Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp5758693pxv; Wed, 7 Jul 2021 11:05:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxFAW4FPL+cgPtaPICRbtzUxE1Mpp1C411EFQ65mH4jePaMOBBpBuNoqlnEBDgPWOcvm4ph X-Received: by 2002:a50:ed8d:: with SMTP id h13mr31462591edr.329.1625681106107; Wed, 07 Jul 2021 11:05:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625681106; cv=none; d=google.com; s=arc-20160816; b=ta4Xi5FRYbLB7sXrOwkvnPjxIpQlGrn+fm85093FChAqPUY+44Ww5Ofody+Fkv7ljh bmvn54eF0bQGpKk8RSkr+jJXwXmDTvtNNL2sNSOOkdNs27iOMJSW0CZlpihlHwGCt8yK efA3C4RKErMxXqJHpXevNY8yaRy+2xlkIhmW7jRm4grC8tRepclFeEzDiWKjttnd78TG W2RBQ9+IzvwGqyrWsRyO5GjhJ36RrjyzqDQGjnaD7xBx9CfJfJLp+6ReiNwNFb7r4fdl v3FaRO5LXiQ1rTK+qEAfJL9GB7FqH1G16FrU3I71ST2A73Wk6k24TetDHDgWyXYDzqMn B/sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=b6lPo0RfcI6bJxDTWDgHQWH/Dyo5lhRrCY5CY72T600=; b=f7zQaisW/x4cxz0jrJzYGDIfgYB/7kLirrsiavc/iT22Cs2GZ+zNKSRpGvrp2QDHV0 RveOW5MbHW3mz866iV0sDNRy0Nyl9rP4fZhf75YQ0e/Av70z9acakkLKY9gQEy3kZZ82 3icgLMyrTSV1XHm+k5EIGkgegy0BShKXuiw9NyPSdF3QcXz4V2wsuA6czHsqRGOcvPzI PVAwd7ZH6ZOlTvNQR/tJgfXWw47vnZLgks3wDe5f+LUqeMrHQaWoaXahMak6ZbMTxjdk KcVWAmU8lOxEMieTe5+nImirl43jiUC7ro4lpcKZ5CAplDddbwVzqdw8dT5lkP3kkVau LXnQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=UPcxgl12; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si17662476edy.360.2021.07.07.11.04.42; Wed, 07 Jul 2021 11:05:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=UPcxgl12; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231328AbhGGSAo (ORCPT + 99 others); Wed, 7 Jul 2021 14:00:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:54738 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229519AbhGGSAn (ORCPT ); Wed, 7 Jul 2021 14:00:43 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 0046D61CCC; Wed, 7 Jul 2021 17:58:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625680683; bh=2PkBSBkSHD0K+zZoRvYC+d540XqyMInd4eDo28svdQ0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=UPcxgl12b+1ZNflKB0RyYBxJdXMP2FaSLZeco6eRT67BS97NeEOkztEvQssrKPG8t J/LBcP5pEBTqFtg+GcQXvzcOH425n3Nk1xS7D+1b2wxgT+qSSy/KRl6jiy8x4Ys34G kQ5LtihDhX0IMqGkX/2CuIAWnitcWM2nzxpfp3z3cboAmc1CgIGR8fjwRcW82RGF/8 ilhSx9MwFKFr2i0ZgPJJYfDV+qstK6hS+OkAoQ16nYyWf9FoD2CWBNPfHa7ny1fq5w 93/r5shUtoyubWxoVMHSzZ797/eWOSkKBRqJLBgQxDvTp7hwTXgleSY/K8JXVvN4eb 5IIezOhEXFvpg== Date: Wed, 7 Jul 2021 10:58:01 -0700 From: Eric Biggers To: Matthew Wilcox Cc: Jeff Layton , Greg KH , "J. Bruce Fields" , Desmond Cheong Zhi Xi , viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, skhan@linuxfoundation.org, linux-kernel-mentees@lists.linuxfoundation.org, syzbot+e6d5398a02c516ce5e70@syzkaller.appspotmail.com Subject: Re: [PATCH v2 1/2] fcntl: fix potential deadlocks for &fown_struct.lock Message-ID: References: <4dda1cad6348fced5fcfcb6140186795ed07d948.camel@kernel.org> <20210707135129.GA9446@fieldses.org> <20210707151936.GB9911@fieldses.org> <20210707153417.GA10570@fieldses.org> <03748f0bf038826f879b4429441d5a0fa8331969.camel@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 07, 2021 at 05:25:19PM +0100, Matthew Wilcox wrote: > On Wed, Jul 07, 2021 at 12:18:45PM -0400, Jeff Layton wrote: > > On Wed, 2021-07-07 at 17:46 +0200, Greg KH wrote: > > > On Wed, Jul 07, 2021 at 11:34:17AM -0400, J. Bruce Fields wrote: > > > > On Wed, Jul 07, 2021 at 05:31:06PM +0200, Greg KH wrote: > > > > > On Wed, Jul 07, 2021 at 11:19:36AM -0400, J. Bruce Fields wrote: > > > > > > On Wed, Jul 07, 2021 at 05:06:45PM +0200, Greg KH wrote: > > > > > > > On Wed, Jul 07, 2021 at 09:51:29AM -0400, J. Bruce Fields wrote: > > > > > > > > On Wed, Jul 07, 2021 at 07:40:47AM -0400, Jeff Layton wrote: > > > > > > > > > On Wed, 2021-07-07 at 12:51 +0200, Greg KH wrote: > > > > > > > > > > On Wed, Jul 07, 2021 at 06:44:42AM -0400, Jeff Layton wrote: > > > > > > > > > > > On Wed, 2021-07-07 at 08:05 +0200, Greg KH wrote: > > > > > > > > > > > > On Wed, Jul 07, 2021 at 10:35:47AM +0800, Desmond Cheong Zhi Xi wrote: > > > > > > > > > > > > > + WARN_ON_ONCE(irqs_disabled()); > > > > > > > > > > > > > > > > > > > > > > > > If this triggers, you just rebooted the box :( > > > > > > > > > > > > > > > > > > > > > > > > Please never do this, either properly handle the problem and return an > > > > > > > > > > > > error, or do not check for this. It is not any type of "fix" at all, > > > > > > > > > > > > and at most, a debugging aid while you work on the root problem. > > > > > > > > > > > > > > > > > > > > > > > > thanks, > > > > > > > > > > > > > > > > > > > > > > > > greg k-h > > > > > > > > > > > > > > > > > > > > > > Wait, what? Why would testing for irqs being disabled and throwing a > > > > > > > > > > > WARN_ON in that case crash the box? > > > > > > > > > > > > > > > > > > > > If panic-on-warn is enabled, which is a common setting for systems these > > > > > > > > > > days. > > > > > > > > > > > > > > > > > > Ok, that makes some sense. > > > > > > > > > > > > > > > > Wait, I don't get it. > > > > > > > > > > > > > > > > How are we supposed to decide when to use WARN, when to use BUG, and > > > > > > > > when to panic? Do we really want to treat them all as equivalent? And > > > > > > > > who exactly is turning on panic-on-warn? > > > > > > > > > > > > > > You never use WARN or BUG, unless the system is so messed up that you > > > > > > > can not possibly recover from the issue. > > > > > > > > > > > > I've heard similar advice for BUG before, but this is the first I've > > > > > > heard it for WARN. Do we have any guidelines for how to choose between > > > > > > WARN and BUG? > > > > > > > > > > Never use either :) > > > > > > > > I can't tell if you're kidding. > > > > > > I am not. > > > > > > > Is there some plan to remove them? > > > > > > Over time, yes. And any WARN that userspace can ever hit should be > > > removed today. > > > > > > > There are definitely cases where I've been able to resolve a problem > > > > more quickly because I got a backtrace from a WARN. > > > > > > If you want a backtrace, ask for that, recover from the error, and move > > > on. Do not allow userspace to reboot a machine for no good reason as > > > again, panic-on-warn is a common setting that people use now. > > > > > > This is what all of the syzbot work has been doing, it triggers things > > > that cause WARN() to be hit and so we have to fix them. > > > > > > > This seems really draconian. Clearly we do want to fix things that show > > a WARN (otherwise we wouldn't bother warning about it), but I don't > > think that's a reason to completely avoid them. My understanding has > > always been: > > > > BUG: for when you reach some condition where the kernel (probably) can't > > carry on > > > > WARN: for when you reach some condition that is problematic but where > > the machine can probably soldier on. > > > > Over the last several years, I've changed a lot of BUGs into WARNs to > > avoid crashing the box unnecessarily. If someone is setting > > panic_on_warn, then aren't they just getting what they asked for? > > > > While I don't feel that strongly about this particular WARN in this > > patch, it seems like a reasonable thing to do. If someone calls these > > functions with IRQs disabled, then they might end up with some subtle > > problems that could be hard to detect otherwise. > > Don't we already have a debugging option that would catch this? > > config DEBUG_IRQFLAGS > bool "Debug IRQ flag manipulation" > help > Enables checks for potentially unsafe enabling or disabling of > interrupts, such as calling raw_local_irq_restore() when interrupts > are enabled. > > so I think this particular warn is unnecessary. > > But I also disagree with Greg. Normal users aren't setting panic-on-warn. > Various build bots are setting panic-on-warn -- and they should -- because > we shouldn't be able to trigger these kinds of warnings from userspace. > Those are bugs that should be fixed. But there's no reason to shy away > from using a WARN when it's the right thing to do. Yes, WARN is the right choice for signaling a kernel bug that is "recoverable", e.g. by returning an error or simply ignoring it. WARN is the wrong choice only when the condition is user-triggerable, e.g. via invalid inputs passed to system calls. I don't understand why Greg is advocating against all use of WARN; that would make it harder for kernel bugs to be found and reported. Users of panic_on_warn (which are usually test systems) *want* the kernel to panic if an assertion fails -- that's the whole point of it. I'm not sure why we are still having this discussion, as the differences between and valid uses for WARN and BUG were documented in include/asm-generic/bug.h a long time ago... - Eric