Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp814057imm; Fri, 1 Jun 2018 09:59:56 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLOXIAv+2ga4JKUbCahkVqER+QIJGUKA/A7upIi6PTUW7B/v21umVkTGj0xjzhkGoWM/Ab2 X-Received: by 2002:a65:4309:: with SMTP id j9-v6mr9359903pgq.375.1527872396049; Fri, 01 Jun 2018 09:59:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527872396; cv=none; d=google.com; s=arc-20160816; b=XKObjxNxyMDrhwpExvuGe4GZ0COBGlmpC5KfRbEMGVEfpOdH5IVlsRPpfuNp8G86B8 rc91nIXnckrmS263fk35lXdWWxKytgDN33S3BChGYiHmMSNFnGvMMTR5Fz3Eer2JjHz5 9sXq1Jg/5dJQczYeDPAPJvHrSzgMmpWFbw9EdDWxZvaN1PeuoAf3dS+OJnDUvb/o2z0k ojbxHwnee5pYkp8WGyIDnWLES4+HbLpqybMWhjXRAJb7646Sy5gO0zHSRUNvb/ZwHIQ5 ROyH/PxX2bfx/NHcU0sLvMnOUD+KF5Xd8NjHNzQaezw+7xJ3Iywl9yEJpCoa7AHRWV2v IPig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=BhA8WEo9h6aOQwQSZl2JgC7++dmtjjCmuEHoL3N5woo=; b=zWdjp1Fbw0kLaVx0mLVJr86B9ptttO2UCtBEqtOD4lQA0r9nJsJouROsva8EZeR9n4 ieCDLEqUI21/DeKPXs0aEJQHZUBX9/sQXeTDgmC6N1O3SavOjfr6jtRh94ch9Ju9zEjj PwkNU0rFCDd+EIRW8xKen/BfITn4ZiY/VMFE1ggy+C0tVoVgfdMnQxufaFAYxtt8VF8W Y2WmJ3O8Gq05Mx4Ysl1qR0igeGorrN5RoMo2fHc7UH2lqhw4JgAPbt/ZZ4W8chNPsn0U IPsvotmJoPbmHvgk1NO3kapX9+hLNmLwCxp2G7oApmRRd1HkPkMN1pZ3aJdwWIN6XKG7 p1KQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m28-v6si5418650pgn.197.2018.06.01.09.59.41; Fri, 01 Jun 2018 09:59:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753307AbeFAQ7V (ORCPT + 99 others); Fri, 1 Jun 2018 12:59:21 -0400 Received: from orcrist.hmeau.com ([104.223.48.154]:58112 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752888AbeFAQ7S (ORCPT ); Fri, 1 Jun 2018 12:59:18 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1fOnOM-0005yq-EB; Sat, 02 Jun 2018 00:59:06 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1fOnOJ-0001Qc-P1; Sat, 02 Jun 2018 00:59:03 +0800 Date: Sat, 2 Jun 2018 00:59:03 +0800 From: Herbert Xu To: Davidlohr Bueso Cc: akpm@linux-foundation.org, torvalds@linux-foundation.org, tgraf@suug.ch, manfred@colorfullife.com, mhocko@kernel.org, guillaume.knispel@supersonicimagine.com, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, Davidlohr Bueso Subject: Re: [PATCH 1/5] lib/rhashtable: convert param sanitations to WARN_ON Message-ID: <20180601165903.bd3jonbv2jrfcevi@gondor.apana.org.au> References: <20180601160125.30031-1-dave@stgolabs.net> <20180601160125.30031-2-dave@stgolabs.net> <20180601160944.ji2gsp3pyunlj476@gondor.apana.org.au> <20180601165347.kvruerdm3gu57ifv@linux-r8p5> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180601165347.kvruerdm3gu57ifv@linux-r8p5> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 01, 2018 at 09:53:47AM -0700, Davidlohr Bueso wrote: > > Curious, are these users setting up the param structure dynamically > or something that they can pass along bogus values? > > If that's the case then yes, I definitely agree. It's just a quality of implementation issue. This is a generic API. Sure for early-boot users like yours it makes sense to just WARN_ON rather than deal with the messy hash table allocation failure. But for a driver author writing some kernel module it isn't nice to WARN_ON and then crash on a NULL-pointer dereference when we can cleanly fail the table init. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt