blob: 0efef9cf014fb1c9467ee293eb22f130912e4f8f [file] [log] [blame]
Robert P. J. Day94f582f2007-10-16 23:26:11 -07001#ifndef __LINUX_COMPILER_H
2#error "Please don't include <linux/compiler-gcc.h> directly, include <linux/compiler.h> instead."
3#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07004
5/*
6 * Common definitions for all gcc versions go here.
7 */
Joe Perchesf6d133f82015-06-25 15:01:00 -07008#define GCC_VERSION (__GNUC__ * 10000 \
9 + __GNUC_MINOR__ * 100 \
10 + __GNUC_PATCHLEVEL__)
Linus Torvalds1da177e2005-04-16 15:20:36 -070011
Linus Torvalds1da177e2005-04-16 15:20:36 -070012/* Optimization barrier */
Daniel Borkmann7829fb02015-04-30 04:13:52 +020013
Linus Torvalds1da177e2005-04-16 15:20:36 -070014/* The "volatile" is due to gcc bugs */
15#define barrier() __asm__ __volatile__("": : :"memory")
Daniel Borkmann7829fb02015-04-30 04:13:52 +020016/*
17 * This version is i.e. to prevent dead stores elimination on @ptr
18 * where gcc and llvm may behave differently when otherwise using
19 * normal barrier(): while gcc behavior gets along with a normal
20 * barrier(), llvm needs an explicit input variable to be assumed
21 * clobbered. The issue is as follows: while the inline asm might
22 * access any memory it wants, the compiler could have fit all of
23 * @ptr into memory registers instead, and since @ptr never escaped
Benjamin Peterson8e8780a2016-12-12 16:45:38 -080024 * from that, it proved that the inline asm wasn't touching any of
Daniel Borkmann7829fb02015-04-30 04:13:52 +020025 * it. This version works well with both compilers, i.e. we're telling
26 * the compiler that the inline asm absolutely may see the contents
27 * of @ptr. See also: https://llvm.org/bugs/show_bug.cgi?id=15495
28 */
29#define barrier_data(ptr) __asm__ __volatile__("": :"r"(ptr) :"memory")
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Anton Blanchardc8d52462006-01-10 18:21:20 +110031/*
Andi Kleen85c210e2009-01-09 16:40:53 -080032 * This macro obfuscates arithmetic on a variable address so that gcc
33 * shouldn't recognize the original var, and make assumptions about it.
34 *
35 * This is needed because the C standard makes it undefined to do
36 * pointer arithmetic on "objects" outside their boundaries and the
37 * gcc optimizers assume this is the case. In particular they
38 * assume such arithmetic does not wrap.
39 *
40 * A miscompilation has been observed because of this on PPC.
41 * To work around it we hide the relationship of the pointer and the object
42 * using this macro.
43 *
Anton Blanchardc8d52462006-01-10 18:21:20 +110044 * Versions of the ppc64 compiler before 4.1 had a bug where use of
45 * RELOC_HIDE could trash r30. The bug can be worked around by changing
46 * the inline assembly constraint from =g to =r, in this particular
47 * case either is valid.
48 */
Joe Perchesf6d133f82015-06-25 15:01:00 -070049#define RELOC_HIDE(ptr, off) \
50({ \
51 unsigned long __ptr; \
52 __asm__ ("" : "=r"(__ptr) : "0"(ptr)); \
53 (typeof(ptr)) (__ptr + (off)); \
54})
Andrew Mortona1365642006-01-08 01:04:09 -080055
Cesar Eduardo Barrosfe8c8a12013-11-25 22:00:41 -020056/* Make the optimizer believe the variable can be manipulated arbitrarily. */
Joe Perchesf6d133f82015-06-25 15:01:00 -070057#define OPTIMIZER_HIDE_VAR(var) \
58 __asm__ ("" : "=r" (var) : "0" (var))
Cesar Eduardo Barrosfe8c8a12013-11-25 22:00:41 -020059
KOSAKI Motohiro5bd7e6a2011-05-24 17:13:17 -070060#ifdef __CHECKER__
Joe Perchesf6d133f82015-06-25 15:01:00 -070061#define __must_be_array(a) 0
KOSAKI Motohiro5bd7e6a2011-05-24 17:13:17 -070062#else
Rusty Russellc5e631cf2007-05-06 14:51:05 -070063/* &a[0] degrades to a pointer: a different type from an array */
Joe Perchesf6d133f82015-06-25 15:01:00 -070064#define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0]))
KOSAKI Motohiro5bd7e6a2011-05-24 17:13:17 -070065#endif
Andrew Mortona1365642006-01-08 01:04:09 -080066
Ingo Molnar60a3cdd2008-03-03 12:38:52 +010067/*
Ingo Molnarae3a0062008-04-30 00:15:31 +020068 * Force always-inline if the user requests it so via the .config,
69 * or if gcc is too old:
Ingo Molnar60a3cdd2008-03-03 12:38:52 +010070 */
Joe Perchesf6d133f82015-06-25 15:01:00 -070071#if !defined(CONFIG_ARCH_SUPPORTS_OPTIMIZED_INLINING) || \
Ingo Molnarae3a0062008-04-30 00:15:31 +020072 !defined(CONFIG_OPTIMIZE_INLINING) || (__GNUC__ < 4)
Joe Perchesf6d133f82015-06-25 15:01:00 -070073#define inline inline __attribute__((always_inline)) notrace
74#define __inline__ __inline__ __attribute__((always_inline)) notrace
75#define __inline __inline __attribute__((always_inline)) notrace
Steven Rostedt45959ee2011-12-12 15:22:41 -050076#else
77/* A lot of inline functions can cause havoc with function tracing */
Joe Perchesf6d133f82015-06-25 15:01:00 -070078#define inline inline notrace
79#define __inline__ __inline__ notrace
80#define __inline __inline notrace
Ingo Molnar60a3cdd2008-03-03 12:38:52 +010081#endif
82
Joe Perchesf6d133f82015-06-25 15:01:00 -070083#define __always_inline inline __attribute__((always_inline))
84#define noinline __attribute__((noinline))
85
86#define __deprecated __attribute__((deprecated))
87#define __packed __attribute__((packed))
88#define __weak __attribute__((weak))
89#define __alias(symbol) __attribute__((alias(#symbol)))
Uwe Kleine-König446c92b2009-03-12 18:03:16 +010090
91/*
Joe Perchesf6d133f82015-06-25 15:01:00 -070092 * it doesn't make sense on ARM (currently the only user of __naked)
93 * to trace naked functions because then mcount is called without
94 * stack and frame pointer being set up and there is no chance to
95 * restore the lr register to the value before mcount was called.
Mikael Pettersson9c695202010-06-29 15:05:25 -070096 *
Joe Perchesf6d133f82015-06-25 15:01:00 -070097 * The asm() bodies of naked functions often depend on standard calling
98 * conventions, therefore they must be noinline and noclone.
99 *
100 * GCC 4.[56] currently fail to enforce this, so we must do so ourselves.
101 * See GCC PR44290.
Uwe Kleine-König446c92b2009-03-12 18:03:16 +0100102 */
Joe Perchesf6d133f82015-06-25 15:01:00 -0700103#define __naked __attribute__((naked)) noinline __noclone notrace
Uwe Kleine-König446c92b2009-03-12 18:03:16 +0100104
Joe Perchesf6d133f82015-06-25 15:01:00 -0700105#define __noreturn __attribute__((noreturn))
Ralf Baechlee8c44312007-10-18 03:07:07 -0700106
107/*
108 * From the GCC manual:
109 *
110 * Many functions have no effects except the return value and their
111 * return value depends only on the parameters and/or global
112 * variables. Such a function can be subject to common subexpression
113 * elimination and loop optimization just as an arithmetic operator
114 * would be.
115 * [...]
116 */
Joe Perchesf6d133f82015-06-25 15:01:00 -0700117#define __pure __attribute__((pure))
118#define __aligned(x) __attribute__((aligned(x)))
Gideon Israel Dsouzad8c34b92016-12-31 21:26:23 +0530119#define __aligned_largest __attribute__((aligned))
Joe Perchesf6d133f82015-06-25 15:01:00 -0700120#define __printf(a, b) __attribute__((format(printf, a, b)))
121#define __scanf(a, b) __attribute__((format(scanf, a, b)))
122#define __attribute_const__ __attribute__((__const__))
123#define __maybe_unused __attribute__((unused))
124#define __always_unused __attribute__((unused))
Gideon Israel Dsouzaa3f08252017-02-24 15:00:32 -0800125#define __mode(x) __attribute__((mode(x)))
Linus Torvaldsf153b822009-01-02 09:23:03 -0800126
Joe Perchescb984d12015-06-25 15:01:02 -0700127/* gcc version specific checks */
128
129#if GCC_VERSION < 30200
130# error Sorry, your compiler is too old - please upgrade it.
131#endif
132
133#if GCC_VERSION < 30300
134# define __used __attribute__((__unused__))
135#else
136# define __used __attribute__((__used__))
137#endif
138
139#ifdef CONFIG_GCOV_KERNEL
140# if GCC_VERSION < 30400
141# error "GCOV profiling support for gcc versions below 3.4 not included"
142# endif /* __GNUC_MINOR__ */
143#endif /* CONFIG_GCOV_KERNEL */
144
145#if GCC_VERSION >= 30400
146#define __must_check __attribute__((warn_unused_result))
Rasmus Villemoesd64e85d2016-05-19 17:10:52 -0700147#define __malloc __attribute__((__malloc__))
Joe Perchescb984d12015-06-25 15:01:02 -0700148#endif
149
150#if GCC_VERSION >= 40000
151
152/* GCC 4.1.[01] miscompiles __weak */
153#ifdef __KERNEL__
154# if GCC_VERSION >= 40100 && GCC_VERSION <= 40101
155# error Your version of gcc miscompiles the __weak directive
156# endif
157#endif
158
159#define __used __attribute__((__used__))
160#define __compiler_offsetof(a, b) \
161 __builtin_offsetof(a, b)
162
Josh Poimboeuf0d025d22016-08-30 08:04:16 -0500163#if GCC_VERSION >= 40100
Joe Perchescb984d12015-06-25 15:01:02 -0700164# define __compiletime_object_size(obj) __builtin_object_size(obj, 0)
165#endif
166
167#if GCC_VERSION >= 40300
168/* Mark functions as cold. gcc will assume any path leading to a call
169 * to them will be unlikely. This means a lot of manual unlikely()s
170 * are unnecessary now for any paths leading to the usual suspects
171 * like BUG(), printk(), panic() etc. [but let's keep them for now for
172 * older compilers]
173 *
174 * Early snapshots of gcc 4.3 don't support this and we can't detect this
175 * in the preprocessor, but we can live with this because they're unreleased.
176 * Maketime probing would be overkill here.
177 *
178 * gcc also has a __attribute__((__hot__)) to move hot functions into
179 * a special section, but I don't see any sense in this right now in
180 * the kernel context
181 */
182#define __cold __attribute__((__cold__))
183
184#define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
185
186#ifndef __CHECKER__
187# define __compiletime_warning(message) __attribute__((warning(message)))
188# define __compiletime_error(message) __attribute__((error(message)))
189#endif /* __CHECKER__ */
190#endif /* GCC_VERSION >= 40300 */
191
192#if GCC_VERSION >= 40500
Emese Revfy0766f782016-06-20 20:42:34 +0200193
194#ifndef __CHECKER__
195#ifdef LATENT_ENTROPY_PLUGIN
196#define __latent_entropy __attribute__((latent_entropy))
197#endif
198#endif
199
Josh Poimboeufd1091c72017-02-21 15:35:32 -0600200#ifdef CONFIG_STACK_VALIDATION
201#define annotate_unreachable() ({ \
Josh Poimboeuf3d1e2362017-02-24 22:31:02 -0600202 asm("%c0:\t\n" \
Josh Poimboeufe390f9a2017-03-01 12:04:44 -0600203 ".pushsection .discard.unreachable\t\n" \
Josh Poimboeuf55149d02017-03-01 00:05:04 -0600204 ".long %c0b - .\t\n" \
Josh Poimboeuf3d1e2362017-02-24 22:31:02 -0600205 ".popsection\t\n" : : "i" (__LINE__)); \
Josh Poimboeufd1091c72017-02-21 15:35:32 -0600206})
207#else
208#define annotate_unreachable()
209#endif
210
Joe Perchescb984d12015-06-25 15:01:02 -0700211/*
212 * Mark a position in code as unreachable. This can be used to
213 * suppress control flow warnings after asm blocks that transfer
214 * control elsewhere.
215 *
216 * Early snapshots of gcc 4.5 don't support this and we can't detect
217 * this in the preprocessor, but we can live with this because they're
218 * unreleased. Really, we need to have autoconf for the kernel.
219 */
Josh Poimboeuf4e4636c2017-02-27 22:21:16 -0600220#define unreachable() \
221 do { annotate_unreachable(); __builtin_unreachable(); } while (0)
Joe Perchescb984d12015-06-25 15:01:02 -0700222
223/* Mark a function definition as prohibited from being cloned. */
Paolo Bonzini95272c22016-03-31 09:38:51 +0200224#define __noclone __attribute__((__noclone__, __optimize__("no-tracer")))
Joe Perchescb984d12015-06-25 15:01:02 -0700225
226#endif /* GCC_VERSION >= 40500 */
227
228#if GCC_VERSION >= 40600
229/*
Andrew Morton9add8502015-11-06 16:30:09 -0800230 * When used with Link Time Optimization, gcc can optimize away C functions or
231 * variables which are referenced only from assembly code. __visible tells the
232 * optimizer that something else uses this function or variable, thus preventing
233 * this.
Joe Perchescb984d12015-06-25 15:01:02 -0700234 */
235#define __visible __attribute__((externally_visible))
236#endif
237
Rasmus Villemoesa744fd12015-11-05 18:45:02 -0800238
Rasmus Villemoes8748dd52015-11-05 18:45:05 -0800239#if GCC_VERSION >= 40900 && !defined(__CHECKER__)
Rasmus Villemoesa744fd12015-11-05 18:45:02 -0800240/*
241 * __assume_aligned(n, k): Tell the optimizer that the returned
242 * pointer can be assumed to be k modulo n. The second argument is
243 * optional (default 0), so we use a variadic macro to make the
244 * shorthand.
245 *
246 * Beware: Do not apply this to functions which may return
247 * ERR_PTRs. Also, it is probably unwise to apply it to functions
248 * returning extra information in the low bits (but in that case the
249 * compiler should see some alignment anyway, when the return value is
250 * massaged by 'flags = ptr & 3; ptr &= ~3;').
251 */
252#define __assume_aligned(a, ...) __attribute__((__assume_aligned__(a, ## __VA_ARGS__)))
253#endif
254
Joe Perchescb984d12015-06-25 15:01:02 -0700255/*
256 * GCC 'asm goto' miscompiles certain code sequences:
257 *
258 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58670
259 *
260 * Work it around via a compiler barrier quirk suggested by Jakub Jelinek.
261 *
262 * (asm goto is automatically volatile - the naming reflects this.)
263 */
264#define asm_volatile_goto(x...) do { asm goto(x); asm (""); } while (0)
265
Johannes Berg101b29a2016-08-25 15:16:45 -0700266/*
267 * sparse (__CHECKER__) pretends to be gcc, but can't do constant
268 * folding in __builtin_bswap*() (yet), so don't set these for it.
269 */
270#if defined(CONFIG_ARCH_USE_BUILTIN_BSWAP) && !defined(__CHECKER__)
Joe Perchescb984d12015-06-25 15:01:02 -0700271#if GCC_VERSION >= 40400
272#define __HAVE_BUILTIN_BSWAP32__
273#define __HAVE_BUILTIN_BSWAP64__
274#endif
Josh Poimboeuf8634de62016-05-06 09:22:25 -0500275#if GCC_VERSION >= 40800
Joe Perchescb984d12015-06-25 15:01:02 -0700276#define __HAVE_BUILTIN_BSWAP16__
277#endif
Johannes Berg101b29a2016-08-25 15:16:45 -0700278#endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP && !__CHECKER__ */
Joe Perchescb984d12015-06-25 15:01:02 -0700279
Dmitry Vyukov045d5992016-11-30 15:54:13 -0800280#if GCC_VERSION >= 70000
281#define KASAN_ABI_VERSION 5
282#elif GCC_VERSION >= 50000
Joe Perchescb984d12015-06-25 15:01:02 -0700283#define KASAN_ABI_VERSION 4
284#elif GCC_VERSION >= 40902
285#define KASAN_ABI_VERSION 3
286#endif
287
Andrey Ryabinind9764412015-10-19 11:37:17 +0300288#if GCC_VERSION >= 40902
289/*
290 * Tell the compiler that address safety instrumentation (KASAN)
291 * should not be applied to that function.
292 * Conflicts with inlining: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
293 */
294#define __no_sanitize_address __attribute__((no_sanitize_address))
295#endif
296
Joe Perchescb984d12015-06-25 15:01:02 -0700297#endif /* gcc version >= 40000 specific checks */
Mikael Pettersson9c695202010-06-29 15:05:25 -0700298
299#if !defined(__noclone)
300#define __noclone /* not needed */
301#endif
Borislav Petkovc837fb32011-03-22 16:33:55 -0700302
Andrey Ryabinind9764412015-10-19 11:37:17 +0300303#if !defined(__no_sanitize_address)
304#define __no_sanitize_address
305#endif
306
Borislav Petkovc837fb32011-03-22 16:33:55 -0700307/*
308 * A trick to suppress uninitialized variable warning without generating any
309 * code
310 */
311#define uninitialized_var(x) x = x