Return-Path: Received: from mailsec110.isp.belgacom.be ([195.238.20.106]:43070 "EHLO mailsec110.isp.belgacom.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750898AbbCaTAm convert rfc822-to-8bit (ORCPT ); Tue, 31 Mar 2015 15:00:42 -0400 Date: Tue, 31 Mar 2015 21:00:41 +0200 (CEST) From: Fabian Frederick Reply-To: Fabian Frederick To: "J. Bruce Fields" Cc: Trond Myklebust , linux-nfs@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "David S. Miller" , Anna Schumaker , Julia Lawall Message-ID: <256862218.214616.1427828441666.open-xchange@webmail.nmp.proximus.be> In-Reply-To: <20150330212520.GF6901@fieldses.org> References: <1427749998-28464-1-git-send-email-fabf@skynet.be> <1427749998-28464-7-git-send-email-fabf@skynet.be> <20150330212520.GF6901@fieldses.org> Subject: Re: [PATCH 7/9 net-next] sunrpc: replace if/BUG by BUG_ON MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-nfs-owner@vger.kernel.org List-ID: > On 30 March 2015 at 23:25 "J. Bruce Fields" wrote: > > > Huh, I thought this wasn't recommended: > >       http://lkml.kernel.org/r/20040828125816.206ef7fa.akpm@osdl.org > >       "I'd prefer that we not move code which has side-effects into >       BUG_ONs" Thanks for the link, I wasn't aware of that problem. Maybe we should add some documentation and fix coccinelle detection then ? Regards, Fabian > > --b. > > On Mon, Mar 30, 2015 at 11:13:15PM +0200, Fabian Frederick wrote: > > Signed-off-by: Fabian Frederick > > --- > >  net/sunrpc/auth_gss/svcauth_gss.c | 9 +++------ > >  net/sunrpc/svc_xprt.c             | 3 +-- > >  2 files changed, 4 insertions(+), 8 deletions(-) > > > > diff --git a/net/sunrpc/auth_gss/svcauth_gss.c > > b/net/sunrpc/auth_gss/svcauth_gss.c > > index 1095be9..09f8a1c6 100644 > > --- a/net/sunrpc/auth_gss/svcauth_gss.c > > +++ b/net/sunrpc/auth_gss/svcauth_gss.c > > @@ -840,11 +840,9 @@ unwrap_integ_data(struct svc_rqst *rqstp, struct > > xdr_buf *buf, u32 seq, struct g > >             return stat; > >     if (integ_len > buf->len) > >             return stat; > > -   if (xdr_buf_subsegment(buf, &integ_buf, 0, integ_len)) > > -           BUG(); > > +   BUG_ON(xdr_buf_subsegment(buf, &integ_buf, 0, integ_len)); > >     /* copy out mic... */ > > -   if (read_u32_from_xdr_buf(buf, integ_len, &mic.len)) > > -           BUG(); > > +   BUG_ON(read_u32_from_xdr_buf(buf, integ_len, &mic.len)); > >     if (mic.len > RPC_MAX_AUTH_SIZE) > >             return stat; > >     mic.data = kmalloc(mic.len, GFP_KERNEL); > > @@ -1595,8 +1593,7 @@ svcauth_gss_wrap_resp_integ(struct svc_rqst *rqstp) > >     BUG_ON(integ_len % 4); > >     *p++ = htonl(integ_len); > >     *p++ = htonl(gc->gc_seq); > > -   if (xdr_buf_subsegment(resbuf, &integ_buf, integ_offset, integ_len)) > > -           BUG(); > > +   BUG_ON(xdr_buf_subsegment(resbuf, &integ_buf, integ_offset, integ_len)); > >     if (resbuf->tail[0].iov_base == NULL) { > >             if (resbuf->head[0].iov_len + RPC_MAX_AUTH_SIZE > PAGE_SIZE) > >                     goto out_err; > > diff --git a/net/sunrpc/svc_xprt.c b/net/sunrpc/svc_xprt.c > > index 163ac45..2f82e8b 100644 > > --- a/net/sunrpc/svc_xprt.c > > +++ b/net/sunrpc/svc_xprt.c > > @@ -960,8 +960,7 @@ static void svc_delete_xprt(struct svc_xprt *xprt) > >     struct svc_deferred_req *dr; > >  > >     /* Only do this once */ > > -   if (test_and_set_bit(XPT_DEAD, &xprt->xpt_flags)) > > -           BUG(); > > +   BUG_ON(test_and_set_bit(XPT_DEAD, &xprt->xpt_flags)); > >  > >     dprintk("svc: svc_delete_xprt(%p)\n", xprt); > >     xprt->xpt_ops->xpo_detach(xprt); > > -- > > 1.9.1