compiler-gcc.h 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. /* SPDX-License-Identifier: GPL-2.0 */
  2. #ifndef __LINUX_COMPILER_TYPES_H
  3. #error "Please don't include <linux/compiler-gcc.h> directly, include <linux/compiler.h> instead."
  4. #endif
  5. /*
  6. * Common definitions for all gcc versions go here.
  7. */
  8. #define GCC_VERSION (__GNUC__ * 10000 \
  9. + __GNUC_MINOR__ * 100 \
  10. + __GNUC_PATCHLEVEL__)
  11. #if GCC_VERSION < 40600
  12. # error Sorry, your compiler is too old - please upgrade it.
  13. #endif
  14. /* Optimization barrier */
  15. /* The "volatile" is due to gcc bugs */
  16. #define barrier() __asm__ __volatile__("": : :"memory")
  17. /*
  18. * This version is i.e. to prevent dead stores elimination on @ptr
  19. * where gcc and llvm may behave differently when otherwise using
  20. * normal barrier(): while gcc behavior gets along with a normal
  21. * barrier(), llvm needs an explicit input variable to be assumed
  22. * clobbered. The issue is as follows: while the inline asm might
  23. * access any memory it wants, the compiler could have fit all of
  24. * @ptr into memory registers instead, and since @ptr never escaped
  25. * from that, it proved that the inline asm wasn't touching any of
  26. * it. This version works well with both compilers, i.e. we're telling
  27. * the compiler that the inline asm absolutely may see the contents
  28. * of @ptr. See also: https://llvm.org/bugs/show_bug.cgi?id=15495
  29. */
  30. #define barrier_data(ptr) __asm__ __volatile__("": :"r"(ptr) :"memory")
  31. /*
  32. * This macro obfuscates arithmetic on a variable address so that gcc
  33. * shouldn't recognize the original var, and make assumptions about it.
  34. *
  35. * This is needed because the C standard makes it undefined to do
  36. * pointer arithmetic on "objects" outside their boundaries and the
  37. * gcc optimizers assume this is the case. In particular they
  38. * assume such arithmetic does not wrap.
  39. *
  40. * A miscompilation has been observed because of this on PPC.
  41. * To work around it we hide the relationship of the pointer and the object
  42. * using this macro.
  43. *
  44. * Versions of the ppc64 compiler before 4.1 had a bug where use of
  45. * RELOC_HIDE could trash r30. The bug can be worked around by changing
  46. * the inline assembly constraint from =g to =r, in this particular
  47. * case either is valid.
  48. */
  49. #define RELOC_HIDE(ptr, off) \
  50. ({ \
  51. unsigned long __ptr; \
  52. __asm__ ("" : "=r"(__ptr) : "0"(ptr)); \
  53. (typeof(ptr)) (__ptr + (off)); \
  54. })
  55. /* Make the optimizer believe the variable can be manipulated arbitrarily. */
  56. #define OPTIMIZER_HIDE_VAR(var) \
  57. __asm__ ("" : "=r" (var) : "0" (var))
  58. /*
  59. * A trick to suppress uninitialized variable warning without generating any
  60. * code
  61. */
  62. #define uninitialized_var(x) x = x
  63. #ifdef __CHECKER__
  64. #define __must_be_array(a) 0
  65. #else
  66. /* &a[0] degrades to a pointer: a different type from an array */
  67. #define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0]))
  68. #endif
  69. #ifdef RETPOLINE
  70. #define __noretpoline __attribute__((indirect_branch("keep")))
  71. #endif
  72. /*
  73. * it doesn't make sense on ARM (currently the only user of __naked)
  74. * to trace naked functions because then mcount is called without
  75. * stack and frame pointer being set up and there is no chance to
  76. * restore the lr register to the value before mcount was called.
  77. *
  78. * The asm() bodies of naked functions often depend on standard calling
  79. * conventions, therefore they must be noinline and noclone.
  80. *
  81. * GCC 4.[56] currently fail to enforce this, so we must do so ourselves.
  82. * See GCC PR44290.
  83. */
  84. #define __naked __attribute__((naked)) noinline __noclone notrace
  85. #define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
  86. #define __optimize(level) __attribute__((__optimize__(level)))
  87. #define __compiletime_object_size(obj) __builtin_object_size(obj, 0)
  88. #ifndef __CHECKER__
  89. #define __compiletime_warning(message) __attribute__((warning(message)))
  90. #define __compiletime_error(message) __attribute__((error(message)))
  91. #ifdef LATENT_ENTROPY_PLUGIN
  92. #define __latent_entropy __attribute__((latent_entropy))
  93. #endif
  94. #endif /* __CHECKER__ */
  95. /*
  96. * calling noreturn functions, __builtin_unreachable() and __builtin_trap()
  97. * confuse the stack allocation in gcc, leading to overly large stack
  98. * frames, see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82365
  99. *
  100. * Adding an empty inline assembly before it works around the problem
  101. */
  102. #define barrier_before_unreachable() asm volatile("")
  103. /*
  104. * Mark a position in code as unreachable. This can be used to
  105. * suppress control flow warnings after asm blocks that transfer
  106. * control elsewhere.
  107. *
  108. * Early snapshots of gcc 4.5 don't support this and we can't detect
  109. * this in the preprocessor, but we can live with this because they're
  110. * unreleased. Really, we need to have autoconf for the kernel.
  111. */
  112. #define unreachable() \
  113. do { \
  114. annotate_unreachable(); \
  115. barrier_before_unreachable(); \
  116. __builtin_unreachable(); \
  117. } while (0)
  118. /* Mark a function definition as prohibited from being cloned. */
  119. #define __noclone __attribute__((__noclone__, __optimize__("no-tracer")))
  120. #if defined(RANDSTRUCT_PLUGIN) && !defined(__CHECKER__)
  121. #define __randomize_layout __attribute__((randomize_layout))
  122. #define __no_randomize_layout __attribute__((no_randomize_layout))
  123. /* This anon struct can add padding, so only enable it under randstruct. */
  124. #define randomized_struct_fields_start struct {
  125. #define randomized_struct_fields_end } __randomize_layout;
  126. #endif
  127. /*
  128. * When used with Link Time Optimization, gcc can optimize away C functions or
  129. * variables which are referenced only from assembly code. __visible tells the
  130. * optimizer that something else uses this function or variable, thus preventing
  131. * this.
  132. */
  133. #define __visible __attribute__((externally_visible))
  134. /* gcc version specific checks */
  135. #if GCC_VERSION >= 40900 && !defined(__CHECKER__)
  136. /*
  137. * __assume_aligned(n, k): Tell the optimizer that the returned
  138. * pointer can be assumed to be k modulo n. The second argument is
  139. * optional (default 0), so we use a variadic macro to make the
  140. * shorthand.
  141. *
  142. * Beware: Do not apply this to functions which may return
  143. * ERR_PTRs. Also, it is probably unwise to apply it to functions
  144. * returning extra information in the low bits (but in that case the
  145. * compiler should see some alignment anyway, when the return value is
  146. * massaged by 'flags = ptr & 3; ptr &= ~3;').
  147. */
  148. #define __assume_aligned(a, ...) __attribute__((__assume_aligned__(a, ## __VA_ARGS__)))
  149. #endif
  150. /*
  151. * GCC 'asm goto' miscompiles certain code sequences:
  152. *
  153. * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58670
  154. *
  155. * Work it around via a compiler barrier quirk suggested by Jakub Jelinek.
  156. *
  157. * (asm goto is automatically volatile - the naming reflects this.)
  158. */
  159. #define asm_volatile_goto(x...) do { asm goto(x); asm (""); } while (0)
  160. /*
  161. * sparse (__CHECKER__) pretends to be gcc, but can't do constant
  162. * folding in __builtin_bswap*() (yet), so don't set these for it.
  163. */
  164. #if defined(CONFIG_ARCH_USE_BUILTIN_BSWAP) && !defined(__CHECKER__)
  165. #define __HAVE_BUILTIN_BSWAP32__
  166. #define __HAVE_BUILTIN_BSWAP64__
  167. #if GCC_VERSION >= 40800
  168. #define __HAVE_BUILTIN_BSWAP16__
  169. #endif
  170. #endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP && !__CHECKER__ */
  171. #if GCC_VERSION >= 70000
  172. #define KASAN_ABI_VERSION 5
  173. #elif GCC_VERSION >= 50000
  174. #define KASAN_ABI_VERSION 4
  175. #elif GCC_VERSION >= 40902
  176. #define KASAN_ABI_VERSION 3
  177. #endif
  178. #if GCC_VERSION >= 40902
  179. /*
  180. * Tell the compiler that address safety instrumentation (KASAN)
  181. * should not be applied to that function.
  182. * Conflicts with inlining: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
  183. */
  184. #define __no_sanitize_address __attribute__((no_sanitize_address))
  185. #endif
  186. #if GCC_VERSION >= 50100
  187. /*
  188. * Mark structures as requiring designated initializers.
  189. * https://gcc.gnu.org/onlinedocs/gcc/Designated-Inits.html
  190. */
  191. #define __designated_init __attribute__((designated_init))
  192. #define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1
  193. #endif
  194. #if !defined(__noclone)
  195. #define __noclone /* not needed */
  196. #endif
  197. #if !defined(__no_sanitize_address)
  198. #define __no_sanitize_address
  199. #endif
  200. /*
  201. * Turn individual warnings and errors on and off locally, depending
  202. * on version.
  203. */
  204. #define __diag_GCC(version, severity, s) \
  205. __diag_GCC_ ## version(__diag_GCC_ ## severity s)
  206. /* Severity used in pragma directives */
  207. #define __diag_GCC_ignore ignored
  208. #define __diag_GCC_warn warning
  209. #define __diag_GCC_error error
  210. #define __diag_str1(s) #s
  211. #define __diag_str(s) __diag_str1(s)
  212. #define __diag(s) _Pragma(__diag_str(GCC diagnostic s))
  213. #if GCC_VERSION >= 80000
  214. #define __diag_GCC_8(s) __diag(s)
  215. #else
  216. #define __diag_GCC_8(s)
  217. #endif