forked from mirrors/linux
		
	Once upgrading the minimum supported version of GCC to 5.1, we can drop
the fallback code for !COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW.
This is effectively a revert of commit f0907827a8 ("compiler.h: enable
builtin overflow checkers and add fallback code")
Link: https://github.com/ClangBuiltLinux/linux/issues/1438#issuecomment-916745801
Suggested-by: Rasmus Villemoes <linux@rasmusvillemoes.dk>
Signed-off-by: Nick Desaulniers <ndesaulniers@google.com>
Acked-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Nathan Chancellor <nathan@kernel.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
		
	
			
		
			
				
	
	
		
			70 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			70 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* SPDX-License-Identifier: GPL-2.0 */
 | 
						|
#ifndef __LINUX_COMPILER_TYPES_H
 | 
						|
#error "Please don't include <linux/compiler-clang.h> directly, include <linux/compiler.h> instead."
 | 
						|
#endif
 | 
						|
 | 
						|
/* Compiler specific definitions for Clang compiler */
 | 
						|
 | 
						|
/* same as gcc, this was present in clang-2.6 so we can assume it works
 | 
						|
 * with any version that can compile the kernel
 | 
						|
 */
 | 
						|
#define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
 | 
						|
 | 
						|
/* all clang versions usable with the kernel support KASAN ABI version 5 */
 | 
						|
#define KASAN_ABI_VERSION 5
 | 
						|
 | 
						|
/*
 | 
						|
 * Note: Checking __has_feature(*_sanitizer) is only true if the feature is
 | 
						|
 * enabled. Therefore it is not required to additionally check defined(CONFIG_*)
 | 
						|
 * to avoid adding redundant attributes in other configurations.
 | 
						|
 */
 | 
						|
 | 
						|
#if __has_feature(address_sanitizer) || __has_feature(hwaddress_sanitizer)
 | 
						|
/* Emulate GCC's __SANITIZE_ADDRESS__ flag */
 | 
						|
#define __SANITIZE_ADDRESS__
 | 
						|
#define __no_sanitize_address \
 | 
						|
		__attribute__((no_sanitize("address", "hwaddress")))
 | 
						|
#else
 | 
						|
#define __no_sanitize_address
 | 
						|
#endif
 | 
						|
 | 
						|
#if __has_feature(thread_sanitizer)
 | 
						|
/* emulate gcc's __SANITIZE_THREAD__ flag */
 | 
						|
#define __SANITIZE_THREAD__
 | 
						|
#define __no_sanitize_thread \
 | 
						|
		__attribute__((no_sanitize("thread")))
 | 
						|
#else
 | 
						|
#define __no_sanitize_thread
 | 
						|
#endif
 | 
						|
 | 
						|
#if defined(CONFIG_ARCH_USE_BUILTIN_BSWAP)
 | 
						|
#define __HAVE_BUILTIN_BSWAP32__
 | 
						|
#define __HAVE_BUILTIN_BSWAP64__
 | 
						|
#define __HAVE_BUILTIN_BSWAP16__
 | 
						|
#endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP */
 | 
						|
 | 
						|
#if __has_feature(undefined_behavior_sanitizer)
 | 
						|
/* GCC does not have __SANITIZE_UNDEFINED__ */
 | 
						|
#define __no_sanitize_undefined \
 | 
						|
		__attribute__((no_sanitize("undefined")))
 | 
						|
#else
 | 
						|
#define __no_sanitize_undefined
 | 
						|
#endif
 | 
						|
 | 
						|
/*
 | 
						|
 * Support for __has_feature(coverage_sanitizer) was added in Clang 13 together
 | 
						|
 * with no_sanitize("coverage"). Prior versions of Clang support coverage
 | 
						|
 * instrumentation, but cannot be queried for support by the preprocessor.
 | 
						|
 */
 | 
						|
#if __has_feature(coverage_sanitizer)
 | 
						|
#define __no_sanitize_coverage __attribute__((no_sanitize("coverage")))
 | 
						|
#else
 | 
						|
#define __no_sanitize_coverage
 | 
						|
#endif
 | 
						|
 | 
						|
#if __has_feature(shadow_call_stack)
 | 
						|
# define __noscs	__attribute__((__no_sanitize__("shadow-call-stack")))
 | 
						|
#endif
 | 
						|
 | 
						|
#define __nocfi		__attribute__((__no_sanitize__("cfi")))
 | 
						|
#define __cficanonical	__attribute__((__cfi_canonical_jump_table__))
 |