Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2951020imm; Thu, 24 May 2018 19:44:58 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqgzW20RaHLTNxMmW5bce+UnrRerp7owNiVxSWw3glgi8MXP7fVsfzunOMx4Uec/FM2Cctx X-Received: by 2002:a17:902:8c81:: with SMTP id t1-v6mr615626plo.310.1527216298593; Thu, 24 May 2018 19:44:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527216298; cv=none; d=google.com; s=arc-20160816; b=rk/SRhdFFmTmCBlNoJUm2+KpKHTBcQqYnicuJYjglZHQkloRlYytkEUP5w0BVsVKIG HnhLkAwMMozRXojsfOvc/dS4krFXFRk7LcZ/wZlWEheK/FdXdBtpn25/CGqnRik84lib mn+Jimx5bz8Ievx4yCVHyzF5Hcxmh4bwd8UH8W6sGhzlbk+XfT3B7zXWNMY8bl4iOj7G SNi+o1iqPIVZMs7L9BlodhBg+6lIJ5T7Ysxcu7skRKYWI4UwV7sr2gdNHXihjMDahBTS N70TDXTygbQ++oUHkF6o8Tjhx2oX+bYlnuIk9hY6wjYFXlsiW6dq5Ts2YBa/FxxNkpHH JfiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=M1FunF/IpVMUkXsmG6hfbXlxd4d96wc/OK6XDBxCIyg=; b=L97lqQ2L7XD26GZwzDixhIPEmwIPIe6E6HeGCEaHTb16ljRtV0mCP8scNHUihYNlYY xKw+ffk7GPdQs2UCK4FO40+zZIUdegu0k2uB2J+I1j5KlWjpARcY5VofabMxO7HlnMug bEXPuVZWtOxMNK3EXU8CUOH5B/zbsOrRBwBM6IlAnHJSKfcByDZplMi/5xFdws9Y6slE Z5dLYEjqaa0k2qLBz3tiIqJc/LL/zR97iVRylm7q5O9VyEnEvyF+CZ3cGTJVB5qXOGcx vj1DiTNZolUyLbbx6vw1ZdU825L+3JmPLGUy4knYsfa66egOWM7MMcbA++zE56NqQnBR Unwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y1-v6si22011440plt.316.2018.05.24.19.44.44; Thu, 24 May 2018 19:44:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161354AbeEXV2b (ORCPT + 99 others); Thu, 24 May 2018 17:28:31 -0400 Received: from smtp2.provo.novell.com ([137.65.250.81]:54450 "EHLO smtp2.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161324AbeEXV2Y (ORCPT ); Thu, 24 May 2018 17:28:24 -0400 Received: from linux-n805.suse.de (prv-ext-foundry1int.gns.novell.com [137.65.251.240]) by smtp2.provo.novell.com with ESMTP (TLS encrypted); Thu, 24 May 2018 15:28:12 -0600 From: Davidlohr Bueso To: akpm@linux-foundation.org, torvalds@linux-foundation.org Cc: tgraf@suug.ch, herbert@gondor.apana.org.au, manfred@colorfullife.com, guillaume.knispel@supersonicimagine.com, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, Davidlohr Bueso , Davidlohr Bueso Subject: [PATCH 1/6] lib/rhashtable: convert param sanitations to WARN_ON Date: Thu, 24 May 2018 14:11:30 -0700 Message-Id: <20180524211135.27760-2-dave@stgolabs.net> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180524211135.27760-1-dave@stgolabs.net> References: <20180524211135.27760-1-dave@stgolabs.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For the purpose of making rhashtable_init() unable to fail, we can replace the returning -EINVAL with WARN_ONs whenever the caller passes bogus parameters during initialization. Signed-off-by: Davidlohr Bueso --- lib/rhashtable.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/lib/rhashtable.c b/lib/rhashtable.c index 9427b5766134..05a4b1b8b8ce 100644 --- a/lib/rhashtable.c +++ b/lib/rhashtable.c @@ -1024,12 +1024,11 @@ int rhashtable_init(struct rhashtable *ht, size = HASH_DEFAULT_SIZE; - if ((!params->key_len && !params->obj_hashfn) || - (params->obj_hashfn && !params->obj_cmpfn)) - return -EINVAL; + WARN_ON((!params->key_len && !params->obj_hashfn) || + (params->obj_hashfn && !params->obj_cmpfn)); - if (params->nulls_base && params->nulls_base < (1U << RHT_BASE_SHIFT)) - return -EINVAL; + WARN_ON(params->nulls_base && + params->nulls_base < (1U << RHT_BASE_SHIFT)); memset(ht, 0, sizeof(*ht)); mutex_init(&ht->mutex); -- 2.13.6