. The conftest binary traps even on good system (e.g. linux/musl) and the unnecessary getgroups wrapper is enforced for any project that uses gnulib. This patch also changes the size_t cast to avoid the explicit zero extension on systems where size_t differs from unsigned int.
2018-07-24Don't use __extension__ in C++ codeA. Wilcox
A few important notes: * __extension__ is a GNU C "alternate" keyword, not a C++ keyword.[1] * __extension__ is designed to work on "expressions"; it does work on #include_next in C mode, but it has no effect in C++ mode; the warning will still appear, if enabled, even with __extension__ preceding #include_next. This is because #include_next is not considered an expression in C++, so the compiler attaches __extension__ to the first expression of the header. All of this leads us to a build failure while building at least all Mozilla software. Moz has an alternate -isystem dir searched before /usr/include that overrides some headers, including <features.h>. The first statement in each of these headers is a #pragma, and since __extension__ is looking for an expression, and #pragma is a "null" expression, we end up with the following error: dist/system_wrappers/features.h:1:9: error: '#pragma' is not allowed here Since __extension__ has no effect on #include_next in C++ mode anyway, and since it can cause breakage, this commit omits __extension__ in C++ mode. [1]: https://gcc.gnu.org/onlinedocs/gcc-6.4.0/gcc/Alternate-Keywords.html
2016-09-10Bump copyright yearsin
2015-07-15Fix confstr() checksin
Do not crash unless the overflow would actually happen.
2015-06-25Add __extension__ mark to include_next to silence -pedanticSteven Barth
Signed-off-by: Steven Barth <steven@midlink.org>
2015-06-22unistd: fix signed / unsigned comparison in getgroupsSteven Barth
Signed-off-by: Steven Barth <steven@midlink.org>
2015-06-03Use namespace-safe macro, param and variable namesTrutz Behn
2015-05-13Add LICENSE headersin
2015-05-13Add fortify_fn() helper in fortify-headers.hsin
2015-03-14Use __typeof__ to in part avoid replicating function typesTrutz Behn
2015-03-14Add __artificial__ to aid in debuggingsin
2015-03-13Restore C++ supportsin
2015-03-13Rework fortify implementation to use extern inlinesin
Overriding functions with macros is legal in C but a lot of software is not prepared for it. Use the extern inline method to achieve the same result.
2015-03-11Put include guards in the reserved namespaceTrutz Behn
fortify-headers is considered part of the implementation.
2015-03-11Ignore C++ for nowsin
It is not legal to override standard functions using macros in C++. We may have to revisit this in the future.
2015-03-11Add ifdef guards for C++ codesin
2015-02-28Remove redundant checkssin
We can never have an array of more than SIZE_MAX/2/sizeof(gid_t) gid_t's.
2015-02-28Add readlink() and readlinkat() checkssin
2015-02-28Add ttyname_r() checksin
2015-02-28Add getgroups() checksin
Since getgroups() will never write more than NGROUPS_MAX entries we might as well cap len to that value. The following should probably not trap the program: gid_t set[NGROUPS_MAX]; getgroups(NGROUPS_MAX + 1, set);
2015-02-28Add getdomainname() checksin
2015-02-25Add getlogin_r() checksin
2015-02-24Add write() checksin
2015-02-24Remove compile time checkssin
These can produce false positives. Given that we support fortify source level 1 we shouldn't break valid code.
2015-02-23Add gethostname() checkssin
2015-02-22Remove header license commentssin
2015-02-05Add getcwd() checkssin
2015-02-05Add confstr() checkssin
2015-02-04Remember to #undef __errordeclsin
Thanks zhasha for spotting this.
2015-02-04Style fixsin
2015-01-30Remove pwrite/writesin
2015-01-30Add pread() and pwrite() checkssin
2015-01-29Style fixsin
2015-01-29Add read()/write() checkssin