Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp5034308ybb; Tue, 24 Mar 2020 09:44:16 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtESMl+ZPfjxQj62F0fgFgvZ0m65CgjYpsb6Wob2TejFqwF0ckHS2kMTZeOWcwT5jK7TogS X-Received: by 2002:a05:6808:b0f:: with SMTP id s15mr3583608oij.105.1585068256666; Tue, 24 Mar 2020 09:44:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585068256; cv=none; d=google.com; s=arc-20160816; b=QeRnTYvYPuL9bZP4h3cNXp7ckEikIMMaiyun0hitPhzUIEafvH4IFIQNwpcJzJ/1rc aX82Waj1av0WEKJrnYI5Tg9/aiQaLtyV392EIRgT+LKeaCoQelM9wqGIDPE5aLSp+GfE TvICyRmLt2ELWliGTA0FjqYltSpY7mB/SxI4KVitKCHg+PlhWF0RAjeRy4WF7XeWmwkT gNdg4cr8GHP9PnXaPj9kWAXmU6A7EXPe+sw6UiyKmXy6Zvcku3b7G9FGBgSc7L+ZD07s v9UXZk9djNRznCa2FBNo9ctOzk83HIX2/VsTnY5V+ns4l0a8ngQPHNGwevtgF+aOcUeX Xv6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Loj0w61EPaOSHQ6aNoAWWP8Jza+TCwZiXNtrgTaafr4=; b=R437aV/gcbc7ztoUd6Z8cewxr+FgJi/zFDZrG+xR45kZmdz+03eUWQ2N3/4DZEvrpd ns/PP80/8rF4+Gr6tPkm0DXTtW/x+gq8/ThNLRxch9pA5WrZbIM2uUz2QhwLMHNqUcAb uT+1O5VRSLgqdHQZpXxcMMF/8U7sZyGngPT/U1qgGHdddf7mTMQIpVbcBRUuqERW1m/p tblzEjqij3X/gZEj8gkzF8YrQS3SrCI8iI2t5xNQczUImv284wTTULBBZwo4/wwoEXop vd26y/wx2svh/er2SqLlU55QI6hIkJQvBMvBb/fREtl9LPy6aBD7KAQzUIG6TyF6CJyk bsxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cvPkMF4E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h7si9809741oia.277.2020.03.24.09.44.03; Tue, 24 Mar 2020 09:44:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cvPkMF4E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727580AbgCXQmy (ORCPT + 99 others); Tue, 24 Mar 2020 12:42:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:35754 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726988AbgCXQmy (ORCPT ); Tue, 24 Mar 2020 12:42:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AFFA32076E; Tue, 24 Mar 2020 16:42:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585068174; bh=F5trW5ADWsv/2B2og+hJh/rRyTBedzD44xQ2ildnw6E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cvPkMF4EW43aTAYf7ebcRR12fM2r0IdNbhbwRi+5xTqVEr2O88zXQXwi4mMPZBA6M 3sShx80ruCzBZnbrk9+AEFyBrMPeIS/qqytmK7su8MBAlHMz0SncJDlCDO6k4I3mq4 74PWoLwRq6eF8NBzPO1QAyV6VgLeoyehNKz66MBg= Date: Tue, 24 Mar 2020 17:42:52 +0100 From: Greg KH To: Will Deacon Cc: linux-kernel@vger.kernel.org, Eric Dumazet , Jann Horn , Kees Cook , Maddie Stone , Marco Elver , "Paul E . McKenney" , Peter Zijlstra , Thomas Gleixner , kernel-team@android.com, kernel-hardening@lists.openwall.com Subject: Re: [RFC PATCH 14/21] plist: Use CHECK_DATA_CORRUPTION instead of explicit {BUG,WARN}_ON() Message-ID: <20200324164252.GD2518746@kroah.com> References: <20200324153643.15527-1-will@kernel.org> <20200324153643.15527-15-will@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200324153643.15527-15-will@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 24, 2020 at 03:36:36PM +0000, Will Deacon wrote: > CHECK_DATA_CORRUPTION() allows detected data corruption to result > consistently in either a BUG() or a WARN() depending on > CONFIG_BUG_ON_DATA_CORRUPTION. > > Use CHECK_DATA_CORRUPTION() to report plist integrity checking failures, > rather than explicit use of BUG_ON() and WARN_ON(). > > Cc: Kees Cook > Cc: Paul E. McKenney > Cc: Peter Zijlstra > Signed-off-by: Will Deacon Reviewed-by: Greg Kroah-Hartman