1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _ASM_GENERIC_BUG_H
3 #define _ASM_GENERIC_BUG_H
5 #include <linux/compiler.h>
6 #include <linux/instrumentation.h>
8 #define CUT_HERE "------------[ cut here ]------------\n"
10 #ifdef CONFIG_GENERIC_BUG
11 #define BUGFLAG_WARNING (1 << 0)
12 #define BUGFLAG_ONCE (1 << 1)
13 #define BUGFLAG_DONE (1 << 2)
14 #define BUGFLAG_NO_CUT_HERE (1 << 3) /* CUT_HERE already sent */
15 #define BUGFLAG_TAINT(taint) ((taint) << 8)
16 #define BUG_GET_TAINT(bug) ((bug)->flags >> 8)
20 #include <linux/kernel.h>
24 #ifdef CONFIG_GENERIC_BUG
26 #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS
27 unsigned long bug_addr
;
29 signed int bug_addr_disp
;
31 #ifdef CONFIG_DEBUG_BUGVERBOSE
32 #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS
41 #endif /* CONFIG_GENERIC_BUG */
44 * Don't use BUG() or BUG_ON() unless there's really no way out; one
45 * example might be detecting data structure corruption in the middle
46 * of an operation that can't be backed out of. If the (sub)system
47 * can somehow continue operating, perhaps with reduced functionality,
48 * it's probably not BUG-worthy.
50 * If you're tempted to BUG(), think again: is completely giving up
51 * really the *only* solution? There are usually better options, where
52 * users don't need to reboot ASAP and can mostly shut down cleanly.
56 printk("BUG: failure at %s:%d/%s()!\n", __FILE__, __LINE__, __func__); \
57 barrier_before_unreachable(); \
62 #ifndef HAVE_ARCH_BUG_ON
63 #define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
67 * WARN(), WARN_ON(), WARN_ON_ONCE, and so on can be used to report
68 * significant kernel issues that need prompt attention if they should ever
71 * Do not use these macros when checking for invalid external inputs
72 * (e.g. invalid system call arguments, or invalid data coming from
73 * network/devices), and on transient conditions like ENOMEM or EAGAIN.
74 * These macros should be used for recoverable kernel issues only.
75 * For invalid external inputs, transient conditions, etc use
76 * pr_err[_once/_ratelimited]() followed by dump_stack(), if necessary.
77 * Do not include "BUG"/"WARNING" in format strings manually to make these
78 * conditions distinguishable from kernel issues.
80 * Use the versions with printk format strings to provide better diagnostics.
84 void warn_slowpath_fmt(const char *file
, const int line
, unsigned taint
,
85 const char *fmt
, ...);
86 #define __WARN() __WARN_printf(TAINT_WARN, NULL)
87 #define __WARN_printf(taint, arg...) do { \
88 instrumentation_begin(); \
89 warn_slowpath_fmt(__FILE__, __LINE__, taint, arg); \
90 instrumentation_end(); \
93 extern __printf(1, 2) void __warn_printk(const char *fmt
, ...);
94 #define __WARN() __WARN_FLAGS(BUGFLAG_TAINT(TAINT_WARN))
95 #define __WARN_printf(taint, arg...) do { \
96 instrumentation_begin(); \
98 __WARN_FLAGS(BUGFLAG_NO_CUT_HERE | BUGFLAG_TAINT(taint));\
99 instrumentation_end(); \
101 #define WARN_ON_ONCE(condition) ({ \
102 int __ret_warn_on = !!(condition); \
103 if (unlikely(__ret_warn_on)) \
104 __WARN_FLAGS(BUGFLAG_ONCE | \
105 BUGFLAG_TAINT(TAINT_WARN)); \
106 unlikely(__ret_warn_on); \
110 /* used internally by panic.c */
114 void __warn(const char *file
, int line
, void *caller
, unsigned taint
,
115 struct pt_regs
*regs
, struct warn_args
*args
);
118 #define WARN_ON(condition) ({ \
119 int __ret_warn_on = !!(condition); \
120 if (unlikely(__ret_warn_on)) \
122 unlikely(__ret_warn_on); \
127 #define WARN(condition, format...) ({ \
128 int __ret_warn_on = !!(condition); \
129 if (unlikely(__ret_warn_on)) \
130 __WARN_printf(TAINT_WARN, format); \
131 unlikely(__ret_warn_on); \
135 #define WARN_TAINT(condition, taint, format...) ({ \
136 int __ret_warn_on = !!(condition); \
137 if (unlikely(__ret_warn_on)) \
138 __WARN_printf(taint, format); \
139 unlikely(__ret_warn_on); \
143 #define WARN_ON_ONCE(condition) ({ \
144 static bool __section(".data.once") __warned; \
145 int __ret_warn_once = !!(condition); \
147 if (unlikely(__ret_warn_once && !__warned)) { \
151 unlikely(__ret_warn_once); \
155 #define WARN_ONCE(condition, format...) ({ \
156 static bool __section(".data.once") __warned; \
157 int __ret_warn_once = !!(condition); \
159 if (unlikely(__ret_warn_once && !__warned)) { \
163 unlikely(__ret_warn_once); \
166 #define WARN_TAINT_ONCE(condition, taint, format...) ({ \
167 static bool __section(".data.once") __warned; \
168 int __ret_warn_once = !!(condition); \
170 if (unlikely(__ret_warn_once && !__warned)) { \
172 WARN_TAINT(1, taint, format); \
174 unlikely(__ret_warn_once); \
177 #else /* !CONFIG_BUG */
178 #ifndef HAVE_ARCH_BUG
179 #define BUG() do {} while (1)
182 #ifndef HAVE_ARCH_BUG_ON
183 #define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
186 #ifndef HAVE_ARCH_WARN_ON
187 #define WARN_ON(condition) ({ \
188 int __ret_warn_on = !!(condition); \
189 unlikely(__ret_warn_on); \
194 #define WARN(condition, format...) ({ \
195 int __ret_warn_on = !!(condition); \
197 unlikely(__ret_warn_on); \
201 #define WARN_ON_ONCE(condition) WARN_ON(condition)
202 #define WARN_ONCE(condition, format...) WARN(condition, format)
203 #define WARN_TAINT(condition, taint, format...) WARN(condition, format)
204 #define WARN_TAINT_ONCE(condition, taint, format...) WARN(condition, format)
209 * WARN_ON_SMP() is for cases that the warning is either
210 * meaningless for !SMP or may even cause failures.
211 * It can also be used with values that are only defined
221 * void func(struct foo *zoot)
223 * WARN_ON_SMP(!zoot->bar);
225 * For CONFIG_SMP, WARN_ON_SMP() should act the same as WARN_ON(),
226 * and should be a nop and return false for uniprocessor.
228 * if (WARN_ON_SMP(x)) returns true only when CONFIG_SMP is set
232 # define WARN_ON_SMP(x) WARN_ON(x)
235 * Use of ({0;}) because WARN_ON_SMP(x) may be used either as
236 * a stand alone line statement or as a condition in an if ()
238 * A simple "0" would cause gcc to give a "statement has no effect"
241 # define WARN_ON_SMP(x) ({0;})
244 #endif /* __ASSEMBLY__ */