1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef __LINUX_COMPILER_TYPES_H
3 #define __LINUX_COMPILER_TYPES_H
8 * Skipped when running bindgen due to a libclang issue;
9 * see https://github.com/rust-lang/rust-bindgen/issues/2244.
11 #if defined(CONFIG_DEBUG_INFO_BTF) && defined(CONFIG_PAHOLE_HAS_BTF_TAG) && \
12 __has_attribute(btf_type_tag) && !defined(__BINDGEN__)
13 # define BTF_TYPE_TAG(value) __attribute__((btf_type_tag(#value)))
15 # define BTF_TYPE_TAG(value) /* nothing */
18 /* sparse defines __CHECKER__; see Documentation/dev-tools/sparse.rst */
21 # define __kernel __attribute__((address_space(0)))
22 # define __user __attribute__((noderef, address_space(__user)))
23 # define __iomem __attribute__((noderef, address_space(__iomem)))
24 # define __percpu __attribute__((noderef, address_space(__percpu)))
25 # define __rcu __attribute__((noderef, address_space(__rcu)))
26 static inline void __chk_user_ptr(const volatile void __user *ptr) { }
27 static inline void __chk_io_ptr(const volatile void __iomem *ptr) { }
29 # define __must_hold(x) __attribute__((context(x,1,1)))
30 # define __acquires(x) __attribute__((context(x,0,1)))
31 # define __cond_acquires(x) __attribute__((context(x,0,-1)))
32 # define __releases(x) __attribute__((context(x,1,0)))
33 # define __acquire(x) __context__(x,1)
34 # define __release(x) __context__(x,-1)
35 # define __cond_lock(x,c) ((c) ? ({ __acquire(x); 1; }) : 0)
37 # define __force __attribute__((force))
38 # define __nocast __attribute__((nocast))
39 # define __safe __attribute__((safe))
40 # define __private __attribute__((noderef))
41 # define ACCESS_PRIVATE(p, member) (*((typeof((p)->member) __force *) &(p)->member))
42 #else /* __CHECKER__ */
45 # ifdef STRUCTLEAK_PLUGIN
46 # define __user __attribute__((user))
48 # define __user BTF_TYPE_TAG(user)
51 # define __percpu BTF_TYPE_TAG(percpu)
53 # define __chk_user_ptr(x) (void)0
54 # define __chk_io_ptr(x) (void)0
56 # define __must_hold(x)
57 # define __acquires(x)
58 # define __cond_acquires(x)
59 # define __releases(x)
60 # define __acquire(x) (void)0
61 # define __release(x) (void)0
62 # define __cond_lock(x,c) (c)
68 # define ACCESS_PRIVATE(p, member) ((p)->member)
69 # define __builtin_warning(x, y...) (1)
70 #endif /* __CHECKER__ */
72 /* Indirect macros required for expanded argument pasting, eg. __LINE__. */
73 #define ___PASTE(a,b) a##b
74 #define __PASTE(a,b) ___PASTE(a,b)
79 #include <linux/compiler_attributes.h>
84 * __has_builtin is supported on gcc >= 10, clang >= 3 and icc >= 21.
85 * In the meantime, to support gcc < 10, we implement __has_builtin
89 #define __has_builtin(x) (0)
92 /* Compiler specific macros. */
94 #include <linux/compiler-clang.h>
95 #elif defined(__INTEL_COMPILER)
96 #include <linux/compiler-intel.h>
97 #elif defined(__GNUC__)
98 /* The above compilers also define __GNUC__, so order is important here. */
99 #include <linux/compiler-gcc.h>
101 #error "Unknown compiler"
105 * Some architectures need to provide custom definitions of macros provided
106 * by linux/compiler-*.h, and can do so using asm/compiler.h. We include that
107 * conditionally rather than using an asm-generic wrapper in order to avoid
108 * build failures if any C compilation, which will include this file via an
109 * -include argument in c_flags, occurs prior to the asm-generic wrappers being
112 #ifdef CONFIG_HAVE_ARCH_COMPILER_H
113 #include <asm/compiler.h>
116 struct ftrace_branch_data {
122 unsigned long correct;
123 unsigned long incorrect;
129 unsigned long miss_hit[2];
133 struct ftrace_likely_data {
134 struct ftrace_branch_data data;
135 unsigned long constant;
138 #if defined(CC_USING_HOTPATCH)
139 #define notrace __attribute__((hotpatch(0, 0)))
140 #elif defined(CC_USING_PATCHABLE_FUNCTION_ENTRY)
141 #define notrace __attribute__((patchable_function_entry(0, 0)))
143 #define notrace __attribute__((__no_instrument_function__))
147 * it doesn't make sense on ARM (currently the only user of __naked)
148 * to trace naked functions because then mcount is called without
149 * stack and frame pointer being set up and there is no chance to
150 * restore the lr register to the value before mcount was called.
152 #define __naked __attribute__((__naked__)) notrace
155 * Prefer gnu_inline, so that extern inline functions do not emit an
156 * externally visible function. This makes extern inline behave as per gnu89
157 * semantics rather than c99. This prevents multiple symbol definition errors
158 * of extern inline functions at link time.
159 * A lot of inline functions can cause havoc with function tracing.
161 #define inline inline __gnu_inline __inline_maybe_unused notrace
164 * gcc provides both __inline__ and __inline as alternate spellings of
165 * the inline keyword, though the latter is undocumented. New kernel
166 * code should only use the inline spelling, but some existing code
167 * uses __inline__. Since we #define inline above, to ensure
168 * __inline__ has the same semantics, we need this #define.
170 * However, the spelling __inline is strictly reserved for referring
171 * to the bare keyword.
173 #define __inline__ inline
176 * GCC does not warn about unused static inline functions for -Wunused-function.
177 * Suppress the warning in clang as well by using __maybe_unused, but enable it
178 * for W=1 build. This will allow clang to find unused functions. Remove the
179 * __inline_maybe_unused entirely after fixing most of -Wunused-function warnings.
181 #ifdef KBUILD_EXTRA_WARN1
182 #define __inline_maybe_unused
184 #define __inline_maybe_unused __maybe_unused
188 * Rather then using noinline to prevent stack consumption, use
189 * noinline_for_stack instead. For documentation reasons.
191 #define noinline_for_stack noinline
194 * Sanitizer helper attributes: Because using __always_inline and
195 * __no_sanitize_* conflict, provide helper attributes that will either expand
196 * to __no_sanitize_* in compilation units where instrumentation is enabled
197 * (__SANITIZE_*__), or __always_inline in compilation units without
198 * instrumentation (__SANITIZE_*__ undefined).
200 #ifdef __SANITIZE_ADDRESS__
202 * We can't declare function 'inline' because __no_sanitize_address conflicts
203 * with inlining. Attempt to inline it may cause a build failure.
204 * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
205 * '__maybe_unused' allows us to avoid defined-but-not-used warnings.
207 # define __no_kasan_or_inline __no_sanitize_address notrace __maybe_unused
208 # define __no_sanitize_or_inline __no_kasan_or_inline
210 # define __no_kasan_or_inline __always_inline
213 #ifdef __SANITIZE_THREAD__
215 * Clang still emits instrumentation for __tsan_func_{entry,exit}() and builtin
216 * atomics even with __no_sanitize_thread (to avoid false positives in userspace
217 * ThreadSanitizer). The kernel's requirements are stricter and we really do not
218 * want any instrumentation with __no_kcsan.
220 * Therefore we add __disable_sanitizer_instrumentation where available to
221 * disable all instrumentation. See Kconfig.kcsan where this is mandatory.
223 # define __no_kcsan __no_sanitize_thread __disable_sanitizer_instrumentation
224 # define __no_sanitize_or_inline __no_kcsan notrace __maybe_unused
229 #ifndef __no_sanitize_or_inline
230 #define __no_sanitize_or_inline __always_inline
233 /* Section for code which can't be instrumented at all */
235 noinline notrace __attribute((__section__(".noinstr.text"))) \
236 __no_kcsan __no_sanitize_address __no_profile __no_sanitize_coverage \
239 #endif /* __KERNEL__ */
241 #endif /* __ASSEMBLY__ */
244 * The below symbols may be defined for one or more, but not ALL, of the above
245 * compilers. We don't consider that to be an error, so set them to nothing.
246 * For example, some of them are for compiler specific plugins.
248 #ifndef __latent_entropy
249 # define __latent_entropy
252 #if defined(RANDSTRUCT) && !defined(__CHECKER__)
253 # define __randomize_layout __designated_init __attribute__((randomize_layout))
254 # define __no_randomize_layout __attribute__((no_randomize_layout))
255 /* This anon struct can add padding, so only enable it under randstruct. */
256 # define randomized_struct_fields_start struct {
257 # define randomized_struct_fields_end } __randomize_layout;
259 # define __randomize_layout __designated_init
260 # define __no_randomize_layout
261 # define randomized_struct_fields_start
262 # define randomized_struct_fields_end
274 * Any place that could be marked with the "alloc_size" attribute is also
275 * a place to be marked with the "malloc" attribute, except those that may
276 * be performing a _reallocation_, as that may alias the existing pointer.
277 * For these, use __realloc_size().
279 #ifdef __alloc_size__
280 # define __alloc_size(x, ...) __alloc_size__(x, ## __VA_ARGS__) __malloc
281 # define __realloc_size(x, ...) __alloc_size__(x, ## __VA_ARGS__)
283 # define __alloc_size(x, ...) __malloc
284 # define __realloc_size(x, ...)
287 #ifndef asm_volatile_goto
288 #define asm_volatile_goto(x...) asm goto(x)
291 #ifdef CONFIG_CC_HAS_ASM_INLINE
292 #define asm_inline asm __inline
294 #define asm_inline asm
297 /* Are two types/vars the same type (ignoring qualifiers)? */
298 #define __same_type(a, b) __builtin_types_compatible_p(typeof(a), typeof(b))
301 * __unqual_scalar_typeof(x) - Declare an unqualified scalar type, leaving
302 * non-scalar types unchanged.
305 * Prefer C11 _Generic for better compile-times and simpler code. Note: 'char'
306 * is not type-compatible with 'signed char', and we define a separate case.
308 #define __scalar_type_to_expr_cases(type) \
309 unsigned type: (unsigned type)0, \
310 signed type: (signed type)0
312 #define __unqual_scalar_typeof(x) typeof( \
315 __scalar_type_to_expr_cases(char), \
316 __scalar_type_to_expr_cases(short), \
317 __scalar_type_to_expr_cases(int), \
318 __scalar_type_to_expr_cases(long), \
319 __scalar_type_to_expr_cases(long long), \
322 /* Is this type a native word size -- useful for atomic operations */
323 #define __native_word(t) \
324 (sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
325 sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long))
328 # define __compiletime_assert(condition, msg, prefix, suffix) \
331 * __noreturn is needed to give the compiler enough \
332 * information to avoid certain possibly-uninitialized \
333 * warnings (regardless of the build failing). \
335 __noreturn extern void prefix ## suffix(void) \
336 __compiletime_error(msg); \
338 prefix ## suffix(); \
341 # define __compiletime_assert(condition, msg, prefix, suffix) do { } while (0)
344 #define _compiletime_assert(condition, msg, prefix, suffix) \
345 __compiletime_assert(condition, msg, prefix, suffix)
348 * compiletime_assert - break build and emit msg if condition is false
349 * @condition: a compile-time constant condition to check
350 * @msg: a message to emit if condition is false
352 * In tradition of POSIX assert, this macro will break the build if the
353 * supplied condition is *false*, emitting the supplied error message if the
354 * compiler has support to do so.
356 #define compiletime_assert(condition, msg) \
357 _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
359 #define compiletime_assert_atomic_type(t) \
360 compiletime_assert(__native_word(t), \
361 "Need native word sized stores/loads for atomicity.")
363 /* Helpers for emitting diagnostics in pragmas. */
365 #define __diag(string)
369 #define __diag_GCC(version, severity, string)
372 #define __diag_push() __diag(push)
373 #define __diag_pop() __diag(pop)
375 #define __diag_ignore(compiler, version, option, comment) \
376 __diag_ ## compiler(version, ignore, option)
377 #define __diag_warn(compiler, version, option, comment) \
378 __diag_ ## compiler(version, warn, option)
379 #define __diag_error(compiler, version, option, comment) \
380 __diag_ ## compiler(version, error, option)
382 #ifndef __diag_ignore_all
383 #define __diag_ignore_all(option, comment)
386 #endif /* __LINUX_COMPILER_TYPES_H */