From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932374AbeDFOTU (ORCPT ); Fri, 6 Apr 2018 10:19:20 -0400 Received: from smtprelay0086.hostedemail.com ([216.40.44.86]:57899 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932225AbeDFOTT (ORCPT ); Fri, 6 Apr 2018 10:19:19 -0400 X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,:::::::::::::::::::::,RULES_HIT:41:355:379:541:599:973:988:989:1260:1277:1311:1313:1314:1345:1359:1373:1437:1515:1516:1518:1534:1540:1593:1594:1711:1730:1747:1777:1792:2194:2199:2393:2553:2559:2562:2693:2828:2901:3138:3139:3140:3141:3142:3352:3622:3865:3867:3868:3870:3871:3872:3874:4321:5007:8603:10004:10400:10848:11232:11658:11914:12296:12663:12740:12760:12895:13069:13146:13230:13311:13357:13439:14096:14097:14659:14721:21080:21627:30012:30036:30054:30070:30090:30091,0,RBL:47.151.150.235:@perches.com:.lbl8.mailshell.net-62.14.0.100 64.201.201.201,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:fn,MSBL:0,DNSBL:neutral,Custom_rules:0:0:0,LFtime:20,LUA_SUMMARY:none X-HE-Tag: sea86_33dd93a3cc15f X-Filterd-Recvd-Size: 2112 Message-ID: <1523024355.6127.3.camel@perches.com> Subject: Re: [PATCH v4 6/9] vsprintf: Factor out %pV handler as va_format() From: Joe Perches To: Petr Mladek Cc: Linus Torvalds , Andy Shevchenko , Rasmus Villemoes , "Tobin C . Harding" , Andrew Morton , Michal Hocko , Sergey Senozhatsky , Steven Rostedt , Sergey Senozhatsky , linux-kernel@vger.kernel.org Date: Fri, 06 Apr 2018 07:19:15 -0700 In-Reply-To: <20180406131242.mnxutlobi7r6qi6u@pathway.suse.cz> References: <20180404085843.16050-1-pmladek@suse.com> <20180404085843.16050-7-pmladek@suse.com> <1522851967.11185.1.camel@perches.com> <20180406131242.mnxutlobi7r6qi6u@pathway.suse.cz> Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: Evolution 3.26.1-1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2018-04-06 at 15:12 +0200, Petr Mladek wrote: > On Wed 2018-04-04 07:26:07, Joe Perches wrote: > > On Wed, 2018-04-04 at 10:58 +0200, Petr Mladek wrote: > > > Move the code from the long pointer() function. We are going to add a check > > > for the access to the address that will make it even more complicated. > > > > > > This patch does not change the existing behavior. > > > > But it might increase stack consumption. > > > > As the %pV is recursive, this is may not be a good thing. > > It seems to be safe to pass just a pointer to struct printf_spec. > In fact, it would make sense to use this also in string() and > __string() calls. Copying 64 bytes many times look useless. huh? struct printf_spec is 64 bits, the same size as a pointer on 64 bit systems. I'm dubious about this entire patch series.