compiler-gcc.h 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236
  1. /* SPDX-License-Identifier: GPL-2.0 */
  2. #ifndef __LINUX_COMPILER_TYPES_H
  3. #error "Please don't include <linux/compiler-gcc.h> directly, include <linux/compiler.h> instead."
  4. #endif
  5. /*
  6. * Common definitions for all gcc versions go here.
  7. */
  8. #define GCC_VERSION (__GNUC__ * 10000 \
  9. + __GNUC_MINOR__ * 100 \
  10. + __GNUC_PATCHLEVEL__)
  11. #if GCC_VERSION < 40600
  12. # error Sorry, your compiler is too old - please upgrade it.
  13. #endif
  14. /* Optimization barrier */
  15. /* The "volatile" is due to gcc bugs */
  16. #define barrier() __asm__ __volatile__("": : :"memory")
  17. /*
  18. * This version is i.e. to prevent dead stores elimination on @ptr
  19. * where gcc and llvm may behave differently when otherwise using
  20. * normal barrier(): while gcc behavior gets along with a normal
  21. * barrier(), llvm needs an explicit input variable to be assumed
  22. * clobbered. The issue is as follows: while the inline asm might
  23. * access any memory it wants, the compiler could have fit all of
  24. * @ptr into memory registers instead, and since @ptr never escaped
  25. * from that, it proved that the inline asm wasn't touching any of
  26. * it. This version works well with both compilers, i.e. we're telling
  27. * the compiler that the inline asm absolutely may see the contents
  28. * of @ptr. See also: https://llvm.org/bugs/show_bug.cgi?id=15495
  29. */
  30. #define barrier_data(ptr) __asm__ __volatile__("": :"r"(ptr) :"memory")
  31. /*
  32. * This macro obfuscates arithmetic on a variable address so that gcc
  33. * shouldn't recognize the original var, and make assumptions about it.
  34. *
  35. * This is needed because the C standard makes it undefined to do
  36. * pointer arithmetic on "objects" outside their boundaries and the
  37. * gcc optimizers assume this is the case. In particular they
  38. * assume such arithmetic does not wrap.
  39. *
  40. * A miscompilation has been observed because of this on PPC.
  41. * To work around it we hide the relationship of the pointer and the object
  42. * using this macro.
  43. *
  44. * Versions of the ppc64 compiler before 4.1 had a bug where use of
  45. * RELOC_HIDE could trash r30. The bug can be worked around by changing
  46. * the inline assembly constraint from =g to =r, in this particular
  47. * case either is valid.
  48. */
  49. #define RELOC_HIDE(ptr, off) \
  50. ({ \
  51. unsigned long __ptr; \
  52. __asm__ ("" : "=r"(__ptr) : "0"(ptr)); \
  53. (typeof(ptr)) (__ptr + (off)); \
  54. })
  55. /* Make the optimizer believe the variable can be manipulated arbitrarily. */
  56. #define OPTIMIZER_HIDE_VAR(var) \
  57. __asm__ ("" : "=r" (var) : "0" (var))
  58. /*
  59. * A trick to suppress uninitialized variable warning without generating any
  60. * code
  61. */
  62. #define uninitialized_var(x) x = x
  63. #ifdef __CHECKER__
  64. #define __must_be_array(a) 0
  65. #else
  66. /* &a[0] degrades to a pointer: a different type from an array */
  67. #define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0]))
  68. #endif
  69. #ifdef RETPOLINE
  70. #define __noretpoline __attribute__((indirect_branch("keep")))
  71. #endif
  72. #define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
  73. #define __optimize(level) __attribute__((__optimize__(level)))
  74. #define __compiletime_object_size(obj) __builtin_object_size(obj, 0)
  75. #ifndef __CHECKER__
  76. #define __compiletime_warning(message) __attribute__((warning(message)))
  77. #define __compiletime_error(message) __attribute__((error(message)))
  78. #ifdef LATENT_ENTROPY_PLUGIN
  79. #define __latent_entropy __attribute__((latent_entropy))
  80. #endif
  81. #endif /* __CHECKER__ */
  82. /*
  83. * calling noreturn functions, __builtin_unreachable() and __builtin_trap()
  84. * confuse the stack allocation in gcc, leading to overly large stack
  85. * frames, see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82365
  86. *
  87. * Adding an empty inline assembly before it works around the problem
  88. */
  89. #define barrier_before_unreachable() asm volatile("")
  90. /*
  91. * Mark a position in code as unreachable. This can be used to
  92. * suppress control flow warnings after asm blocks that transfer
  93. * control elsewhere.
  94. *
  95. * Early snapshots of gcc 4.5 don't support this and we can't detect
  96. * this in the preprocessor, but we can live with this because they're
  97. * unreleased. Really, we need to have autoconf for the kernel.
  98. */
  99. #define unreachable() \
  100. do { \
  101. annotate_unreachable(); \
  102. barrier_before_unreachable(); \
  103. __builtin_unreachable(); \
  104. } while (0)
  105. /* Mark a function definition as prohibited from being cloned. */
  106. #define __noclone __attribute__((__noclone__, __optimize__("no-tracer")))
  107. #if defined(RANDSTRUCT_PLUGIN) && !defined(__CHECKER__)
  108. #define __randomize_layout __attribute__((randomize_layout))
  109. #define __no_randomize_layout __attribute__((no_randomize_layout))
  110. /* This anon struct can add padding, so only enable it under randstruct. */
  111. #define randomized_struct_fields_start struct {
  112. #define randomized_struct_fields_end } __randomize_layout;
  113. #endif
  114. /*
  115. * When used with Link Time Optimization, gcc can optimize away C functions or
  116. * variables which are referenced only from assembly code. __visible tells the
  117. * optimizer that something else uses this function or variable, thus preventing
  118. * this.
  119. */
  120. #define __visible __attribute__((externally_visible))
  121. /* gcc version specific checks */
  122. #if GCC_VERSION >= 40900 && !defined(__CHECKER__)
  123. /*
  124. * __assume_aligned(n, k): Tell the optimizer that the returned
  125. * pointer can be assumed to be k modulo n. The second argument is
  126. * optional (default 0), so we use a variadic macro to make the
  127. * shorthand.
  128. *
  129. * Beware: Do not apply this to functions which may return
  130. * ERR_PTRs. Also, it is probably unwise to apply it to functions
  131. * returning extra information in the low bits (but in that case the
  132. * compiler should see some alignment anyway, when the return value is
  133. * massaged by 'flags = ptr & 3; ptr &= ~3;').
  134. */
  135. #define __assume_aligned(a, ...) __attribute__((__assume_aligned__(a, ## __VA_ARGS__)))
  136. #endif
  137. /*
  138. * GCC 'asm goto' miscompiles certain code sequences:
  139. *
  140. * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58670
  141. *
  142. * Work it around via a compiler barrier quirk suggested by Jakub Jelinek.
  143. *
  144. * (asm goto is automatically volatile - the naming reflects this.)
  145. */
  146. #define asm_volatile_goto(x...) do { asm goto(x); asm (""); } while (0)
  147. /*
  148. * sparse (__CHECKER__) pretends to be gcc, but can't do constant
  149. * folding in __builtin_bswap*() (yet), so don't set these for it.
  150. */
  151. #if defined(CONFIG_ARCH_USE_BUILTIN_BSWAP) && !defined(__CHECKER__)
  152. #define __HAVE_BUILTIN_BSWAP32__
  153. #define __HAVE_BUILTIN_BSWAP64__
  154. #if GCC_VERSION >= 40800
  155. #define __HAVE_BUILTIN_BSWAP16__
  156. #endif
  157. #endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP && !__CHECKER__ */
  158. #if GCC_VERSION >= 70000
  159. #define KASAN_ABI_VERSION 5
  160. #elif GCC_VERSION >= 50000
  161. #define KASAN_ABI_VERSION 4
  162. #elif GCC_VERSION >= 40902
  163. #define KASAN_ABI_VERSION 3
  164. #endif
  165. #if GCC_VERSION >= 40902
  166. /*
  167. * Tell the compiler that address safety instrumentation (KASAN)
  168. * should not be applied to that function.
  169. * Conflicts with inlining: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
  170. */
  171. #define __no_sanitize_address __attribute__((no_sanitize_address))
  172. #endif
  173. #if GCC_VERSION >= 50100
  174. /*
  175. * Mark structures as requiring designated initializers.
  176. * https://gcc.gnu.org/onlinedocs/gcc/Designated-Inits.html
  177. */
  178. #define __designated_init __attribute__((designated_init))
  179. #define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1
  180. #endif
  181. #if !defined(__noclone)
  182. #define __noclone /* not needed */
  183. #endif
  184. #if !defined(__no_sanitize_address)
  185. #define __no_sanitize_address
  186. #endif
  187. /*
  188. * Turn individual warnings and errors on and off locally, depending
  189. * on version.
  190. */
  191. #define __diag_GCC(version, severity, s) \
  192. __diag_GCC_ ## version(__diag_GCC_ ## severity s)
  193. /* Severity used in pragma directives */
  194. #define __diag_GCC_ignore ignored
  195. #define __diag_GCC_warn warning
  196. #define __diag_GCC_error error
  197. #define __diag_str1(s) #s
  198. #define __diag_str(s) __diag_str1(s)
  199. #define __diag(s) _Pragma(__diag_str(GCC diagnostic s))
  200. #if GCC_VERSION >= 80000
  201. #define __diag_GCC_8(s) __diag(s)
  202. #else
  203. #define __diag_GCC_8(s)
  204. #endif