xref: /linux/include/linux/compiler_types.h (revision 9cc220a422113f665e13364be1411c7bba9e3e30)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef __LINUX_COMPILER_TYPES_H
3 #define __LINUX_COMPILER_TYPES_H
4 
5 /*
6  * __has_builtin is supported on gcc >= 10, clang >= 3 and icc >= 21.
7  * In the meantime, to support gcc < 10, we implement __has_builtin
8  * by hand.
9  */
10 #ifndef __has_builtin
11 #define __has_builtin(x) (0)
12 #endif
13 
14 #ifndef __ASSEMBLY__
15 
16 /*
17  * Skipped when running bindgen due to a libclang issue;
18  * see https://github.com/rust-lang/rust-bindgen/issues/2244.
19  */
20 #if defined(CONFIG_DEBUG_INFO_BTF) && defined(CONFIG_PAHOLE_HAS_BTF_TAG) && \
21 	__has_attribute(btf_type_tag) && !defined(__BINDGEN__)
22 # define BTF_TYPE_TAG(value) __attribute__((btf_type_tag(#value)))
23 #else
24 # define BTF_TYPE_TAG(value) /* nothing */
25 #endif
26 
27 /* sparse defines __CHECKER__; see Documentation/dev-tools/sparse.rst */
28 #ifdef __CHECKER__
29 /* address spaces */
30 # define __kernel	__attribute__((address_space(0)))
31 # define __user		__attribute__((noderef, address_space(__user)))
32 # define __iomem	__attribute__((noderef, address_space(__iomem)))
33 # define __percpu	__attribute__((noderef, address_space(__percpu)))
34 # define __rcu		__attribute__((noderef, address_space(__rcu)))
__chk_user_ptr(const volatile void __user * ptr)35 static inline void __chk_user_ptr(const volatile void __user *ptr) { }
__chk_io_ptr(const volatile void __iomem * ptr)36 static inline void __chk_io_ptr(const volatile void __iomem *ptr) { }
37 /* context/locking */
38 # define __must_hold(x)	__attribute__((context(x,1,1)))
39 # define __acquires(x)	__attribute__((context(x,0,1)))
40 # define __cond_acquires(x) __attribute__((context(x,0,-1)))
41 # define __releases(x)	__attribute__((context(x,1,0)))
42 # define __acquire(x)	__context__(x,1)
43 # define __release(x)	__context__(x,-1)
44 # define __cond_lock(x,c)	((c) ? ({ __acquire(x); 1; }) : 0)
45 /* other */
46 # define __force	__attribute__((force))
47 # define __nocast	__attribute__((nocast))
48 # define __safe		__attribute__((safe))
49 # define __private	__attribute__((noderef))
50 # define ACCESS_PRIVATE(p, member) (*((typeof((p)->member) __force *) &(p)->member))
51 #else /* __CHECKER__ */
52 /* address spaces */
53 # define __kernel
54 # ifdef STRUCTLEAK_PLUGIN
55 #  define __user	__attribute__((user))
56 # else
57 #  define __user	BTF_TYPE_TAG(user)
58 # endif
59 # define __iomem
60 # define __percpu	__percpu_qual BTF_TYPE_TAG(percpu)
61 # define __rcu		BTF_TYPE_TAG(rcu)
62 
63 # define __chk_user_ptr(x)	(void)0
64 # define __chk_io_ptr(x)	(void)0
65 /* context/locking */
66 # define __must_hold(x)
67 # define __acquires(x)
68 # define __cond_acquires(x)
69 # define __releases(x)
70 # define __acquire(x)	(void)0
71 # define __release(x)	(void)0
72 # define __cond_lock(x,c) (c)
73 /* other */
74 # define __force
75 # define __nocast
76 # define __safe
77 # define __private
78 # define ACCESS_PRIVATE(p, member) ((p)->member)
79 # define __builtin_warning(x, y...) (1)
80 #endif /* __CHECKER__ */
81 
82 /* Indirect macros required for expanded argument pasting, eg. __LINE__. */
83 #define ___PASTE(a,b) a##b
84 #define __PASTE(a,b) ___PASTE(a,b)
85 
86 #ifdef __KERNEL__
87 
88 /* Attributes */
89 #include <linux/compiler_attributes.h>
90 
91 #if CONFIG_FUNCTION_ALIGNMENT > 0
92 #define __function_aligned		__aligned(CONFIG_FUNCTION_ALIGNMENT)
93 #else
94 #define __function_aligned
95 #endif
96 
97 /*
98  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-cold-function-attribute
99  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Label-Attributes.html#index-cold-label-attribute
100  *
101  * When -falign-functions=N is in use, we must avoid the cold attribute as
102  * GCC drops the alignment for cold functions. Worse, GCC can implicitly mark
103  * callees of cold functions as cold themselves, so it's not sufficient to add
104  * __function_aligned here as that will not ensure that callees are correctly
105  * aligned.
106  *
107  * See:
108  *
109  *   https://lore.kernel.org/lkml/Y77%2FqVgvaJidFpYt@FVFF77S0Q05N
110  *   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88345#c9
111  */
112 #if defined(CONFIG_CC_HAS_SANE_FUNCTION_ALIGNMENT) || (CONFIG_FUNCTION_ALIGNMENT == 0)
113 #define __cold				__attribute__((__cold__))
114 #else
115 #define __cold
116 #endif
117 
118 /*
119  * On x86-64 and arm64 targets, __preserve_most changes the calling convention
120  * of a function to make the code in the caller as unintrusive as possible. This
121  * convention behaves identically to the C calling convention on how arguments
122  * and return values are passed, but uses a different set of caller- and callee-
123  * saved registers.
124  *
125  * The purpose is to alleviates the burden of saving and recovering a large
126  * register set before and after the call in the caller.  This is beneficial for
127  * rarely taken slow paths, such as error-reporting functions that may be called
128  * from hot paths.
129  *
130  * Note: This may conflict with instrumentation inserted on function entry which
131  * does not use __preserve_most or equivalent convention (if in assembly). Since
132  * function tracing assumes the normal C calling convention, where the attribute
133  * is supported, __preserve_most implies notrace.  It is recommended to restrict
134  * use of the attribute to functions that should or already disable tracing.
135  *
136  * Optional: not supported by gcc.
137  *
138  * clang: https://clang.llvm.org/docs/AttributeReference.html#preserve-most
139  */
140 #if __has_attribute(__preserve_most__) && (defined(CONFIG_X86_64) || defined(CONFIG_ARM64))
141 # define __preserve_most notrace __attribute__((__preserve_most__))
142 #else
143 # define __preserve_most
144 #endif
145 
146 /*
147  * Annotating a function/variable with __retain tells the compiler to place
148  * the object in its own section and set the flag SHF_GNU_RETAIN. This flag
149  * instructs the linker to retain the object during garbage-cleanup or LTO
150  * phases.
151  *
152  * Note that the __used macro is also used to prevent functions or data
153  * being optimized out, but operates at the compiler/IR-level and may still
154  * allow unintended removal of objects during linking.
155  *
156  * Optional: only supported since gcc >= 11, clang >= 13
157  *
158  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-retain-function-attribute
159  * clang: https://clang.llvm.org/docs/AttributeReference.html#retain
160  */
161 #if __has_attribute(__retain__) && \
162 	(defined(CONFIG_LD_DEAD_CODE_DATA_ELIMINATION) || \
163 	 defined(CONFIG_LTO_CLANG))
164 # define __retain			__attribute__((__retain__))
165 #else
166 # define __retain
167 #endif
168 
169 /* Compiler specific macros. */
170 #ifdef __clang__
171 #include <linux/compiler-clang.h>
172 #elif defined(__GNUC__)
173 /* The above compilers also define __GNUC__, so order is important here. */
174 #include <linux/compiler-gcc.h>
175 #else
176 #error "Unknown compiler"
177 #endif
178 
179 /*
180  * Some architectures need to provide custom definitions of macros provided
181  * by linux/compiler-*.h, and can do so using asm/compiler.h. We include that
182  * conditionally rather than using an asm-generic wrapper in order to avoid
183  * build failures if any C compilation, which will include this file via an
184  * -include argument in c_flags, occurs prior to the asm-generic wrappers being
185  * generated.
186  */
187 #ifdef CONFIG_HAVE_ARCH_COMPILER_H
188 #include <asm/compiler.h>
189 #endif
190 
191 struct ftrace_branch_data {
192 	const char *func;
193 	const char *file;
194 	unsigned line;
195 	union {
196 		struct {
197 			unsigned long correct;
198 			unsigned long incorrect;
199 		};
200 		struct {
201 			unsigned long miss;
202 			unsigned long hit;
203 		};
204 		unsigned long miss_hit[2];
205 	};
206 };
207 
208 struct ftrace_likely_data {
209 	struct ftrace_branch_data	data;
210 	unsigned long			constant;
211 };
212 
213 #if defined(CC_USING_HOTPATCH)
214 #define notrace			__attribute__((hotpatch(0, 0)))
215 #elif defined(CC_USING_PATCHABLE_FUNCTION_ENTRY)
216 #define notrace			__attribute__((patchable_function_entry(0, 0)))
217 #else
218 #define notrace			__attribute__((__no_instrument_function__))
219 #endif
220 
221 /*
222  * it doesn't make sense on ARM (currently the only user of __naked)
223  * to trace naked functions because then mcount is called without
224  * stack and frame pointer being set up and there is no chance to
225  * restore the lr register to the value before mcount was called.
226  */
227 #define __naked			__attribute__((__naked__)) notrace
228 
229 /*
230  * Prefer gnu_inline, so that extern inline functions do not emit an
231  * externally visible function. This makes extern inline behave as per gnu89
232  * semantics rather than c99. This prevents multiple symbol definition errors
233  * of extern inline functions at link time.
234  * A lot of inline functions can cause havoc with function tracing.
235  */
236 #define inline inline __gnu_inline __inline_maybe_unused notrace
237 
238 /*
239  * gcc provides both __inline__ and __inline as alternate spellings of
240  * the inline keyword, though the latter is undocumented. New kernel
241  * code should only use the inline spelling, but some existing code
242  * uses __inline__. Since we #define inline above, to ensure
243  * __inline__ has the same semantics, we need this #define.
244  *
245  * However, the spelling __inline is strictly reserved for referring
246  * to the bare keyword.
247  */
248 #define __inline__ inline
249 
250 /*
251  * GCC does not warn about unused static inline functions for -Wunused-function.
252  * Suppress the warning in clang as well by using __maybe_unused, but enable it
253  * for W=1 build. This will allow clang to find unused functions. Remove the
254  * __inline_maybe_unused entirely after fixing most of -Wunused-function warnings.
255  */
256 #ifdef KBUILD_EXTRA_WARN1
257 #define __inline_maybe_unused
258 #else
259 #define __inline_maybe_unused __maybe_unused
260 #endif
261 
262 /*
263  * Rather then using noinline to prevent stack consumption, use
264  * noinline_for_stack instead.  For documentation reasons.
265  */
266 #define noinline_for_stack noinline
267 
268 /*
269  * Use noinline_for_tracing for functions that should not be inlined.
270  * For tracing reasons.
271  */
272 #define noinline_for_tracing noinline
273 
274 /*
275  * Sanitizer helper attributes: Because using __always_inline and
276  * __no_sanitize_* conflict, provide helper attributes that will either expand
277  * to __no_sanitize_* in compilation units where instrumentation is enabled
278  * (__SANITIZE_*__), or __always_inline in compilation units without
279  * instrumentation (__SANITIZE_*__ undefined).
280  */
281 #ifdef __SANITIZE_ADDRESS__
282 /*
283  * We can't declare function 'inline' because __no_sanitize_address conflicts
284  * with inlining. Attempt to inline it may cause a build failure.
285  *     https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
286  * '__maybe_unused' allows us to avoid defined-but-not-used warnings.
287  */
288 # define __no_kasan_or_inline __no_sanitize_address notrace __maybe_unused
289 # define __no_sanitize_or_inline __no_kasan_or_inline
290 #else
291 # define __no_kasan_or_inline __always_inline
292 #endif
293 
294 #ifdef __SANITIZE_THREAD__
295 /*
296  * Clang still emits instrumentation for __tsan_func_{entry,exit}() and builtin
297  * atomics even with __no_sanitize_thread (to avoid false positives in userspace
298  * ThreadSanitizer). The kernel's requirements are stricter and we really do not
299  * want any instrumentation with __no_kcsan.
300  *
301  * Therefore we add __disable_sanitizer_instrumentation where available to
302  * disable all instrumentation. See Kconfig.kcsan where this is mandatory.
303  */
304 # define __no_kcsan __no_sanitize_thread __disable_sanitizer_instrumentation
305 /*
306  * Type qualifier to mark variables where all data-racy accesses should be
307  * ignored by KCSAN. Note, the implementation simply marks these variables as
308  * volatile, since KCSAN will treat such accesses as "marked".
309  */
310 # define __data_racy volatile
311 # define __no_sanitize_or_inline __no_kcsan notrace __maybe_unused
312 #else
313 # define __no_kcsan
314 # define __data_racy
315 #endif
316 
317 #ifdef __SANITIZE_MEMORY__
318 /*
319  * Similarly to KASAN and KCSAN, KMSAN loses function attributes of inlined
320  * functions, therefore disabling KMSAN checks also requires disabling inlining.
321  *
322  * __no_sanitize_or_inline effectively prevents KMSAN from reporting errors
323  * within the function and marks all its outputs as initialized.
324  */
325 # define __no_sanitize_or_inline __no_kmsan_checks notrace __maybe_unused
326 #endif
327 
328 #ifndef __no_sanitize_or_inline
329 #define __no_sanitize_or_inline __always_inline
330 #endif
331 
332 /*
333  * The assume attribute is used to indicate that a certain condition is
334  * assumed to be true. If this condition is violated at runtime, the behavior
335  * is undefined. Compilers may or may not use this indication to generate
336  * optimized code.
337  *
338  * Note that the clang documentation states that optimizers may react
339  * differently to this attribute, and this may even have a negative
340  * performance impact. Therefore this attribute should be used with care.
341  *
342  * Optional: only supported since gcc >= 13
343  * Optional: only supported since clang >= 19
344  *
345  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Statement-Attributes.html#index-assume-statement-attribute
346  * clang: https://clang.llvm.org/docs/AttributeReference.html#id13
347  *
348  */
349 #ifdef CONFIG_CC_HAS_ASSUME
350 # define __assume(expr)			__attribute__((__assume__(expr)))
351 #else
352 # define __assume(expr)
353 #endif
354 
355 /*
356  * Optional: only supported since gcc >= 15
357  * Optional: only supported since clang >= 18
358  *
359  *   gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108896
360  * clang: https://github.com/llvm/llvm-project/pull/76348
361  *
362  * __bdos on clang < 19.1.2 can erroneously return 0:
363  * https://github.com/llvm/llvm-project/pull/110497
364  *
365  * __bdos on clang < 19.1.3 can be off by 4:
366  * https://github.com/llvm/llvm-project/pull/112636
367  */
368 #ifdef CONFIG_CC_HAS_COUNTED_BY
369 # define __counted_by(member)		__attribute__((__counted_by__(member)))
370 #else
371 # define __counted_by(member)
372 #endif
373 
374 /*
375  * Optional: only supported since gcc >= 15
376  * Optional: not supported by Clang
377  *
378  * gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=117178
379  */
380 #ifdef CONFIG_CC_HAS_MULTIDIMENSIONAL_NONSTRING
381 # define __nonstring_array		__attribute__((__nonstring__))
382 #else
383 # define __nonstring_array
384 #endif
385 
386 /*
387  * Apply __counted_by() when the Endianness matches to increase test coverage.
388  */
389 #ifdef __LITTLE_ENDIAN
390 #define __counted_by_le(member)	__counted_by(member)
391 #define __counted_by_be(member)
392 #else
393 #define __counted_by_le(member)
394 #define __counted_by_be(member)	__counted_by(member)
395 #endif
396 
397 /* Do not trap wrapping arithmetic within an annotated function. */
398 #ifdef CONFIG_UBSAN_INTEGER_WRAP
399 # define __signed_wrap __attribute__((no_sanitize("signed-integer-overflow")))
400 #else
401 # define __signed_wrap
402 #endif
403 
404 /* Section for code which can't be instrumented at all */
405 #define __noinstr_section(section)					\
406 	noinline notrace __attribute((__section__(section)))		\
407 	__no_kcsan __no_sanitize_address __no_profile __no_sanitize_coverage \
408 	__no_sanitize_memory __signed_wrap
409 
410 #define noinstr __noinstr_section(".noinstr.text")
411 
412 /*
413  * The __cpuidle section is used twofold:
414  *
415  *  1) the original use -- identifying if a CPU is 'stuck' in idle state based
416  *     on it's instruction pointer. See cpu_in_idle().
417  *
418  *  2) supressing instrumentation around where cpuidle disables RCU; where the
419  *     function isn't strictly required for #1, this is interchangeable with
420  *     noinstr.
421  */
422 #define __cpuidle __noinstr_section(".cpuidle.text")
423 
424 #endif /* __KERNEL__ */
425 
426 #endif /* __ASSEMBLY__ */
427 
428 /*
429  * The below symbols may be defined for one or more, but not ALL, of the above
430  * compilers. We don't consider that to be an error, so set them to nothing.
431  * For example, some of them are for compiler specific plugins.
432  */
433 #ifndef __latent_entropy
434 # define __latent_entropy
435 #endif
436 
437 #if defined(RANDSTRUCT) && !defined(__CHECKER__)
438 # define __randomize_layout __designated_init __attribute__((randomize_layout))
439 # define __no_randomize_layout __attribute__((no_randomize_layout))
440 /* This anon struct can add padding, so only enable it under randstruct. */
441 # define randomized_struct_fields_start	struct {
442 # define randomized_struct_fields_end	} __randomize_layout;
443 #else
444 # define __randomize_layout __designated_init
445 # define __no_randomize_layout
446 # define randomized_struct_fields_start
447 # define randomized_struct_fields_end
448 #endif
449 
450 #ifndef __no_kstack_erase
451 # define __no_kstack_erase
452 #endif
453 
454 #ifndef __noscs
455 # define __noscs
456 #endif
457 
458 #ifndef __nocfi
459 # define __nocfi
460 #endif
461 
462 /*
463  * Any place that could be marked with the "alloc_size" attribute is also
464  * a place to be marked with the "malloc" attribute, except those that may
465  * be performing a _reallocation_, as that may alias the existing pointer.
466  * For these, use __realloc_size().
467  */
468 #ifdef __alloc_size__
469 # define __alloc_size(x, ...)	__alloc_size__(x, ## __VA_ARGS__) __malloc
470 # define __realloc_size(x, ...)	__alloc_size__(x, ## __VA_ARGS__)
471 #else
472 # define __alloc_size(x, ...)	__malloc
473 # define __realloc_size(x, ...)
474 #endif
475 
476 /*
477  * When the size of an allocated object is needed, use the best available
478  * mechanism to find it. (For cases where sizeof() cannot be used.)
479  *
480  * Optional: only supported since gcc >= 12
481  *
482  *   gcc: https://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html
483  * clang: https://clang.llvm.org/docs/LanguageExtensions.html#evaluating-object-size
484  */
485 #if __has_builtin(__builtin_dynamic_object_size)
486 #define __struct_size(p)	__builtin_dynamic_object_size(p, 0)
487 #define __member_size(p)	__builtin_dynamic_object_size(p, 1)
488 #else
489 #define __struct_size(p)	__builtin_object_size(p, 0)
490 #define __member_size(p)	__builtin_object_size(p, 1)
491 #endif
492 
493 /*
494  * Determine if an attribute has been applied to a variable.
495  * Using __annotated needs to check for __annotated being available,
496  * or negative tests may fail when annotation cannot be checked. For
497  * example, see the definition of __is_cstr().
498  */
499 #if __has_builtin(__builtin_has_attribute)
500 #define __annotated(var, attr)	__builtin_has_attribute(var, attr)
501 #endif
502 
503 /*
504  * Some versions of gcc do not mark 'asm goto' volatile:
505  *
506  *  https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103979
507  *
508  * We do it here by hand, because it doesn't hurt.
509  */
510 #ifndef asm_goto_output
511 #define asm_goto_output(x...) asm volatile goto(x)
512 #endif
513 
514 /*
515  * Clang has trouble with constraints with multiple
516  * alternative behaviors (mainly "g" and "rm").
517  */
518 #ifndef ASM_INPUT_G
519   #define ASM_INPUT_G "g"
520   #define ASM_INPUT_RM "rm"
521 #endif
522 
523 #ifdef CONFIG_CC_HAS_ASM_INLINE
524 #define asm_inline asm __inline
525 #else
526 #define asm_inline asm
527 #endif
528 
529 /* Are two types/vars the same type (ignoring qualifiers)? */
530 #define __same_type(a, b) __builtin_types_compatible_p(typeof(a), typeof(b))
531 
532 /*
533  * __unqual_scalar_typeof(x) - Declare an unqualified scalar type, leaving
534  *			       non-scalar types unchanged.
535  */
536 /*
537  * Prefer C11 _Generic for better compile-times and simpler code. Note: 'char'
538  * is not type-compatible with 'signed char', and we define a separate case.
539  */
540 #define __scalar_type_to_expr_cases(type)				\
541 		unsigned type:	(unsigned type)0,			\
542 		signed type:	(signed type)0
543 
544 #define __unqual_scalar_typeof(x) typeof(				\
545 		_Generic((x),						\
546 			 char:	(char)0,				\
547 			 __scalar_type_to_expr_cases(char),		\
548 			 __scalar_type_to_expr_cases(short),		\
549 			 __scalar_type_to_expr_cases(int),		\
550 			 __scalar_type_to_expr_cases(long),		\
551 			 __scalar_type_to_expr_cases(long long),	\
552 			 default: (x)))
553 
554 /* Is this type a native word size -- useful for atomic operations */
555 #define __native_word(t) \
556 	(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
557 	 sizeof(t) == sizeof(int) || sizeof(t) == sizeof(long))
558 
559 #ifdef __OPTIMIZE__
560 /*
561  * #ifdef __OPTIMIZE__ is only a good approximation; for instance "make
562  * CFLAGS_foo.o=-Og" defines __OPTIMIZE__, does not elide the conditional code
563  * and can break compilation with wrong error message(s). Combine with
564  * -U__OPTIMIZE__ when needed.
565  */
566 # define __compiletime_assert(condition, msg, prefix, suffix)		\
567 	do {								\
568 		/*							\
569 		 * __noreturn is needed to give the compiler enough	\
570 		 * information to avoid certain possibly-uninitialized	\
571 		 * warnings (regardless of the build failing).		\
572 		 */							\
573 		__noreturn extern void prefix ## suffix(void)		\
574 			__compiletime_error(msg);			\
575 		if (!(condition))					\
576 			prefix ## suffix();				\
577 	} while (0)
578 #else
579 # define __compiletime_assert(condition, msg, prefix, suffix) ((void)(condition))
580 #endif
581 
582 #define _compiletime_assert(condition, msg, prefix, suffix) \
583 	__compiletime_assert(condition, msg, prefix, suffix)
584 
585 /**
586  * compiletime_assert - break build and emit msg if condition is false
587  * @condition: a compile-time constant condition to check
588  * @msg:       a message to emit if condition is false
589  *
590  * In tradition of POSIX assert, this macro will break the build if the
591  * supplied condition is *false*, emitting the supplied error message if the
592  * compiler has support to do so.
593  */
594 #define compiletime_assert(condition, msg) \
595 	_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
596 
597 #define compiletime_assert_atomic_type(t)				\
598 	compiletime_assert(__native_word(t),				\
599 		"Need native word sized stores/loads for atomicity.")
600 
601 /* Helpers for emitting diagnostics in pragmas. */
602 #ifndef __diag
603 #define __diag(string)
604 #endif
605 
606 #ifndef __diag_GCC
607 #define __diag_GCC(version, severity, string)
608 #endif
609 
610 #define __diag_push()	__diag(push)
611 #define __diag_pop()	__diag(pop)
612 
613 #define __diag_ignore(compiler, version, option, comment) \
614 	__diag_ ## compiler(version, ignore, option)
615 #define __diag_warn(compiler, version, option, comment) \
616 	__diag_ ## compiler(version, warn, option)
617 #define __diag_error(compiler, version, option, comment) \
618 	__diag_ ## compiler(version, error, option)
619 
620 #ifndef __diag_ignore_all
621 #define __diag_ignore_all(option, comment)
622 #endif
623 
624 #endif /* __LINUX_COMPILER_TYPES_H */
625