~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/include/linux/compiler_types.h

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* SPDX-License-Identifier: GPL-2.0 */
  2 #ifndef __LINUX_COMPILER_TYPES_H
  3 #define __LINUX_COMPILER_TYPES_H
  4 
  5 /*
  6  * __has_builtin is supported on gcc >= 10, clang >= 3 and icc >= 21.
  7  * In the meantime, to support gcc < 10, we implement __has_builtin
  8  * by hand.
  9  */
 10 #ifndef __has_builtin
 11 #define __has_builtin(x) (0)
 12 #endif
 13 
 14 #ifndef __ASSEMBLY__
 15 
 16 /*
 17  * Skipped when running bindgen due to a libclang issue;
 18  * see https://github.com/rust-lang/rust-bindgen/issues/2244.
 19  */
 20 #if defined(CONFIG_DEBUG_INFO_BTF) && defined(CONFIG_PAHOLE_HAS_BTF_TAG) && \
 21         __has_attribute(btf_type_tag) && !defined(__BINDGEN__)
 22 # define BTF_TYPE_TAG(value) __attribute__((btf_type_tag(#value)))
 23 #else
 24 # define BTF_TYPE_TAG(value) /* nothing */
 25 #endif
 26 
 27 /* sparse defines __CHECKER__; see Documentation/dev-tools/sparse.rst */
 28 #ifdef __CHECKER__
 29 /* address spaces */
 30 # define __kernel       __attribute__((address_space(0)))
 31 # define __user         __attribute__((noderef, address_space(__user)))
 32 # define __iomem        __attribute__((noderef, address_space(__iomem)))
 33 # define __percpu       __attribute__((noderef, address_space(__percpu)))
 34 # define __rcu          __attribute__((noderef, address_space(__rcu)))
 35 static inline void __chk_user_ptr(const volatile void __user *ptr) { }
 36 static inline void __chk_io_ptr(const volatile void __iomem *ptr) { }
 37 /* context/locking */
 38 # define __must_hold(x) __attribute__((context(x,1,1)))
 39 # define __acquires(x)  __attribute__((context(x,0,1)))
 40 # define __cond_acquires(x) __attribute__((context(x,0,-1)))
 41 # define __releases(x)  __attribute__((context(x,1,0)))
 42 # define __acquire(x)   __context__(x,1)
 43 # define __release(x)   __context__(x,-1)
 44 # define __cond_lock(x,c)       ((c) ? ({ __acquire(x); 1; }) : 0)
 45 /* other */
 46 # define __force        __attribute__((force))
 47 # define __nocast       __attribute__((nocast))
 48 # define __safe         __attribute__((safe))
 49 # define __private      __attribute__((noderef))
 50 # define ACCESS_PRIVATE(p, member) (*((typeof((p)->member) __force *) &(p)->member))
 51 #else /* __CHECKER__ */
 52 /* address spaces */
 53 # define __kernel
 54 # ifdef STRUCTLEAK_PLUGIN
 55 #  define __user        __attribute__((user))
 56 # else
 57 #  define __user        BTF_TYPE_TAG(user)
 58 # endif
 59 # define __iomem
 60 # define __percpu       BTF_TYPE_TAG(percpu)
 61 # define __rcu          BTF_TYPE_TAG(rcu)
 62 
 63 # define __chk_user_ptr(x)      (void)0
 64 # define __chk_io_ptr(x)        (void)0
 65 /* context/locking */
 66 # define __must_hold(x)
 67 # define __acquires(x)
 68 # define __cond_acquires(x)
 69 # define __releases(x)
 70 # define __acquire(x)   (void)0
 71 # define __release(x)   (void)0
 72 # define __cond_lock(x,c) (c)
 73 /* other */
 74 # define __force
 75 # define __nocast
 76 # define __safe
 77 # define __private
 78 # define ACCESS_PRIVATE(p, member) ((p)->member)
 79 # define __builtin_warning(x, y...) (1)
 80 #endif /* __CHECKER__ */
 81 
 82 /* Indirect macros required for expanded argument pasting, eg. __LINE__. */
 83 #define ___PASTE(a,b) a##b
 84 #define __PASTE(a,b) ___PASTE(a,b)
 85 
 86 #ifdef __KERNEL__
 87 
 88 /* Attributes */
 89 #include <linux/compiler_attributes.h>
 90 
 91 #if CONFIG_FUNCTION_ALIGNMENT > 0
 92 #define __function_aligned              __aligned(CONFIG_FUNCTION_ALIGNMENT)
 93 #else
 94 #define __function_aligned
 95 #endif
 96 
 97 /*
 98  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-cold-function-attribute
 99  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Label-Attributes.html#index-cold-label-attribute
100  *
101  * When -falign-functions=N is in use, we must avoid the cold attribute as
102  * GCC drops the alignment for cold functions. Worse, GCC can implicitly mark
103  * callees of cold functions as cold themselves, so it's not sufficient to add
104  * __function_aligned here as that will not ensure that callees are correctly
105  * aligned.
106  *
107  * See:
108  *
109  *   https://lore.kernel.org/lkml/Y77%2FqVgvaJidFpYt@FVFF77S0Q05N
110  *   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88345#c9
111  */
112 #if defined(CONFIG_CC_HAS_SANE_FUNCTION_ALIGNMENT) || (CONFIG_FUNCTION_ALIGNMENT == 0)
113 #define __cold                          __attribute__((__cold__))
114 #else
115 #define __cold
116 #endif
117 
118 /*
119  * On x86-64 and arm64 targets, __preserve_most changes the calling convention
120  * of a function to make the code in the caller as unintrusive as possible. This
121  * convention behaves identically to the C calling convention on how arguments
122  * and return values are passed, but uses a different set of caller- and callee-
123  * saved registers.
124  *
125  * The purpose is to alleviates the burden of saving and recovering a large
126  * register set before and after the call in the caller.  This is beneficial for
127  * rarely taken slow paths, such as error-reporting functions that may be called
128  * from hot paths.
129  *
130  * Note: This may conflict with instrumentation inserted on function entry which
131  * does not use __preserve_most or equivalent convention (if in assembly). Since
132  * function tracing assumes the normal C calling convention, where the attribute
133  * is supported, __preserve_most implies notrace.  It is recommended to restrict
134  * use of the attribute to functions that should or already disable tracing.
135  *
136  * Optional: not supported by gcc.
137  *
138  * clang: https://clang.llvm.org/docs/AttributeReference.html#preserve-most
139  */
140 #if __has_attribute(__preserve_most__) && (defined(CONFIG_X86_64) || defined(CONFIG_ARM64))
141 # define __preserve_most notrace __attribute__((__preserve_most__))
142 #else
143 # define __preserve_most
144 #endif
145 
146 /*
147  * Annotating a function/variable with __retain tells the compiler to place
148  * the object in its own section and set the flag SHF_GNU_RETAIN. This flag
149  * instructs the linker to retain the object during garbage-cleanup or LTO
150  * phases.
151  *
152  * Note that the __used macro is also used to prevent functions or data
153  * being optimized out, but operates at the compiler/IR-level and may still
154  * allow unintended removal of objects during linking.
155  *
156  * Optional: only supported since gcc >= 11, clang >= 13
157  *
158  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-retain-function-attribute
159  * clang: https://clang.llvm.org/docs/AttributeReference.html#retain
160  */
161 #if __has_attribute(__retain__) && \
162         (defined(CONFIG_LD_DEAD_CODE_DATA_ELIMINATION) || \
163          defined(CONFIG_LTO_CLANG))
164 # define __retain                       __attribute__((__retain__))
165 #else
166 # define __retain
167 #endif
168 
169 /* Compiler specific macros. */
170 #ifdef __clang__
171 #include <linux/compiler-clang.h>
172 #elif defined(__GNUC__)
173 /* The above compilers also define __GNUC__, so order is important here. */
174 #include <linux/compiler-gcc.h>
175 #else
176 #error "Unknown compiler"
177 #endif
178 
179 /*
180  * Some architectures need to provide custom definitions of macros provided
181  * by linux/compiler-*.h, and can do so using asm/compiler.h. We include that
182  * conditionally rather than using an asm-generic wrapper in order to avoid
183  * build failures if any C compilation, which will include this file via an
184  * -include argument in c_flags, occurs prior to the asm-generic wrappers being
185  * generated.
186  */
187 #ifdef CONFIG_HAVE_ARCH_COMPILER_H
188 #include <asm/compiler.h>
189 #endif
190 
191 struct ftrace_branch_data {
192         const char *func;
193         const char *file;
194         unsigned line;
195         union {
196                 struct {
197                         unsigned long correct;
198                         unsigned long incorrect;
199                 };
200                 struct {
201                         unsigned long miss;
202                         unsigned long hit;
203                 };
204                 unsigned long miss_hit[2];
205         };
206 };
207 
208 struct ftrace_likely_data {
209         struct ftrace_branch_data       data;
210         unsigned long                   constant;
211 };
212 
213 #if defined(CC_USING_HOTPATCH)
214 #define notrace                 __attribute__((hotpatch(0, 0)))
215 #elif defined(CC_USING_PATCHABLE_FUNCTION_ENTRY)
216 #define notrace                 __attribute__((patchable_function_entry(0, 0)))
217 #else
218 #define notrace                 __attribute__((__no_instrument_function__))
219 #endif
220 
221 /*
222  * it doesn't make sense on ARM (currently the only user of __naked)
223  * to trace naked functions because then mcount is called without
224  * stack and frame pointer being set up and there is no chance to
225  * restore the lr register to the value before mcount was called.
226  */
227 #define __naked                 __attribute__((__naked__)) notrace
228 
229 /*
230  * Prefer gnu_inline, so that extern inline functions do not emit an
231  * externally visible function. This makes extern inline behave as per gnu89
232  * semantics rather than c99. This prevents multiple symbol definition errors
233  * of extern inline functions at link time.
234  * A lot of inline functions can cause havoc with function tracing.
235  */
236 #define inline inline __gnu_inline __inline_maybe_unused notrace
237 
238 /*
239  * gcc provides both __inline__ and __inline as alternate spellings of
240  * the inline keyword, though the latter is undocumented. New kernel
241  * code should only use the inline spelling, but some existing code
242  * uses __inline__. Since we #define inline above, to ensure
243  * __inline__ has the same semantics, we need this #define.
244  *
245  * However, the spelling __inline is strictly reserved for referring
246  * to the bare keyword.
247  */
248 #define __inline__ inline
249 
250 /*
251  * GCC does not warn about unused static inline functions for -Wunused-function.
252  * Suppress the warning in clang as well by using __maybe_unused, but enable it
253  * for W=1 build. This will allow clang to find unused functions. Remove the
254  * __inline_maybe_unused entirely after fixing most of -Wunused-function warnings.
255  */
256 #ifdef KBUILD_EXTRA_WARN1
257 #define __inline_maybe_unused
258 #else
259 #define __inline_maybe_unused __maybe_unused
260 #endif
261 
262 /*
263  * Rather then using noinline to prevent stack consumption, use
264  * noinline_for_stack instead.  For documentation reasons.
265  */
266 #define noinline_for_stack noinline
267 
268 /*
269  * Sanitizer helper attributes: Because using __always_inline and
270  * __no_sanitize_* conflict, provide helper attributes that will either expand
271  * to __no_sanitize_* in compilation units where instrumentation is enabled
272  * (__SANITIZE_*__), or __always_inline in compilation units without
273  * instrumentation (__SANITIZE_*__ undefined).
274  */
275 #ifdef __SANITIZE_ADDRESS__
276 /*
277  * We can't declare function 'inline' because __no_sanitize_address conflicts
278  * with inlining. Attempt to inline it may cause a build failure.
279  *     https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
280  * '__maybe_unused' allows us to avoid defined-but-not-used warnings.
281  */
282 # define __no_kasan_or_inline __no_sanitize_address notrace __maybe_unused
283 # define __no_sanitize_or_inline __no_kasan_or_inline
284 #else
285 # define __no_kasan_or_inline __always_inline
286 #endif
287 
288 #ifdef __SANITIZE_THREAD__
289 /*
290  * Clang still emits instrumentation for __tsan_func_{entry,exit}() and builtin
291  * atomics even with __no_sanitize_thread (to avoid false positives in userspace
292  * ThreadSanitizer). The kernel's requirements are stricter and we really do not
293  * want any instrumentation with __no_kcsan.
294  *
295  * Therefore we add __disable_sanitizer_instrumentation where available to
296  * disable all instrumentation. See Kconfig.kcsan where this is mandatory.
297  */
298 # define __no_kcsan __no_sanitize_thread __disable_sanitizer_instrumentation
299 /*
300  * Type qualifier to mark variables where all data-racy accesses should be
301  * ignored by KCSAN. Note, the implementation simply marks these variables as
302  * volatile, since KCSAN will treat such accesses as "marked".
303  */
304 # define __data_racy volatile
305 # define __no_sanitize_or_inline __no_kcsan notrace __maybe_unused
306 #else
307 # define __no_kcsan
308 # define __data_racy
309 #endif
310 
311 #ifdef __SANITIZE_MEMORY__
312 /*
313  * Similarly to KASAN and KCSAN, KMSAN loses function attributes of inlined
314  * functions, therefore disabling KMSAN checks also requires disabling inlining.
315  *
316  * __no_sanitize_or_inline effectively prevents KMSAN from reporting errors
317  * within the function and marks all its outputs as initialized.
318  */
319 # define __no_sanitize_or_inline __no_kmsan_checks notrace __maybe_unused
320 #endif
321 
322 #ifndef __no_sanitize_or_inline
323 #define __no_sanitize_or_inline __always_inline
324 #endif
325 
326 /*
327  * Apply __counted_by() when the Endianness matches to increase test coverage.
328  */
329 #ifdef __LITTLE_ENDIAN
330 #define __counted_by_le(member) __counted_by(member)
331 #define __counted_by_be(member)
332 #else
333 #define __counted_by_le(member)
334 #define __counted_by_be(member) __counted_by(member)
335 #endif
336 
337 /* Do not trap wrapping arithmetic within an annotated function. */
338 #ifdef CONFIG_UBSAN_SIGNED_WRAP
339 # define __signed_wrap __attribute__((no_sanitize("signed-integer-overflow")))
340 #else
341 # define __signed_wrap
342 #endif
343 
344 /* Section for code which can't be instrumented at all */
345 #define __noinstr_section(section)                                      \
346         noinline notrace __attribute((__section__(section)))            \
347         __no_kcsan __no_sanitize_address __no_profile __no_sanitize_coverage \
348         __no_sanitize_memory __signed_wrap
349 
350 #define noinstr __noinstr_section(".noinstr.text")
351 
352 /*
353  * The __cpuidle section is used twofold:
354  *
355  *  1) the original use -- identifying if a CPU is 'stuck' in idle state based
356  *     on it's instruction pointer. See cpu_in_idle().
357  *
358  *  2) supressing instrumentation around where cpuidle disables RCU; where the
359  *     function isn't strictly required for #1, this is interchangeable with
360  *     noinstr.
361  */
362 #define __cpuidle __noinstr_section(".cpuidle.text")
363 
364 #endif /* __KERNEL__ */
365 
366 #endif /* __ASSEMBLY__ */
367 
368 /*
369  * The below symbols may be defined for one or more, but not ALL, of the above
370  * compilers. We don't consider that to be an error, so set them to nothing.
371  * For example, some of them are for compiler specific plugins.
372  */
373 #ifndef __latent_entropy
374 # define __latent_entropy
375 #endif
376 
377 #if defined(RANDSTRUCT) && !defined(__CHECKER__)
378 # define __randomize_layout __designated_init __attribute__((randomize_layout))
379 # define __no_randomize_layout __attribute__((no_randomize_layout))
380 /* This anon struct can add padding, so only enable it under randstruct. */
381 # define randomized_struct_fields_start struct {
382 # define randomized_struct_fields_end   } __randomize_layout;
383 #else
384 # define __randomize_layout __designated_init
385 # define __no_randomize_layout
386 # define randomized_struct_fields_start
387 # define randomized_struct_fields_end
388 #endif
389 
390 #ifndef __noscs
391 # define __noscs
392 #endif
393 
394 #ifndef __nocfi
395 # define __nocfi
396 #endif
397 
398 /*
399  * Any place that could be marked with the "alloc_size" attribute is also
400  * a place to be marked with the "malloc" attribute, except those that may
401  * be performing a _reallocation_, as that may alias the existing pointer.
402  * For these, use __realloc_size().
403  */
404 #ifdef __alloc_size__
405 # define __alloc_size(x, ...)   __alloc_size__(x, ## __VA_ARGS__) __malloc
406 # define __realloc_size(x, ...) __alloc_size__(x, ## __VA_ARGS__)
407 #else
408 # define __alloc_size(x, ...)   __malloc
409 # define __realloc_size(x, ...)
410 #endif
411 
412 /*
413  * When the size of an allocated object is needed, use the best available
414  * mechanism to find it. (For cases where sizeof() cannot be used.)
415  */
416 #if __has_builtin(__builtin_dynamic_object_size)
417 #define __struct_size(p)        __builtin_dynamic_object_size(p, 0)
418 #define __member_size(p)        __builtin_dynamic_object_size(p, 1)
419 #else
420 #define __struct_size(p)        __builtin_object_size(p, 0)
421 #define __member_size(p)        __builtin_object_size(p, 1)
422 #endif
423 
424 /*
425  * Some versions of gcc do not mark 'asm goto' volatile:
426  *
427  *  https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103979
428  *
429  * We do it here by hand, because it doesn't hurt.
430  */
431 #ifndef asm_goto_output
432 #define asm_goto_output(x...) asm volatile goto(x)
433 #endif
434 
435 /*
436  * Clang has trouble with constraints with multiple
437  * alternative behaviors (mainly "g" and "rm").
438  */
439 #ifndef ASM_INPUT_G
440   #define ASM_INPUT_G "g"
441   #define ASM_INPUT_RM "rm"
442 #endif
443 
444 #ifdef CONFIG_CC_HAS_ASM_INLINE
445 #define asm_inline asm __inline
446 #else
447 #define asm_inline asm
448 #endif
449 
450 /* Are two types/vars the same type (ignoring qualifiers)? */
451 #define __same_type(a, b) __builtin_types_compatible_p(typeof(a), typeof(b))
452 
453 /*
454  * __unqual_scalar_typeof(x) - Declare an unqualified scalar type, leaving
455  *                             non-scalar types unchanged.
456  */
457 /*
458  * Prefer C11 _Generic for better compile-times and simpler code. Note: 'char'
459  * is not type-compatible with 'signed char', and we define a separate case.
460  */
461 #define __scalar_type_to_expr_cases(type)                               \
462                 unsigned type:  (unsigned type)0,                       \
463                 signed type:    (signed type)0
464 
465 #define __unqual_scalar_typeof(x) typeof(                               \
466                 _Generic((x),                                           \
467                          char:  (char)0,                                \
468                          __scalar_type_to_expr_cases(char),             \
469                          __scalar_type_to_expr_cases(short),            \
470                          __scalar_type_to_expr_cases(int),              \
471                          __scalar_type_to_expr_cases(long),             \
472                          __scalar_type_to_expr_cases(long long),        \
473                          default: (x)))
474 
475 /* Is this type a native word size -- useful for atomic operations */
476 #define __native_word(t) \
477         (sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
478          sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long))
479 
480 #ifdef __OPTIMIZE__
481 # define __compiletime_assert(condition, msg, prefix, suffix)           \
482         do {                                                            \
483                 /*                                                      \
484                  * __noreturn is needed to give the compiler enough     \
485                  * information to avoid certain possibly-uninitialized  \
486                  * warnings (regardless of the build failing).          \
487                  */                                                     \
488                 __noreturn extern void prefix ## suffix(void)           \
489                         __compiletime_error(msg);                       \
490                 if (!(condition))                                       \
491                         prefix ## suffix();                             \
492         } while (0)
493 #else
494 # define __compiletime_assert(condition, msg, prefix, suffix) do { } while (0)
495 #endif
496 
497 #define _compiletime_assert(condition, msg, prefix, suffix) \
498         __compiletime_assert(condition, msg, prefix, suffix)
499 
500 /**
501  * compiletime_assert - break build and emit msg if condition is false
502  * @condition: a compile-time constant condition to check
503  * @msg:       a message to emit if condition is false
504  *
505  * In tradition of POSIX assert, this macro will break the build if the
506  * supplied condition is *false*, emitting the supplied error message if the
507  * compiler has support to do so.
508  */
509 #define compiletime_assert(condition, msg) \
510         _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
511 
512 #define compiletime_assert_atomic_type(t)                               \
513         compiletime_assert(__native_word(t),                            \
514                 "Need native word sized stores/loads for atomicity.")
515 
516 /* Helpers for emitting diagnostics in pragmas. */
517 #ifndef __diag
518 #define __diag(string)
519 #endif
520 
521 #ifndef __diag_GCC
522 #define __diag_GCC(version, severity, string)
523 #endif
524 
525 #define __diag_push()   __diag(push)
526 #define __diag_pop()    __diag(pop)
527 
528 #define __diag_ignore(compiler, version, option, comment) \
529         __diag_ ## compiler(version, ignore, option)
530 #define __diag_warn(compiler, version, option, comment) \
531         __diag_ ## compiler(version, warn, option)
532 #define __diag_error(compiler, version, option, comment) \
533         __diag_ ## compiler(version, error, option)
534 
535 #ifndef __diag_ignore_all
536 #define __diag_ignore_all(option, comment)
537 #endif
538 
539 #endif /* __LINUX_COMPILER_TYPES_H */
540 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php