From patchwork Fri Aug 26 15:42:00 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 101918 Delivered-To: patch@linaro.org Received: by 10.140.29.52 with SMTP id a49csp421610qga; Fri, 26 Aug 2016 08:46:08 -0700 (PDT) X-Received: by 10.66.253.101 with SMTP id zz5mr7182595pac.32.1472226368735; Fri, 26 Aug 2016 08:46:08 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f5si21782322pfk.77.2016.08.26.08.46.08; Fri, 26 Aug 2016 08:46:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754905AbcHZPpw (ORCPT + 27 others); Fri, 26 Aug 2016 11:45:52 -0400 Received: from mout.kundenserver.de ([212.227.126.135]:55073 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754714AbcHZPm6 (ORCPT ); Fri, 26 Aug 2016 11:42:58 -0400 Received: from wuerfel.lan. ([176.0.135.42]) by mrelayeu.kundenserver.de (mreue005) with ESMTPA (Nemesis) id 0LpRtB-1bA2rc0maT-00fBQI; Fri, 26 Aug 2016 17:42:41 +0200 From: Arnd Bergmann To: "Paul E . McKenney" Cc: Kees Cook , Steven Rostedt , Rik van Riel , Arnd Bergmann , linux-kernel@vger.kernel.org Subject: [PATCH] bug: avoid Kconfig warning for BUG_ON_DATA_CORRUPTION Date: Fri, 26 Aug 2016 17:42:00 +0200 Message-Id: <20160826154232.933432-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:k4fyC3dHzUuhagtNDPfuPyuMvPRo642vQHgfOSjdTuMNkshYqlH D/BjkDKXQKQOsk/Wyiashv/eMrNoMBHHY1f9nUfPTueNNs+6ZoYX7U4JdMVTkbkuhARd3Ro b+t9Bt+wD+G+VWTr9p1/vExW1m8x9uX/ZDxp2zCgzPt1QXgEARB5b/BDjfT6JsksQ1Rk5Dq wrReA3AOfv8c/gfWyn4jA== X-UI-Out-Filterresults: notjunk:1; V01:K0:Lhq7mZF7H54=:uQtHMoCcHqryD7BU2t8ZjD 9UNRz8OTw5cE7aV8QroJyc8gr6K1NNCYIbFI/CWVMMSrxfr9x03QnIiK39aFXESBpEhiI6yjr eE6DyO/fDAILlzXUZlfZ09i703Z/2nFnMTd9wvhlmytKhOlzZhrgz9ZhrZJC3eslroW1kUtVE jkm3cMckIgc5VV+CTZO5Azo2bWLEKSYzvDoCBsGP5+lQYBj8e1PzVGGLTv2UizDizkBBm86eE bLUA7RbjTLypDdi+72EUM0Ui/6VCTXmf1bFFI7265liyjBmQQsaz2G5TElHFQv/QIDSMvyqY1 hKj2OehV1D9OpLs/cqGWEXaTlXZ3Ho+xWVsZtakYcl18hOEjeZoTAmX1ZYUsnK0a/J2lGvCuG OD5NI+eFyo4Kh96UdSUJ4oGmiy3YBuFfIaz4RUueGmWlUpiBMaO0pQTr/NgfAP6PtSgH+1qz9 Ew7cwXIbCpysbr1D0FP9HDdUonUojFhX5qAcZ7Pqhd3HhRhm5jqFMQF+BBCOTaN7D9LPLFcJ6 VlWz3l6FGlYyu1IGsw6LN21bNXZEA2vPYBnALJSsJeUsR8GvLICmovPTEEvq6Q4YImLGNQcJc ELflPaQgg8RrlaHdhPXSw7FCszeYDq3EZUXFmbMJXtOikKaYokEhd/Qzvmq+zzsYOtBq0pjL0 l8pWzkJ8L+DGAEe89mrTg86UPoS8Qa7hCMZGgW/X0pRXPJdjw76t5pzBwFK2R7U6BSfA= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The CONFIG_DEBUG_LIST option is normally meant for kernel developers rather than production machines and is guarded by CONFIG_DEBUG_KERNEL. In contrast, the newly added CONFIG_BUG_ON_DATA_CORRUPTION is meant for security hardening and may be used on systems that intentionally do not enable CONFIG_DEBUG_KERNEL. In this configuration, we get a warning from Kconfig about the mismatched dependencies: warning: (BUG_ON_DATA_CORRUPTION) selects DEBUG_LIST which has unmet direct dependencies (DEBUG_KERNEL) This annotates the DEBUG_LIST option to be selectable by BUG_ON_DATA_CORRUPTION when DEBUG_KERNEL is disabled. Signed-off-by: Arnd Bergmann Fixes: 40cd725cfc7f ("bug: Provide toggle for BUG on data corruption") --- lib/Kconfig.debug | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- 2.9.0 diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 6f5ca0530e47..dd40d4ad9063 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -1229,7 +1229,7 @@ config DEBUG_BUGVERBOSE config DEBUG_LIST bool "Debug linked list manipulation" - depends on DEBUG_KERNEL + depends on DEBUG_KERNEL || BUG_ON_DATA_CORRUPTION help Enable this to turn on extended checks in the linked-list walking routines.