summaryrefslogtreecommitdiff
path: root/src/internal/syscall.h
diff options
context:
space:
mode:
authorRich Felker <dalias@aerifal.cx>2012-10-25 15:40:58 -0400
committerRich Felker <dalias@aerifal.cx>2012-10-25 15:40:58 -0400
commit607b05aca683eee5bcdb7bf9af4ebf02adc635d9 (patch)
tree34c9c2435269738bb8d489346ea5e388b14dd850 /src/internal/syscall.h
parent80a45458e0d9b75d508110bd880d0ae0432b0356 (diff)
downloadmusl-607b05aca683eee5bcdb7bf9af4ebf02adc635d9.tar.gz
use explicit visibility to optimize a few hot-path function calls
on x86 and some other archs, functions which make function calls which might go through a PLT incur a significant overhead cost loading the GOT register prior to making the call. this load is utterly useless in musl, since all calls are bound at library-creation time using -Bsymbolic-functions, but the compiler has no way of knowing this, and attempts to set the default visibility to protected have failed due to bugs in GCC and binutils. this commit simply manually assigns hidden/protected visibility, as appropriate, to a few internal-use-only functions which have many callers, or which have callers that are hot paths like getc/putc. it shaves about 5k off the i386 libc.so with -Os. many of the improvements are in syscall wrappers, where the benefit is just size and performance improvement is unmeasurable noise amid the syscall overhead. however, stdio may be measurably faster. if in the future there are toolchains that can do the same thing globally without introducing linking bugs, it might be worth considering removing these workarounds.
Diffstat (limited to 'src/internal/syscall.h')
-rw-r--r--src/internal/syscall.h8
1 files changed, 5 insertions, 3 deletions
diff --git a/src/internal/syscall.h b/src/internal/syscall.h
index 50409ef8..7381efea 100644
--- a/src/internal/syscall.h
+++ b/src/internal/syscall.h
@@ -1,9 +1,11 @@
#ifndef _INTERNAL_SYSCALL_H
#define _INTERNAL_SYSCALL_H
-long __syscall_ret(unsigned long);
-long __syscall(long, ...);
-long __syscall_cp(long, long, long, long, long, long, long);
+#if defined(__PIC__) && (100*__GNUC__+__GNUC_MINOR__ >= 303)
+__attribute__((visibility("protected")))
+#endif
+long __syscall_ret(unsigned long), __syscall(long, ...),
+ __syscall_cp(long, long, long, long, long, long, long);
#include <sys/syscall.h>
#include "syscall_arch.h"