Use autoconf's FLEXIBLE_ARRAY_MEMBER for unspecified-length arrays

C99 allows a syntax for structures whose last element is of
unspecified length:
   struct s {
     int elt1;
     ...
     char last_element[];
   };

Recent (last-5-years) autoconf versions provide an
AC_C_FLEXIBLE_ARRAY_MEMBER test that defines FLEXIBLE_ARRAY_MEMBER
to either no tokens (if you have c99 flexible array support) or to 1
(if you don't).  At that point you just use offsetof
[STRUCT_OFFSET() for us] to see where last_element begins, and
allocate your structures like:

   struct s {
     int elt1;
     ...
     char last_element[FLEXIBLE_ARRAY_MEMBER];
   };

   tor_malloc(STRUCT_OFFSET(struct s, last_element) +
                                   n_elements*sizeof(char));

The advantages are:

   1) It's easier to see which structures and elements are of
      unspecified length.
   2) The compiler and related checking tools can also see which
      structures and elements are of unspecified length, in case they
      wants to try weird bounds-checking tricks or something.
   3) The compiler can warn us if we do something dumb, like try
      to stack-allocate a flexible-length structure.
This commit is contained in:
Nick Mathewson 2011-01-06 15:59:05 -05:00
parent fd8f7991e4
commit d4165ef8b4
6 changed files with 36 additions and 12 deletions

View File

@ -158,6 +158,28 @@ AM_CONDITIONAL(NAT_PMP, test x$natpmp = xtrue)
AM_CONDITIONAL(MINIUPNPC, test x$upnp = xtrue)
AM_PROG_CC_C_O
ifdef([AC_C_FLEXIBLE_ARRAY_MEMBER], [
AC_C_FLEXIBLE_ARRAY_MEMBER
], [
dnl Maybe we've got an old autoconf...
AC_CACHE_CHECK([for flexible array members],
tor_cv_c_flexarray,
[AC_COMPILE_IFELSE(
AC_LANG_PROGRAM([
struct abc { int a; char b[]; };
], [
struct abc *def = malloc(sizeof(struct abc)+sizeof(char));
def->b[0] = 33;
]),
[tor_cv_c_flexarray=yes],
[tor_cv_c_flexarray=no])])
if test $tor_cv_flexarray = yes ; then
AC_DEFINE([FLEXIBLE_ARRAY_MEMBER], [])
else
AC_DEFINE([FLEXIBLE_ARRAY_MEMBER], [1])
fi
])
AC_PATH_PROG([SHA1SUM], [sha1sum], none)
AC_PATH_PROG([OPENSSL], [openssl], none)

View File

@ -137,7 +137,8 @@ struct mp_chunk_t {
int capacity; /**< Number of items that can be fit into this chunk. */
size_t mem_size; /**< Number of usable bytes in mem. */
char *next_mem; /**< Pointer into part of <b>mem</b> not yet carved up. */
char mem[1]; /**< Storage for this chunk. (Not actual size.) */
/** Storage for this chunk */
char mem[FLEXIBLE_ARRAY_MEMBER];
};
/** Number of extra bytes needed beyond mem_size to allocate a chunk. */

View File

@ -68,8 +68,8 @@ typedef struct chunk_t {
size_t datalen; /**< The number of bytes stored in this chunk */
size_t memlen; /**< The number of usable bytes of storage in <b>mem</b>. */
char *data; /**< A pointer to the first byte of data stored in <b>mem</b>. */
char mem[1]; /**< The actual memory used for storage in this chunk. May be
* more than one byte long. */
char mem[FLEXIBLE_ARRAY_MEMBER]; /**< The actual memory used for storage in
* this chunk. */
} chunk_t;
#define CHUNK_HEADER_LEN STRUCT_OFFSET(chunk_t, mem[0])

View File

@ -191,7 +191,8 @@ var_cell_pack_header(const var_cell_t *cell, char *hdr_out)
var_cell_t *
var_cell_new(uint16_t payload_len)
{
var_cell_t *cell = tor_malloc(sizeof(var_cell_t)+payload_len-1);
size_t size = STRUCT_OFFSET(var_cell_t, payload) + payload_len;
var_cell_t *cell = tor_malloc(size);
cell->payload_len = payload_len;
cell->command = 0;
cell->circ_id = 0;

View File

@ -857,8 +857,8 @@ typedef struct cell_t {
typedef struct var_cell_t {
uint8_t command;
circid_t circ_id;
uint16_t payload_len;
uint8_t payload[1];
uint16_t payload_len; /**< The actual length of <b>payload</b>. */
uint8_t payload[FLEXIBLE_ARRAY_MEMBER];
} var_cell_t;
/** A cell as packed for writing to the network. */
@ -1660,11 +1660,11 @@ typedef struct short_policy_t {
unsigned int is_accept : 1;
/** The actual number of values in 'entries'. */
unsigned int n_entries : 31;
/** An array of (probably more than 1!) short_policy_entry_t values,
* each descriping a range of ports that this policy accepts or rejects
* (depending on the value of is_accept).
/** An array of 0 or more short_policy_entry_t values, each descriping a
* range of ports that this policy accepts or rejects (depending on the
* value of is_accept).
*/
short_policy_entry_t entries[1];
short_policy_entry_t entries[FLEXIBLE_ARRAY_MEMBER];
} short_policy_t;
/** A microdescriptor is the smallest amount of information needed to build a

View File

@ -1382,8 +1382,8 @@ parse_short_policy(const char *summary)
}
{
size_t size = sizeof(short_policy_t) +
sizeof(short_policy_entry_t)*(n_entries-1);
size_t size = STRUCT_OFFSET(short_policy_t, entries) +
sizeof(short_policy_entry_t)*(n_entries);
result = tor_malloc_zero(size);
tor_assert( (char*)&result->entries[n_entries-1] < ((char*)result)+size);