| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 1 | /*	$NetBSD: cdefs.h,v 1.58 2004/12/11 05:59:00 christos Exp $	*/ | 
 | 2 |  | 
 | 3 | /* | 
 | 4 |  * Copyright (c) 1991, 1993 | 
 | 5 |  *	The Regents of the University of California.  All rights reserved. | 
 | 6 |  * | 
 | 7 |  * This code is derived from software contributed to Berkeley by | 
 | 8 |  * Berkeley Software Design, Inc. | 
 | 9 |  * | 
 | 10 |  * Redistribution and use in source and binary forms, with or without | 
 | 11 |  * modification, are permitted provided that the following conditions | 
 | 12 |  * are met: | 
 | 13 |  * 1. Redistributions of source code must retain the above copyright | 
 | 14 |  *    notice, this list of conditions and the following disclaimer. | 
 | 15 |  * 2. Redistributions in binary form must reproduce the above copyright | 
 | 16 |  *    notice, this list of conditions and the following disclaimer in the | 
 | 17 |  *    documentation and/or other materials provided with the distribution. | 
 | 18 |  * 3. Neither the name of the University nor the names of its contributors | 
 | 19 |  *    may be used to endorse or promote products derived from this software | 
 | 20 |  *    without specific prior written permission. | 
 | 21 |  * | 
 | 22 |  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | 
 | 23 |  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
 | 24 |  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 
 | 25 |  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | 
 | 26 |  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 
 | 27 |  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | 
 | 28 |  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 
 | 29 |  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | 
 | 30 |  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 
 | 31 |  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
 | 32 |  * SUCH DAMAGE. | 
 | 33 |  * | 
 | 34 |  *	@(#)cdefs.h	8.8 (Berkeley) 1/9/95 | 
 | 35 |  */ | 
 | 36 |  | 
| Elliott Hughes | c0f4656 | 2018-11-09 15:38:52 -0800 | [diff] [blame] | 37 | #pragma once | 
| Elliott Hughes | 50cda38 | 2017-09-14 15:30:08 -0700 | [diff] [blame] | 38 |  | 
| Elliott Hughes | 80e9f65 | 2019-10-14 12:19:29 -0700 | [diff] [blame] | 39 | /** | 
 | 40 |  * `__BIONIC__` is always defined if you're building with bionic. See | 
 | 41 |  * https://android.googlesource.com/platform/bionic/+/master/docs/defines.md. | 
 | 42 |  */ | 
| Elliott Hughes | 50cda38 | 2017-09-14 15:30:08 -0700 | [diff] [blame] | 43 | #define __BIONIC__ 1 | 
 | 44 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 45 | #if defined(__cplusplus) | 
| Elliott Hughes | d1dd7c5 | 2016-08-10 14:18:01 -0700 | [diff] [blame] | 46 | #define __BEGIN_DECLS extern "C" { | 
 | 47 | #define __END_DECLS } | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 48 | #else | 
| Elliott Hughes | d1dd7c5 | 2016-08-10 14:18:01 -0700 | [diff] [blame] | 49 | #define __BEGIN_DECLS | 
 | 50 | #define __END_DECLS | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 51 | #endif | 
 | 52 |  | 
| Elliott Hughes | c0f4656 | 2018-11-09 15:38:52 -0800 | [diff] [blame] | 53 | #define __strong_alias(alias, sym) \ | 
 | 54 |     __asm__(".global " #alias "\n" \ | 
 | 55 |             #alias " = " #sym); | 
 | 56 |  | 
| Elliott Hughes | 5470c18 | 2016-07-22 11:36:17 -0700 | [diff] [blame] | 57 | #if defined(__cplusplus) | 
 | 58 | #define __BIONIC_CAST(_k,_t,_v) (_k<_t>(_v)) | 
 | 59 | #else | 
 | 60 | #define __BIONIC_CAST(_k,_t,_v) ((_t) (_v)) | 
 | 61 | #endif | 
 | 62 |  | 
| Dan Albert | a613d0d | 2017-10-05 16:39:33 -0700 | [diff] [blame] | 63 | #define __BIONIC_ALIGN(__value, __alignment) (((__value) + (__alignment)-1) & ~((__alignment)-1)) | 
 | 64 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 65 | /* | 
 | 66 |  * The __CONCAT macro is used to concatenate parts of symbol names, e.g. | 
 | 67 |  * with "#define OLD(foo) __CONCAT(old,foo)", OLD(foo) produces oldfoo. | 
 | 68 |  * The __CONCAT macro is a bit tricky -- make sure you don't put spaces | 
 | 69 |  * in between its arguments.  __CONCAT can also concatenate double-quoted | 
 | 70 |  * strings produced by the __STRING macro, but this only works with ANSI C. | 
 | 71 |  */ | 
 | 72 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 73 | #define	__P(protos)	protos		/* full-blown ANSI C */ | 
| Elliott Hughes | c0f4656 | 2018-11-09 15:38:52 -0800 | [diff] [blame] | 74 |  | 
| Elliott Hughes | 7763ab4 | 2018-07-24 12:45:58 -0700 | [diff] [blame] | 75 | #define	__CONCAT1(x,y)	x ## y | 
 | 76 | #define	__CONCAT(x,y)	__CONCAT1(x,y) | 
| Elliott Hughes | c0f4656 | 2018-11-09 15:38:52 -0800 | [diff] [blame] | 77 | #define	___CONCAT(x,y)	__CONCAT(x,y) | 
 | 78 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 79 | #define	__STRING(x)	#x | 
| Elliott Hughes | c0f4656 | 2018-11-09 15:38:52 -0800 | [diff] [blame] | 80 | #define	___STRING(x)	__STRING(x) | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 81 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 82 | #if defined(__cplusplus) | 
 | 83 | #define	__inline	inline		/* convert to C++ keyword */ | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 84 | #endif /* !__cplusplus */ | 
 | 85 |  | 
| Elliott Hughes | f484050 | 2016-06-06 17:35:53 -0700 | [diff] [blame] | 86 | #define __always_inline __attribute__((__always_inline__)) | 
| Elliott Hughes | 95fa061 | 2016-09-28 12:29:52 -0700 | [diff] [blame] | 87 | #define __attribute_const__ __attribute__((__const__)) | 
 | 88 | #define __attribute_pure__ __attribute__((__pure__)) | 
| Elliott Hughes | 44ddb31 | 2015-09-22 13:00:21 -0700 | [diff] [blame] | 89 | #define __dead __attribute__((__noreturn__)) | 
| Elliott Hughes | f484050 | 2016-06-06 17:35:53 -0700 | [diff] [blame] | 90 | #define __noreturn __attribute__((__noreturn__)) | 
| Elliott Hughes | 95fa061 | 2016-09-28 12:29:52 -0700 | [diff] [blame] | 91 | #define __mallocfunc  __attribute__((__malloc__)) | 
| Elliott Hughes | f484050 | 2016-06-06 17:35:53 -0700 | [diff] [blame] | 92 | #define __packed __attribute__((__packed__)) | 
| Josh Gao | 3403315 | 2019-05-13 13:15:50 -0700 | [diff] [blame] | 93 | #define __returns_twice __attribute__((__returns_twice__)) | 
| Elliott Hughes | f484050 | 2016-06-06 17:35:53 -0700 | [diff] [blame] | 94 | #define __unused __attribute__((__unused__)) | 
 | 95 | #define __used __attribute__((__used__)) | 
| Elliott Hughes | 06040fd | 2013-07-09 13:25:03 -0700 | [diff] [blame] | 96 |  | 
| Elliott Hughes | 9eb3ae1 | 2016-06-30 09:12:40 -0700 | [diff] [blame] | 97 | #define __printflike(x, y) __attribute__((__format__(printf, x, y))) | 
 | 98 | #define __scanflike(x, y) __attribute__((__format__(scanf, x, y))) | 
| Elliott Hughes | 3376c23 | 2018-02-13 23:14:12 -0800 | [diff] [blame] | 99 | #define __strftimelike(x) __attribute__((__format__(strftime, x, 0))) | 
| Elliott Hughes | d04c183 | 2013-05-14 16:08:43 -0700 | [diff] [blame] | 100 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 101 | /* | 
| Elliott Hughes | f484050 | 2016-06-06 17:35:53 -0700 | [diff] [blame] | 102 |  * GNU C version 2.96 added explicit branch prediction so that | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 103 |  * the CPU back-end can hint the processor and also so that | 
 | 104 |  * code blocks can be reordered such that the predicted path | 
 | 105 |  * sees a more linear flow, thus improving cache behavior, etc. | 
 | 106 |  * | 
 | 107 |  * The following two macros provide us with a way to use this | 
 | 108 |  * compiler feature.  Use __predict_true() if you expect the expression | 
 | 109 |  * to evaluate to true, and __predict_false() if you expect the | 
 | 110 |  * expression to evaluate to false. | 
 | 111 |  * | 
 | 112 |  * A few notes about usage: | 
 | 113 |  * | 
 | 114 |  *	* Generally, __predict_false() error condition checks (unless | 
 | 115 |  *	  you have some _strong_ reason to do otherwise, in which case | 
 | 116 |  *	  document it), and/or __predict_true() `no-error' condition | 
 | 117 |  *	  checks, assuming you want to optimize for the no-error case. | 
 | 118 |  * | 
 | 119 |  *	* Other than that, if you don't know the likelihood of a test | 
 | 120 |  *	  succeeding from empirical or other `hard' evidence, don't | 
 | 121 |  *	  make predictions. | 
 | 122 |  * | 
 | 123 |  *	* These are meant to be used in places that are run `a lot'. | 
 | 124 |  *	  It is wasteful to make predictions in code that is run | 
 | 125 |  *	  seldomly (e.g. at subsystem initialization time) as the | 
 | 126 |  *	  basic block reordering that this affects can often generate | 
 | 127 |  *	  larger code. | 
 | 128 |  */ | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 129 | #define	__predict_true(exp)	__builtin_expect((exp) != 0, 1) | 
 | 130 | #define	__predict_false(exp)	__builtin_expect((exp) != 0, 0) | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 131 |  | 
| Elliott Hughes | 24fad01 | 2013-02-04 13:44:14 -0800 | [diff] [blame] | 132 | #define __wur __attribute__((__warn_unused_result__)) | 
| Elliott Hughes | 24fad01 | 2013-02-04 13:44:14 -0800 | [diff] [blame] | 133 |  | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 134 | #define __errorattr(msg) __attribute__((unavailable(msg))) | 
 | 135 | #define __warnattr(msg) __attribute__((deprecated(msg))) | 
 | 136 | #define __warnattr_real(msg) __attribute__((deprecated(msg))) | 
 | 137 | #define __enable_if(cond, msg) __attribute__((enable_if(cond, msg))) | 
 | 138 | #define __clang_error_if(cond, msg) __attribute__((diagnose_if(cond, msg, "error"))) | 
 | 139 | #define __clang_warning_if(cond, msg) __attribute__((diagnose_if(cond, msg, "warning"))) | 
| Josh Gao | 8ba4424 | 2016-04-25 14:53:13 -0700 | [diff] [blame] | 140 |  | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 141 | #if defined(ANDROID_STRICT) | 
 | 142 | /* | 
 | 143 |  * For things that are sketchy, but not necessarily an error. FIXME: Enable | 
 | 144 |  * this. | 
 | 145 |  */ | 
 | 146 | #  define __warnattr_strict(msg) /* __warnattr(msg) */ | 
 | 147 | #else | 
 | 148 | #  define __warnattr_strict(msg) | 
 | 149 | #endif | 
| Yabin Cui | c9d0943 | 2015-02-13 10:52:35 -0800 | [diff] [blame] | 150 |  | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 151 | /* | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 152 |  * Some BSD source needs these macros. | 
 | 153 |  * Originally they embedded the rcs versions of each source file | 
 | 154 |  * in the generated binary. We strip strings during build anyway,. | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 155 |  */ | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 156 | #define __IDSTRING(_prefix,_s) /* nothing */ | 
 | 157 | #define __COPYRIGHT(_s) /* nothing */ | 
 | 158 | #define __FBSDID(_s) /* nothing */ | 
 | 159 | #define __RCSID(_s) /* nothing */ | 
 | 160 | #define __SCCSID(_s) /* nothing */ | 
| David 'Digit' Turner | 3527fd6 | 2010-06-14 17:18:35 -0700 | [diff] [blame] | 161 |  | 
| Elliott Hughes | f4c948a | 2014-08-19 11:16:41 -0700 | [diff] [blame] | 162 | /* | 
| Elliott Hughes | 3ba55f8 | 2016-06-08 18:11:23 -0700 | [diff] [blame] | 163 |  * With bionic, you always get all C and POSIX API. | 
| Elliott Hughes | fc8974b | 2014-09-04 08:52:38 -0700 | [diff] [blame] | 164 |  * | 
| Elliott Hughes | 3ba55f8 | 2016-06-08 18:11:23 -0700 | [diff] [blame] | 165 |  * If you want BSD and/or GNU extensions, _BSD_SOURCE and/or _GNU_SOURCE are | 
 | 166 |  * expected to be defined by callers before *any* standard header file is | 
 | 167 |  * included. | 
 | 168 |  * | 
 | 169 |  * In our header files we test against __USE_BSD and __USE_GNU. | 
| Elliott Hughes | f4c948a | 2014-08-19 11:16:41 -0700 | [diff] [blame] | 170 |  */ | 
| Elliott Hughes | f4c948a | 2014-08-19 11:16:41 -0700 | [diff] [blame] | 171 | #if defined(_GNU_SOURCE) | 
| Elliott Hughes | a348174 | 2017-11-28 14:47:17 -0800 | [diff] [blame] | 172 | #  define __USE_BSD 1 | 
 | 173 | #  define __USE_GNU 1 | 
| Elliott Hughes | fc8974b | 2014-09-04 08:52:38 -0700 | [diff] [blame] | 174 | #endif | 
 | 175 |  | 
 | 176 | #if defined(_BSD_SOURCE) | 
| Elliott Hughes | a348174 | 2017-11-28 14:47:17 -0800 | [diff] [blame] | 177 | #  define __USE_BSD 1 | 
| Elliott Hughes | f4c948a | 2014-08-19 11:16:41 -0700 | [diff] [blame] | 178 | #endif | 
 | 179 |  | 
| Elliott Hughes | a348174 | 2017-11-28 14:47:17 -0800 | [diff] [blame] | 180 | /* | 
 | 181 |  * _FILE_OFFSET_BITS 64 support. | 
 | 182 |  * See https://android.googlesource.com/platform/bionic/+/master/docs/32-bit-abi.md | 
 | 183 |  */ | 
| Dan Albert | f560537 | 2017-07-17 14:05:44 -0700 | [diff] [blame] | 184 | #if !defined(__LP64__) && defined(_FILE_OFFSET_BITS) && _FILE_OFFSET_BITS == 64 | 
| Elliott Hughes | a348174 | 2017-11-28 14:47:17 -0800 | [diff] [blame] | 185 | #  define __USE_FILE_OFFSET64 1 | 
| Elliott Hughes | 7c5a851 | 2017-07-20 10:00:28 -0700 | [diff] [blame] | 186 | /* | 
 | 187 |  * Note that __RENAME_IF_FILE_OFFSET64 is only valid if the off_t and off64_t | 
 | 188 |  * functions were both added at the same API level because if you use this, | 
 | 189 |  * you only have one declaration to attach __INTRODUCED_IN to. | 
 | 190 |  */ | 
| Elliott Hughes | a348174 | 2017-11-28 14:47:17 -0800 | [diff] [blame] | 191 | #  define __RENAME_IF_FILE_OFFSET64(func) __RENAME(func) | 
| Dan Albert | f560537 | 2017-07-17 14:05:44 -0700 | [diff] [blame] | 192 | #else | 
| Elliott Hughes | a348174 | 2017-11-28 14:47:17 -0800 | [diff] [blame] | 193 | #  define __RENAME_IF_FILE_OFFSET64(func) | 
| Elliott Hughes | 68dc20d | 2015-02-06 22:28:49 -0800 | [diff] [blame] | 194 | #endif | 
 | 195 |  | 
| Elliott Hughes | 50cda38 | 2017-09-14 15:30:08 -0700 | [diff] [blame] | 196 | /* | 
 | 197 |  * For LP32, `long double` == `double`. Historically many `long double` functions were incorrect | 
 | 198 |  * on x86, missing on most architectures, and even if they are present and correct, linking to | 
 | 199 |  * them just bloats your ELF file by adding extra relocations. The __BIONIC_LP32_USE_LONG_DOUBLE | 
 | 200 |  * macro lets us test the headers both ways (and adds an escape valve). | 
 | 201 |  * | 
 | 202 |  * Note that some functions have their __RENAME_LDBL commented out as a sign that although we could | 
 | 203 |  * use __RENAME_LDBL it would actually cause the function to be introduced later because the | 
 | 204 |  * `long double` variant appeared before the `double` variant. | 
 | 205 |  */ | 
 | 206 | #if defined(__LP64__) || defined(__BIONIC_LP32_USE_LONG_DOUBLE) | 
 | 207 | #define __RENAME_LDBL(rewrite,rewrite_api_level,regular_api_level) __INTRODUCED_IN(regular_api_level) | 
 | 208 | #else | 
 | 209 | #define __RENAME_LDBL(rewrite,rewrite_api_level,regular_api_level) __RENAME(rewrite) __INTRODUCED_IN(rewrite_api_level) | 
 | 210 | #endif | 
| The Android Open Source Project | 1dc9e47 | 2009-03-03 19:28:35 -0800 | [diff] [blame] | 211 |  | 
| Elliott Hughes | 25f17e4 | 2018-02-12 15:48:01 -0800 | [diff] [blame] | 212 | /* | 
 | 213 |  * On all architectures, `struct stat` == `struct stat64`, but LP32 didn't gain the *64 functions | 
 | 214 |  * until API level 21. | 
 | 215 |  */ | 
 | 216 | #if defined(__LP64__) || defined(__BIONIC_LP32_USE_STAT64) | 
 | 217 | #define __RENAME_STAT64(rewrite,rewrite_api_level,regular_api_level) __INTRODUCED_IN(regular_api_level) | 
 | 218 | #else | 
 | 219 | #define __RENAME_STAT64(rewrite,rewrite_api_level,regular_api_level) __RENAME(rewrite) __INTRODUCED_IN(rewrite_api_level) | 
 | 220 | #endif | 
 | 221 |  | 
| Elliott Hughes | caa15bf | 2014-04-03 13:59:14 -0700 | [diff] [blame] | 222 | /* glibc compatibility. */ | 
| Josh Gao | b36efa4 | 2016-09-15 13:55:41 -0700 | [diff] [blame] | 223 | #if defined(__LP64__) | 
| Elliott Hughes | caa15bf | 2014-04-03 13:59:14 -0700 | [diff] [blame] | 224 | #define __WORDSIZE 64 | 
 | 225 | #else | 
 | 226 | #define __WORDSIZE 32 | 
 | 227 | #endif | 
 | 228 |  | 
| Nick Kralevich | bd8e674 | 2013-08-28 13:22:52 -0700 | [diff] [blame] | 229 | /* | 
 | 230 |  * When _FORTIFY_SOURCE is defined, automatic bounds checking is | 
 | 231 |  * added to commonly used libc functions. If a buffer overrun is | 
 | 232 |  * detected, the program is safely aborted. | 
 | 233 |  * | 
| Elliott Hughes | ef2b2fe | 2017-04-16 08:50:58 -0700 | [diff] [blame] | 234 |  * https://android-developers.googleblog.com/2017/04/fortify-in-android.html | 
| Nick Kralevich | bd8e674 | 2013-08-28 13:22:52 -0700 | [diff] [blame] | 235 |  */ | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 236 |  | 
 | 237 | #define __BIONIC_FORTIFY_UNKNOWN_SIZE ((size_t) -1) | 
 | 238 |  | 
| George Burgess IV | d9551db | 2017-08-17 18:51:02 -0700 | [diff] [blame] | 239 | #if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE > 0 | 
| George Burgess IV | e5d66eb | 2017-10-30 21:41:22 -0700 | [diff] [blame] | 240 | /* | 
 | 241 |  * FORTIFY's _chk functions effectively disable ASAN's stdlib interceptors. | 
 | 242 |  * Additionally, the static analyzer/clang-tidy try to pattern match some | 
 | 243 |  * standard library functions, and FORTIFY sometimes interferes with this. So, | 
 | 244 |  * we turn FORTIFY off in both cases. | 
 | 245 |  */ | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 246 | #  if !__has_feature(address_sanitizer) && !defined(__clang_analyzer__) | 
| George Burgess IV | d9551db | 2017-08-17 18:51:02 -0700 | [diff] [blame] | 247 | #    define __BIONIC_FORTIFY 1 | 
 | 248 | #  endif | 
 | 249 | #endif | 
 | 250 |  | 
| Andreas Gampe | 00a6d5f | 2018-04-13 13:52:10 -0700 | [diff] [blame] | 251 | // As we move some FORTIFY checks to be always on, __bos needs to be | 
 | 252 | // always available. | 
| George Burgess IV | d9551db | 2017-08-17 18:51:02 -0700 | [diff] [blame] | 253 | #if defined(__BIONIC_FORTIFY) | 
| Elliott Hughes | 44ddb31 | 2015-09-22 13:00:21 -0700 | [diff] [blame] | 254 | #  if _FORTIFY_SOURCE == 2 | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 255 | #    define __bos_level 1 | 
| Elliott Hughes | 44ddb31 | 2015-09-22 13:00:21 -0700 | [diff] [blame] | 256 | #  else | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 257 | #    define __bos_level 0 | 
| Elliott Hughes | 44ddb31 | 2015-09-22 13:00:21 -0700 | [diff] [blame] | 258 | #  endif | 
| Andreas Gampe | 00a6d5f | 2018-04-13 13:52:10 -0700 | [diff] [blame] | 259 | #else | 
 | 260 | #  define __bos_level 0 | 
 | 261 | #endif | 
 | 262 |  | 
 | 263 | #define __bosn(s, n) __builtin_object_size((s), (n)) | 
 | 264 | #define __bos(s) __bosn((s), __bos_level) | 
 | 265 |  | 
 | 266 | #if defined(__BIONIC_FORTIFY) | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 267 | #  define __bos0(s) __bosn((s), 0) | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 268 | #  define __pass_object_size_n(n) __attribute__((pass_object_size(n))) | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 269 | /* | 
 | 270 |  * FORTIFY'ed functions all have either enable_if or pass_object_size, which | 
 | 271 |  * makes taking their address impossible. Saying (&read)(foo, bar, baz); will | 
 | 272 |  * therefore call the unFORTIFYed version of read. | 
 | 273 |  */ | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 274 | #  define __call_bypassing_fortify(fn) (&fn) | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 275 | /* | 
 | 276 |  * Because clang-FORTIFY uses overloads, we can't mark functions as `extern | 
 | 277 |  * inline` without making them available externally. | 
 | 278 |  */ | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 279 | #  define __BIONIC_FORTIFY_INLINE static __inline__ __always_inline | 
| Chih-Hung Hsieh | f81abef | 2018-01-25 15:30:27 -0800 | [diff] [blame] | 280 | /* | 
 | 281 |  * We should use __BIONIC_FORTIFY_VARIADIC instead of __BIONIC_FORTIFY_INLINE | 
 | 282 |  * for variadic functions because compilers cannot inline them. | 
 | 283 |  * The __always_inline attribute is useless, misleading, and could trigger | 
 | 284 |  * clang compiler bug to incorrectly inline variadic functions. | 
 | 285 |  */ | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 286 | #  define __BIONIC_FORTIFY_VARIADIC static __inline__ | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 287 | /* Error functions don't have bodies, so they can just be static. */ | 
| Logan Chien | ae4d10b | 2019-01-16 13:21:22 +0800 | [diff] [blame] | 288 | #  define __BIONIC_ERROR_FUNCTION_VISIBILITY static __attribute__((unused)) | 
| George Burgess IV | bd3d208 | 2017-04-04 17:34:02 -0700 | [diff] [blame] | 289 | #else | 
 | 290 | /* Further increase sharing for some inline functions */ | 
 | 291 | #  define __pass_object_size_n(n) | 
| Nick Kralevich | 1aaa178 | 2014-10-06 14:49:00 -0700 | [diff] [blame] | 292 | #endif | 
| George Burgess IV | bd3d208 | 2017-04-04 17:34:02 -0700 | [diff] [blame] | 293 | #define __pass_object_size __pass_object_size_n(__bos_level) | 
 | 294 | #define __pass_object_size0 __pass_object_size_n(0) | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 295 |  | 
| George Burgess IV | 5273dc5 | 2019-05-09 13:46:57 -0700 | [diff] [blame] | 296 | /* Intended for use in unevaluated contexts, e.g. diagnose_if conditions. */ | 
 | 297 | #define __bos_unevaluated_lt(bos_val, val) \ | 
 | 298 |   ((bos_val) != __BIONIC_FORTIFY_UNKNOWN_SIZE && (bos_val) < (val)) | 
 | 299 |  | 
| George Burgess IV | c03d596 | 2019-05-23 15:22:01 -0700 | [diff] [blame] | 300 | #define __bos_unevaluated_le(bos_val, val) \ | 
| George Burgess IV | 5273dc5 | 2019-05-09 13:46:57 -0700 | [diff] [blame] | 301 |   ((bos_val) != __BIONIC_FORTIFY_UNKNOWN_SIZE && (bos_val) <= (val)) | 
 | 302 |  | 
| George Burgess IV | 5da5dd5 | 2019-05-09 14:32:43 -0700 | [diff] [blame] | 303 | /* Intended for use in evaluated contexts. */ | 
| George Burgess IV | a1a09b2 | 2019-05-13 17:16:20 -0700 | [diff] [blame] | 304 | #define __bos_dynamic_check_impl_and(bos_val, op, index, cond) \ | 
 | 305 |   (bos_val == __BIONIC_FORTIFY_UNKNOWN_SIZE ||                 \ | 
 | 306 |    (__builtin_constant_p(index) && bos_val op index && (cond))) | 
 | 307 |  | 
| George Burgess IV | 5da5dd5 | 2019-05-09 14:32:43 -0700 | [diff] [blame] | 308 | #define __bos_dynamic_check_impl(bos_val, op, index) \ | 
| George Burgess IV | a1a09b2 | 2019-05-13 17:16:20 -0700 | [diff] [blame] | 309 |   __bos_dynamic_check_impl_and(bos_val, op, index, 1) | 
 | 310 |  | 
| George Burgess IV | c03d596 | 2019-05-23 15:22:01 -0700 | [diff] [blame] | 311 | #define __bos_trivially_ge(bos_val, index) __bos_dynamic_check_impl((bos_val), >=, (index)) | 
| George Burgess IV | a1a09b2 | 2019-05-13 17:16:20 -0700 | [diff] [blame] | 312 | #define __bos_trivially_gt(bos_val, index) __bos_dynamic_check_impl((bos_val), >, (index)) | 
| George Burgess IV | 5da5dd5 | 2019-05-09 14:32:43 -0700 | [diff] [blame] | 313 |  | 
| George Burgess IV | 1de2e35 | 2017-08-15 11:03:07 -0700 | [diff] [blame] | 314 | #if defined(__BIONIC_FORTIFY) || defined(__BIONIC_DECLARE_FORTIFY_HELPERS) | 
| George Burgess IV | b97049c | 2017-07-24 15:05:05 -0700 | [diff] [blame] | 315 | #  define __BIONIC_INCLUDE_FORTIFY_HEADERS 1 | 
 | 316 | #endif | 
 | 317 |  | 
| Elliott Hughes | 0d1a8a5 | 2018-07-24 19:36:51 +0000 | [diff] [blame] | 318 | #define __overloadable __attribute__((overloadable)) | 
| Nick Kralevich | 71a18dd | 2012-06-07 14:01:26 -0700 | [diff] [blame] | 319 |  | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 320 | /* Used to tag non-static symbols that are private and never exposed by the shared library. */ | 
 | 321 | #define __LIBC_HIDDEN__ __attribute__((visibility("hidden"))) | 
 | 322 |  | 
| Elliott Hughes | f47514d | 2016-07-19 13:56:46 -0700 | [diff] [blame] | 323 | /* | 
 | 324 |  * Used to tag symbols that should be hidden for 64-bit, | 
 | 325 |  * but visible to preserve binary compatibility for LP32. | 
 | 326 |  */ | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 327 | #ifdef __LP64__ | 
| Elliott Hughes | f47514d | 2016-07-19 13:56:46 -0700 | [diff] [blame] | 328 | #define __LIBC32_LEGACY_PUBLIC__ __attribute__((visibility("hidden"))) | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 329 | #else | 
| Elliott Hughes | f47514d | 2016-07-19 13:56:46 -0700 | [diff] [blame] | 330 | #define __LIBC32_LEGACY_PUBLIC__ __attribute__((visibility("default"))) | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 331 | #endif | 
 | 332 |  | 
| Elliott Hughes | 2cfb4e8 | 2014-08-18 14:45:42 -0700 | [diff] [blame] | 333 | /* Used to rename functions so that the compiler emits a call to 'x' rather than the function this was applied to. */ | 
 | 334 | #define __RENAME(x) __asm__(#x) | 
 | 335 |  | 
| Daniel Micay | fed2659 | 2015-07-18 13:55:51 -0400 | [diff] [blame] | 336 | #if __has_builtin(__builtin_umul_overflow) || __GNUC__ >= 5 | 
| Josh Gao | b36efa4 | 2016-09-15 13:55:41 -0700 | [diff] [blame] | 337 | #if defined(__LP64__) | 
| Daniel Micay | fed2659 | 2015-07-18 13:55:51 -0400 | [diff] [blame] | 338 | #define __size_mul_overflow(a, b, result) __builtin_umull_overflow(a, b, result) | 
 | 339 | #else | 
 | 340 | #define __size_mul_overflow(a, b, result) __builtin_umul_overflow(a, b, result) | 
 | 341 | #endif | 
 | 342 | #else | 
| Xia Yang | 6b45d57 | 2016-01-20 18:34:59 -0800 | [diff] [blame] | 343 | extern __inline__ __always_inline __attribute__((gnu_inline)) | 
 | 344 | int __size_mul_overflow(__SIZE_TYPE__ a, __SIZE_TYPE__ b, __SIZE_TYPE__ *result) { | 
| Daniel Micay | fed2659 | 2015-07-18 13:55:51 -0400 | [diff] [blame] | 345 |     *result = a * b; | 
 | 346 |     static const __SIZE_TYPE__ mul_no_overflow = 1UL << (sizeof(__SIZE_TYPE__) * 4); | 
 | 347 |     return (a >= mul_no_overflow || b >= mul_no_overflow) && a > 0 && (__SIZE_TYPE__)-1 / a < b; | 
 | 348 | } | 
 | 349 | #endif | 
 | 350 |  | 
| George Burgess IV | 7cc779f | 2017-02-09 00:00:31 -0800 | [diff] [blame] | 351 | /* | 
 | 352 |  * Used when we need to check for overflow when multiplying x and y. This | 
 | 353 |  * should only be used where __size_mul_overflow can not work, because it makes | 
 | 354 |  * assumptions that __size_mul_overflow doesn't (x and y are positive, ...), | 
 | 355 |  * *and* doesn't make use of compiler intrinsics, so it's probably slower than | 
 | 356 |  * __size_mul_overflow. | 
 | 357 |  */ | 
 | 358 | #define __unsafe_check_mul_overflow(x, y) ((__SIZE_TYPE__)-1 / (x) < (y)) | 
| Dan Albert | 3e6929d | 2016-07-26 16:27:31 -0700 | [diff] [blame] | 359 |  | 
| Elliott Hughes | c0f4656 | 2018-11-09 15:38:52 -0800 | [diff] [blame] | 360 | #include <android/versioning.h> | 
 | 361 | #include <android/api-level.h> | 
| Elliott Hughes | f69d852 | 2019-08-20 13:18:57 -0700 | [diff] [blame] | 362 | #if __has_include(<android/ndk-version.h>) | 
 | 363 | #include <android/ndk-version.h> | 
 | 364 | #endif |