Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp7387754ybi; Wed, 5 Jun 2019 16:57:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqz09aKkAaznSy7PzXavEN4rzgAo0YP3VdAjHS28xhjDvu8jIG5dD5PeYt1l7bdLj7o2aiHI X-Received: by 2002:a63:3141:: with SMTP id x62mr493902pgx.282.1559779063517; Wed, 05 Jun 2019 16:57:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559779063; cv=none; d=google.com; s=arc-20160816; b=SQRWD0y+z+TeX/mOVHfDBRCTWGckQbjLGSedkwE2sp6n5oCUEVpAUhqVnF6szDsmai 4F/KMUcxVHCh92+6QGPhEWA9HKOE2XC6neHMVRDQgpA2lzYhuvve7An1GMwm7f1Dw+ap wg5wUL2jno6RZGFCyS/9fB9wMnp7JiYfO1WG1SrIHLjr+L5xXCAmcQ8x6pJx5VcfPxrY 9dutMsYHcGC5L3LltTdKTpu+uHVbFhxTRp+5Z9EB6r8dcrpwUSgR1+QS1T2/p4nG+B0w LyblQeJkIYZcBgY5K0EcgEySL6qxzhoyJdh7QH4jgtUiDczdHz9cntRmBH1J8Y9iGzZd kraw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=PSsZu41+QjDMuD/+FpGFT7jyYQ5N1K++m8Z97fGqtpc=; b=TJbkvatqsIocobbTw9RIQET7GWTzEmtmDyJZBgPplOMVa24mVhRfGSJ6nfsXzQ0rMP KulE55dH0CrLKzD7/KXeku/TEGQ4DqflhI3gfpEbLoEHw2qX/zeZVE1XUm4rT9zXsf/u EFSmWLs0rncKymLWSdMTnjuYsV8Or3dw9EpyQ2eH4w8GU1Y13IwLst6QHhznlXlF/IWL GU0o4efURcSPWThQEmPxrzCMKHEkDIWEQeHo7JOzqgjPcyrIO0CRl2e03WQ2UTDKDnYy vXQKiLqOaET7VeXcOErFn1bKlp7Hfs1CvU7Gy+zpDF0HHzYlFhPnuIlz9hjFd+Fo0aBC O9sg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cp14si56673plb.183.2019.06.05.16.57.27; Wed, 05 Jun 2019 16:57:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726721AbfFEXzq (ORCPT + 99 others); Wed, 5 Jun 2019 19:55:46 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:42494 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726510AbfFEXzq (ORCPT ); Wed, 5 Jun 2019 19:55:46 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 1D041136E16AB; Wed, 5 Jun 2019 16:55:46 -0700 (PDT) Date: Wed, 05 Jun 2019 16:55:45 -0700 (PDT) Message-Id: <20190605.165545.1484056704164319975.davem@davemloft.net> To: gustavo@embeddedor.com Cc: jakub.kicinski@netronome.com, oss-drivers@netronome.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH][next] nfp: flower: use struct_size() helper From: David Miller In-Reply-To: <20190605203827.GA22786@embeddedor> References: <20190605203827.GA22786@embeddedor> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 05 Jun 2019 16:55:46 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Gustavo A. R. Silva" Date: Wed, 5 Jun 2019 15:38:27 -0500 > One of the more common cases of allocation size calculations is finding > the size of a structure that has a zero-sized array at the end, along > with memory for some number of elements for that array. For example: > > struct nfp_tun_active_tuns { > ... > struct route_ip_info { > __be32 ipv4; > __be32 egress_port; > __be32 extra[2]; > } tun_info[]; > }; > > Make use of the struct_size() helper instead of an open-coded version > in order to avoid any potential type mistakes. > > So, replace the following form: > > sizeof(struct nfp_tun_active_tuns) + sizeof(struct route_ip_info) * count > > with: > > struct_size(payload, tun_info, count) > > This code was detected with the help of Coccinelle. > > Signed-off-by: Gustavo A. R. Silva Applied.