From patchwork Sun Jan 22 00:15:17 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: "Michael.Karcher" X-Patchwork-Id: 13111376 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D712EC27C76 for ; Sun, 22 Jan 2023 00:15:23 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229672AbjAVAPX (ORCPT ); Sat, 21 Jan 2023 19:15:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37026 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229463AbjAVAPW (ORCPT ); Sat, 21 Jan 2023 19:15:22 -0500 Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5960A17CE8; Sat, 21 Jan 2023 16:15:21 -0800 (PST) Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (envelope-from ) id 1pJO10-002AZK-CU; Sun, 22 Jan 2023 01:15:18 +0100 Received: from pd9f631ca.dip0.t-ipconnect.de ([217.246.49.202] helo=[192.168.144.87]) by inpost2.zedat.fu-berlin.de (Exim 4.95) with esmtpsa (TLS1.3) tls TLS_AES_128_GCM_SHA256 (envelope-from ) id 1pJO0z-002Kk0-Vw; Sun, 22 Jan 2023 01:15:18 +0100 Message-ID: <52952170-f1a9-89a0-e307-f974ce2b7977@fu-berlin.de> Date: Sun, 22 Jan 2023 01:15:17 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 To: linux-kernel@vger.kernel.org, linux-sh@vger.kernel.org, Segher Boessenkool , Rich Felker , Yoshinori Sato , John Paul Adrian Glaubitz From: "Michael.Karcher" Cc: jakub@gcc.gnu.org Subject: [PATCH: 1/1] sh4: avoid spurious gcc warning X-Original-Sender: Michael.Karcher@fu-berlin.de X-Originating-IP: 217.246.49.202 Precedence: bulk List-ID: X-Mailing-List: linux-sh@vger.kernel.org Prevent sizeof-pointer-div warning in SH4 intc macros Gcc warns about the pattern sizeof(void*)/sizeof(void), as it looks like the abuse of a pattern to calculate the array size. This pattern appears in the unevaluated part of the ternary operator in _INTC_ARRAY if the parameter is NULL. The replacement uses an alternate approach to return 0 in case of NULL which does not generate the pattern sizeof(void*)/sizeof(void), but still emits the warning if _INTC_ARRAY is called with a nonarray parameter. This patch is required for successful compilation with -Werror enabled. The idea to use _Generic for type distinction is taken from Comment #7 in https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108483 by Jakub Jelinek Signed-off-by: Michael Karcher Tested-by: Randy Dunlap # build-tested ---               prio_regs,    sense_regs, ack_regs)    \ diff --git a/include/linux/sh_intc.h b/include/linux/sh_intc.h index c255273b0281..d7a7ffb60a34 100644 --- a/include/linux/sh_intc.h +++ b/include/linux/sh_intc.h @@ -97,7 +97,7 @@ struct intc_hw_desc {      unsigned int nr_subgroups;  }; -#define _INTC_ARRAY(a) a, __same_type(a, NULL) ? 0 : sizeof(a)/sizeof(*a) +#define _INTC_ARRAY(a) a, sizeof(a)/(_Generic((a), typeof(NULL): 0xFFFFFFFFU, default: sizeof(*a)))  #define INTC_HW_DESC(vectors, groups, mask_regs,    \