Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752057AbeADIwL (ORCPT + 1 other); Thu, 4 Jan 2018 03:52:11 -0500 Received: from verein.lst.de ([213.95.11.211]:48139 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751401AbeADIwI (ORCPT ); Thu, 4 Jan 2018 03:52:08 -0500 Date: Thu, 4 Jan 2018 09:52:05 +0100 From: Christoph Hellwig To: Geert Uytterhoeven Cc: Christoph Hellwig , iommu@lists.linux-foundation.org, Linux MIPS Mailing List , linux-ia64@vger.kernel.org, Linux-sh list , sparclinux , Guan Xuetao , Linux-Arch , linux-s390 , linux-c6x-dev@linux-c6x.org, "open list:QUALCOMM HEXAGON..." , the arch/x86 maintainers , arcml , adi-buildroot-devel@lists.sourceforge.net, linux-m68k , patches@groups.riscv.org, "open list:METAG ARCHITECTURE" , linux-arm-kernel@lists.infradead.org, Michal Simek , Parisc List , Cris , Linux Kernel Mailing List , alpha , linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH 27/67] dma-direct: add dma address sanity checks Message-ID: <20180104085205.GC3251@lst.de> References: <20171229081911.2802-1-hch@lst.de> <20171229081911.2802-28-hch@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Fri, Dec 29, 2017 at 03:12:25PM +0100, Geert Uytterhoeven wrote: > > +check_addr(struct device *dev, dma_addr_t dma_addr, size_t size, > > + const char *caller) > > +{ > > + if (unlikely(dev && !dma_capable(dev, dma_addr, size))) { > > + if (*dev->dma_mask >= DMA_BIT_MASK(32)) { > > + dev_err(dev, > > + "%s: overflow %llx+%zu of device mask %llx\n", > > Please use "%pad" to format dma_addr_t ... > > > + caller, (long long)dma_addr, size, > > ... and use &dma_addr. > > > + (long long)*dev->dma_mask); > > This cast is not needed, as u64 is unsigned long long in kernelspace on > all architectures. Thanks, fixed.