mirror of
git://git.yoctoproject.org/linux-yocto.git
synced 2025-10-23 07:23:12 +02:00

commit 3fac212fe489aa0dbe8d80a42a7809840ca7b0f9 upstream.
Clang 22 recently added support for defining __SANITIZE__ macros similar
to GCC [1], which causes warnings (or errors with CONFIG_WERROR=y or W=e)
with the existing defines that the kernel creates to emulate this behavior
with existing clang versions.
In file included from <built-in>:3:
In file included from include/linux/compiler_types.h:171:
include/linux/compiler-clang.h:37:9: error: '__SANITIZE_THREAD__' macro redefined [-Werror,-Wmacro-redefined]
37 | #define __SANITIZE_THREAD__
| ^
<built-in>:352:9: note: previous definition is here
352 | #define __SANITIZE_THREAD__ 1
| ^
Refactor compiler-clang.h to only define the sanitizer macros when they
are undefined and adjust the rest of the code to use these macros for
checking if the sanitizers are enabled, clearing up the warnings and
allowing the kernel to easily drop these defines when the minimum
supported version of LLVM for building the kernel becomes 22.0.0 or newer.
Link: https://lkml.kernel.org/r/20250902-clang-update-sanitize-defines-v1-1-cf3702ca3d92@kernel.org
Link: 568c23bbd3
[1]
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Reviewed-by: Justin Stitt <justinstitt@google.com>
Cc: Alexander Potapenko <glider@google.com>
Cc: Andrey Konovalov <andreyknvl@gmail.com>
Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com>
Cc: Bill Wendling <morbo@google.com>
Cc: Dmitriy Vyukov <dvyukov@google.com>
Cc: Marco Elver <elver@google.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
149 lines
4.7 KiB
C
149 lines
4.7 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef __LINUX_COMPILER_TYPES_H
|
|
#error "Please don't include <linux/compiler-clang.h> directly, include <linux/compiler.h> instead."
|
|
#endif
|
|
|
|
/* Compiler specific definitions for Clang compiler */
|
|
|
|
/*
|
|
* Clang prior to 17 is being silly and considers many __cleanup() variables
|
|
* as unused (because they are, their sole purpose is to go out of scope).
|
|
*
|
|
* https://reviews.llvm.org/D152180
|
|
*/
|
|
#undef __cleanup
|
|
#define __cleanup(func) __maybe_unused __attribute__((__cleanup__(func)))
|
|
|
|
/* same as gcc, this was present in clang-2.6 so we can assume it works
|
|
* with any version that can compile the kernel
|
|
*/
|
|
#define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
|
|
|
|
/* all clang versions usable with the kernel support KASAN ABI version 5 */
|
|
#define KASAN_ABI_VERSION 5
|
|
|
|
/*
|
|
* Clang 22 added preprocessor macros to match GCC, in hopes of eventually
|
|
* dropping __has_feature support for sanitizers:
|
|
* https://github.com/llvm/llvm-project/commit/568c23bbd3303518c5056d7f03444dae4fdc8a9c
|
|
* Create these macros for older versions of clang so that it is easy to clean
|
|
* up once the minimum supported version of LLVM for building the kernel always
|
|
* creates these macros.
|
|
*
|
|
* Note: Checking __has_feature(*_sanitizer) is only true if the feature is
|
|
* enabled. Therefore it is not required to additionally check defined(CONFIG_*)
|
|
* to avoid adding redundant attributes in other configurations.
|
|
*/
|
|
#if __has_feature(address_sanitizer) && !defined(__SANITIZE_ADDRESS__)
|
|
#define __SANITIZE_ADDRESS__
|
|
#endif
|
|
#if __has_feature(hwaddress_sanitizer) && !defined(__SANITIZE_HWADDRESS__)
|
|
#define __SANITIZE_HWADDRESS__
|
|
#endif
|
|
#if __has_feature(thread_sanitizer) && !defined(__SANITIZE_THREAD__)
|
|
#define __SANITIZE_THREAD__
|
|
#endif
|
|
|
|
/*
|
|
* Treat __SANITIZE_HWADDRESS__ the same as __SANITIZE_ADDRESS__ in the kernel.
|
|
*/
|
|
#ifdef __SANITIZE_HWADDRESS__
|
|
#define __SANITIZE_ADDRESS__
|
|
#endif
|
|
|
|
#ifdef __SANITIZE_ADDRESS__
|
|
#define __no_sanitize_address \
|
|
__attribute__((no_sanitize("address", "hwaddress")))
|
|
#else
|
|
#define __no_sanitize_address
|
|
#endif
|
|
|
|
#ifdef __SANITIZE_THREAD__
|
|
#define __no_sanitize_thread \
|
|
__attribute__((no_sanitize("thread")))
|
|
#else
|
|
#define __no_sanitize_thread
|
|
#endif
|
|
|
|
#if defined(CONFIG_ARCH_USE_BUILTIN_BSWAP)
|
|
#define __HAVE_BUILTIN_BSWAP32__
|
|
#define __HAVE_BUILTIN_BSWAP64__
|
|
#define __HAVE_BUILTIN_BSWAP16__
|
|
#endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP */
|
|
|
|
#if __has_feature(undefined_behavior_sanitizer)
|
|
/* GCC does not have __SANITIZE_UNDEFINED__ */
|
|
#define __no_sanitize_undefined \
|
|
__attribute__((no_sanitize("undefined")))
|
|
#else
|
|
#define __no_sanitize_undefined
|
|
#endif
|
|
|
|
#if __has_feature(memory_sanitizer)
|
|
#define __SANITIZE_MEMORY__
|
|
/*
|
|
* Unlike other sanitizers, KMSAN still inserts code into functions marked with
|
|
* no_sanitize("kernel-memory"). Using disable_sanitizer_instrumentation
|
|
* provides the behavior consistent with other __no_sanitize_ attributes,
|
|
* guaranteeing that __no_sanitize_memory functions remain uninstrumented.
|
|
*/
|
|
#define __no_sanitize_memory __disable_sanitizer_instrumentation
|
|
|
|
/*
|
|
* The __no_kmsan_checks attribute ensures that a function does not produce
|
|
* false positive reports by:
|
|
* - initializing all local variables and memory stores in this function;
|
|
* - skipping all shadow checks;
|
|
* - passing initialized arguments to this function's callees.
|
|
*/
|
|
#define __no_kmsan_checks __attribute__((no_sanitize("kernel-memory")))
|
|
#else
|
|
#define __no_sanitize_memory
|
|
#define __no_kmsan_checks
|
|
#endif
|
|
|
|
/*
|
|
* Support for __has_feature(coverage_sanitizer) was added in Clang 13 together
|
|
* with no_sanitize("coverage"). Prior versions of Clang support coverage
|
|
* instrumentation, but cannot be queried for support by the preprocessor.
|
|
*/
|
|
#if __has_feature(coverage_sanitizer)
|
|
#define __no_sanitize_coverage __attribute__((no_sanitize("coverage")))
|
|
#else
|
|
#define __no_sanitize_coverage
|
|
#endif
|
|
|
|
#if __has_feature(shadow_call_stack)
|
|
# define __noscs __attribute__((__no_sanitize__("shadow-call-stack")))
|
|
#endif
|
|
|
|
#if __has_feature(kcfi)
|
|
/* Disable CFI checking inside a function. */
|
|
#define __nocfi __attribute__((__no_sanitize__("kcfi")))
|
|
#endif
|
|
|
|
/*
|
|
* Turn individual warnings and errors on and off locally, depending
|
|
* on version.
|
|
*/
|
|
#define __diag_clang(version, severity, s) \
|
|
__diag_clang_ ## version(__diag_clang_ ## severity s)
|
|
|
|
/* Severity used in pragma directives */
|
|
#define __diag_clang_ignore ignored
|
|
#define __diag_clang_warn warning
|
|
#define __diag_clang_error error
|
|
|
|
#define __diag_str1(s) #s
|
|
#define __diag_str(s) __diag_str1(s)
|
|
#define __diag(s) _Pragma(__diag_str(clang diagnostic s))
|
|
|
|
#if CONFIG_CLANG_VERSION >= 110000
|
|
#define __diag_clang_11(s) __diag(s)
|
|
#else
|
|
#define __diag_clang_11(s)
|
|
#endif
|
|
|
|
#define __diag_ignore_all(option, comment) \
|
|
__diag_clang(11, ignore, option)
|