Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1763018AbXHALoV (ORCPT ); Wed, 1 Aug 2007 07:44:21 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1759002AbXHALoP (ORCPT ); Wed, 1 Aug 2007 07:44:15 -0400 Received: from sovereign.computergmbh.de ([85.214.69.204]:42503 "EHLO sovereign.computergmbh.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758495AbXHALoO (ORCPT ); Wed, 1 Aug 2007 07:44:14 -0400 Date: Wed, 1 Aug 2007 13:44:13 +0200 (CEST) From: Jan Engelhardt To: Miklos Szeredi cc: andi@firstfloor.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, akpm@linux-foundation.org, torvalds@linux-foundation.org Subject: Re: [RFC PATCH] type safe allocator In-Reply-To: Message-ID: References: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 693 Lines: 24 On Aug 1 2007 12:45, Miklos Szeredi wrote: >> > >> > #define k_new(type, flags) ((type *) kmalloc(sizeof(type), flags)) >> >> The cast doesn't make it more safe in any way > >I does, since a warning will be issued, if the type of the assigned >pointer doesn't match the requested allocation. > >And yes, warnings are _very_ useful in C for enforcing type safety. void *p; p = (struct foo *)kmalloc(sizeof(struct foo), GFP_KERNEL); Jan -- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/