linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re:[PATCH]  x86/mm/mem_encrypt_identity : fix error useage to sizeof
       [not found] <201901071946365174691@zte.com.cn>
@ 2019-01-15 10:13 ` Thomas Gleixner
  2019-01-15 10:21   ` [PATCH] " Juergen Gross
  0 siblings, 1 reply; 7+ messages in thread
From: Thomas Gleixner @ 2019-01-15 10:13 UTC (permalink / raw)
  To: peng.hao2; +Cc: bp, dave.hansen, peterz, luto, x86, linux-kernel

On Mon, 7 Jan 2019, peng.hao2@zte.com.cn wrote:

> >> Fix error usage to sizeof. It should not use sizeof to pointer.
> >
> >.... because?
> >
> >The commit message needs to explain what the potential issue could be
> >and why it doesn't matter in this case.
> I see the definition of pte_t may be more than sizeof(unsigned long).
> So I think sizeof(pte_t) is safer.

What exactly is the difference between:

	pte_t	*p;

	sizeof(*p)

and

	sizeof(pte_t)

and what is safer about the latter?

Answer: No difference and nothing is safer because it's exactly the same.

In general we use sizeof(*p) simply because when the data type of p changes
you don't have to update the code, it just works and stays correct.

Thanks,

	tglx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/mm/mem_encrypt_identity : fix error useage to sizeof
  2019-01-15 10:13 ` Re:[PATCH] x86/mm/mem_encrypt_identity : fix error useage to sizeof Thomas Gleixner
@ 2019-01-15 10:21   ` Juergen Gross
  2019-01-15 10:25     ` Thomas Gleixner
  0 siblings, 1 reply; 7+ messages in thread
From: Juergen Gross @ 2019-01-15 10:21 UTC (permalink / raw)
  To: Thomas Gleixner, peng.hao2
  Cc: bp, dave.hansen, peterz, luto, x86, linux-kernel

On 15/01/2019 11:13, Thomas Gleixner wrote:
> On Mon, 7 Jan 2019, peng.hao2@zte.com.cn wrote:
> 
>>>> Fix error usage to sizeof. It should not use sizeof to pointer.
>>>
>>> .... because?
>>>
>>> The commit message needs to explain what the potential issue could be
>>> and why it doesn't matter in this case.
>> I see the definition of pte_t may be more than sizeof(unsigned long).
>> So I think sizeof(pte_t) is safer.
> 
> What exactly is the difference between:
> 
> 	pte_t	*p;
> 
> 	sizeof(*p)
> 
> and
> 
> 	sizeof(pte_t)
> 
> and what is safer about the latter?

Please note that the current code is using sizeof(p) instead of sizeof(*p).

And this is really different for X86_32 PAE.


Juergen

> 
> Answer: No difference and nothing is safer because it's exactly the same.
> 
> In general we use sizeof(*p) simply because when the data type of p changes
> you don't have to update the code, it just works and stays correct.
> 
> Thanks,
> 
> 	tglx
> 


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/mm/mem_encrypt_identity : fix error useage to sizeof
  2019-01-15 10:21   ` [PATCH] " Juergen Gross
@ 2019-01-15 10:25     ` Thomas Gleixner
  2019-01-15 10:35       ` Juergen Gross
  2019-01-15 10:35       ` Thomas Gleixner
  0 siblings, 2 replies; 7+ messages in thread
From: Thomas Gleixner @ 2019-01-15 10:25 UTC (permalink / raw)
  To: Juergen Gross; +Cc: peng.hao2, bp, dave.hansen, peterz, luto, x86, linux-kernel

On Tue, 15 Jan 2019, Juergen Gross wrote:
> On 15/01/2019 11:13, Thomas Gleixner wrote:
> > On Mon, 7 Jan 2019, peng.hao2@zte.com.cn wrote:
> > 
> >>>> Fix error usage to sizeof. It should not use sizeof to pointer.
> >>>
> >>> .... because?
> >>>
> >>> The commit message needs to explain what the potential issue could be
> >>> and why it doesn't matter in this case.
> >> I see the definition of pte_t may be more than sizeof(unsigned long).
> >> So I think sizeof(pte_t) is safer.
> > 
> > What exactly is the difference between:
> > 
> > 	pte_t	*p;
> > 
> > 	sizeof(*p)
> > 
> > and
> > 
> > 	sizeof(pte_t)
> > 
> > and what is safer about the latter?
> 
> Please note that the current code is using sizeof(p) instead of sizeof(*p).

Ooops. That's wrong indeed, but we should not change it to sizeof(pte_t)
and change it to sizeof(*p) instead.

Thanks,

	tglx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/mm/mem_encrypt_identity : fix error useage to sizeof
  2019-01-15 10:25     ` Thomas Gleixner
@ 2019-01-15 10:35       ` Juergen Gross
  2019-01-15 10:35       ` Thomas Gleixner
  1 sibling, 0 replies; 7+ messages in thread
From: Juergen Gross @ 2019-01-15 10:35 UTC (permalink / raw)
  To: Thomas Gleixner
  Cc: peng.hao2, bp, dave.hansen, peterz, luto, x86, linux-kernel

On 15/01/2019 11:25, Thomas Gleixner wrote:
> On Tue, 15 Jan 2019, Juergen Gross wrote:
>> On 15/01/2019 11:13, Thomas Gleixner wrote:
>>> On Mon, 7 Jan 2019, peng.hao2@zte.com.cn wrote:
>>>
>>>>>> Fix error usage to sizeof. It should not use sizeof to pointer.
>>>>>
>>>>> .... because?
>>>>>
>>>>> The commit message needs to explain what the potential issue could be
>>>>> and why it doesn't matter in this case.
>>>> I see the definition of pte_t may be more than sizeof(unsigned long).
>>>> So I think sizeof(pte_t) is safer.
>>>
>>> What exactly is the difference between:
>>>
>>> 	pte_t	*p;
>>>
>>> 	sizeof(*p)
>>>
>>> and
>>>
>>> 	sizeof(pte_t)
>>>
>>> and what is safer about the latter?
>>
>> Please note that the current code is using sizeof(p) instead of sizeof(*p).
> 
> Ooops. That's wrong indeed, but we should not change it to sizeof(pte_t)
> and change it to sizeof(*p) instead.

And that's what the patch does.


Juergen


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/mm/mem_encrypt_identity : fix error useage to sizeof
  2019-01-15 10:25     ` Thomas Gleixner
  2019-01-15 10:35       ` Juergen Gross
@ 2019-01-15 10:35       ` Thomas Gleixner
  1 sibling, 0 replies; 7+ messages in thread
From: Thomas Gleixner @ 2019-01-15 10:35 UTC (permalink / raw)
  To: Juergen Gross; +Cc: peng.hao2, bp, dave.hansen, peterz, luto, x86, linux-kernel

On Tue, 15 Jan 2019, Thomas Gleixner wrote:

> On Tue, 15 Jan 2019, Juergen Gross wrote:
> > On 15/01/2019 11:13, Thomas Gleixner wrote:
> > > On Mon, 7 Jan 2019, peng.hao2@zte.com.cn wrote:
> > > 
> > >>>> Fix error usage to sizeof. It should not use sizeof to pointer.
> > >>>
> > >>> .... because?
> > >>>
> > >>> The commit message needs to explain what the potential issue could be
> > >>> and why it doesn't matter in this case.
> > >> I see the definition of pte_t may be more than sizeof(unsigned long).
> > >> So I think sizeof(pte_t) is safer.
> > > 
> > > What exactly is the difference between:
> > > 
> > > 	pte_t	*p;
> > > 
> > > 	sizeof(*p)
> > > 
> > > and
> > > 
> > > 	sizeof(pte_t)
> > > 
> > > and what is safer about the latter?
> > 
> > Please note that the current code is using sizeof(p) instead of sizeof(*p).
> 
> Ooops. That's wrong indeed, but we should not change it to sizeof(pte_t)
> and change it to sizeof(*p) instead.

Which is what the patch actually does. Just the above reply:

> > >> So I think sizeof(pte_t) is safer.

confused the hell out of me. -ENOTENOUGHCOFFEE

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH]  x86/mm/mem_encrypt_identity : fix error useage to sizeof
  2018-12-29  6:34 Peng Hao
@ 2018-12-29  8:00 ` Borislav Petkov
  0 siblings, 0 replies; 7+ messages in thread
From: Borislav Petkov @ 2018-12-29  8:00 UTC (permalink / raw)
  To: Peng Hao; +Cc: dave.hansen, peterz, tglx, luto, x86, linux-kernel

On Sat, Dec 29, 2018 at 02:34:12PM +0800, Peng Hao wrote:
> Fix error usage to sizeof. It should not use sizeof to pointer.

... because?

The commit message needs to explain what the potential issue could be
and why it doesn't matter in this case.

Thx.

-- 
Regards/Gruss,
    Boris.

ECO tip #101: Trim your mails when you reply.
--

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [PATCH]  x86/mm/mem_encrypt_identity : fix error useage to sizeof
@ 2018-12-29  6:34 Peng Hao
  2018-12-29  8:00 ` Borislav Petkov
  0 siblings, 1 reply; 7+ messages in thread
From: Peng Hao @ 2018-12-29  6:34 UTC (permalink / raw)
  To: dave.hansen, peterz, tglx, luto; +Cc: x86, linux-kernel, Peng Hao

Fix error usage to sizeof. It should not use sizeof to pointer.

Signed-off-by: Peng Hao <peng.hao2@zte.com.cn>
---
 arch/x86/mm/mem_encrypt_identity.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/arch/x86/mm/mem_encrypt_identity.c b/arch/x86/mm/mem_encrypt_identity.c
index a19ef1a..4aa9b14 100644
--- a/arch/x86/mm/mem_encrypt_identity.c
+++ b/arch/x86/mm/mem_encrypt_identity.c
@@ -158,8 +158,8 @@ static void __init sme_populate_pgd(struct sme_populate_pgd_data *ppd)
 	pmd = pmd_offset(pud, ppd->vaddr);
 	if (pmd_none(*pmd)) {
 		pte = ppd->pgtable_area;
-		memset(pte, 0, sizeof(pte) * PTRS_PER_PTE);
-		ppd->pgtable_area += sizeof(pte) * PTRS_PER_PTE;
+		memset(pte, 0, sizeof(*pte) * PTRS_PER_PTE);
+		ppd->pgtable_area += sizeof(*pte) * PTRS_PER_PTE;
 		set_pmd(pmd, __pmd(PMD_FLAGS | __pa(pte)));
 	}
 
-- 
1.8.3.1


^ permalink raw reply related	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2019-01-15 10:36 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <201901071946365174691@zte.com.cn>
2019-01-15 10:13 ` Re:[PATCH] x86/mm/mem_encrypt_identity : fix error useage to sizeof Thomas Gleixner
2019-01-15 10:21   ` [PATCH] " Juergen Gross
2019-01-15 10:25     ` Thomas Gleixner
2019-01-15 10:35       ` Juergen Gross
2019-01-15 10:35       ` Thomas Gleixner
2018-12-29  6:34 Peng Hao
2018-12-29  8:00 ` Borislav Petkov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).