2009-03-04 04:28:35 +01:00
|
|
|
/* $NetBSD: cdefs.h,v 1.58 2004/12/11 05:59:00 christos Exp $ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1991, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Berkeley Software Design, Inc.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)cdefs.h 8.8 (Berkeley) 1/9/95
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _SYS_CDEFS_H_
|
|
|
|
#define _SYS_CDEFS_H_
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Macro to test if we're using a GNU C compiler of a specific vintage
|
|
|
|
* or later, for e.g. features that appeared in a particular version
|
|
|
|
* of GNU C. Usage:
|
|
|
|
*
|
|
|
|
* #if __GNUC_PREREQ__(major, minor)
|
|
|
|
* ...cool feature...
|
|
|
|
* #else
|
|
|
|
* ...delete feature...
|
|
|
|
* #endif
|
|
|
|
*/
|
|
|
|
#ifdef __GNUC__
|
|
|
|
#define __GNUC_PREREQ__(x, y) \
|
|
|
|
((__GNUC__ == (x) && __GNUC_MINOR__ >= (y)) || \
|
|
|
|
(__GNUC__ > (x)))
|
|
|
|
#else
|
|
|
|
#define __GNUC_PREREQ__(x, y) 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/cdefs_elf.h>
|
|
|
|
|
|
|
|
#if defined(__cplusplus)
|
|
|
|
#define __BEGIN_DECLS extern "C" {
|
|
|
|
#define __END_DECLS }
|
|
|
|
#define __static_cast(x,y) static_cast<x>(y)
|
|
|
|
#else
|
|
|
|
#define __BEGIN_DECLS
|
|
|
|
#define __END_DECLS
|
|
|
|
#define __static_cast(x,y) (x)y
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The __CONCAT macro is used to concatenate parts of symbol names, e.g.
|
|
|
|
* with "#define OLD(foo) __CONCAT(old,foo)", OLD(foo) produces oldfoo.
|
|
|
|
* The __CONCAT macro is a bit tricky -- make sure you don't put spaces
|
|
|
|
* in between its arguments. __CONCAT can also concatenate double-quoted
|
|
|
|
* strings produced by the __STRING macro, but this only works with ANSI C.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define ___STRING(x) __STRING(x)
|
|
|
|
#define ___CONCAT(x,y) __CONCAT(x,y)
|
|
|
|
|
2011-03-17 10:56:25 +01:00
|
|
|
#if defined(__STDC__) || defined(__cplusplus)
|
2009-03-04 04:28:35 +01:00
|
|
|
#define __P(protos) protos /* full-blown ANSI C */
|
|
|
|
#define __CONCAT(x,y) x ## y
|
|
|
|
#define __STRING(x) #x
|
|
|
|
|
|
|
|
#define __const const /* define reserved names to standard */
|
|
|
|
#define __signed signed
|
|
|
|
#define __volatile volatile
|
|
|
|
#if defined(__cplusplus)
|
|
|
|
#define __inline inline /* convert to C++ keyword */
|
|
|
|
#else
|
|
|
|
#if !defined(__GNUC__) && !defined(__lint__)
|
|
|
|
#define __inline /* delete GCC keyword */
|
|
|
|
#endif /* !__GNUC__ && !__lint__ */
|
|
|
|
#endif /* !__cplusplus */
|
|
|
|
|
|
|
|
#else /* !(__STDC__ || __cplusplus) */
|
|
|
|
#define __P(protos) () /* traditional C preprocessor */
|
|
|
|
#define __CONCAT(x,y) x/**/y
|
|
|
|
#define __STRING(x) "x"
|
|
|
|
|
|
|
|
#ifndef __GNUC__
|
|
|
|
#define __const /* delete pseudo-ANSI C keywords */
|
|
|
|
#define __inline
|
|
|
|
#define __signed
|
|
|
|
#define __volatile
|
|
|
|
#endif /* !__GNUC__ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In non-ANSI C environments, new programs will want ANSI-only C keywords
|
|
|
|
* deleted from the program and old programs will want them left alone.
|
|
|
|
* Programs using the ANSI C keywords const, inline etc. as normal
|
|
|
|
* identifiers should define -DNO_ANSI_KEYWORDS.
|
|
|
|
*/
|
|
|
|
#ifndef NO_ANSI_KEYWORDS
|
|
|
|
#define const __const /* convert ANSI C keywords */
|
|
|
|
#define inline __inline
|
|
|
|
#define signed __signed
|
|
|
|
#define volatile __volatile
|
|
|
|
#endif /* !NO_ANSI_KEYWORDS */
|
|
|
|
#endif /* !(__STDC__ || __cplusplus) */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Used for internal auditing of the NetBSD source tree.
|
|
|
|
*/
|
|
|
|
#ifdef __AUDIT__
|
|
|
|
#define __aconst __const
|
|
|
|
#else
|
|
|
|
#define __aconst
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The following macro is used to remove const cast-away warnings
|
|
|
|
* from gcc -Wcast-qual; it should be used with caution because it
|
|
|
|
* can hide valid errors; in particular most valid uses are in
|
|
|
|
* situations where the API requires it, not to cast away string
|
|
|
|
* constants. We don't use *intptr_t on purpose here and we are
|
|
|
|
* explicit about unsigned long so that we don't have additional
|
|
|
|
* dependencies.
|
|
|
|
*/
|
|
|
|
#define __UNCONST(a) ((void *)(unsigned long)(const void *)(a))
|
|
|
|
|
|
|
|
/*
|
|
|
|
* GCC2 provides __extension__ to suppress warnings for various GNU C
|
|
|
|
* language extensions under "-ansi -pedantic".
|
|
|
|
*/
|
|
|
|
#if !__GNUC_PREREQ__(2, 0)
|
|
|
|
#define __extension__ /* delete __extension__ if non-gcc or gcc1 */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* GCC1 and some versions of GCC2 declare dead (non-returning) and
|
|
|
|
* pure (no side effects) functions using "volatile" and "const";
|
|
|
|
* unfortunately, these then cause warnings under "-ansi -pedantic".
|
|
|
|
* GCC2 uses a new, peculiar __attribute__((attrs)) style. All of
|
|
|
|
* these work for GNU C++ (modulo a slight glitch in the C++ grammar
|
|
|
|
* in the distribution version of 2.5.5).
|
|
|
|
*/
|
|
|
|
#if !__GNUC_PREREQ__(2, 5)
|
|
|
|
#define __attribute__(x) /* delete __attribute__ if non-gcc or gcc1 */
|
|
|
|
#if defined(__GNUC__) && !defined(__STRICT_ANSI__)
|
|
|
|
#define __dead __volatile
|
|
|
|
#define __pure __const
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Delete pseudo-keywords wherever they are not available or needed. */
|
|
|
|
#ifndef __dead
|
|
|
|
#define __dead
|
|
|
|
#define __pure
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if __GNUC_PREREQ__(2, 7)
|
|
|
|
#define __unused __attribute__((__unused__))
|
|
|
|
#else
|
|
|
|
#define __unused /* delete */
|
|
|
|
#endif
|
|
|
|
|
Upgrade libm.
This brings us up to date with FreeBSD HEAD, fixes various bugs, unifies
the set of functions we support on ARM, MIPS, and x86, fixes "long double",
adds ISO C99 support, and adds basic unit tests.
It turns out that our "long double" functions have always been broken
for non-normal numbers. This patch fixes that by not using the upstream
implementations and just forwarding to the regular "double" implementation
instead (since "long double" on Android is just "double" anyway, which is
what BSD doesn't support).
All the tests pass on ARM, MIPS, and x86, plus glibc on x86-64.
Bug: 3169850
Bug: 8012787
Bug: https://code.google.com/p/android/issues/detail?id=6697
Change-Id: If0c343030959c24bfc50d4d21c9530052c581837
2013-01-31 04:06:37 +01:00
|
|
|
#define __pure2 __attribute__((__const__)) /* Android-added: used by FreeBSD libm */
|
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
#if __GNUC_PREREQ__(3, 1)
|
|
|
|
#define __used __attribute__((__used__))
|
|
|
|
#else
|
|
|
|
#define __used /* delete */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if __GNUC_PREREQ__(2, 7)
|
|
|
|
#define __packed __attribute__((__packed__))
|
|
|
|
#define __aligned(x) __attribute__((__aligned__(x)))
|
|
|
|
#define __section(x) __attribute__((__section__(x)))
|
|
|
|
#elif defined(__lint__)
|
|
|
|
#define __packed /* delete */
|
|
|
|
#define __aligned(x) /* delete */
|
|
|
|
#define __section(x) /* delete */
|
|
|
|
#else
|
|
|
|
#define __packed error: no __packed for this compiler
|
|
|
|
#define __aligned(x) error: no __aligned for this compiler
|
|
|
|
#define __section(x) error: no __section for this compiler
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if !__GNUC_PREREQ__(2, 8)
|
|
|
|
#define __extension__
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if __GNUC_PREREQ__(2, 8)
|
|
|
|
#define __statement(x) __extension__(x)
|
|
|
|
#elif defined(lint)
|
|
|
|
#define __statement(x) (0)
|
|
|
|
#else
|
|
|
|
#define __statement(x) (x)
|
|
|
|
#endif
|
|
|
|
|
2013-07-09 22:25:03 +02:00
|
|
|
#define __nonnull(args) __attribute__((__nonnull__ args))
|
|
|
|
|
|
|
|
#define __printflike(x, y) __attribute__((__format__(printf, x, y))) __nonnull((x))
|
|
|
|
#define __scanflike(x, y) __attribute__((__format__(scanf, x, y))) __nonnull((x))
|
2013-05-15 01:08:43 +02:00
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
/*
|
|
|
|
* C99 defines the restrict type qualifier keyword, which was made available
|
|
|
|
* in GCC 2.92.
|
|
|
|
*/
|
2011-03-17 10:56:25 +01:00
|
|
|
#if defined(__STDC__VERSION__) && __STDC_VERSION__ >= 199901L
|
2009-03-04 04:28:35 +01:00
|
|
|
#define __restrict restrict
|
|
|
|
#else
|
|
|
|
#if !__GNUC_PREREQ__(2, 92)
|
|
|
|
#define __restrict /* delete __restrict when not supported */
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* C99 defines __func__ predefined identifier, which was made available
|
|
|
|
* in GCC 2.95.
|
|
|
|
*/
|
2011-03-17 10:56:25 +01:00
|
|
|
#if !defined(__STDC_VERSION__) || !(__STDC_VERSION__ >= 199901L)
|
2009-03-04 04:28:35 +01:00
|
|
|
#if __GNUC_PREREQ__(2, 6)
|
|
|
|
#define __func__ __PRETTY_FUNCTION__
|
|
|
|
#elif __GNUC_PREREQ__(2, 4)
|
|
|
|
#define __func__ __FUNCTION__
|
|
|
|
#else
|
|
|
|
#define __func__ ""
|
|
|
|
#endif
|
|
|
|
#endif /* !(__STDC_VERSION__ >= 199901L) */
|
|
|
|
|
|
|
|
#if defined(_KERNEL)
|
|
|
|
#if defined(NO_KERNEL_RCSIDS)
|
|
|
|
#undef __KERNEL_RCSID
|
|
|
|
#define __KERNEL_RCSID(_n, _s) /* nothing */
|
|
|
|
#endif /* NO_KERNEL_RCSIDS */
|
|
|
|
#endif /* _KERNEL */
|
|
|
|
|
|
|
|
#if !defined(_STANDALONE) && !defined(_KERNEL)
|
|
|
|
#ifdef __GNUC__
|
|
|
|
#define __RENAME(x) ___RENAME(x)
|
|
|
|
#else
|
|
|
|
#ifdef __lint__
|
|
|
|
#define __RENAME(x) __symbolrename(x)
|
|
|
|
#else
|
|
|
|
#error "No function renaming possible"
|
|
|
|
#endif /* __lint__ */
|
|
|
|
#endif /* __GNUC__ */
|
|
|
|
#else /* _STANDALONE || _KERNEL */
|
|
|
|
#define __RENAME(x) no renaming in kernel or standalone environment
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A barrier to stop the optimizer from moving code or assume live
|
|
|
|
* register values. This is gcc specific, the version is more or less
|
|
|
|
* arbitrary, might work with older compilers.
|
|
|
|
*/
|
|
|
|
#if __GNUC_PREREQ__(2, 95)
|
|
|
|
#define __insn_barrier() __asm __volatile("":::"memory")
|
|
|
|
#else
|
|
|
|
#define __insn_barrier() /* */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* GNU C version 2.96 adds explicit branch prediction so that
|
|
|
|
* the CPU back-end can hint the processor and also so that
|
|
|
|
* code blocks can be reordered such that the predicted path
|
|
|
|
* sees a more linear flow, thus improving cache behavior, etc.
|
|
|
|
*
|
|
|
|
* The following two macros provide us with a way to use this
|
|
|
|
* compiler feature. Use __predict_true() if you expect the expression
|
|
|
|
* to evaluate to true, and __predict_false() if you expect the
|
|
|
|
* expression to evaluate to false.
|
|
|
|
*
|
|
|
|
* A few notes about usage:
|
|
|
|
*
|
|
|
|
* * Generally, __predict_false() error condition checks (unless
|
|
|
|
* you have some _strong_ reason to do otherwise, in which case
|
|
|
|
* document it), and/or __predict_true() `no-error' condition
|
|
|
|
* checks, assuming you want to optimize for the no-error case.
|
|
|
|
*
|
|
|
|
* * Other than that, if you don't know the likelihood of a test
|
|
|
|
* succeeding from empirical or other `hard' evidence, don't
|
|
|
|
* make predictions.
|
|
|
|
*
|
|
|
|
* * These are meant to be used in places that are run `a lot'.
|
|
|
|
* It is wasteful to make predictions in code that is run
|
|
|
|
* seldomly (e.g. at subsystem initialization time) as the
|
|
|
|
* basic block reordering that this affects can often generate
|
|
|
|
* larger code.
|
|
|
|
*/
|
|
|
|
#if __GNUC_PREREQ__(2, 96)
|
|
|
|
#define __predict_true(exp) __builtin_expect((exp) != 0, 1)
|
|
|
|
#define __predict_false(exp) __builtin_expect((exp) != 0, 0)
|
|
|
|
#else
|
|
|
|
#define __predict_true(exp) (exp)
|
|
|
|
#define __predict_false(exp) (exp)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if __GNUC_PREREQ__(2, 96)
|
|
|
|
#define __noreturn __attribute__((__noreturn__))
|
|
|
|
#define __mallocfunc __attribute__((malloc))
|
2012-03-21 16:48:18 +01:00
|
|
|
#define __purefunc __attribute__((pure))
|
2009-03-04 04:28:35 +01:00
|
|
|
#else
|
|
|
|
#define __noreturn
|
|
|
|
#define __mallocfunc
|
2012-03-21 16:48:18 +01:00
|
|
|
#define __purefunc
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
|
Upgrade libm.
This brings us up to date with FreeBSD HEAD, fixes various bugs, unifies
the set of functions we support on ARM, MIPS, and x86, fixes "long double",
adds ISO C99 support, and adds basic unit tests.
It turns out that our "long double" functions have always been broken
for non-normal numbers. This patch fixes that by not using the upstream
implementations and just forwarding to the regular "double" implementation
instead (since "long double" on Android is just "double" anyway, which is
what BSD doesn't support).
All the tests pass on ARM, MIPS, and x86, plus glibc on x86-64.
Bug: 3169850
Bug: 8012787
Bug: https://code.google.com/p/android/issues/detail?id=6697
Change-Id: If0c343030959c24bfc50d4d21c9530052c581837
2013-01-31 04:06:37 +01:00
|
|
|
#if __GNUC_PREREQ__(3, 1)
|
|
|
|
#define __always_inline __attribute__((__always_inline__))
|
|
|
|
#else
|
|
|
|
#define __always_inline
|
|
|
|
#endif
|
|
|
|
|
2013-02-04 22:44:14 +01:00
|
|
|
#if __GNUC_PREREQ__(3, 4)
|
|
|
|
#define __wur __attribute__((__warn_unused_result__))
|
|
|
|
#else
|
|
|
|
#define __wur
|
|
|
|
#endif
|
|
|
|
|
2013-06-18 19:46:02 +02:00
|
|
|
#if __GNUC_PREREQ__(4, 3)
|
|
|
|
#define __errordecl(name, msg) extern void name(void) __attribute__((__error__(msg)))
|
2013-12-18 05:43:30 +01:00
|
|
|
#define __warnattr(msg) __attribute__((__warning__(msg)))
|
2013-06-18 19:46:02 +02:00
|
|
|
#else
|
|
|
|
#define __errordecl(name, msg) extern void name(void)
|
2013-12-18 05:43:30 +01:00
|
|
|
#define __warnattr(msg)
|
2013-06-18 19:46:02 +02:00
|
|
|
#endif
|
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
/*
|
|
|
|
* Macros for manipulating "link sets". Link sets are arrays of pointers
|
|
|
|
* to objects, which are gathered up by the linker.
|
|
|
|
*
|
|
|
|
* Object format-specific code has provided us with the following macros:
|
|
|
|
*
|
|
|
|
* __link_set_add_text(set, sym)
|
|
|
|
* Add a reference to the .text symbol `sym' to `set'.
|
|
|
|
*
|
|
|
|
* __link_set_add_rodata(set, sym)
|
|
|
|
* Add a reference to the .rodata symbol `sym' to `set'.
|
|
|
|
*
|
|
|
|
* __link_set_add_data(set, sym)
|
|
|
|
* Add a reference to the .data symbol `sym' to `set'.
|
|
|
|
*
|
|
|
|
* __link_set_add_bss(set, sym)
|
|
|
|
* Add a reference to the .bss symbol `sym' to `set'.
|
|
|
|
*
|
|
|
|
* __link_set_decl(set, ptype)
|
|
|
|
* Provide an extern declaration of the set `set', which
|
|
|
|
* contains an array of the pointer type `ptype'. This
|
|
|
|
* macro must be used by any code which wishes to reference
|
|
|
|
* the elements of a link set.
|
|
|
|
*
|
|
|
|
* __link_set_start(set)
|
|
|
|
* This points to the first slot in the link set.
|
|
|
|
*
|
|
|
|
* __link_set_end(set)
|
|
|
|
* This points to the (non-existent) slot after the last
|
|
|
|
* entry in the link set.
|
|
|
|
*
|
|
|
|
* __link_set_count(set)
|
|
|
|
* Count the number of entries in link set `set'.
|
|
|
|
*
|
|
|
|
* In addition, we provide the following macros for accessing link sets:
|
|
|
|
*
|
|
|
|
* __link_set_foreach(pvar, set)
|
|
|
|
* Iterate over the link set `set'. Because a link set is
|
|
|
|
* an array of pointers, pvar must be declared as "type **pvar",
|
|
|
|
* and the actual entry accessed as "*pvar".
|
|
|
|
*
|
|
|
|
* __link_set_entry(set, idx)
|
|
|
|
* Access the link set entry at index `idx' from set `set'.
|
|
|
|
*/
|
|
|
|
#define __link_set_foreach(pvar, set) \
|
|
|
|
for (pvar = __link_set_start(set); pvar < __link_set_end(set); pvar++)
|
|
|
|
|
|
|
|
#define __link_set_entry(set, idx) (__link_set_begin(set)[idx])
|
|
|
|
|
2010-06-15 02:18:35 +02:00
|
|
|
/*
|
2013-02-07 02:08:15 +01:00
|
|
|
* Some of the FreeBSD sources used in Bionic need this.
|
2010-06-15 02:18:35 +02:00
|
|
|
* Originally, this is used to embed the rcs versions of each source file
|
|
|
|
* in the generated binary. We certainly don't want this in Bionic.
|
|
|
|
*/
|
2013-02-07 02:08:15 +01:00
|
|
|
#define __FBSDID(s) /* nothing */
|
2010-06-15 02:18:35 +02:00
|
|
|
|
2010-06-17 01:36:41 +02:00
|
|
|
/*-
|
|
|
|
* The following definitions are an extension of the behavior originally
|
|
|
|
* implemented in <sys/_posix.h>, but with a different level of granularity.
|
|
|
|
* POSIX.1 requires that the macros we test be defined before any standard
|
|
|
|
* header file is included.
|
|
|
|
*
|
|
|
|
* Here's a quick run-down of the versions:
|
|
|
|
* defined(_POSIX_SOURCE) 1003.1-1988
|
|
|
|
* _POSIX_C_SOURCE == 1 1003.1-1990
|
|
|
|
* _POSIX_C_SOURCE == 2 1003.2-1992 C Language Binding Option
|
|
|
|
* _POSIX_C_SOURCE == 199309 1003.1b-1993
|
|
|
|
* _POSIX_C_SOURCE == 199506 1003.1c-1995, 1003.1i-1995,
|
|
|
|
* and the omnibus ISO/IEC 9945-1: 1996
|
|
|
|
* _POSIX_C_SOURCE == 200112 1003.1-2001
|
|
|
|
* _POSIX_C_SOURCE == 200809 1003.1-2008
|
|
|
|
*
|
|
|
|
* In addition, the X/Open Portability Guide, which is now the Single UNIX
|
|
|
|
* Specification, defines a feature-test macro which indicates the version of
|
|
|
|
* that specification, and which subsumes _POSIX_C_SOURCE.
|
|
|
|
*
|
|
|
|
* Our macros begin with two underscores to avoid namespace screwage.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Deal with IEEE Std. 1003.1-1990, in which _POSIX_C_SOURCE == 1. */
|
|
|
|
#if defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE == 1
|
|
|
|
#undef _POSIX_C_SOURCE /* Probably illegal, but beyond caring now. */
|
|
|
|
#define _POSIX_C_SOURCE 199009
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Deal with IEEE Std. 1003.2-1992, in which _POSIX_C_SOURCE == 2. */
|
|
|
|
#if defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE == 2
|
|
|
|
#undef _POSIX_C_SOURCE
|
|
|
|
#define _POSIX_C_SOURCE 199209
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Deal with various X/Open Portability Guides and Single UNIX Spec. */
|
|
|
|
#ifdef _XOPEN_SOURCE
|
|
|
|
#if _XOPEN_SOURCE - 0 >= 700
|
|
|
|
#define __XSI_VISIBLE 700
|
|
|
|
#undef _POSIX_C_SOURCE
|
|
|
|
#define _POSIX_C_SOURCE 200809
|
|
|
|
#elif _XOPEN_SOURCE - 0 >= 600
|
|
|
|
#define __XSI_VISIBLE 600
|
|
|
|
#undef _POSIX_C_SOURCE
|
|
|
|
#define _POSIX_C_SOURCE 200112
|
|
|
|
#elif _XOPEN_SOURCE - 0 >= 500
|
|
|
|
#define __XSI_VISIBLE 500
|
|
|
|
#undef _POSIX_C_SOURCE
|
|
|
|
#define _POSIX_C_SOURCE 199506
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Deal with all versions of POSIX. The ordering relative to the tests above is
|
|
|
|
* important.
|
|
|
|
*/
|
|
|
|
#if defined(_POSIX_SOURCE) && !defined(_POSIX_C_SOURCE)
|
|
|
|
#define _POSIX_C_SOURCE 198808
|
|
|
|
#endif
|
|
|
|
#ifdef _POSIX_C_SOURCE
|
|
|
|
#if _POSIX_C_SOURCE >= 200809
|
|
|
|
#define __POSIX_VISIBLE 200809
|
|
|
|
#define __ISO_C_VISIBLE 1999
|
|
|
|
#elif _POSIX_C_SOURCE >= 200112
|
|
|
|
#define __POSIX_VISIBLE 200112
|
|
|
|
#define __ISO_C_VISIBLE 1999
|
|
|
|
#elif _POSIX_C_SOURCE >= 199506
|
|
|
|
#define __POSIX_VISIBLE 199506
|
|
|
|
#define __ISO_C_VISIBLE 1990
|
|
|
|
#elif _POSIX_C_SOURCE >= 199309
|
|
|
|
#define __POSIX_VISIBLE 199309
|
|
|
|
#define __ISO_C_VISIBLE 1990
|
|
|
|
#elif _POSIX_C_SOURCE >= 199209
|
|
|
|
#define __POSIX_VISIBLE 199209
|
|
|
|
#define __ISO_C_VISIBLE 1990
|
|
|
|
#elif _POSIX_C_SOURCE >= 199009
|
|
|
|
#define __POSIX_VISIBLE 199009
|
|
|
|
#define __ISO_C_VISIBLE 1990
|
|
|
|
#else
|
|
|
|
#define __POSIX_VISIBLE 198808
|
|
|
|
#define __ISO_C_VISIBLE 0
|
|
|
|
#endif /* _POSIX_C_SOURCE */
|
|
|
|
#else
|
|
|
|
/*-
|
|
|
|
* Deal with _ANSI_SOURCE:
|
|
|
|
* If it is defined, and no other compilation environment is explicitly
|
|
|
|
* requested, then define our internal feature-test macros to zero. This
|
|
|
|
* makes no difference to the preprocessor (undefined symbols in preprocessing
|
|
|
|
* expressions are defined to have value zero), but makes it more convenient for
|
|
|
|
* a test program to print out the values.
|
|
|
|
*
|
|
|
|
* If a program mistakenly defines _ANSI_SOURCE and some other macro such as
|
|
|
|
* _POSIX_C_SOURCE, we will assume that it wants the broader compilation
|
|
|
|
* environment (and in fact we will never get here).
|
|
|
|
*/
|
|
|
|
#if defined(_ANSI_SOURCE) /* Hide almost everything. */
|
|
|
|
#define __POSIX_VISIBLE 0
|
|
|
|
#define __XSI_VISIBLE 0
|
|
|
|
#define __BSD_VISIBLE 0
|
|
|
|
#define __ISO_C_VISIBLE 1990
|
|
|
|
#elif defined(_C99_SOURCE) /* Localism to specify strict C99 env. */
|
|
|
|
#define __POSIX_VISIBLE 0
|
|
|
|
#define __XSI_VISIBLE 0
|
|
|
|
#define __BSD_VISIBLE 0
|
|
|
|
#define __ISO_C_VISIBLE 1999
|
|
|
|
#else /* Default environment: show everything. */
|
|
|
|
#define __POSIX_VISIBLE 200809
|
|
|
|
#define __XSI_VISIBLE 700
|
|
|
|
#define __BSD_VISIBLE 1
|
|
|
|
#define __ISO_C_VISIBLE 1999
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Default values.
|
|
|
|
*/
|
|
|
|
#ifndef __XPG_VISIBLE
|
|
|
|
# define __XPG_VISIBLE 700
|
|
|
|
#endif
|
|
|
|
#ifndef __POSIX_VISIBLE
|
|
|
|
# define __POSIX_VISIBLE 200809
|
|
|
|
#endif
|
|
|
|
#ifndef __ISO_C_VISIBLE
|
|
|
|
# define __ISO_C_VISIBLE 1999
|
|
|
|
#endif
|
|
|
|
#ifndef __BSD_VISIBLE
|
|
|
|
# define __BSD_VISIBLE 1
|
|
|
|
#endif
|
2010-06-15 02:18:35 +02:00
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
#define __BIONIC__ 1
|
2010-12-06 12:05:11 +01:00
|
|
|
#include <android/api-level.h>
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2013-08-28 22:22:52 +02:00
|
|
|
/*
|
|
|
|
* When _FORTIFY_SOURCE is defined, automatic bounds checking is
|
|
|
|
* added to commonly used libc functions. If a buffer overrun is
|
|
|
|
* detected, the program is safely aborted.
|
|
|
|
*
|
|
|
|
* See
|
|
|
|
* http://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html for details.
|
|
|
|
*/
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
#if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE > 0 && defined(__OPTIMIZE__) && __OPTIMIZE__ > 0
|
2013-03-22 18:58:55 +01:00
|
|
|
#define __BIONIC_FORTIFY 1
|
2013-04-29 23:07:06 +02:00
|
|
|
#if _FORTIFY_SOURCE == 2
|
2013-04-30 01:29:37 +02:00
|
|
|
#define __bos(s) __builtin_object_size((s), 1)
|
2013-04-29 23:07:06 +02:00
|
|
|
#else
|
2013-04-30 01:29:37 +02:00
|
|
|
#define __bos(s) __builtin_object_size((s), 0)
|
2013-04-29 23:07:06 +02:00
|
|
|
#endif
|
2013-08-28 22:22:52 +02:00
|
|
|
#define __bos0(s) __builtin_object_size((s), 0)
|
2013-04-29 23:07:06 +02:00
|
|
|
|
2012-06-07 23:01:26 +02:00
|
|
|
#define __BIONIC_FORTIFY_INLINE \
|
2014-02-04 00:41:57 +01:00
|
|
|
extern __inline__ \
|
2012-06-07 23:01:26 +02:00
|
|
|
__attribute__ ((always_inline)) \
|
libc: add limited FORTIFY_SOURCE support for clang
In 829c089f83ddee37203b52bcb294867a9ae7bdbc, we disabled all
FORTIFY_SOURCE support when compiling under clang. At the time,
we didn't have proper test cases, and couldn't easily create targeted
clang tests.
This change re-enables FORTIFY_SOURCE support under clang for a
limited set of functions, where we have explicit unittests available.
The functions are:
* memcpy
* memmove
* strcpy
* strncpy
* strcat
* strncat
* memset
* strlen (with modifications)
* strchr (with modifications)
* strrchr (with modifications)
It may be possible, in the future, to enable other functions. However,
I need to write unittests first.
For strlen, strchr, and strrchr, clang unconditionally calls the
fortified version of the relevant function. If it doesn't know the
size of the buffer it's dealing with, it passes in ((size_t) -1),
which is the largest possible size_t.
I added two new clang specific unittest files, primarily copied
from fortify?_test.cpp.
I've also rebuild the entire system with these changes, and didn't
observe any obvious problems.
Change-Id: If12a15089bb0ffe93824b485290d05b14355fcaa
2013-06-17 23:49:19 +02:00
|
|
|
__attribute__ ((gnu_inline))
|
2012-06-07 23:01:26 +02:00
|
|
|
#endif
|
2013-03-22 18:58:55 +01:00
|
|
|
#define __BIONIC_FORTIFY_UNKNOWN_SIZE ((size_t) -1)
|
2012-06-07 23:01:26 +02:00
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif /* !_SYS_CDEFS_H_ */
|