compiler-gcc.h 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244
  1. /* SPDX-License-Identifier: GPL-2.0 */
  2. #ifndef __LINUX_COMPILER_TYPES_H
  3. #error "Please don't include <linux/compiler-gcc.h> directly, include <linux/compiler.h> instead."
  4. #endif
  5. /*
  6. * Common definitions for all gcc versions go here.
  7. */
  8. #define GCC_VERSION (__GNUC__ * 10000 \
  9. + __GNUC_MINOR__ * 100 \
  10. + __GNUC_PATCHLEVEL__)
  11. #if GCC_VERSION < 40600
  12. # error Sorry, your compiler is too old - please upgrade it.
  13. #endif
  14. /* Optimization barrier */
  15. /* The "volatile" is due to gcc bugs */
  16. #define barrier() __asm__ __volatile__("": : :"memory")
  17. /*
  18. * This version is i.e. to prevent dead stores elimination on @ptr
  19. * where gcc and llvm may behave differently when otherwise using
  20. * normal barrier(): while gcc behavior gets along with a normal
  21. * barrier(), llvm needs an explicit input variable to be assumed
  22. * clobbered. The issue is as follows: while the inline asm might
  23. * access any memory it wants, the compiler could have fit all of
  24. * @ptr into memory registers instead, and since @ptr never escaped
  25. * from that, it proved that the inline asm wasn't touching any of
  26. * it. This version works well with both compilers, i.e. we're telling
  27. * the compiler that the inline asm absolutely may see the contents
  28. * of @ptr. See also: https://llvm.org/bugs/show_bug.cgi?id=15495
  29. */
  30. #define barrier_data(ptr) __asm__ __volatile__("": :"r"(ptr) :"memory")
  31. /*
  32. * This macro obfuscates arithmetic on a variable address so that gcc
  33. * shouldn't recognize the original var, and make assumptions about it.
  34. *
  35. * This is needed because the C standard makes it undefined to do
  36. * pointer arithmetic on "objects" outside their boundaries and the
  37. * gcc optimizers assume this is the case. In particular they
  38. * assume such arithmetic does not wrap.
  39. *
  40. * A miscompilation has been observed because of this on PPC.
  41. * To work around it we hide the relationship of the pointer and the object
  42. * using this macro.
  43. *
  44. * Versions of the ppc64 compiler before 4.1 had a bug where use of
  45. * RELOC_HIDE could trash r30. The bug can be worked around by changing
  46. * the inline assembly constraint from =g to =r, in this particular
  47. * case either is valid.
  48. */
  49. #define RELOC_HIDE(ptr, off) \
  50. ({ \
  51. unsigned long __ptr; \
  52. __asm__ ("" : "=r"(__ptr) : "0"(ptr)); \
  53. (typeof(ptr)) (__ptr + (off)); \
  54. })
  55. /* Make the optimizer believe the variable can be manipulated arbitrarily. */
  56. #define OPTIMIZER_HIDE_VAR(var) \
  57. __asm__ ("" : "=r" (var) : "0" (var))
  58. /*
  59. * A trick to suppress uninitialized variable warning without generating any
  60. * code
  61. */
  62. #define uninitialized_var(x) x = x
  63. #ifdef __CHECKER__
  64. #define __must_be_array(a) 0
  65. #else
  66. /* &a[0] degrades to a pointer: a different type from an array */
  67. #define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0]))
  68. #endif
  69. #ifdef RETPOLINE
  70. #define __noretpoline __attribute__((indirect_branch("keep")))
  71. #endif
  72. /*
  73. * it doesn't make sense on ARM (currently the only user of __naked)
  74. * to trace naked functions because then mcount is called without
  75. * stack and frame pointer being set up and there is no chance to
  76. * restore the lr register to the value before mcount was called.
  77. */
  78. #define __naked __attribute__((naked)) notrace
  79. #define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
  80. #define __optimize(level) __attribute__((__optimize__(level)))
  81. #define __compiletime_object_size(obj) __builtin_object_size(obj, 0)
  82. #ifndef __CHECKER__
  83. #define __compiletime_warning(message) __attribute__((warning(message)))
  84. #define __compiletime_error(message) __attribute__((error(message)))
  85. #ifdef LATENT_ENTROPY_PLUGIN
  86. #define __latent_entropy __attribute__((latent_entropy))
  87. #endif
  88. #endif /* __CHECKER__ */
  89. /*
  90. * calling noreturn functions, __builtin_unreachable() and __builtin_trap()
  91. * confuse the stack allocation in gcc, leading to overly large stack
  92. * frames, see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=82365
  93. *
  94. * Adding an empty inline assembly before it works around the problem
  95. */
  96. #define barrier_before_unreachable() asm volatile("")
  97. /*
  98. * Mark a position in code as unreachable. This can be used to
  99. * suppress control flow warnings after asm blocks that transfer
  100. * control elsewhere.
  101. *
  102. * Early snapshots of gcc 4.5 don't support this and we can't detect
  103. * this in the preprocessor, but we can live with this because they're
  104. * unreleased. Really, we need to have autoconf for the kernel.
  105. */
  106. #define unreachable() \
  107. do { \
  108. annotate_unreachable(); \
  109. barrier_before_unreachable(); \
  110. __builtin_unreachable(); \
  111. } while (0)
  112. /* Mark a function definition as prohibited from being cloned. */
  113. #define __noclone __attribute__((__noclone__, __optimize__("no-tracer")))
  114. #if defined(RANDSTRUCT_PLUGIN) && !defined(__CHECKER__)
  115. #define __randomize_layout __attribute__((randomize_layout))
  116. #define __no_randomize_layout __attribute__((no_randomize_layout))
  117. /* This anon struct can add padding, so only enable it under randstruct. */
  118. #define randomized_struct_fields_start struct {
  119. #define randomized_struct_fields_end } __randomize_layout;
  120. #endif
  121. /*
  122. * When used with Link Time Optimization, gcc can optimize away C functions or
  123. * variables which are referenced only from assembly code. __visible tells the
  124. * optimizer that something else uses this function or variable, thus preventing
  125. * this.
  126. */
  127. #define __visible __attribute__((externally_visible))
  128. /* gcc version specific checks */
  129. #if GCC_VERSION >= 40900 && !defined(__CHECKER__)
  130. /*
  131. * __assume_aligned(n, k): Tell the optimizer that the returned
  132. * pointer can be assumed to be k modulo n. The second argument is
  133. * optional (default 0), so we use a variadic macro to make the
  134. * shorthand.
  135. *
  136. * Beware: Do not apply this to functions which may return
  137. * ERR_PTRs. Also, it is probably unwise to apply it to functions
  138. * returning extra information in the low bits (but in that case the
  139. * compiler should see some alignment anyway, when the return value is
  140. * massaged by 'flags = ptr & 3; ptr &= ~3;').
  141. */
  142. #define __assume_aligned(a, ...) __attribute__((__assume_aligned__(a, ## __VA_ARGS__)))
  143. #endif
  144. /*
  145. * GCC 'asm goto' miscompiles certain code sequences:
  146. *
  147. * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58670
  148. *
  149. * Work it around via a compiler barrier quirk suggested by Jakub Jelinek.
  150. *
  151. * (asm goto is automatically volatile - the naming reflects this.)
  152. */
  153. #define asm_volatile_goto(x...) do { asm goto(x); asm (""); } while (0)
  154. /*
  155. * sparse (__CHECKER__) pretends to be gcc, but can't do constant
  156. * folding in __builtin_bswap*() (yet), so don't set these for it.
  157. */
  158. #if defined(CONFIG_ARCH_USE_BUILTIN_BSWAP) && !defined(__CHECKER__)
  159. #define __HAVE_BUILTIN_BSWAP32__
  160. #define __HAVE_BUILTIN_BSWAP64__
  161. #if GCC_VERSION >= 40800
  162. #define __HAVE_BUILTIN_BSWAP16__
  163. #endif
  164. #endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP && !__CHECKER__ */
  165. #if GCC_VERSION >= 70000
  166. #define KASAN_ABI_VERSION 5
  167. #elif GCC_VERSION >= 50000
  168. #define KASAN_ABI_VERSION 4
  169. #elif GCC_VERSION >= 40902
  170. #define KASAN_ABI_VERSION 3
  171. #endif
  172. #if GCC_VERSION >= 40902
  173. /*
  174. * Tell the compiler that address safety instrumentation (KASAN)
  175. * should not be applied to that function.
  176. * Conflicts with inlining: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
  177. */
  178. #define __no_sanitize_address __attribute__((no_sanitize_address))
  179. #endif
  180. #if GCC_VERSION >= 50100
  181. /*
  182. * Mark structures as requiring designated initializers.
  183. * https://gcc.gnu.org/onlinedocs/gcc/Designated-Inits.html
  184. */
  185. #define __designated_init __attribute__((designated_init))
  186. #define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1
  187. #endif
  188. #if !defined(__noclone)
  189. #define __noclone /* not needed */
  190. #endif
  191. #if !defined(__no_sanitize_address)
  192. #define __no_sanitize_address
  193. #endif
  194. /*
  195. * Turn individual warnings and errors on and off locally, depending
  196. * on version.
  197. */
  198. #define __diag_GCC(version, severity, s) \
  199. __diag_GCC_ ## version(__diag_GCC_ ## severity s)
  200. /* Severity used in pragma directives */
  201. #define __diag_GCC_ignore ignored
  202. #define __diag_GCC_warn warning
  203. #define __diag_GCC_error error
  204. #define __diag_str1(s) #s
  205. #define __diag_str(s) __diag_str1(s)
  206. #define __diag(s) _Pragma(__diag_str(GCC diagnostic s))
  207. #if GCC_VERSION >= 80000
  208. #define __diag_GCC_8(s) __diag(s)
  209. #else
  210. #define __diag_GCC_8(s)
  211. #endif