Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966194AbaFSXIM (ORCPT ); Thu, 19 Jun 2014 19:08:12 -0400 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:60876 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964958AbaFSXIK (ORCPT ); Thu, 19 Jun 2014 19:08:10 -0400 Message-ID: <1403219288.1962.17.camel@jarvis.lan> Subject: Re: [REPOST PATCH 1/8] fence: dma-buf cross-device synchronization (v17) From: James Bottomley To: "H. Peter Anvin" Cc: Greg KH , Daniel Vetter , Rob Clark , Maarten Lankhorst , linux-arch@vger.kernel.org, Thomas Hellstrom , Linux Kernel Mailing List , "dri-devel@lists.freedesktop.org" , "linaro-mm-sig@lists.linaro.org" , Thierry Reding , Colin Cross , Sumit Semwal , "linux-media@vger.kernel.org" Date: Thu, 19 Jun 2014 16:08:08 -0700 In-Reply-To: <53A366B3.8020808@zytor.com> References: <20140618102957.15728.43525.stgit@patser> <20140618103653.15728.4942.stgit@patser> <20140619011327.GC10921@kroah.com> <20140619170059.GA1224@kroah.com> <20140619200159.GA27883@kroah.com> <53A366B3.8020808@zytor.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.10.2 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2014-06-19 at 15:39 -0700, H. Peter Anvin wrote: > On 06/19/2014 01:01 PM, Greg KH wrote: > > On Thu, Jun 19, 2014 at 09:15:36PM +0200, Daniel Vetter wrote: > >> On Thu, Jun 19, 2014 at 7:00 PM, Greg KH wrote: > >>>>>> + BUG_ON(f1->context != f2->context); > >>>>> > >>>>> Nice, you just crashed the kernel, making it impossible to debug or > >>>>> recover :( > >>>> > >>>> agreed, that should probably be 'if (WARN_ON(...)) return NULL;' > >>>> > >>>> (but at least I wouldn't expect to hit that under console_lock so you > >>>> should at least see the last N lines of the backtrace on the screen > >>>> ;-)) > >>> > >>> Lots of devices don't have console screens :) > >> > >> Aside: This is a pet peeve of mine and recently I've switched to > >> rejecting all patch that have a BUG_ON, period. > > > > Please do, I have been for a few years now as well for the same reasons > > you cite. > > > > I'm actually concerned about this trend. Downgrading things to WARN_ON > can allow a security bug in the kernel to continue to exist, for > example, or make the error message disappear. Me too. We use BUG_ON in the I/O subsystem where we're forced to violate a guarantee. When the choice is corrupt something or panic the system, I prefer the latter every time. > I am wondering if the right thing here isn't to have a user (command > line?) settable policy as to how to proceed on an assert violation, > instead of hardcoding it at compile time. I'd say it depends on the consequence of the assertion violation. We have assertions that are largely theoretical, ones that govern process internal state (so killing the process mostly sanitizes the system) and a few that imply data loss or data corruption. James -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/