1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 21da177e4SLinus Torvalds #ifndef _ASM_GENERIC_BUG_H 31da177e4SLinus Torvalds #define _ASM_GENERIC_BUG_H 41da177e4SLinus Torvalds 51da177e4SLinus Torvalds #include <linux/compiler.h> 61da177e4SLinus Torvalds 72a8358d8SKees Cook #define CUT_HERE "------------[ cut here ]------------\n" 82a8358d8SKees Cook 909682c1dSPaul Mundt #ifdef CONFIG_GENERIC_BUG 1009682c1dSPaul Mundt #define BUGFLAG_WARNING (1 << 0) 1119d43626SPeter Zijlstra #define BUGFLAG_ONCE (1 << 1) 1219d43626SPeter Zijlstra #define BUGFLAG_DONE (1 << 2) 13f26dee15SPeter Zijlstra #define BUGFLAG_TAINT(taint) ((taint) << 8) 1409682c1dSPaul Mundt #define BUG_GET_TAINT(bug) ((bug)->flags >> 8) 1509682c1dSPaul Mundt #endif 1609682c1dSPaul Mundt 1709682c1dSPaul Mundt #ifndef __ASSEMBLY__ 1809682c1dSPaul Mundt #include <linux/kernel.h> 1909682c1dSPaul Mundt 207664c5a1SJeremy Fitzhardinge struct bug_entry { 21f81f8ad5SNadav Amit #ifdef CONFIG_GENERIC_BUG 22b93a531eSJan Beulich #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS 237664c5a1SJeremy Fitzhardinge unsigned long bug_addr; 24b93a531eSJan Beulich #else 25b93a531eSJan Beulich signed int bug_addr_disp; 26b93a531eSJan Beulich #endif 277664c5a1SJeremy Fitzhardinge #ifdef CONFIG_DEBUG_BUGVERBOSE 28b93a531eSJan Beulich #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS 297664c5a1SJeremy Fitzhardinge const char *file; 30b93a531eSJan Beulich #else 31b93a531eSJan Beulich signed int file_disp; 32b93a531eSJan Beulich #endif 337664c5a1SJeremy Fitzhardinge unsigned short line; 347664c5a1SJeremy Fitzhardinge #endif 357664c5a1SJeremy Fitzhardinge unsigned short flags; 367664c5a1SJeremy Fitzhardinge #endif /* CONFIG_GENERIC_BUG */ 37f81f8ad5SNadav Amit }; 38f81f8ad5SNadav Amit 39f81f8ad5SNadav Amit #ifdef CONFIG_BUG 407664c5a1SJeremy Fitzhardinge 41af9379c7SDavid Brownell /* 42af9379c7SDavid Brownell * Don't use BUG() or BUG_ON() unless there's really no way out; one 43af9379c7SDavid Brownell * example might be detecting data structure corruption in the middle 44af9379c7SDavid Brownell * of an operation that can't be backed out of. If the (sub)system 45af9379c7SDavid Brownell * can somehow continue operating, perhaps with reduced functionality, 46af9379c7SDavid Brownell * it's probably not BUG-worthy. 47af9379c7SDavid Brownell * 48af9379c7SDavid Brownell * If you're tempted to BUG(), think again: is completely giving up 49af9379c7SDavid Brownell * really the *only* solution? There are usually better options, where 50af9379c7SDavid Brownell * users don't need to reboot ASAP and can mostly shut down cleanly. 51af9379c7SDavid Brownell */ 521da177e4SLinus Torvalds #ifndef HAVE_ARCH_BUG 531da177e4SLinus Torvalds #define BUG() do { \ 54d5c003b4SHarvey Harrison printk("BUG: failure at %s:%d/%s()!\n", __FILE__, __LINE__, __func__); \ 55173a3efdSArnd Bergmann barrier_before_unreachable(); \ 561da177e4SLinus Torvalds panic("BUG!"); \ 571da177e4SLinus Torvalds } while (0) 581da177e4SLinus Torvalds #endif 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds #ifndef HAVE_ARCH_BUG_ON 612a41de48SAlexey Dobriyan #define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0) 621da177e4SLinus Torvalds #endif 631da177e4SLinus Torvalds 6419d43626SPeter Zijlstra #ifdef __WARN_FLAGS 6519d43626SPeter Zijlstra #define __WARN_TAINT(taint) __WARN_FLAGS(BUGFLAG_TAINT(taint)) 6619d43626SPeter Zijlstra #define __WARN_ONCE_TAINT(taint) __WARN_FLAGS(BUGFLAG_ONCE|BUGFLAG_TAINT(taint)) 6719d43626SPeter Zijlstra 6819d43626SPeter Zijlstra #define WARN_ON_ONCE(condition) ({ \ 6919d43626SPeter Zijlstra int __ret_warn_on = !!(condition); \ 7019d43626SPeter Zijlstra if (unlikely(__ret_warn_on)) \ 7119d43626SPeter Zijlstra __WARN_ONCE_TAINT(TAINT_WARN); \ 7219d43626SPeter Zijlstra unlikely(__ret_warn_on); \ 7319d43626SPeter Zijlstra }) 7419d43626SPeter Zijlstra #endif 7519d43626SPeter Zijlstra 76af9379c7SDavid Brownell /* 77af9379c7SDavid Brownell * WARN(), WARN_ON(), WARN_ON_ONCE, and so on can be used to report 7896c6a32cSDmitry Vyukov * significant kernel issues that need prompt attention if they should ever 7996c6a32cSDmitry Vyukov * appear at runtime. 8096c6a32cSDmitry Vyukov * 8196c6a32cSDmitry Vyukov * Do not use these macros when checking for invalid external inputs 8296c6a32cSDmitry Vyukov * (e.g. invalid system call arguments, or invalid data coming from 8396c6a32cSDmitry Vyukov * network/devices), and on transient conditions like ENOMEM or EAGAIN. 8496c6a32cSDmitry Vyukov * These macros should be used for recoverable kernel issues only. 8596c6a32cSDmitry Vyukov * For invalid external inputs, transient conditions, etc use 8696c6a32cSDmitry Vyukov * pr_err[_once/_ratelimited]() followed by dump_stack(), if necessary. 8796c6a32cSDmitry Vyukov * Do not include "BUG"/"WARNING" in format strings manually to make these 8896c6a32cSDmitry Vyukov * conditions distinguishable from kernel issues. 8996c6a32cSDmitry Vyukov * 9096c6a32cSDmitry Vyukov * Use the versions with printk format strings to provide better diagnostics. 91af9379c7SDavid Brownell */ 92b2be0527SBen Hutchings #ifndef __WARN_TAINT 93b9075fa9SJoe Perches extern __printf(3, 4) 94b9075fa9SJoe Perches void warn_slowpath_fmt(const char *file, const int line, 95b9075fa9SJoe Perches const char *fmt, ...); 96b9075fa9SJoe Perches extern __printf(4, 5) 97b9075fa9SJoe Perches void warn_slowpath_fmt_taint(const char *file, const int line, unsigned taint, 98b9075fa9SJoe Perches const char *fmt, ...); 9957adc4d2SAndi Kleen extern void warn_slowpath_null(const char *file, const int line); 10079b4cc5eSArjan van de Ven #define WANT_WARN_ON_SLOWPATH 10157adc4d2SAndi Kleen #define __WARN() warn_slowpath_null(__FILE__, __LINE__) 10257adc4d2SAndi Kleen #define __WARN_printf(arg...) warn_slowpath_fmt(__FILE__, __LINE__, arg) 103b2be0527SBen Hutchings #define __WARN_printf_taint(taint, arg...) \ 104b2be0527SBen Hutchings warn_slowpath_fmt_taint(__FILE__, __LINE__, taint, arg) 105a8f18b90SArjan van de Ven #else 106a7bed27aSKees Cook extern __printf(1, 2) void __warn_printk(const char *fmt, ...); 107b2be0527SBen Hutchings #define __WARN() __WARN_TAINT(TAINT_WARN) 108a7bed27aSKees Cook #define __WARN_printf(arg...) do { __warn_printk(arg); __WARN(); } while (0) 109b2be0527SBen Hutchings #define __WARN_printf_taint(taint, arg...) \ 110a7bed27aSKees Cook do { __warn_printk(arg); __WARN_TAINT(taint); } while (0) 1113a6a62f9SOlof Johansson #endif 1123a6a62f9SOlof Johansson 1132553b67aSJosh Poimboeuf /* used internally by panic.c */ 1142553b67aSJosh Poimboeuf struct warn_args; 1150b396923SIan Abbott struct pt_regs; 1162553b67aSJosh Poimboeuf 1172553b67aSJosh Poimboeuf void __warn(const char *file, int line, void *caller, unsigned taint, 1182553b67aSJosh Poimboeuf struct pt_regs *regs, struct warn_args *args); 1192553b67aSJosh Poimboeuf 1203a6a62f9SOlof Johansson #ifndef WARN_ON 1213a6a62f9SOlof Johansson #define WARN_ON(condition) ({ \ 1223a6a62f9SOlof Johansson int __ret_warn_on = !!(condition); \ 1233a6a62f9SOlof Johansson if (unlikely(__ret_warn_on)) \ 1243a6a62f9SOlof Johansson __WARN(); \ 125684f9783SHerbert Xu unlikely(__ret_warn_on); \ 126684f9783SHerbert Xu }) 1271da177e4SLinus Torvalds #endif 1281da177e4SLinus Torvalds 129a8f18b90SArjan van de Ven #ifndef WARN 130a8f18b90SArjan van de Ven #define WARN(condition, format...) ({ \ 131a8f18b90SArjan van de Ven int __ret_warn_on = !!(condition); \ 132a8f18b90SArjan van de Ven if (unlikely(__ret_warn_on)) \ 133a8f18b90SArjan van de Ven __WARN_printf(format); \ 134a8f18b90SArjan van de Ven unlikely(__ret_warn_on); \ 135a8f18b90SArjan van de Ven }) 136a8f18b90SArjan van de Ven #endif 137a8f18b90SArjan van de Ven 138b2be0527SBen Hutchings #define WARN_TAINT(condition, taint, format...) ({ \ 139b2be0527SBen Hutchings int __ret_warn_on = !!(condition); \ 140b2be0527SBen Hutchings if (unlikely(__ret_warn_on)) \ 141b2be0527SBen Hutchings __WARN_printf_taint(taint, format); \ 142b2be0527SBen Hutchings unlikely(__ret_warn_on); \ 143b2be0527SBen Hutchings }) 144b2be0527SBen Hutchings 14519d43626SPeter Zijlstra #ifndef WARN_ON_ONCE 146684f9783SHerbert Xu #define WARN_ON_ONCE(condition) ({ \ 147b1fca27dSAndi Kleen static bool __section(.data.once) __warned; \ 1488d4fbcfbSLinus Torvalds int __ret_warn_once = !!(condition); \ 14974bb6a09SIngo Molnar \ 150dfbf2897SSteven Rostedt if (unlikely(__ret_warn_once && !__warned)) { \ 15142f247c8SCesar Eduardo Barros __warned = true; \ 152dfbf2897SSteven Rostedt WARN_ON(1); \ 153dfbf2897SSteven Rostedt } \ 154684f9783SHerbert Xu unlikely(__ret_warn_once); \ 15574bb6a09SIngo Molnar }) 15619d43626SPeter Zijlstra #endif 15774bb6a09SIngo Molnar 15845e9c0deSArjan van de Ven #define WARN_ONCE(condition, format...) ({ \ 159b1fca27dSAndi Kleen static bool __section(.data.once) __warned; \ 16045e9c0deSArjan van de Ven int __ret_warn_once = !!(condition); \ 16145e9c0deSArjan van de Ven \ 162dfbf2897SSteven Rostedt if (unlikely(__ret_warn_once && !__warned)) { \ 16342f247c8SCesar Eduardo Barros __warned = true; \ 164dfbf2897SSteven Rostedt WARN(1, format); \ 165dfbf2897SSteven Rostedt } \ 16645e9c0deSArjan van de Ven unlikely(__ret_warn_once); \ 16745e9c0deSArjan van de Ven }) 16845e9c0deSArjan van de Ven 169b2be0527SBen Hutchings #define WARN_TAINT_ONCE(condition, taint, format...) ({ \ 170b1fca27dSAndi Kleen static bool __section(.data.once) __warned; \ 171b2be0527SBen Hutchings int __ret_warn_once = !!(condition); \ 172b2be0527SBen Hutchings \ 173dfbf2897SSteven Rostedt if (unlikely(__ret_warn_once && !__warned)) { \ 174b2be0527SBen Hutchings __warned = true; \ 175dfbf2897SSteven Rostedt WARN_TAINT(1, taint, format); \ 176dfbf2897SSteven Rostedt } \ 177b2be0527SBen Hutchings unlikely(__ret_warn_once); \ 178b2be0527SBen Hutchings }) 179b2be0527SBen Hutchings 180b607e70eSJosh Triplett #else /* !CONFIG_BUG */ 181b607e70eSJosh Triplett #ifndef HAVE_ARCH_BUG 182a4b5d580SJosh Triplett #define BUG() do {} while (1) 183b607e70eSJosh Triplett #endif 184b607e70eSJosh Triplett 185b607e70eSJosh Triplett #ifndef HAVE_ARCH_BUG_ON 1863c047057SArnd Bergmann #define BUG_ON(condition) do { if (condition) BUG(); } while (0) 187b607e70eSJosh Triplett #endif 188b607e70eSJosh Triplett 189b607e70eSJosh Triplett #ifndef HAVE_ARCH_WARN_ON 190b607e70eSJosh Triplett #define WARN_ON(condition) ({ \ 191b607e70eSJosh Triplett int __ret_warn_on = !!(condition); \ 192b607e70eSJosh Triplett unlikely(__ret_warn_on); \ 193b607e70eSJosh Triplett }) 194b607e70eSJosh Triplett #endif 195b607e70eSJosh Triplett 196b607e70eSJosh Triplett #ifndef WARN 197b607e70eSJosh Triplett #define WARN(condition, format...) ({ \ 198b607e70eSJosh Triplett int __ret_warn_on = !!(condition); \ 1994e50ebdeSJosh Triplett no_printk(format); \ 200b607e70eSJosh Triplett unlikely(__ret_warn_on); \ 201b607e70eSJosh Triplett }) 202b607e70eSJosh Triplett #endif 203b607e70eSJosh Triplett 204b607e70eSJosh Triplett #define WARN_ON_ONCE(condition) WARN_ON(condition) 205b607e70eSJosh Triplett #define WARN_ONCE(condition, format...) WARN(condition, format) 206b607e70eSJosh Triplett #define WARN_TAINT(condition, taint, format...) WARN(condition, format) 207b607e70eSJosh Triplett #define WARN_TAINT_ONCE(condition, taint, format...) WARN(condition, format) 208b607e70eSJosh Triplett 209b607e70eSJosh Triplett #endif 210b607e70eSJosh Triplett 2112092e6beSSteven Rostedt /* 2122092e6beSSteven Rostedt * WARN_ON_SMP() is for cases that the warning is either 2132092e6beSSteven Rostedt * meaningless for !SMP or may even cause failures. 2142092e6beSSteven Rostedt * This is usually used for cases that we have 2152092e6beSSteven Rostedt * WARN_ON(!spin_is_locked(&lock)) checks, as spin_is_locked() 2162092e6beSSteven Rostedt * returns 0 for uniprocessor settings. 2172092e6beSSteven Rostedt * It can also be used with values that are only defined 2182092e6beSSteven Rostedt * on SMP: 2192092e6beSSteven Rostedt * 2202092e6beSSteven Rostedt * struct foo { 2212092e6beSSteven Rostedt * [...] 2222092e6beSSteven Rostedt * #ifdef CONFIG_SMP 2232092e6beSSteven Rostedt * int bar; 2242092e6beSSteven Rostedt * #endif 2252092e6beSSteven Rostedt * }; 2262092e6beSSteven Rostedt * 2272092e6beSSteven Rostedt * void func(struct foo *zoot) 2282092e6beSSteven Rostedt * { 2292092e6beSSteven Rostedt * WARN_ON_SMP(!zoot->bar); 2302092e6beSSteven Rostedt * 2312092e6beSSteven Rostedt * For CONFIG_SMP, WARN_ON_SMP() should act the same as WARN_ON(), 2322092e6beSSteven Rostedt * and should be a nop and return false for uniprocessor. 2332092e6beSSteven Rostedt * 2342092e6beSSteven Rostedt * if (WARN_ON_SMP(x)) returns true only when CONFIG_SMP is set 2352092e6beSSteven Rostedt * and x is true. 2362092e6beSSteven Rostedt */ 2378eb94f80SIngo Molnar #ifdef CONFIG_SMP 2388eb94f80SIngo Molnar # define WARN_ON_SMP(x) WARN_ON(x) 2398eb94f80SIngo Molnar #else 240ccd0d44fSSteven Rostedt /* 241ccd0d44fSSteven Rostedt * Use of ({0;}) because WARN_ON_SMP(x) may be used either as 242ccd0d44fSSteven Rostedt * a stand alone line statement or as a condition in an if () 243ccd0d44fSSteven Rostedt * statement. 244ccd0d44fSSteven Rostedt * A simple "0" would cause gcc to give a "statement has no effect" 245ccd0d44fSSteven Rostedt * warning. 246ccd0d44fSSteven Rostedt */ 2472092e6beSSteven Rostedt # define WARN_ON_SMP(x) ({0;}) 2488eb94f80SIngo Molnar #endif 2498eb94f80SIngo Molnar 2502603efa3SPaul Mundt #endif /* __ASSEMBLY__ */ 2512603efa3SPaul Mundt 2521da177e4SLinus Torvalds #endif 253