scripts: Fix fortify checks if compiler does not support _FORTIFY_SOURCE=3
[glibc.git] / debug / mempcpy_chk.c
blobb47b14ee9af8c4035e29b068a709d9440993e2a4
1 /* Copy memory to memory until the specified number of bytes
2 has been copied, return pointer to following byte, with error checking.
3 Overlap is NOT handled correctly.
4 Copyright (C) 1991-2023 Free Software Foundation, Inc.
5 This file is part of the GNU C Library.
7 The GNU C Library is free software; you can redistribute it and/or
8 modify it under the terms of the GNU Lesser General Public
9 License as published by the Free Software Foundation; either
10 version 2.1 of the License, or (at your option) any later version.
12 The GNU C Library is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
17 You should have received a copy of the GNU Lesser General Public
18 License along with the GNU C Library; if not, see
19 <https://www.gnu.org/licenses/>. */
21 #include <string.h>
22 #include <memcopy.h>
24 void *
25 __mempcpy_chk (void *dstpp, const void *srcpp, size_t len, size_t dstlen)
27 if (__glibc_unlikely (dstlen < len))
28 __chk_fail ();
30 return __mempcpy (dstpp, srcpp, len);
32 libc_hidden_builtin_def (__mempcpy_chk)