at master 22 kB view raw
1/* SPDX-License-Identifier: GPL-2.0 */ 2#ifndef __LINUX_COMPILER_TYPES_H 3#define __LINUX_COMPILER_TYPES_H 4 5/* 6 * __has_builtin is supported on gcc >= 10, clang >= 3 and icc >= 21. 7 * In the meantime, to support gcc < 10, we implement __has_builtin 8 * by hand. 9 */ 10#ifndef __has_builtin 11#define __has_builtin(x) (0) 12#endif 13 14/* Indirect macros required for expanded argument pasting, eg. __LINE__. */ 15#define ___PASTE(a, b) a##b 16#define __PASTE(a, b) ___PASTE(a, b) 17 18#ifndef __ASSEMBLY__ 19 20/* 21 * C23 introduces "auto" as a standard way to define type-inferred 22 * variables, but "auto" has been a (useless) keyword even since K&R C, 23 * so it has always been "namespace reserved." 24 * 25 * Until at some future time we require C23 support, we need the gcc 26 * extension __auto_type, but there is no reason to put that elsewhere 27 * in the source code. 28 */ 29#if __STDC_VERSION__ < 202311L 30# define auto __auto_type 31#endif 32 33/* 34 * Skipped when running bindgen due to a libclang issue; 35 * see https://github.com/rust-lang/rust-bindgen/issues/2244. 36 */ 37#if defined(CONFIG_DEBUG_INFO_BTF) && defined(CONFIG_PAHOLE_HAS_BTF_TAG) && \ 38 __has_attribute(btf_type_tag) && !defined(__BINDGEN__) 39# define BTF_TYPE_TAG(value) __attribute__((btf_type_tag(#value))) 40#else 41# define BTF_TYPE_TAG(value) /* nothing */ 42#endif 43 44/* sparse defines __CHECKER__; see Documentation/dev-tools/sparse.rst */ 45#ifdef __CHECKER__ 46/* address spaces */ 47# define __kernel __attribute__((address_space(0))) 48# define __user __attribute__((noderef, address_space(__user))) 49# define __iomem __attribute__((noderef, address_space(__iomem))) 50# define __percpu __attribute__((noderef, address_space(__percpu))) 51# define __rcu __attribute__((noderef, address_space(__rcu))) 52static inline void __chk_user_ptr(const volatile void __user *ptr) { } 53static inline void __chk_io_ptr(const volatile void __iomem *ptr) { } 54/* context/locking */ 55# define __must_hold(x) __attribute__((context(x,1,1))) 56# define __acquires(x) __attribute__((context(x,0,1))) 57# define __cond_acquires(x) __attribute__((context(x,0,-1))) 58# define __releases(x) __attribute__((context(x,1,0))) 59# define __acquire(x) __context__(x,1) 60# define __release(x) __context__(x,-1) 61# define __cond_lock(x,c) ((c) ? ({ __acquire(x); 1; }) : 0) 62/* other */ 63# define __force __attribute__((force)) 64# define __nocast __attribute__((nocast)) 65# define __safe __attribute__((safe)) 66# define __private __attribute__((noderef)) 67# define ACCESS_PRIVATE(p, member) (*((typeof((p)->member) __force *) &(p)->member)) 68#else /* __CHECKER__ */ 69/* address spaces */ 70# define __kernel 71# ifdef STRUCTLEAK_PLUGIN 72# define __user __attribute__((user)) 73# else 74# define __user BTF_TYPE_TAG(user) 75# endif 76# define __iomem 77# define __percpu __percpu_qual BTF_TYPE_TAG(percpu) 78# define __rcu BTF_TYPE_TAG(rcu) 79 80# define __chk_user_ptr(x) (void)0 81# define __chk_io_ptr(x) (void)0 82/* context/locking */ 83# define __must_hold(x) 84# define __acquires(x) 85# define __cond_acquires(x) 86# define __releases(x) 87# define __acquire(x) (void)0 88# define __release(x) (void)0 89# define __cond_lock(x,c) (c) 90/* other */ 91# define __force 92# define __nocast 93# define __safe 94# define __private 95# define ACCESS_PRIVATE(p, member) ((p)->member) 96# define __builtin_warning(x, y...) (1) 97#endif /* __CHECKER__ */ 98 99#ifdef __KERNEL__ 100 101/* Attributes */ 102#include <linux/compiler_attributes.h> 103 104#if CONFIG_FUNCTION_ALIGNMENT > 0 105#define __function_aligned __aligned(CONFIG_FUNCTION_ALIGNMENT) 106#else 107#define __function_aligned 108#endif 109 110/* 111 * gcc: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-cold-function-attribute 112 * gcc: https://gcc.gnu.org/onlinedocs/gcc/Label-Attributes.html#index-cold-label-attribute 113 * 114 * When -falign-functions=N is in use, we must avoid the cold attribute as 115 * GCC drops the alignment for cold functions. Worse, GCC can implicitly mark 116 * callees of cold functions as cold themselves, so it's not sufficient to add 117 * __function_aligned here as that will not ensure that callees are correctly 118 * aligned. 119 * 120 * See: 121 * 122 * https://lore.kernel.org/lkml/Y77%2FqVgvaJidFpYt@FVFF77S0Q05N 123 * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88345#c9 124 */ 125#if defined(CONFIG_CC_HAS_SANE_FUNCTION_ALIGNMENT) || (CONFIG_FUNCTION_ALIGNMENT == 0) 126#define __cold __attribute__((__cold__)) 127#else 128#define __cold 129#endif 130 131/* 132 * On x86-64 and arm64 targets, __preserve_most changes the calling convention 133 * of a function to make the code in the caller as unintrusive as possible. This 134 * convention behaves identically to the C calling convention on how arguments 135 * and return values are passed, but uses a different set of caller- and callee- 136 * saved registers. 137 * 138 * The purpose is to alleviates the burden of saving and recovering a large 139 * register set before and after the call in the caller. This is beneficial for 140 * rarely taken slow paths, such as error-reporting functions that may be called 141 * from hot paths. 142 * 143 * Note: This may conflict with instrumentation inserted on function entry which 144 * does not use __preserve_most or equivalent convention (if in assembly). Since 145 * function tracing assumes the normal C calling convention, where the attribute 146 * is supported, __preserve_most implies notrace. It is recommended to restrict 147 * use of the attribute to functions that should or already disable tracing. 148 * 149 * Optional: not supported by gcc. 150 * 151 * clang: https://clang.llvm.org/docs/AttributeReference.html#preserve-most 152 */ 153#if __has_attribute(__preserve_most__) && (defined(CONFIG_X86_64) || defined(CONFIG_ARM64)) 154# define __preserve_most notrace __attribute__((__preserve_most__)) 155#else 156# define __preserve_most 157#endif 158 159/* 160 * Annotating a function/variable with __retain tells the compiler to place 161 * the object in its own section and set the flag SHF_GNU_RETAIN. This flag 162 * instructs the linker to retain the object during garbage-cleanup or LTO 163 * phases. 164 * 165 * Note that the __used macro is also used to prevent functions or data 166 * being optimized out, but operates at the compiler/IR-level and may still 167 * allow unintended removal of objects during linking. 168 * 169 * Optional: only supported since gcc >= 11, clang >= 13 170 * 171 * gcc: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-retain-function-attribute 172 * clang: https://clang.llvm.org/docs/AttributeReference.html#retain 173 */ 174#if __has_attribute(__retain__) && \ 175 (defined(CONFIG_LD_DEAD_CODE_DATA_ELIMINATION) || \ 176 defined(CONFIG_LTO_CLANG)) 177# define __retain __attribute__((__retain__)) 178#else 179# define __retain 180#endif 181 182/* Compiler specific macros. */ 183#ifdef __clang__ 184#include <linux/compiler-clang.h> 185#elif defined(__GNUC__) 186/* The above compilers also define __GNUC__, so order is important here. */ 187#include <linux/compiler-gcc.h> 188#else 189#error "Unknown compiler" 190#endif 191 192/* 193 * Some architectures need to provide custom definitions of macros provided 194 * by linux/compiler-*.h, and can do so using asm/compiler.h. We include that 195 * conditionally rather than using an asm-generic wrapper in order to avoid 196 * build failures if any C compilation, which will include this file via an 197 * -include argument in c_flags, occurs prior to the asm-generic wrappers being 198 * generated. 199 */ 200#ifdef CONFIG_HAVE_ARCH_COMPILER_H 201#include <asm/compiler.h> 202#endif 203 204struct ftrace_branch_data { 205 const char *func; 206 const char *file; 207 unsigned line; 208 union { 209 struct { 210 unsigned long correct; 211 unsigned long incorrect; 212 }; 213 struct { 214 unsigned long miss; 215 unsigned long hit; 216 }; 217 unsigned long miss_hit[2]; 218 }; 219}; 220 221struct ftrace_likely_data { 222 struct ftrace_branch_data data; 223 unsigned long constant; 224}; 225 226#if defined(CC_USING_HOTPATCH) 227#define notrace __attribute__((hotpatch(0, 0))) 228#elif defined(CC_USING_PATCHABLE_FUNCTION_ENTRY) 229#define notrace __attribute__((patchable_function_entry(0, 0))) 230#else 231#define notrace __attribute__((__no_instrument_function__)) 232#endif 233 234/* 235 * it doesn't make sense on ARM (currently the only user of __naked) 236 * to trace naked functions because then mcount is called without 237 * stack and frame pointer being set up and there is no chance to 238 * restore the lr register to the value before mcount was called. 239 */ 240#define __naked __attribute__((__naked__)) notrace 241 242/* 243 * Prefer gnu_inline, so that extern inline functions do not emit an 244 * externally visible function. This makes extern inline behave as per gnu89 245 * semantics rather than c99. This prevents multiple symbol definition errors 246 * of extern inline functions at link time. 247 * A lot of inline functions can cause havoc with function tracing. 248 */ 249#define inline inline __gnu_inline __inline_maybe_unused notrace 250 251/* 252 * gcc provides both __inline__ and __inline as alternate spellings of 253 * the inline keyword, though the latter is undocumented. New kernel 254 * code should only use the inline spelling, but some existing code 255 * uses __inline__. Since we #define inline above, to ensure 256 * __inline__ has the same semantics, we need this #define. 257 * 258 * However, the spelling __inline is strictly reserved for referring 259 * to the bare keyword. 260 */ 261#define __inline__ inline 262 263/* 264 * GCC does not warn about unused static inline functions for -Wunused-function. 265 * Suppress the warning in clang as well by using __maybe_unused, but enable it 266 * for W=2 build. This will allow clang to find unused functions. 267 */ 268#ifdef KBUILD_EXTRA_WARN2 269#define __inline_maybe_unused 270#else 271#define __inline_maybe_unused __maybe_unused 272#endif 273 274/* 275 * Rather then using noinline to prevent stack consumption, use 276 * noinline_for_stack instead. For documentation reasons. 277 */ 278#define noinline_for_stack noinline 279 280/* 281 * Use noinline_for_tracing for functions that should not be inlined. 282 * For tracing reasons. 283 */ 284#define noinline_for_tracing noinline 285 286/* 287 * Sanitizer helper attributes: Because using __always_inline and 288 * __no_sanitize_* conflict, provide helper attributes that will either expand 289 * to __no_sanitize_* in compilation units where instrumentation is enabled 290 * (__SANITIZE_*__), or __always_inline in compilation units without 291 * instrumentation (__SANITIZE_*__ undefined). 292 */ 293#ifdef __SANITIZE_ADDRESS__ 294/* 295 * We can't declare function 'inline' because __no_sanitize_address conflicts 296 * with inlining. Attempt to inline it may cause a build failure. 297 * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368 298 * '__maybe_unused' allows us to avoid defined-but-not-used warnings. 299 */ 300# define __no_kasan_or_inline __no_sanitize_address notrace __maybe_unused 301# define __no_sanitize_or_inline __no_kasan_or_inline 302#else 303# define __no_kasan_or_inline __always_inline 304#endif 305 306#ifdef __SANITIZE_THREAD__ 307/* 308 * Clang still emits instrumentation for __tsan_func_{entry,exit}() and builtin 309 * atomics even with __no_sanitize_thread (to avoid false positives in userspace 310 * ThreadSanitizer). The kernel's requirements are stricter and we really do not 311 * want any instrumentation with __no_kcsan. 312 * 313 * Therefore we add __disable_sanitizer_instrumentation where available to 314 * disable all instrumentation. See Kconfig.kcsan where this is mandatory. 315 */ 316# define __no_kcsan __no_sanitize_thread __disable_sanitizer_instrumentation 317/* 318 * Type qualifier to mark variables where all data-racy accesses should be 319 * ignored by KCSAN. Note, the implementation simply marks these variables as 320 * volatile, since KCSAN will treat such accesses as "marked". 321 */ 322# define __data_racy volatile 323# define __no_sanitize_or_inline __no_kcsan notrace __maybe_unused 324#else 325# define __no_kcsan 326# define __data_racy 327#endif 328 329#ifdef __SANITIZE_MEMORY__ 330/* 331 * Similarly to KASAN and KCSAN, KMSAN loses function attributes of inlined 332 * functions, therefore disabling KMSAN checks also requires disabling inlining. 333 * 334 * __no_sanitize_or_inline effectively prevents KMSAN from reporting errors 335 * within the function and marks all its outputs as initialized. 336 */ 337# define __no_sanitize_or_inline __no_kmsan_checks notrace __maybe_unused 338#endif 339 340#ifndef __no_sanitize_or_inline 341#define __no_sanitize_or_inline __always_inline 342#endif 343 344/* 345 * The assume attribute is used to indicate that a certain condition is 346 * assumed to be true. If this condition is violated at runtime, the behavior 347 * is undefined. Compilers may or may not use this indication to generate 348 * optimized code. 349 * 350 * Note that the clang documentation states that optimizers may react 351 * differently to this attribute, and this may even have a negative 352 * performance impact. Therefore this attribute should be used with care. 353 * 354 * Optional: only supported since gcc >= 13 355 * Optional: only supported since clang >= 19 356 * 357 * gcc: https://gcc.gnu.org/onlinedocs/gcc/Statement-Attributes.html#index-assume-statement-attribute 358 * clang: https://clang.llvm.org/docs/AttributeReference.html#id13 359 * 360 */ 361#ifdef CONFIG_CC_HAS_ASSUME 362# define __assume(expr) __attribute__((__assume__(expr))) 363#else 364# define __assume(expr) 365#endif 366 367/* 368 * Optional: only supported since gcc >= 15 369 * Optional: only supported since clang >= 18 370 * 371 * gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108896 372 * clang: https://github.com/llvm/llvm-project/pull/76348 373 * 374 * __bdos on clang < 19.1.2 can erroneously return 0: 375 * https://github.com/llvm/llvm-project/pull/110497 376 * 377 * __bdos on clang < 19.1.3 can be off by 4: 378 * https://github.com/llvm/llvm-project/pull/112636 379 */ 380#ifdef CONFIG_CC_HAS_COUNTED_BY 381# define __counted_by(member) __attribute__((__counted_by__(member))) 382#else 383# define __counted_by(member) 384#endif 385 386/* 387 * Optional: only supported since gcc >= 15 388 * Optional: not supported by Clang 389 * 390 * gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=117178 391 */ 392#ifdef CONFIG_CC_HAS_MULTIDIMENSIONAL_NONSTRING 393# define __nonstring_array __attribute__((__nonstring__)) 394#else 395# define __nonstring_array 396#endif 397 398/* 399 * Apply __counted_by() when the Endianness matches to increase test coverage. 400 */ 401#ifdef __LITTLE_ENDIAN 402#define __counted_by_le(member) __counted_by(member) 403#define __counted_by_be(member) 404#else 405#define __counted_by_le(member) 406#define __counted_by_be(member) __counted_by(member) 407#endif 408 409/* 410 * This designates the minimum number of elements a passed array parameter must 411 * have. For example: 412 * 413 * void some_function(u8 param[at_least 7]); 414 * 415 * If a caller passes an array with fewer than 7 elements, the compiler will 416 * emit a warning. 417 */ 418#ifndef __CHECKER__ 419#define at_least static 420#else 421#define at_least 422#endif 423 424/* Do not trap wrapping arithmetic within an annotated function. */ 425#ifdef CONFIG_UBSAN_INTEGER_WRAP 426# define __signed_wrap __attribute__((no_sanitize("signed-integer-overflow"))) 427#else 428# define __signed_wrap 429#endif 430 431/* Section for code which can't be instrumented at all */ 432#define __noinstr_section(section) \ 433 noinline notrace __attribute((__section__(section))) \ 434 __no_kcsan __no_sanitize_address __no_profile __no_sanitize_coverage \ 435 __no_sanitize_memory __signed_wrap 436 437#define noinstr __noinstr_section(".noinstr.text") 438 439/* 440 * The __cpuidle section is used twofold: 441 * 442 * 1) the original use -- identifying if a CPU is 'stuck' in idle state based 443 * on it's instruction pointer. See cpu_in_idle(). 444 * 445 * 2) supressing instrumentation around where cpuidle disables RCU; where the 446 * function isn't strictly required for #1, this is interchangeable with 447 * noinstr. 448 */ 449#define __cpuidle __noinstr_section(".cpuidle.text") 450 451#endif /* __KERNEL__ */ 452 453#endif /* __ASSEMBLY__ */ 454 455/* 456 * The below symbols may be defined for one or more, but not ALL, of the above 457 * compilers. We don't consider that to be an error, so set them to nothing. 458 * For example, some of them are for compiler specific plugins. 459 */ 460#ifndef __latent_entropy 461# define __latent_entropy 462#endif 463 464#if defined(RANDSTRUCT) && !defined(__CHECKER__) 465# define __randomize_layout __designated_init __attribute__((randomize_layout)) 466# define __no_randomize_layout __attribute__((no_randomize_layout)) 467/* This anon struct can add padding, so only enable it under randstruct. */ 468# define randomized_struct_fields_start struct { 469# define randomized_struct_fields_end } __randomize_layout; 470#else 471# define __randomize_layout __designated_init 472# define __no_randomize_layout 473# define randomized_struct_fields_start 474# define randomized_struct_fields_end 475#endif 476 477#ifndef __no_kstack_erase 478# define __no_kstack_erase 479#endif 480 481#ifndef __noscs 482# define __noscs 483#endif 484 485#if defined(CONFIG_CFI) 486# define __nocfi __attribute__((__no_sanitize__("kcfi"))) 487#else 488# define __nocfi 489#endif 490 491#if defined(CONFIG_ARCH_USES_CFI_GENERIC_LLVM_PASS) 492# define __nocfi_generic __nocfi 493#else 494# define __nocfi_generic 495#endif 496 497/* 498 * Any place that could be marked with the "alloc_size" attribute is also 499 * a place to be marked with the "malloc" attribute, except those that may 500 * be performing a _reallocation_, as that may alias the existing pointer. 501 * For these, use __realloc_size(). 502 */ 503#ifdef __alloc_size__ 504# define __alloc_size(x, ...) __alloc_size__(x, ## __VA_ARGS__) __malloc 505# define __realloc_size(x, ...) __alloc_size__(x, ## __VA_ARGS__) 506#else 507# define __alloc_size(x, ...) __malloc 508# define __realloc_size(x, ...) 509#endif 510 511/* 512 * When the size of an allocated object is needed, use the best available 513 * mechanism to find it. (For cases where sizeof() cannot be used.) 514 * 515 * Optional: only supported since gcc >= 12 516 * 517 * gcc: https://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html 518 * clang: https://clang.llvm.org/docs/LanguageExtensions.html#evaluating-object-size 519 */ 520#if __has_builtin(__builtin_dynamic_object_size) 521#define __struct_size(p) __builtin_dynamic_object_size(p, 0) 522#define __member_size(p) __builtin_dynamic_object_size(p, 1) 523#else 524#define __struct_size(p) __builtin_object_size(p, 0) 525#define __member_size(p) __builtin_object_size(p, 1) 526#endif 527 528/* 529 * Determine if an attribute has been applied to a variable. 530 * Using __annotated needs to check for __annotated being available, 531 * or negative tests may fail when annotation cannot be checked. For 532 * example, see the definition of __is_cstr(). 533 */ 534#if __has_builtin(__builtin_has_attribute) 535#define __annotated(var, attr) __builtin_has_attribute(var, attr) 536#endif 537 538/* 539 * Some versions of gcc do not mark 'asm goto' volatile: 540 * 541 * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103979 542 * 543 * We do it here by hand, because it doesn't hurt. 544 */ 545#ifndef asm_goto_output 546#define asm_goto_output(x...) asm volatile goto(x) 547#endif 548 549/* 550 * Clang has trouble with constraints with multiple 551 * alternative behaviors ("g" , "rm" and "=rm"). 552 */ 553#ifndef ASM_INPUT_G 554 #define ASM_INPUT_G "g" 555 #define ASM_INPUT_RM "rm" 556 #define ASM_OUTPUT_RM "=rm" 557#endif 558 559#ifdef CONFIG_CC_HAS_ASM_INLINE 560#define asm_inline asm __inline 561#else 562#define asm_inline asm 563#endif 564 565/* Are two types/vars the same type (ignoring qualifiers)? */ 566#define __same_type(a, b) __builtin_types_compatible_p(typeof(a), typeof(b)) 567 568/* 569 * __unqual_scalar_typeof(x) - Declare an unqualified scalar type, leaving 570 * non-scalar types unchanged. 571 */ 572/* 573 * Prefer C11 _Generic for better compile-times and simpler code. Note: 'char' 574 * is not type-compatible with 'signed char', and we define a separate case. 575 */ 576#define __scalar_type_to_expr_cases(type) \ 577 unsigned type: (unsigned type)0, \ 578 signed type: (signed type)0 579 580#define __unqual_scalar_typeof(x) typeof( \ 581 _Generic((x), \ 582 char: (char)0, \ 583 __scalar_type_to_expr_cases(char), \ 584 __scalar_type_to_expr_cases(short), \ 585 __scalar_type_to_expr_cases(int), \ 586 __scalar_type_to_expr_cases(long), \ 587 __scalar_type_to_expr_cases(long long), \ 588 default: (x))) 589 590/* Is this type a native word size -- useful for atomic operations */ 591#define __native_word(t) \ 592 (sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \ 593 sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long)) 594 595#ifdef __OPTIMIZE__ 596/* 597 * #ifdef __OPTIMIZE__ is only a good approximation; for instance "make 598 * CFLAGS_foo.o=-Og" defines __OPTIMIZE__, does not elide the conditional code 599 * and can break compilation with wrong error message(s). Combine with 600 * -U__OPTIMIZE__ when needed. 601 */ 602# define __compiletime_assert(condition, msg, prefix, suffix) \ 603 do { \ 604 /* \ 605 * __noreturn is needed to give the compiler enough \ 606 * information to avoid certain possibly-uninitialized \ 607 * warnings (regardless of the build failing). \ 608 */ \ 609 __noreturn extern void prefix ## suffix(void) \ 610 __compiletime_error(msg); \ 611 if (!(condition)) \ 612 prefix ## suffix(); \ 613 } while (0) 614#else 615# define __compiletime_assert(condition, msg, prefix, suffix) ((void)(condition)) 616#endif 617 618#define _compiletime_assert(condition, msg, prefix, suffix) \ 619 __compiletime_assert(condition, msg, prefix, suffix) 620 621/** 622 * compiletime_assert - break build and emit msg if condition is false 623 * @condition: a compile-time constant condition to check 624 * @msg: a message to emit if condition is false 625 * 626 * In tradition of POSIX assert, this macro will break the build if the 627 * supplied condition is *false*, emitting the supplied error message if the 628 * compiler has support to do so. 629 */ 630#define compiletime_assert(condition, msg) \ 631 _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__) 632 633#define compiletime_assert_atomic_type(t) \ 634 compiletime_assert(__native_word(t), \ 635 "Need native word sized stores/loads for atomicity.") 636 637/* Helpers for emitting diagnostics in pragmas. */ 638#ifndef __diag 639#define __diag(string) 640#endif 641 642#ifndef __diag_GCC 643#define __diag_GCC(version, severity, string) 644#endif 645 646#define __diag_push() __diag(push) 647#define __diag_pop() __diag(pop) 648 649#define __diag_ignore(compiler, version, option, comment) \ 650 __diag_ ## compiler(version, ignore, option) 651#define __diag_warn(compiler, version, option, comment) \ 652 __diag_ ## compiler(version, warn, option) 653#define __diag_error(compiler, version, option, comment) \ 654 __diag_ ## compiler(version, error, option) 655 656#ifndef __diag_ignore_all 657#define __diag_ignore_all(option, comment) 658#endif 659 660#endif /* __LINUX_COMPILER_TYPES_H */