Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4679994rwb; Sat, 21 Jan 2023 17:22:15 -0800 (PST) X-Google-Smtp-Source: AMrXdXvd8w7T1t2GPJ2E4UM4VGzAEuvckFxowdVRitFbCoKc99nHWBSItMo6IVri6XVIHVbqgy0w X-Received: by 2002:a17:907:c712:b0:7ba:5085:869 with SMTP id ty18-20020a170907c71200b007ba50850869mr22561189ejc.9.1674350535031; Sat, 21 Jan 2023 17:22:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674350535; cv=none; d=google.com; s=arc-20160816; b=q5bfuVzxeGflKJ6ldFxqkp/30z0myTjveHhkZORz+O/CJMkcYrQb5rHx+k7NJqvCoW NH6vi3l6gwy+haezyjUsyB0ykAPCsacPU75Xp3csvi3u756sUfAp5QxNOikJgXX6sS4/ h55XG69wNFZWBWMU4244cGxq1kaK+JfOuf0TXtXn6vUiW3+QZAafCR5U//irH3EF5o9l ZwQrpAZv3IibbQWAZP3WiKVGjoAMMHCWpmYDghPU4rLtQlACMM+6cSuX2LLIzR8S3Hw2 xEe+RPETMBtxMhxXDErTJGV1do4ZofhwOx37wIZLLEnp0qlJYX6UgBW0EWDUHMxbpPhe WhhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:subject:cc:from:to :user-agent:mime-version:date:message-id; bh=jd1eiYuMHcnHIdWx4Lp2uiLgKXX8dIcjh0/xD7Kbv20=; b=XxHL464YGpzL+RE03HfoOFDfAaHSTyGgHMRknDYni0gXV2HThNhZKS65Yih+ko7Nvj meJ0yngD3HBnfFiEsLPvkngbQye/ufY/F7Wiht1KJ9CNyW9XttOv6F+EbRmN4Md6uQHx aQA5SRPo47JqDk9Zs6AXx2evepqHuwAEIft/PbSzgcBZaqy7sd98H9pfCkIMhRCv8suy 5glrwijUyMjDe8cluLvOvNJC0a5OrD6OB2I3G6MRdXhswYLuWHthqGCfMij0eSm4vXch kmD5AgYEpYl6/Hqt7t4W2GWKRIjGBrYy4diHTkc9Shkuz3VE9cSYREO96h+OPnQf2EXB oh5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hv18-20020a17090760d200b0086e1af0565csi26093945ejc.986.2023.01.21.17.21.56; Sat, 21 Jan 2023 17:22:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229680AbjAVAPX (ORCPT + 50 others); Sat, 21 Jan 2023 19:15:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37026 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229463AbjAVAPW (ORCPT ); Sat, 21 Jan 2023 19:15:22 -0500 Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5960A17CE8; Sat, 21 Jan 2023 16:15:21 -0800 (PST) Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (envelope-from ) id 1pJO10-002AZK-CU; Sun, 22 Jan 2023 01:15:18 +0100 Received: from pd9f631ca.dip0.t-ipconnect.de ([217.246.49.202] helo=[192.168.144.87]) by inpost2.zedat.fu-berlin.de (Exim 4.95) with esmtpsa (TLS1.3) tls TLS_AES_128_GCM_SHA256 (envelope-from ) id 1pJO0z-002Kk0-Vw; Sun, 22 Jan 2023 01:15:18 +0100 Message-ID: <52952170-f1a9-89a0-e307-f974ce2b7977@fu-berlin.de> Date: Sun, 22 Jan 2023 01:15:17 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 To: linux-kernel@vger.kernel.org, linux-sh@vger.kernel.org, Segher Boessenkool , Rich Felker , Yoshinori Sato , John Paul Adrian Glaubitz From: "Michael.Karcher" Cc: jakub@gcc.gnu.org Subject: [PATCH: 1/1] sh4: avoid spurious gcc warning Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Original-Sender: Michael.Karcher@fu-berlin.de X-Originating-IP: 217.246.49.202 X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Prevent sizeof-pointer-div warning in SH4 intc macros Gcc warns about the pattern sizeof(void*)/sizeof(void), as it looks like the abuse of a pattern to calculate the array size. This pattern appears in the unevaluated part of the ternary operator in _INTC_ARRAY if the parameter is NULL. The replacement uses an alternate approach to return 0 in case of NULL which does not generate the pattern sizeof(void*)/sizeof(void), but still emits the warning if _INTC_ARRAY is called with a nonarray parameter. This patch is required for successful compilation with -Werror enabled. The idea to use _Generic for type distinction is taken from Comment #7 in https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108483 by Jakub Jelinek Signed-off-by: Michael Karcher --- diff --git a/include/linux/sh_intc.h b/include/linux/sh_intc.h index c255273b0281..d7a7ffb60a34 100644 --- a/include/linux/sh_intc.h +++ b/include/linux/sh_intc.h @@ -97,7 +97,7 @@ struct intc_hw_desc {      unsigned int nr_subgroups;  }; -#define _INTC_ARRAY(a) a, __same_type(a, NULL) ? 0 : sizeof(a)/sizeof(*a) +#define _INTC_ARRAY(a) a, sizeof(a)/(_Generic((a), typeof(NULL): 0xFFFFFFFFU, default: sizeof(*a)))  #define INTC_HW_DESC(vectors, groups, mask_regs,    \               prio_regs,    sense_regs, ack_regs)    \