Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp877686rwe; Wed, 24 Aug 2022 10:26:52 -0700 (PDT) X-Google-Smtp-Source: AA6agR7ysJU0XLQ1ZZ9euiySKKC6KwKhHMehWgcZIp+VoBvoTCA5DjeYlE6V99xsC4sxv45aC3Zj X-Received: by 2002:a05:6a00:989:b0:535:dc8a:fabe with SMTP id u9-20020a056a00098900b00535dc8afabemr228895pfg.35.1661362012548; Wed, 24 Aug 2022 10:26:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661362012; cv=none; d=google.com; s=arc-20160816; b=n+x8F/zHJgF7TJvDiCUN8uNUpk6OMh0glF8FoI+zta+EXfQyfgvsYOzOxSNzWuei+t R0TlPOAeO/JmjanOkKhkM8rgtcs2ttIRUFdGvtWpIliYk1rnevtGQ9FvM+8XbwTP2hFc Viof+Nlyk5MpNunYCcE21WRtPWgNKWVUAV8gNJ3024CEWmlWAYv/B+I1VGZNPUYk9S0O acpJeHFeYOHnAW+RT4yTWfB+uhHnt5HTRMs8oTSHNH9V9oqmBZjHlqCM3jfNn6htFQMx eZC9x6feHDFqfS6yurN0ypjPzNJdY82upSjzQPqT2plv7SF8DGFjLBzoGe8ghOOWTR08 GFiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id; bh=fw0fkO8UHmkowllrS9wZgEDl2+/tp9j3QJj8hF4USU0=; b=TjSRsAKhmp+TZsDBzM/duwdiQcuABl5qvlinI0la+ZYG3LVDe0Sx7nsuFhGgONbxv0 Knw//Ojl5CnM9682YhGk0Td1D/Re8jgF+5lEiXc1lYsDUBBJ1H3Piz9jxZYpBsn9kmpr qT+ooQ9kPd92M2ZsUgeOb7AD3tpSfGBnTjlh336Egz3vR7rsPi1OUovBBAckJpFX7wxh bXsRUvkmEJZFz8aOtT5e+BufaabFZiTydwVq73aJ2imHhjjbOicy2bVv6xG1akPigTnk wvvlMNomCj9qC/h7s8+ur8YBPI8x+FSIoFze2EVoNWfEHTap3FR5Spy7QG/oc4Fbszue Spig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m2-20020a170902e40200b0016f007ecddbsi12079878ple.66.2022.08.24.10.26.41; Wed, 24 Aug 2022 10:26:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238223AbiHXQwR convert rfc822-to-8bit (ORCPT + 99 others); Wed, 24 Aug 2022 12:52:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58292 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238359AbiHXQwN (ORCPT ); Wed, 24 Aug 2022 12:52:13 -0400 Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AA1F193F1 for ; Wed, 24 Aug 2022 09:52:12 -0700 (PDT) Received: from omf07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id C3D66C024E; Wed, 24 Aug 2022 16:52:09 +0000 (UTC) Received: from [HIDDEN] (Authenticated sender: joe@perches.com) by omf07.hostedemail.com (Postfix) with ESMTPA id 696E12002C; Wed, 24 Aug 2022 16:52:06 +0000 (UTC) Message-ID: <3c250aa26020b2f336fd575a58d06ba26faf1f14.camel@perches.com> Subject: Re: [PATCH RFC 2/2] checkpatch: warn on usage of VM_BUG_ON() and friends From: Joe Perches To: David Hildenbrand , linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, linux-doc@vger.kernel.org, kexec@lists.infradead.org, Linus Torvalds , Andrew Morton , Ingo Molnar , David Laight , Jonathan Corbet , Andy Whitcroft , Dwaipayan Ray , Lukas Bulwahn , Baoquan He , Vivek Goyal , Dave Young Date: Wed, 24 Aug 2022 12:52:05 -0400 In-Reply-To: <20220824163100.224449-3-david@redhat.com> References: <20220824163100.224449-1-david@redhat.com> <20220824163100.224449-3-david@redhat.com> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 8BIT User-Agent: Evolution 3.44.4 (3.44.4-1.fc36) MIME-Version: 1.0 X-Stat-Signature: jucjcx4acoerrt8q895fp6htgrjxts67 X-Rspamd-Server: rspamout04 X-Rspamd-Queue-Id: 696E12002C X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,FORGED_SPF_HELO, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS, SPF_NONE,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Session-Marker: 6A6F6540706572636865732E636F6D X-Session-ID: U2FsdGVkX1/ObFLiNI+vpAgQqKNzyIkOlEeiH6U5Lr8= X-HE-Tag: 1661359926-188978 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2022-08-24 at 18:31 +0200, David Hildenbrand wrote: > checkpatch does not point out that VM_BUG_ON() and friends should be > avoided, however, Linus notes: > > VM_BUG_ON() has the exact same semantics as BUG_ON. It is literally > no different, the only difference is "we can make the code smaller > because these are less important". [1] > > So let's warn on VM_BUG_ON() and friends as well. While at it, make it > clearer that the kernel really shouldn't be crashed. > > Note that there are some other *_BUG_ON flavors, but they are not all > bad: for example, KVM_BUG_ON() only triggers a WARN_ON_ONCE and then > flags KVM as being buggy, so we'll not care about them for now here. [] > diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl [] > @@ -4695,12 +4695,12 @@ sub process { > } > } > > -# avoid BUG() or BUG_ON() > - if ($line =~ /\b(?:BUG|BUG_ON)\b/) { > +# do not use BUG(), BUG_ON(), VM_BUG_ON() and friends. > + if ($line =~ /\b(?:BUG|BUG_ON|VM_BUG_ON|VM_BUG_ON_[A-Z]+)\b/) { Perhaps better as something like the below to pick up more variants if ($line =~ /\b(?!KVM_|BUILD_)(?:[A-Z_]*_)?BUG(?:_ON)?(?:_[A-Z_]+)?\s*\(/ > my $msg_level = \&WARN; > $msg_level = \&CHK if ($file); > &{$msg_level}("AVOID_BUG", > - "Avoid crashing the kernel - try using WARN_ON & recovery code rather than BUG() or BUG_ON()\n" . $herecurr); and maybe: "Do not crash the kernel unless it is unavoidable - use WARN_ON_ONCE & recovery code (if reasonable) rather than BUG() or variants\n" . $herecurr);