We currently consult CONFIG_BUG_ON_DATA_CORRUPTION=y only in linked list code, but we should really do it everywhere, where we detect data corruption. We have some assertions in the TLSF code, so let's panic if the user has configured that this happens. Signed-off-by: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx> --- include/tlsf.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/include/tlsf.h b/include/tlsf.h index 3fa220371577..2f82d0fa005b 100644 --- a/include/tlsf.h +++ b/include/tlsf.h @@ -43,10 +43,12 @@ extern "C" { #endif #include <printk.h> +#include <linux/bug.h> #define tlsf_assert(expr) do { \ if (unlikely(!(expr))) { \ printf(#expr "%s %d\n", __FILE__, __LINE__); \ + BUG_ON(IS_ENABLED(CONFIG_BUG_ON_DATA_CORRUPTION)); \ dump_stack(); \ } \ } while (0) -- 2.39.5