/src/c-blosc/internal-complibs/zstd-1.5.6/common/compiler.h
Line | Count | Source |
1 | | /* |
2 | | * Copyright (c) Meta Platforms, Inc. and affiliates. |
3 | | * All rights reserved. |
4 | | * |
5 | | * This source code is licensed under both the BSD-style license (found in the |
6 | | * LICENSE file in the root directory of this source tree) and the GPLv2 (found |
7 | | * in the COPYING file in the root directory of this source tree). |
8 | | * You may select, at your option, one of the above-listed licenses. |
9 | | */ |
10 | | |
11 | | #ifndef ZSTD_COMPILER_H |
12 | | #define ZSTD_COMPILER_H |
13 | | |
14 | | #include <stddef.h> |
15 | | |
16 | | #include "portability_macros.h" |
17 | | |
18 | | /*-******************************************************* |
19 | | * Compiler specifics |
20 | | *********************************************************/ |
21 | | /* force inlining */ |
22 | | |
23 | | #if !defined(ZSTD_NO_INLINE) |
24 | | #if (defined(__GNUC__) && !defined(__STRICT_ANSI__)) || defined(__cplusplus) || defined(__STDC_VERSION__) && __STDC_VERSION__ >= 199901L /* C99 */ |
25 | | # define INLINE_KEYWORD inline |
26 | | #else |
27 | | # define INLINE_KEYWORD |
28 | | #endif |
29 | | |
30 | | #if defined(__GNUC__) || defined(__ICCARM__) |
31 | | # define FORCE_INLINE_ATTR __attribute__((always_inline)) |
32 | | #elif defined(_MSC_VER) |
33 | | # define FORCE_INLINE_ATTR __forceinline |
34 | | #else |
35 | | # define FORCE_INLINE_ATTR |
36 | | #endif |
37 | | |
38 | | #else |
39 | | |
40 | | #define INLINE_KEYWORD |
41 | | #define FORCE_INLINE_ATTR |
42 | | |
43 | | #endif |
44 | | |
45 | | /** |
46 | | On MSVC qsort requires that functions passed into it use the __cdecl calling conversion(CC). |
47 | | This explicitly marks such functions as __cdecl so that the code will still compile |
48 | | if a CC other than __cdecl has been made the default. |
49 | | */ |
50 | | #if defined(_MSC_VER) |
51 | | # define WIN_CDECL __cdecl |
52 | | #else |
53 | | # define WIN_CDECL |
54 | | #endif |
55 | | |
56 | | /* UNUSED_ATTR tells the compiler it is okay if the function is unused. */ |
57 | | #if defined(__GNUC__) |
58 | | # define UNUSED_ATTR __attribute__((unused)) |
59 | | #else |
60 | | # define UNUSED_ATTR |
61 | | #endif |
62 | | |
63 | | /** |
64 | | * FORCE_INLINE_TEMPLATE is used to define C "templates", which take constant |
65 | | * parameters. They must be inlined for the compiler to eliminate the constant |
66 | | * branches. |
67 | | */ |
68 | | #define FORCE_INLINE_TEMPLATE static INLINE_KEYWORD FORCE_INLINE_ATTR UNUSED_ATTR |
69 | | /** |
70 | | * HINT_INLINE is used to help the compiler generate better code. It is *not* |
71 | | * used for "templates", so it can be tweaked based on the compilers |
72 | | * performance. |
73 | | * |
74 | | * gcc-4.8 and gcc-4.9 have been shown to benefit from leaving off the |
75 | | * always_inline attribute. |
76 | | * |
77 | | * clang up to 5.0.0 (trunk) benefit tremendously from the always_inline |
78 | | * attribute. |
79 | | */ |
80 | | #if !defined(__clang__) && defined(__GNUC__) && __GNUC__ >= 4 && __GNUC_MINOR__ >= 8 && __GNUC__ < 5 |
81 | | # define HINT_INLINE static INLINE_KEYWORD |
82 | | #else |
83 | | # define HINT_INLINE FORCE_INLINE_TEMPLATE |
84 | | #endif |
85 | | |
86 | | /* "soft" inline : |
87 | | * The compiler is free to select if it's a good idea to inline or not. |
88 | | * The main objective is to silence compiler warnings |
89 | | * when a defined function in included but not used. |
90 | | * |
91 | | * Note : this macro is prefixed `MEM_` because it used to be provided by `mem.h` unit. |
92 | | * Updating the prefix is probably preferable, but requires a fairly large codemod, |
93 | | * since this name is used everywhere. |
94 | | */ |
95 | | #ifndef MEM_STATIC /* already defined in Linux Kernel mem.h */ |
96 | | #if defined(__GNUC__) |
97 | | # define MEM_STATIC static __inline UNUSED_ATTR |
98 | | #elif defined (__cplusplus) || (defined (__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */) |
99 | | # define MEM_STATIC static inline |
100 | | #elif defined(_MSC_VER) |
101 | | # define MEM_STATIC static __inline |
102 | | #else |
103 | | # define MEM_STATIC static /* this version may generate warnings for unused static functions; disable the relevant warning */ |
104 | | #endif |
105 | | #endif |
106 | | |
107 | | /* force no inlining */ |
108 | | #ifdef _MSC_VER |
109 | | # define FORCE_NOINLINE static __declspec(noinline) |
110 | | #else |
111 | | # if defined(__GNUC__) || defined(__ICCARM__) |
112 | | # define FORCE_NOINLINE static __attribute__((__noinline__)) |
113 | | # else |
114 | | # define FORCE_NOINLINE static |
115 | | # endif |
116 | | #endif |
117 | | |
118 | | |
119 | | /* target attribute */ |
120 | | #if defined(__GNUC__) || defined(__ICCARM__) |
121 | | # define TARGET_ATTRIBUTE(target) __attribute__((__target__(target))) |
122 | | #else |
123 | | # define TARGET_ATTRIBUTE(target) |
124 | | #endif |
125 | | |
126 | | /* Target attribute for BMI2 dynamic dispatch. |
127 | | * Enable lzcnt, bmi, and bmi2. |
128 | | * We test for bmi1 & bmi2. lzcnt is included in bmi1. |
129 | | */ |
130 | | #define BMI2_TARGET_ATTRIBUTE TARGET_ATTRIBUTE("lzcnt,bmi,bmi2") |
131 | | |
132 | | /* prefetch |
133 | | * can be disabled, by declaring NO_PREFETCH build macro */ |
134 | | #if defined(NO_PREFETCH) |
135 | | # define PREFETCH_L1(ptr) do { (void)(ptr); } while (0) /* disabled */ |
136 | | # define PREFETCH_L2(ptr) do { (void)(ptr); } while (0) /* disabled */ |
137 | | #else |
138 | | # if defined(_MSC_VER) && (defined(_M_X64) || defined(_M_I86)) && !defined(_M_ARM64EC) /* _mm_prefetch() is not defined outside of x86/x64 */ |
139 | | # include <mmintrin.h> /* https://msdn.microsoft.com/fr-fr/library/84szxsww(v=vs.90).aspx */ |
140 | | # define PREFETCH_L1(ptr) _mm_prefetch((const char*)(ptr), _MM_HINT_T0) |
141 | | # define PREFETCH_L2(ptr) _mm_prefetch((const char*)(ptr), _MM_HINT_T1) |
142 | | # elif defined(__GNUC__) && ( (__GNUC__ >= 4) || ( (__GNUC__ == 3) && (__GNUC_MINOR__ >= 1) ) ) |
143 | 0 | # define PREFETCH_L1(ptr) __builtin_prefetch((ptr), 0 /* rw==read */, 3 /* locality */) |
144 | 0 | # define PREFETCH_L2(ptr) __builtin_prefetch((ptr), 0 /* rw==read */, 2 /* locality */) |
145 | | # elif defined(__aarch64__) |
146 | | # define PREFETCH_L1(ptr) do { __asm__ __volatile__("prfm pldl1keep, %0" ::"Q"(*(ptr))); } while (0) |
147 | | # define PREFETCH_L2(ptr) do { __asm__ __volatile__("prfm pldl2keep, %0" ::"Q"(*(ptr))); } while (0) |
148 | | # else |
149 | | # define PREFETCH_L1(ptr) do { (void)(ptr); } while (0) /* disabled */ |
150 | | # define PREFETCH_L2(ptr) do { (void)(ptr); } while (0) /* disabled */ |
151 | | # endif |
152 | | #endif /* NO_PREFETCH */ |
153 | | |
154 | 0 | #define CACHELINE_SIZE 64 |
155 | | |
156 | | #define PREFETCH_AREA(p, s) \ |
157 | 0 | do { \ |
158 | 0 | const char* const _ptr = (const char*)(p); \ |
159 | 0 | size_t const _size = (size_t)(s); \ |
160 | 0 | size_t _pos; \ |
161 | 0 | for (_pos=0; _pos<_size; _pos+=CACHELINE_SIZE) { \ |
162 | 0 | PREFETCH_L2(_ptr + _pos); \ |
163 | 0 | } \ |
164 | 0 | } while (0) |
165 | | |
166 | | /* vectorization |
167 | | * older GCC (pre gcc-4.3 picked as the cutoff) uses a different syntax, |
168 | | * and some compilers, like Intel ICC and MCST LCC, do not support it at all. */ |
169 | | #if !defined(__INTEL_COMPILER) && !defined(__clang__) && defined(__GNUC__) && !defined(__LCC__) |
170 | | # if (__GNUC__ == 4 && __GNUC_MINOR__ > 3) || (__GNUC__ >= 5) |
171 | | # define DONT_VECTORIZE __attribute__((optimize("no-tree-vectorize"))) |
172 | | # else |
173 | | # define DONT_VECTORIZE _Pragma("GCC optimize(\"no-tree-vectorize\")") |
174 | | # endif |
175 | | #else |
176 | | # define DONT_VECTORIZE |
177 | | #endif |
178 | | |
179 | | /* Tell the compiler that a branch is likely or unlikely. |
180 | | * Only use these macros if it causes the compiler to generate better code. |
181 | | * If you can remove a LIKELY/UNLIKELY annotation without speed changes in gcc |
182 | | * and clang, please do. |
183 | | */ |
184 | | #if defined(__GNUC__) |
185 | 12.7M | #define LIKELY(x) (__builtin_expect((x), 1)) |
186 | 45.9M | #define UNLIKELY(x) (__builtin_expect((x), 0)) |
187 | | #else |
188 | | #define LIKELY(x) (x) |
189 | | #define UNLIKELY(x) (x) |
190 | | #endif |
191 | | |
192 | | #if __has_builtin(__builtin_unreachable) || (defined(__GNUC__) && (__GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 5))) |
193 | 0 | # define ZSTD_UNREACHABLE do { assert(0), __builtin_unreachable(); } while (0) |
194 | | #else |
195 | | # define ZSTD_UNREACHABLE do { assert(0); } while (0) |
196 | | #endif |
197 | | |
198 | | /* disable warnings */ |
199 | | #ifdef _MSC_VER /* Visual Studio */ |
200 | | # include <intrin.h> /* For Visual 2005 */ |
201 | | # pragma warning(disable : 4100) /* disable: C4100: unreferenced formal parameter */ |
202 | | # pragma warning(disable : 4127) /* disable: C4127: conditional expression is constant */ |
203 | | # pragma warning(disable : 4204) /* disable: C4204: non-constant aggregate initializer */ |
204 | | # pragma warning(disable : 4214) /* disable: C4214: non-int bitfields */ |
205 | | # pragma warning(disable : 4324) /* disable: C4324: padded structure */ |
206 | | #endif |
207 | | |
208 | | /*Like DYNAMIC_BMI2 but for compile time determination of BMI2 support*/ |
209 | | #ifndef STATIC_BMI2 |
210 | | # if defined(_MSC_VER) && (defined(_M_X64) || defined(_M_I86)) |
211 | | # ifdef __AVX2__ //MSVC does not have a BMI2 specific flag, but every CPU that supports AVX2 also supports BMI2 |
212 | | # define STATIC_BMI2 1 |
213 | | # endif |
214 | | # elif defined(__BMI2__) && defined(__x86_64__) && defined(__GNUC__) |
215 | | # define STATIC_BMI2 1 |
216 | | # endif |
217 | | #endif |
218 | | |
219 | | #ifndef STATIC_BMI2 |
220 | | #define STATIC_BMI2 0 |
221 | | #endif |
222 | | |
223 | | /* compile time determination of SIMD support */ |
224 | | #if !defined(ZSTD_NO_INTRINSICS) |
225 | | # if defined(__SSE2__) || defined(_M_AMD64) || (defined (_M_IX86) && defined(_M_IX86_FP) && (_M_IX86_FP >= 2)) |
226 | | # define ZSTD_ARCH_X86_SSE2 |
227 | | # endif |
228 | | # if defined(__ARM_NEON) || defined(_M_ARM64) |
229 | | # define ZSTD_ARCH_ARM_NEON |
230 | | # endif |
231 | | # |
232 | | # if defined(ZSTD_ARCH_X86_SSE2) |
233 | | # include <emmintrin.h> |
234 | | # elif defined(ZSTD_ARCH_ARM_NEON) |
235 | | # include <arm_neon.h> |
236 | | # endif |
237 | | #endif |
238 | | |
239 | | /* C-language Attributes are added in C23. */ |
240 | | #if defined(__STDC_VERSION__) && (__STDC_VERSION__ > 201710L) && defined(__has_c_attribute) |
241 | | # define ZSTD_HAS_C_ATTRIBUTE(x) __has_c_attribute(x) |
242 | | #else |
243 | | # define ZSTD_HAS_C_ATTRIBUTE(x) 0 |
244 | | #endif |
245 | | |
246 | | /* Only use C++ attributes in C++. Some compilers report support for C++ |
247 | | * attributes when compiling with C. |
248 | | */ |
249 | | #if defined(__cplusplus) && defined(__has_cpp_attribute) |
250 | | # define ZSTD_HAS_CPP_ATTRIBUTE(x) __has_cpp_attribute(x) |
251 | | #else |
252 | | # define ZSTD_HAS_CPP_ATTRIBUTE(x) 0 |
253 | | #endif |
254 | | |
255 | | /* Define ZSTD_FALLTHROUGH macro for annotating switch case with the 'fallthrough' attribute. |
256 | | * - C23: https://en.cppreference.com/w/c/language/attributes/fallthrough |
257 | | * - CPP17: https://en.cppreference.com/w/cpp/language/attributes/fallthrough |
258 | | * - Else: __attribute__((__fallthrough__)) |
259 | | */ |
260 | | #ifndef ZSTD_FALLTHROUGH |
261 | | # if ZSTD_HAS_C_ATTRIBUTE(fallthrough) |
262 | | # define ZSTD_FALLTHROUGH [[fallthrough]] |
263 | | # elif ZSTD_HAS_CPP_ATTRIBUTE(fallthrough) |
264 | | # define ZSTD_FALLTHROUGH [[fallthrough]] |
265 | | # elif __has_attribute(__fallthrough__) |
266 | | /* Leading semicolon is to satisfy gcc-11 with -pedantic. Without the semicolon |
267 | | * gcc complains about: a label can only be part of a statement and a declaration is not a statement. |
268 | | */ |
269 | 96.3k | # define ZSTD_FALLTHROUGH ; __attribute__((__fallthrough__)) |
270 | | # else |
271 | | # define ZSTD_FALLTHROUGH |
272 | | # endif |
273 | | #endif |
274 | | |
275 | | /*-************************************************************** |
276 | | * Alignment check |
277 | | *****************************************************************/ |
278 | | |
279 | | /* this test was initially positioned in mem.h, |
280 | | * but this file is removed (or replaced) for linux kernel |
281 | | * so it's now hosted in compiler.h, |
282 | | * which remains valid for both user & kernel spaces. |
283 | | */ |
284 | | |
285 | | #ifndef ZSTD_ALIGNOF |
286 | | # if defined(__GNUC__) || defined(_MSC_VER) |
287 | | /* covers gcc, clang & MSVC */ |
288 | | /* note : this section must come first, before C11, |
289 | | * due to a limitation in the kernel source generator */ |
290 | 0 | # define ZSTD_ALIGNOF(T) __alignof(T) |
291 | | |
292 | | # elif defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 201112L) |
293 | | /* C11 support */ |
294 | | # include <stdalign.h> |
295 | | # define ZSTD_ALIGNOF(T) alignof(T) |
296 | | |
297 | | # else |
298 | | /* No known support for alignof() - imperfect backup */ |
299 | | # define ZSTD_ALIGNOF(T) (sizeof(void*) < sizeof(T) ? sizeof(void*) : sizeof(T)) |
300 | | |
301 | | # endif |
302 | | #endif /* ZSTD_ALIGNOF */ |
303 | | |
304 | | /*-************************************************************** |
305 | | * Sanitizer |
306 | | *****************************************************************/ |
307 | | |
308 | | /** |
309 | | * Zstd relies on pointer overflow in its decompressor. |
310 | | * We add this attribute to functions that rely on pointer overflow. |
311 | | */ |
312 | | #ifndef ZSTD_ALLOW_POINTER_OVERFLOW_ATTR |
313 | | # if __has_attribute(no_sanitize) |
314 | | # if !defined(__clang__) && defined(__GNUC__) && __GNUC__ < 8 |
315 | | /* gcc < 8 only has signed-integer-overlow which triggers on pointer overflow */ |
316 | | # define ZSTD_ALLOW_POINTER_OVERFLOW_ATTR __attribute__((no_sanitize("signed-integer-overflow"))) |
317 | | # else |
318 | | /* older versions of clang [3.7, 5.0) will warn that pointer-overflow is ignored. */ |
319 | | # define ZSTD_ALLOW_POINTER_OVERFLOW_ATTR __attribute__((no_sanitize("pointer-overflow"))) |
320 | | # endif |
321 | | # else |
322 | | # define ZSTD_ALLOW_POINTER_OVERFLOW_ATTR |
323 | | # endif |
324 | | #endif |
325 | | |
326 | | /** |
327 | | * Helper function to perform a wrapped pointer difference without trigging |
328 | | * UBSAN. |
329 | | * |
330 | | * @returns lhs - rhs with wrapping |
331 | | */ |
332 | | MEM_STATIC |
333 | | ZSTD_ALLOW_POINTER_OVERFLOW_ATTR |
334 | | ptrdiff_t ZSTD_wrappedPtrDiff(unsigned char const* lhs, unsigned char const* rhs) |
335 | 0 | { |
336 | 0 | return lhs - rhs; |
337 | 0 | } Unexecuted instantiation: zstd_common.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_compress.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_compress_literals.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_compress_sequences.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_compress_superblock.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_double_fast.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_fast.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_lazy.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_ldm.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_opt.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_decompress.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_decompress_block.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: entropy_common.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: error_private.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: fse_decompress.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: fse_compress.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: hist.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: huf_compress.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: huf_decompress.c:ZSTD_wrappedPtrDiff Unexecuted instantiation: zstd_ddict.c:ZSTD_wrappedPtrDiff |
338 | | |
339 | | /** |
340 | | * Helper function to perform a wrapped pointer add without triggering UBSAN. |
341 | | * |
342 | | * @return ptr + add with wrapping |
343 | | */ |
344 | | MEM_STATIC |
345 | | ZSTD_ALLOW_POINTER_OVERFLOW_ATTR |
346 | | unsigned char const* ZSTD_wrappedPtrAdd(unsigned char const* ptr, ptrdiff_t add) |
347 | 0 | { |
348 | 0 | return ptr + add; |
349 | 0 | } Unexecuted instantiation: zstd_common.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_compress.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_compress_literals.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_compress_sequences.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_compress_superblock.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_double_fast.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_fast.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_lazy.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_ldm.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_opt.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_decompress.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_decompress_block.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: entropy_common.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: error_private.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: fse_decompress.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: fse_compress.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: hist.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: huf_compress.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: huf_decompress.c:ZSTD_wrappedPtrAdd Unexecuted instantiation: zstd_ddict.c:ZSTD_wrappedPtrAdd |
350 | | |
351 | | /** |
352 | | * Helper function to perform a wrapped pointer subtraction without triggering |
353 | | * UBSAN. |
354 | | * |
355 | | * @return ptr - sub with wrapping |
356 | | */ |
357 | | MEM_STATIC |
358 | | ZSTD_ALLOW_POINTER_OVERFLOW_ATTR |
359 | | unsigned char const* ZSTD_wrappedPtrSub(unsigned char const* ptr, ptrdiff_t sub) |
360 | 0 | { |
361 | 0 | return ptr - sub; |
362 | 0 | } Unexecuted instantiation: zstd_common.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_compress.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_compress_literals.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_compress_sequences.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_compress_superblock.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_double_fast.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_fast.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_lazy.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_ldm.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_opt.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_decompress.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_decompress_block.c:ZSTD_wrappedPtrSub Unexecuted instantiation: entropy_common.c:ZSTD_wrappedPtrSub Unexecuted instantiation: error_private.c:ZSTD_wrappedPtrSub Unexecuted instantiation: fse_decompress.c:ZSTD_wrappedPtrSub Unexecuted instantiation: fse_compress.c:ZSTD_wrappedPtrSub Unexecuted instantiation: hist.c:ZSTD_wrappedPtrSub Unexecuted instantiation: huf_compress.c:ZSTD_wrappedPtrSub Unexecuted instantiation: huf_decompress.c:ZSTD_wrappedPtrSub Unexecuted instantiation: zstd_ddict.c:ZSTD_wrappedPtrSub |
363 | | |
364 | | /** |
365 | | * Helper function to add to a pointer that works around C's undefined behavior |
366 | | * of adding 0 to NULL. |
367 | | * |
368 | | * @returns `ptr + add` except it defines `NULL + 0 == NULL`. |
369 | | */ |
370 | | MEM_STATIC |
371 | | unsigned char* ZSTD_maybeNullPtrAdd(unsigned char* ptr, ptrdiff_t add) |
372 | 188k | { |
373 | 188k | return add > 0 ? ptr + add : ptr; |
374 | 188k | } Unexecuted instantiation: zstd_common.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_compress.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_compress_literals.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_compress_sequences.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_compress_superblock.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_double_fast.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_fast.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_lazy.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_ldm.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_opt.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: zstd_decompress.c:ZSTD_maybeNullPtrAdd zstd_decompress_block.c:ZSTD_maybeNullPtrAdd Line | Count | Source | 372 | 105k | { | 373 | 105k | return add > 0 ? ptr + add : ptr; | 374 | 105k | } |
Unexecuted instantiation: entropy_common.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: error_private.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: fse_decompress.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: fse_compress.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: hist.c:ZSTD_maybeNullPtrAdd Unexecuted instantiation: huf_compress.c:ZSTD_maybeNullPtrAdd huf_decompress.c:ZSTD_maybeNullPtrAdd Line | Count | Source | 372 | 83.4k | { | 373 | 83.4k | return add > 0 ? ptr + add : ptr; | 374 | 83.4k | } |
Unexecuted instantiation: zstd_ddict.c:ZSTD_maybeNullPtrAdd |
375 | | |
376 | | /* Issue #3240 reports an ASAN failure on an llvm-mingw build. Out of an |
377 | | * abundance of caution, disable our custom poisoning on mingw. */ |
378 | | #ifdef __MINGW32__ |
379 | | #ifndef ZSTD_ASAN_DONT_POISON_WORKSPACE |
380 | | #define ZSTD_ASAN_DONT_POISON_WORKSPACE 1 |
381 | | #endif |
382 | | #ifndef ZSTD_MSAN_DONT_POISON_WORKSPACE |
383 | | #define ZSTD_MSAN_DONT_POISON_WORKSPACE 1 |
384 | | #endif |
385 | | #endif |
386 | | |
387 | | #if ZSTD_MEMORY_SANITIZER && !defined(ZSTD_MSAN_DONT_POISON_WORKSPACE) |
388 | | /* Not all platforms that support msan provide sanitizers/msan_interface.h. |
389 | | * We therefore declare the functions we need ourselves, rather than trying to |
390 | | * include the header file... */ |
391 | | #include <stddef.h> /* size_t */ |
392 | | #define ZSTD_DEPS_NEED_STDINT |
393 | | #include "zstd_deps.h" /* intptr_t */ |
394 | | |
395 | | /* Make memory region fully initialized (without changing its contents). */ |
396 | | void __msan_unpoison(const volatile void *a, size_t size); |
397 | | |
398 | | /* Make memory region fully uninitialized (without changing its contents). |
399 | | This is a legacy interface that does not update origin information. Use |
400 | | __msan_allocated_memory() instead. */ |
401 | | void __msan_poison(const volatile void *a, size_t size); |
402 | | |
403 | | /* Returns the offset of the first (at least partially) poisoned byte in the |
404 | | memory range, or -1 if the whole range is good. */ |
405 | | intptr_t __msan_test_shadow(const volatile void *x, size_t size); |
406 | | |
407 | | /* Print shadow and origin for the memory range to stderr in a human-readable |
408 | | format. */ |
409 | | void __msan_print_shadow(const volatile void *x, size_t size); |
410 | | #endif |
411 | | |
412 | | #if ZSTD_ADDRESS_SANITIZER && !defined(ZSTD_ASAN_DONT_POISON_WORKSPACE) |
413 | | /* Not all platforms that support asan provide sanitizers/asan_interface.h. |
414 | | * We therefore declare the functions we need ourselves, rather than trying to |
415 | | * include the header file... */ |
416 | | #include <stddef.h> /* size_t */ |
417 | | |
418 | | /** |
419 | | * Marks a memory region (<c>[addr, addr+size)</c>) as unaddressable. |
420 | | * |
421 | | * This memory must be previously allocated by your program. Instrumented |
422 | | * code is forbidden from accessing addresses in this region until it is |
423 | | * unpoisoned. This function is not guaranteed to poison the entire region - |
424 | | * it could poison only a subregion of <c>[addr, addr+size)</c> due to ASan |
425 | | * alignment restrictions. |
426 | | * |
427 | | * \note This function is not thread-safe because no two threads can poison or |
428 | | * unpoison memory in the same memory region simultaneously. |
429 | | * |
430 | | * \param addr Start of memory region. |
431 | | * \param size Size of memory region. */ |
432 | | void __asan_poison_memory_region(void const volatile *addr, size_t size); |
433 | | |
434 | | /** |
435 | | * Marks a memory region (<c>[addr, addr+size)</c>) as addressable. |
436 | | * |
437 | | * This memory must be previously allocated by your program. Accessing |
438 | | * addresses in this region is allowed until this region is poisoned again. |
439 | | * This function could unpoison a super-region of <c>[addr, addr+size)</c> due |
440 | | * to ASan alignment restrictions. |
441 | | * |
442 | | * \note This function is not thread-safe because no two threads can |
443 | | * poison or unpoison memory in the same memory region simultaneously. |
444 | | * |
445 | | * \param addr Start of memory region. |
446 | | * \param size Size of memory region. */ |
447 | | void __asan_unpoison_memory_region(void const volatile *addr, size_t size); |
448 | | #endif |
449 | | |
450 | | #endif /* ZSTD_COMPILER_H */ |