WARN() is used in some places to report firmware or hardware bugs that are then worked-around. These bugs do not affect the stability of the kernel and should not set the flag for TAINT_WARN. To allow for this, add WARN_TAINT() and WARN_TAINT_ONCE() macros that take a taint number as argument. Architectures that implement warnings using trap instructions instead of calls to warn_slowpath_*() now implement __WARN_TAINT(taint) instead of __WARN(). Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Acked-by: Helge Deller <deller@gmx.de> Tested-by: Paul Mundt <lethal@linux-sh.org> Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
		
			
				
	
	
		
			174 lines
		
	
	
	
		
			4.6 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			174 lines
		
	
	
	
		
			4.6 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
#ifndef _ASM_GENERIC_BUG_H
 | 
						|
#define _ASM_GENERIC_BUG_H
 | 
						|
 | 
						|
#include <linux/compiler.h>
 | 
						|
 | 
						|
#ifdef CONFIG_BUG
 | 
						|
 | 
						|
#ifdef CONFIG_GENERIC_BUG
 | 
						|
#ifndef __ASSEMBLY__
 | 
						|
struct bug_entry {
 | 
						|
#ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS
 | 
						|
	unsigned long	bug_addr;
 | 
						|
#else
 | 
						|
	signed int	bug_addr_disp;
 | 
						|
#endif
 | 
						|
#ifdef CONFIG_DEBUG_BUGVERBOSE
 | 
						|
#ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS
 | 
						|
	const char	*file;
 | 
						|
#else
 | 
						|
	signed int	file_disp;
 | 
						|
#endif
 | 
						|
	unsigned short	line;
 | 
						|
#endif
 | 
						|
	unsigned short	flags;
 | 
						|
};
 | 
						|
#endif		/* __ASSEMBLY__ */
 | 
						|
 | 
						|
#define BUGFLAG_WARNING		(1 << 0)
 | 
						|
#define BUGFLAG_TAINT(taint)	(BUGFLAG_WARNING | ((taint) << 8))
 | 
						|
#define BUG_GET_TAINT(bug)	((bug)->flags >> 8)
 | 
						|
 | 
						|
#endif	/* CONFIG_GENERIC_BUG */
 | 
						|
 | 
						|
/*
 | 
						|
 * Don't use BUG() or BUG_ON() unless there's really no way out; one
 | 
						|
 * example might be detecting data structure corruption in the middle
 | 
						|
 * of an operation that can't be backed out of.  If the (sub)system
 | 
						|
 * can somehow continue operating, perhaps with reduced functionality,
 | 
						|
 * it's probably not BUG-worthy.
 | 
						|
 *
 | 
						|
 * If you're tempted to BUG(), think again:  is completely giving up
 | 
						|
 * really the *only* solution?  There are usually better options, where
 | 
						|
 * users don't need to reboot ASAP and can mostly shut down cleanly.
 | 
						|
 */
 | 
						|
#ifndef HAVE_ARCH_BUG
 | 
						|
#define BUG() do { \
 | 
						|
	printk("BUG: failure at %s:%d/%s()!\n", __FILE__, __LINE__, __func__); \
 | 
						|
	panic("BUG!"); \
 | 
						|
} while (0)
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef HAVE_ARCH_BUG_ON
 | 
						|
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while(0)
 | 
						|
#endif
 | 
						|
 | 
						|
/*
 | 
						|
 * WARN(), WARN_ON(), WARN_ON_ONCE, and so on can be used to report
 | 
						|
 * significant issues that need prompt attention if they should ever
 | 
						|
 * appear at runtime.  Use the versions with printk format strings
 | 
						|
 * to provide better diagnostics.
 | 
						|
 */
 | 
						|
#ifndef __WARN_TAINT
 | 
						|
#ifndef __ASSEMBLY__
 | 
						|
extern void warn_slowpath_fmt(const char *file, const int line,
 | 
						|
		const char *fmt, ...) __attribute__((format(printf, 3, 4)));
 | 
						|
extern void warn_slowpath_fmt_taint(const char *file, const int line,
 | 
						|
				    unsigned taint, const char *fmt, ...)
 | 
						|
	__attribute__((format(printf, 4, 5)));
 | 
						|
extern void warn_slowpath_null(const char *file, const int line);
 | 
						|
#define WANT_WARN_ON_SLOWPATH
 | 
						|
#endif
 | 
						|
#define __WARN()		warn_slowpath_null(__FILE__, __LINE__)
 | 
						|
#define __WARN_printf(arg...)	warn_slowpath_fmt(__FILE__, __LINE__, arg)
 | 
						|
#define __WARN_printf_taint(taint, arg...)				\
 | 
						|
	warn_slowpath_fmt_taint(__FILE__, __LINE__, taint, arg)
 | 
						|
#else
 | 
						|
#define __WARN()		__WARN_TAINT(TAINT_WARN)
 | 
						|
#define __WARN_printf(arg...)	do { printk(arg); __WARN(); } while (0)
 | 
						|
#define __WARN_printf_taint(taint, arg...)				\
 | 
						|
	do { printk(arg); __WARN_TAINT(taint); } while (0)
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef WARN_ON
 | 
						|
#define WARN_ON(condition) ({						\
 | 
						|
	int __ret_warn_on = !!(condition);				\
 | 
						|
	if (unlikely(__ret_warn_on))					\
 | 
						|
		__WARN();						\
 | 
						|
	unlikely(__ret_warn_on);					\
 | 
						|
})
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef WARN
 | 
						|
#define WARN(condition, format...) ({						\
 | 
						|
	int __ret_warn_on = !!(condition);				\
 | 
						|
	if (unlikely(__ret_warn_on))					\
 | 
						|
		__WARN_printf(format);					\
 | 
						|
	unlikely(__ret_warn_on);					\
 | 
						|
})
 | 
						|
#endif
 | 
						|
 | 
						|
#define WARN_TAINT(condition, taint, format...) ({			\
 | 
						|
	int __ret_warn_on = !!(condition);				\
 | 
						|
	if (unlikely(__ret_warn_on))					\
 | 
						|
		__WARN_printf_taint(taint, format);			\
 | 
						|
	unlikely(__ret_warn_on);					\
 | 
						|
})
 | 
						|
 | 
						|
#else /* !CONFIG_BUG */
 | 
						|
#ifndef HAVE_ARCH_BUG
 | 
						|
#define BUG() do {} while(0)
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef HAVE_ARCH_BUG_ON
 | 
						|
#define BUG_ON(condition) do { if (condition) ; } while(0)
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef HAVE_ARCH_WARN_ON
 | 
						|
#define WARN_ON(condition) ({						\
 | 
						|
	int __ret_warn_on = !!(condition);				\
 | 
						|
	unlikely(__ret_warn_on);					\
 | 
						|
})
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef WARN
 | 
						|
#define WARN(condition, format...) ({					\
 | 
						|
	int __ret_warn_on = !!(condition);				\
 | 
						|
	unlikely(__ret_warn_on);					\
 | 
						|
})
 | 
						|
#endif
 | 
						|
 | 
						|
#define WARN_TAINT(condition, taint, format...) WARN_ON(condition)
 | 
						|
 | 
						|
#endif
 | 
						|
 | 
						|
#define WARN_ON_ONCE(condition)	({				\
 | 
						|
	static bool __warned;					\
 | 
						|
	int __ret_warn_once = !!(condition);			\
 | 
						|
								\
 | 
						|
	if (unlikely(__ret_warn_once))				\
 | 
						|
		if (WARN_ON(!__warned)) 			\
 | 
						|
			__warned = true;			\
 | 
						|
	unlikely(__ret_warn_once);				\
 | 
						|
})
 | 
						|
 | 
						|
#define WARN_ONCE(condition, format...)	({			\
 | 
						|
	static bool __warned;					\
 | 
						|
	int __ret_warn_once = !!(condition);			\
 | 
						|
								\
 | 
						|
	if (unlikely(__ret_warn_once))				\
 | 
						|
		if (WARN(!__warned, format)) 			\
 | 
						|
			__warned = true;			\
 | 
						|
	unlikely(__ret_warn_once);				\
 | 
						|
})
 | 
						|
 | 
						|
#define WARN_TAINT_ONCE(condition, taint, format...)	({	\
 | 
						|
	static bool __warned;					\
 | 
						|
	int __ret_warn_once = !!(condition);			\
 | 
						|
								\
 | 
						|
	if (unlikely(__ret_warn_once))				\
 | 
						|
		if (WARN_TAINT(!__warned, taint, format))	\
 | 
						|
			__warned = true;			\
 | 
						|
	unlikely(__ret_warn_once);				\
 | 
						|
})
 | 
						|
 | 
						|
#define WARN_ON_RATELIMIT(condition, state)			\
 | 
						|
		WARN_ON((condition) && __ratelimit(state))
 | 
						|
 | 
						|
#ifdef CONFIG_SMP
 | 
						|
# define WARN_ON_SMP(x)			WARN_ON(x)
 | 
						|
#else
 | 
						|
# define WARN_ON_SMP(x)			do { } while (0)
 | 
						|
#endif
 | 
						|
 | 
						|
#endif
 |