Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp760341imm; Fri, 1 Jun 2018 09:04:17 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLe0XNs1iK23wpTydXJiLs06ANS/M4KJ2NGX4EwdHVuKN8DKgNS1i8Cde3I/Bb5yNUnceyu X-Received: by 2002:a17:902:a60d:: with SMTP id u13-v6mr11863082plq.40.1527869057792; Fri, 01 Jun 2018 09:04:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527869057; cv=none; d=google.com; s=arc-20160816; b=nWjCbYk9CBS5cumeIgHYkfs7xGFPvzUhgU5bQpOpXpg4rfWUBN2UpsNIqPiYaee8dq eByf2B0LDJDlFu9qqs/H8vtt6UwrFSvXjzOB7fHocf1pyeE7wYDHSqZ1aKzVCl4UlOnn LfUMDWudnOtECqpeUnZvkuN5hLc6sSclwCQe+y4XWpds8WXIKQS6kgKwqXSM9cKHQeyw 9KCWabfgqK7b+dpBhPOse0zbgCA0DDme4uIgXboH7E1NOBNhCybQx1ZJDqOBNFkyEf9F lUcytYuO+QlxMK8UOZHOMa9yS+VhUR9W5AZwc4HZV2FhuAJVmHHiAjWhUbEtZQzA809m 3q8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=pMugcRwNMX57Hvd589eU2RCb+7ueTjxu7+MuoEQ9bms=; b=Q2VrrBct8SbqaWP0ApshFMdrCjPLZ2Jvucg/5gy3RCdk2xs6Cx7RgGnFWz+L8/iPrM yYri+5FTz9PXkG6za96TMt2o15XjD9ruL9P/HIldz7Qr0Tq9ruNcp0lJb1w6lC/R1zh6 y943AMKqUKm9FeGFUn/+z59LDyat0sFkxp7HWNeg20bS+teYmUWE7bXHJyG5fahggUWS LDH52QoIozBH/biQp9oKwLhGmeZEejW9N913+BGrAxmaDZtinpO4MraOEBa+r18XEvkW 4WdQbTjfS8GUjpzuuJUz6FE6vvKnORoZfDS1UhVnHFwvVo+id4BwDqyQtutc+EkUosJW 0DAg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a187-v6si32771549pgc.238.2018.06.01.09.04.02; Fri, 01 Jun 2018 09:04:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752857AbeFAQCJ (ORCPT + 99 others); Fri, 1 Jun 2018 12:02:09 -0400 Received: from smtp2.provo.novell.com ([137.65.250.81]:60807 "EHLO smtp2.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752660AbeFAQCE (ORCPT ); Fri, 1 Jun 2018 12:02:04 -0400 Received: from localhost.localdomain (prv-ext-foundry1int.gns.novell.com [137.65.251.240]) by smtp2.provo.novell.com with ESMTP (TLS encrypted); Fri, 01 Jun 2018 10:01:56 -0600 From: Davidlohr Bueso To: akpm@linux-foundation.org, torvalds@linux-foundation.org Cc: tgraf@suug.ch, herbert@gondor.apana.org.au, manfred@colorfullife.com, mhocko@kernel.org, guillaume.knispel@supersonicimagine.com, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, Davidlohr Bueso , Davidlohr Bueso Subject: [PATCH 1/5] lib/rhashtable: convert param sanitations to WARN_ON Date: Fri, 1 Jun 2018 09:01:21 -0700 Message-Id: <20180601160125.30031-2-dave@stgolabs.net> X-Mailer: git-send-email 2.16.3 In-Reply-To: <20180601160125.30031-1-dave@stgolabs.net> References: <20180601160125.30031-1-dave@stgolabs.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For the purpose of making rhashtable_init() unable to fail, we can replace the returning -EINVAL with WARN_ONs whenever the caller passes bogus parameters during initialization. Signed-off-by: Davidlohr Bueso --- lib/rhashtable.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/lib/rhashtable.c b/lib/rhashtable.c index 9427b5766134..05a4b1b8b8ce 100644 --- a/lib/rhashtable.c +++ b/lib/rhashtable.c @@ -1024,12 +1024,11 @@ int rhashtable_init(struct rhashtable *ht, size = HASH_DEFAULT_SIZE; - if ((!params->key_len && !params->obj_hashfn) || - (params->obj_hashfn && !params->obj_cmpfn)) - return -EINVAL; + WARN_ON((!params->key_len && !params->obj_hashfn) || + (params->obj_hashfn && !params->obj_cmpfn)); - if (params->nulls_base && params->nulls_base < (1U << RHT_BASE_SHIFT)) - return -EINVAL; + WARN_ON(params->nulls_base && + params->nulls_base < (1U << RHT_BASE_SHIFT)); memset(ht, 0, sizeof(*ht)); mutex_init(&ht->mutex); -- 2.16.3