From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932472AbdJZOc3 (ORCPT ); Thu, 26 Oct 2017 10:32:29 -0400 Received: from mail-qk0-f176.google.com ([209.85.220.176]:49656 "EHLO mail-qk0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932234AbdJZOc0 (ORCPT ); Thu, 26 Oct 2017 10:32:26 -0400 X-Google-Smtp-Source: ABhQp+Tx0DBMUACBmxI56onA+9fUzdCs/VBSBCoFkg//0BQhvCzj7olDC/Z0FU+G03U5EZE8QcGCyw== Date: Thu, 26 Oct 2017 07:32:22 -0700 From: Tejun Heo To: Matthias Kaehlcke Cc: Nick Desaulniers , Li Zefan , Johannes Weiner , cgroups@vger.kernel.org, Linux Kernel Mailing List , Michael Davidson , Greg Hackmann , android-llvm@google.com Subject: Re: [PATCH] cgroup: reorder flexible array members of struct cgroup_root Message-ID: <20171026143222.GC59538@devbig577.frc2.facebook.com> References: <20171017063322.11455-1-nick.desaulniers@gmail.com> <20171018133010.GD1302522@devbig577.frc2.facebook.com> <20171021153253.GG1302522@devbig577.frc2.facebook.com> <20171025215423.GD96615@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171025215423.GD96615@google.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Wed, Oct 25, 2017 at 02:54:23PM -0700, Matthias Kaehlcke wrote: > From your earlier comment I understand that there is no problem in > this case because we know that cgroup_root->cgrp will always be > empty. > > However in other instances the warning could point out actual errors > in the code, so I think it is good to have this warning generally > enabled. If cgroup_root was defined in a .c file we could consider to > disable the warning locally, but since the definition is in a header > that is widely included (indirectly through linux/cgroup.h and > net/sock.h) this doesn't seem to be an option. > > Is there a good reason for the current position of cgrp within > cgroup_root? If there are no drawbacks in moving it to the end of > the struct I think Nick's patch is a reasonable solution. This all sounds really bogus to me. Let's say we have something like the following. struct flex_struct { int array[]; }; And the following two usages. 1. struct flex_struct *fs = kmalloc(sizeof(struct flex_struct) + N * sizeof(int)); 2. struct enclosing_struct es { struct flex_struct fs; int fs_array_storage[N]; }; struct enclosing_struct *es = kmalloc(sizeof(struct enclosing_struct)); So, you're saying #1 is okay but #2 is not, which is just silly. The compiler can't warn correctly about flex array members whether they're embedded or not. Nothing prevents somebody accessing beyond N in #1 either. This effort seems really pointless to me. Let's please not waste any more bandwidth on this. Thanks. -- tejun