Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753015AbbFHJQv (ORCPT ); Mon, 8 Jun 2015 05:16:51 -0400 Received: from h1446028.stratoserver.net ([85.214.92.142]:41923 "EHLO mail.ahsoftware.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752647AbbFHJQo (ORCPT ); Mon, 8 Jun 2015 05:16:44 -0400 Message-ID: <55755D6F.3030201@ahsoftware.de> Date: Mon, 08 Jun 2015 11:16:31 +0200 From: Alexander Holler User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: Ingo Molnar CC: Richard Weinberger , Linus Torvalds , Tejun Heo , Louis Langholtz , Linux Kernel Mailing List , Trivial patch monkey , Rusty Russell , Andrew Morton , Peter Zijlstra , Thomas Gleixner , Greg Kroah-Hartman Subject: Re: [PATCH] debug: Deprecate BUG_ON() use in new code, introduce CRASH_ON() References: <1433721270-9182-1-git-send-email-lou_langholtz@me.com> <20150608000007.GA3543@mtj.duckdns.org> <20150608071215.GA369@gmail.com> <557546E6.5030304@ahsoftware.de> <5575558E.5070706@ahsoftware.de> <20150608090509.GA19160@gmail.com> In-Reply-To: <20150608090509.GA19160@gmail.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2541 Lines: 64 Am 08.06.2015 um 11:05 schrieb Ingo Molnar: > > * Alexander Holler wrote: > >> Am 08.06.2015 um 10:08 schrieb Richard Weinberger: >>> On Mon, Jun 8, 2015 at 9:40 AM, Alexander Holler wrote: >>>> Am 08.06.2015 um 09:12 schrieb Ingo Molnar: >>>>> >>>>> >>>>> * Linus Torvalds wrote: >>>>> >>>>>> Stop with the random BUG_ON() additions. >>>>> >>>>> >>>>> Yeah, so I propose the attached patch which attempts to resist new >>>>> BUG_ON() >>>>> additions. >>>> >>>> >>>> As this reminded me at flame I received once from a maintainer because I >>>> wanted to avoid a desastrous memory corruption by using a BUG_ON(). >>> >>> Reference? >> >> https://lkml.org/lkml/2013/5/17/254 >> >> To explain: The bug already existed for several releases and the memory >> corruption was that desatrous that it even leaded here to hard resets of systems >> without any oops. And fixing it needed several more releases (another year). >> >> And in the above mentioned case and the kernel config settings I use(d), only >> the wronggoing thread was killed by the BUG_ON (I proposed) before it had the >> chance to corrupt the memory. > > Firstly, the changelog of the patch that Greg rejected told nothing about all that > thinking, so at minimum it's a deficient changelog. > > Secondly and more importantly, instead of doing a BUG_ON() you could have done: > > if (WARN_ON_ONCE(port->itty)) > return; > > This would probably have prevented the tty related memory corruption just as much, > at the cost of a (small and infrequent) memory leak. > > I.e. instead of crashing the machine, you need to try to find the least > destructive approach if a bug is detected. > > I am pretty certain that Greg would have applied such a patch in an eye blink. As you've said it, *probably*. But such a simple exit path as you're proposing doesn't always exist. And I assume if it would have existed, it would not have needed another year to get rid of at least the memory corruption. It took me quiet some time to find the problem and I'm sure, if I had seen during my adventures through the tty-subsystem that such a simple return would have been enough, I would have used WARN_ON or WARN_ON_ONCE. But I can't remember. Alexander Holler -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/