11da177e4SLinus Torvalds #ifndef _ASM_GENERIC_BUG_H 21da177e4SLinus Torvalds #define _ASM_GENERIC_BUG_H 31da177e4SLinus Torvalds 41da177e4SLinus Torvalds #include <linux/compiler.h> 51da177e4SLinus Torvalds 609682c1dSPaul Mundt #ifdef CONFIG_GENERIC_BUG 709682c1dSPaul Mundt #define BUGFLAG_WARNING (1 << 0) 809682c1dSPaul Mundt #define BUGFLAG_TAINT(taint) (BUGFLAG_WARNING | ((taint) << 8)) 909682c1dSPaul Mundt #define BUG_GET_TAINT(bug) ((bug)->flags >> 8) 1009682c1dSPaul Mundt #endif 1109682c1dSPaul Mundt 1209682c1dSPaul Mundt #ifndef __ASSEMBLY__ 1309682c1dSPaul Mundt #include <linux/kernel.h> 1409682c1dSPaul Mundt 15c8538a7aSMatt Mackall #ifdef CONFIG_BUG 167664c5a1SJeremy Fitzhardinge 177664c5a1SJeremy Fitzhardinge #ifdef CONFIG_GENERIC_BUG 187664c5a1SJeremy Fitzhardinge struct bug_entry { 19b93a531eSJan Beulich #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS 207664c5a1SJeremy Fitzhardinge unsigned long bug_addr; 21b93a531eSJan Beulich #else 22b93a531eSJan Beulich signed int bug_addr_disp; 23b93a531eSJan Beulich #endif 247664c5a1SJeremy Fitzhardinge #ifdef CONFIG_DEBUG_BUGVERBOSE 25b93a531eSJan Beulich #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS 267664c5a1SJeremy Fitzhardinge const char *file; 27b93a531eSJan Beulich #else 28b93a531eSJan Beulich signed int file_disp; 29b93a531eSJan Beulich #endif 307664c5a1SJeremy Fitzhardinge unsigned short line; 317664c5a1SJeremy Fitzhardinge #endif 327664c5a1SJeremy Fitzhardinge unsigned short flags; 337664c5a1SJeremy Fitzhardinge }; 347664c5a1SJeremy Fitzhardinge #endif /* CONFIG_GENERIC_BUG */ 357664c5a1SJeremy Fitzhardinge 36af9379c7SDavid Brownell /* 37af9379c7SDavid Brownell * Don't use BUG() or BUG_ON() unless there's really no way out; one 38af9379c7SDavid Brownell * example might be detecting data structure corruption in the middle 39af9379c7SDavid Brownell * of an operation that can't be backed out of. If the (sub)system 40af9379c7SDavid Brownell * can somehow continue operating, perhaps with reduced functionality, 41af9379c7SDavid Brownell * it's probably not BUG-worthy. 42af9379c7SDavid Brownell * 43af9379c7SDavid Brownell * If you're tempted to BUG(), think again: is completely giving up 44af9379c7SDavid Brownell * really the *only* solution? There are usually better options, where 45af9379c7SDavid Brownell * users don't need to reboot ASAP and can mostly shut down cleanly. 46af9379c7SDavid Brownell */ 471da177e4SLinus Torvalds #ifndef HAVE_ARCH_BUG 481da177e4SLinus Torvalds #define BUG() do { \ 49d5c003b4SHarvey Harrison printk("BUG: failure at %s:%d/%s()!\n", __FILE__, __LINE__, __func__); \ 501da177e4SLinus Torvalds panic("BUG!"); \ 511da177e4SLinus Torvalds } while (0) 521da177e4SLinus Torvalds #endif 531da177e4SLinus Torvalds 541da177e4SLinus Torvalds #ifndef HAVE_ARCH_BUG_ON 552a41de48SAlexey Dobriyan #define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0) 561da177e4SLinus Torvalds #endif 571da177e4SLinus Torvalds 58af9379c7SDavid Brownell /* 59af9379c7SDavid Brownell * WARN(), WARN_ON(), WARN_ON_ONCE, and so on can be used to report 60af9379c7SDavid Brownell * significant issues that need prompt attention if they should ever 61af9379c7SDavid Brownell * appear at runtime. Use the versions with printk format strings 62af9379c7SDavid Brownell * to provide better diagnostics. 63af9379c7SDavid Brownell */ 64b2be0527SBen Hutchings #ifndef __WARN_TAINT 65b9075fa9SJoe Perches extern __printf(3, 4) 66b9075fa9SJoe Perches void warn_slowpath_fmt(const char *file, const int line, 67b9075fa9SJoe Perches const char *fmt, ...); 68b9075fa9SJoe Perches extern __printf(4, 5) 69b9075fa9SJoe Perches void warn_slowpath_fmt_taint(const char *file, const int line, unsigned taint, 70b9075fa9SJoe Perches const char *fmt, ...); 7157adc4d2SAndi Kleen extern void warn_slowpath_null(const char *file, const int line); 7279b4cc5eSArjan van de Ven #define WANT_WARN_ON_SLOWPATH 7357adc4d2SAndi Kleen #define __WARN() warn_slowpath_null(__FILE__, __LINE__) 7457adc4d2SAndi Kleen #define __WARN_printf(arg...) warn_slowpath_fmt(__FILE__, __LINE__, arg) 75b2be0527SBen Hutchings #define __WARN_printf_taint(taint, arg...) \ 76b2be0527SBen Hutchings warn_slowpath_fmt_taint(__FILE__, __LINE__, taint, arg) 77a8f18b90SArjan van de Ven #else 78b2be0527SBen Hutchings #define __WARN() __WARN_TAINT(TAINT_WARN) 79f6f286f3SArjan van de Ven #define __WARN_printf(arg...) do { printk(arg); __WARN(); } while (0) 80b2be0527SBen Hutchings #define __WARN_printf_taint(taint, arg...) \ 81b2be0527SBen Hutchings do { printk(arg); __WARN_TAINT(taint); } while (0) 823a6a62f9SOlof Johansson #endif 833a6a62f9SOlof Johansson 842553b67aSJosh Poimboeuf /* used internally by panic.c */ 852553b67aSJosh Poimboeuf struct warn_args; 862553b67aSJosh Poimboeuf 872553b67aSJosh Poimboeuf void __warn(const char *file, int line, void *caller, unsigned taint, 882553b67aSJosh Poimboeuf struct pt_regs *regs, struct warn_args *args); 892553b67aSJosh Poimboeuf 903a6a62f9SOlof Johansson #ifndef WARN_ON 913a6a62f9SOlof Johansson #define WARN_ON(condition) ({ \ 923a6a62f9SOlof Johansson int __ret_warn_on = !!(condition); \ 933a6a62f9SOlof Johansson if (unlikely(__ret_warn_on)) \ 943a6a62f9SOlof Johansson __WARN(); \ 95684f9783SHerbert Xu unlikely(__ret_warn_on); \ 96684f9783SHerbert Xu }) 971da177e4SLinus Torvalds #endif 981da177e4SLinus Torvalds 99a8f18b90SArjan van de Ven #ifndef WARN 100a8f18b90SArjan van de Ven #define WARN(condition, format...) ({ \ 101a8f18b90SArjan van de Ven int __ret_warn_on = !!(condition); \ 102a8f18b90SArjan van de Ven if (unlikely(__ret_warn_on)) \ 103a8f18b90SArjan van de Ven __WARN_printf(format); \ 104a8f18b90SArjan van de Ven unlikely(__ret_warn_on); \ 105a8f18b90SArjan van de Ven }) 106a8f18b90SArjan van de Ven #endif 107a8f18b90SArjan van de Ven 108b2be0527SBen Hutchings #define WARN_TAINT(condition, taint, format...) ({ \ 109b2be0527SBen Hutchings int __ret_warn_on = !!(condition); \ 110b2be0527SBen Hutchings if (unlikely(__ret_warn_on)) \ 111b2be0527SBen Hutchings __WARN_printf_taint(taint, format); \ 112b2be0527SBen Hutchings unlikely(__ret_warn_on); \ 113b2be0527SBen Hutchings }) 114b2be0527SBen Hutchings 115684f9783SHerbert Xu #define WARN_ON_ONCE(condition) ({ \ 1167ccaba53SJan Beulich static bool __section(.data.unlikely) __warned; \ 1178d4fbcfbSLinus Torvalds int __ret_warn_once = !!(condition); \ 11874bb6a09SIngo Molnar \ 119dfbf2897SSteven Rostedt if (unlikely(__ret_warn_once && !__warned)) { \ 12042f247c8SCesar Eduardo Barros __warned = true; \ 121dfbf2897SSteven Rostedt WARN_ON(1); \ 122dfbf2897SSteven Rostedt } \ 123684f9783SHerbert Xu unlikely(__ret_warn_once); \ 12474bb6a09SIngo Molnar }) 12574bb6a09SIngo Molnar 12645e9c0deSArjan van de Ven #define WARN_ONCE(condition, format...) ({ \ 1277ccaba53SJan Beulich static bool __section(.data.unlikely) __warned; \ 12845e9c0deSArjan van de Ven int __ret_warn_once = !!(condition); \ 12945e9c0deSArjan van de Ven \ 130dfbf2897SSteven Rostedt if (unlikely(__ret_warn_once && !__warned)) { \ 13142f247c8SCesar Eduardo Barros __warned = true; \ 132dfbf2897SSteven Rostedt WARN(1, format); \ 133dfbf2897SSteven Rostedt } \ 13445e9c0deSArjan van de Ven unlikely(__ret_warn_once); \ 13545e9c0deSArjan van de Ven }) 13645e9c0deSArjan van de Ven 137b2be0527SBen Hutchings #define WARN_TAINT_ONCE(condition, taint, format...) ({ \ 1387ccaba53SJan Beulich static bool __section(.data.unlikely) __warned; \ 139b2be0527SBen Hutchings int __ret_warn_once = !!(condition); \ 140b2be0527SBen Hutchings \ 141dfbf2897SSteven Rostedt if (unlikely(__ret_warn_once && !__warned)) { \ 142b2be0527SBen Hutchings __warned = true; \ 143dfbf2897SSteven Rostedt WARN_TAINT(1, taint, format); \ 144dfbf2897SSteven Rostedt } \ 145b2be0527SBen Hutchings unlikely(__ret_warn_once); \ 146b2be0527SBen Hutchings }) 147b2be0527SBen Hutchings 148b607e70eSJosh Triplett #else /* !CONFIG_BUG */ 149b607e70eSJosh Triplett #ifndef HAVE_ARCH_BUG 150a4b5d580SJosh Triplett #define BUG() do {} while (1) 151b607e70eSJosh Triplett #endif 152b607e70eSJosh Triplett 153b607e70eSJosh Triplett #ifndef HAVE_ARCH_BUG_ON 154b607e70eSJosh Triplett #define BUG_ON(condition) do { if (condition) ; } while (0) 155b607e70eSJosh Triplett #endif 156b607e70eSJosh Triplett 157b607e70eSJosh Triplett #ifndef HAVE_ARCH_WARN_ON 158b607e70eSJosh Triplett #define WARN_ON(condition) ({ \ 159b607e70eSJosh Triplett int __ret_warn_on = !!(condition); \ 160b607e70eSJosh Triplett unlikely(__ret_warn_on); \ 161b607e70eSJosh Triplett }) 162b607e70eSJosh Triplett #endif 163b607e70eSJosh Triplett 164b607e70eSJosh Triplett #ifndef WARN 165b607e70eSJosh Triplett #define WARN(condition, format...) ({ \ 166b607e70eSJosh Triplett int __ret_warn_on = !!(condition); \ 1674e50ebdeSJosh Triplett no_printk(format); \ 168b607e70eSJosh Triplett unlikely(__ret_warn_on); \ 169b607e70eSJosh Triplett }) 170b607e70eSJosh Triplett #endif 171b607e70eSJosh Triplett 172b607e70eSJosh Triplett #define WARN_ON_ONCE(condition) WARN_ON(condition) 173b607e70eSJosh Triplett #define WARN_ONCE(condition, format...) WARN(condition, format) 174b607e70eSJosh Triplett #define WARN_TAINT(condition, taint, format...) WARN(condition, format) 175b607e70eSJosh Triplett #define WARN_TAINT_ONCE(condition, taint, format...) WARN(condition, format) 176b607e70eSJosh Triplett 177b607e70eSJosh Triplett #endif 178b607e70eSJosh Triplett 1792092e6beSSteven Rostedt /* 1802092e6beSSteven Rostedt * WARN_ON_SMP() is for cases that the warning is either 1812092e6beSSteven Rostedt * meaningless for !SMP or may even cause failures. 1822092e6beSSteven Rostedt * This is usually used for cases that we have 1832092e6beSSteven Rostedt * WARN_ON(!spin_is_locked(&lock)) checks, as spin_is_locked() 1842092e6beSSteven Rostedt * returns 0 for uniprocessor settings. 1852092e6beSSteven Rostedt * It can also be used with values that are only defined 1862092e6beSSteven Rostedt * on SMP: 1872092e6beSSteven Rostedt * 1882092e6beSSteven Rostedt * struct foo { 1892092e6beSSteven Rostedt * [...] 1902092e6beSSteven Rostedt * #ifdef CONFIG_SMP 1912092e6beSSteven Rostedt * int bar; 1922092e6beSSteven Rostedt * #endif 1932092e6beSSteven Rostedt * }; 1942092e6beSSteven Rostedt * 1952092e6beSSteven Rostedt * void func(struct foo *zoot) 1962092e6beSSteven Rostedt * { 1972092e6beSSteven Rostedt * WARN_ON_SMP(!zoot->bar); 1982092e6beSSteven Rostedt * 1992092e6beSSteven Rostedt * For CONFIG_SMP, WARN_ON_SMP() should act the same as WARN_ON(), 2002092e6beSSteven Rostedt * and should be a nop and return false for uniprocessor. 2012092e6beSSteven Rostedt * 2022092e6beSSteven Rostedt * if (WARN_ON_SMP(x)) returns true only when CONFIG_SMP is set 2032092e6beSSteven Rostedt * and x is true. 2042092e6beSSteven Rostedt */ 2058eb94f80SIngo Molnar #ifdef CONFIG_SMP 2068eb94f80SIngo Molnar # define WARN_ON_SMP(x) WARN_ON(x) 2078eb94f80SIngo Molnar #else 208ccd0d44fSSteven Rostedt /* 209ccd0d44fSSteven Rostedt * Use of ({0;}) because WARN_ON_SMP(x) may be used either as 210ccd0d44fSSteven Rostedt * a stand alone line statement or as a condition in an if () 211ccd0d44fSSteven Rostedt * statement. 212ccd0d44fSSteven Rostedt * A simple "0" would cause gcc to give a "statement has no effect" 213ccd0d44fSSteven Rostedt * warning. 214ccd0d44fSSteven Rostedt */ 2152092e6beSSteven Rostedt # define WARN_ON_SMP(x) ({0;}) 2168eb94f80SIngo Molnar #endif 2178eb94f80SIngo Molnar 2182603efa3SPaul Mundt #endif /* __ASSEMBLY__ */ 2192603efa3SPaul Mundt 2201da177e4SLinus Torvalds #endif 221