Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp22400rwb; Mon, 28 Nov 2022 16:35:55 -0800 (PST) X-Google-Smtp-Source: AA0mqf4Q9e/1VHoQ5giCRd3Sd7sr569bGAR08GZ7C+7qQtXGUAt3MFQ4+uwx57lZ3uW9EKu5X31u X-Received: by 2002:a05:6402:2b91:b0:457:23cb:20ab with SMTP id fj17-20020a0564022b9100b0045723cb20abmr35211627edb.254.1669682155394; Mon, 28 Nov 2022 16:35:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669682155; cv=none; d=google.com; s=arc-20160816; b=D0qPUdr9WykwD2STngjOv180fsNsnSsrUAaCfwMkOUfhZd4aO8rwUJrviQN8XbxZ38 gujnQkbcsPWoPe3vUsvWgZfIvRAV8HTwuLwLnfM3Ntkq2dbLXxPyp2g1dDObyRoFD1Ps wauzcR42FdxD34M4qnOwCX1kIr7+GuI6Pv8Rd74/77Q0q1ByY0k/NHlnlOtt7HF+Os7n RSOEKrMESDcxVmhs3ei6n33BGWFWSHtqGRxdekn58XstQerGt8ULwLaHiWhOF40IijTG YeR3fZuAbYOSDqUL/EOdtqFFqyVeqKRdeCKhpnWPRVmGsB7WVE4YbFaGl8lW9XMdYjHY lQMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:authenticated-by; bh=pq1WqpEXOm8s0VpHy/E5vJ39wqjyeJ6DEnWpkAEQSLc=; b=bk/zNfnvciPqJS18ZYxgf8+oWNGaTRYA6f7ZB3LsUvM3OlOgE2ABe9BDsGwT1/JUHp KX8DeBv8lE+BAAmpoalTwtwutdLsOuBY6+XBsfopq3qjdAwdBZ+C8ahM8ajJLDmi+23p McqxKwGp5vwQtMB6SKJRpiGh5naEFIUgCi/pXTgyCmF02sCfbF6/OCnq5kNAMQXX1e/D KADm6vbyaz6oK57kwlj3NC2TK3GEPTjkZTWlr+Yo1LOfUhbRaWZBrdpsZR//pJZBZhxT 034tKHzBlCz5J0u+44axe1CfkzGJ7ZavwAjb2Gdz1V2h3dl3e91kaze2f/t99tw49sJK r9Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m14-20020a056402510e00b0046adf195723si8510296edd.251.2022.11.28.16.35.34; Mon, 28 Nov 2022 16:35:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234884AbiK2AWy convert rfc822-to-8bit (ORCPT + 67 others); Mon, 28 Nov 2022 19:22:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49964 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234888AbiK2AWw (ORCPT ); Mon, 28 Nov 2022 19:22:52 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CFD8B11A0D for ; Mon, 28 Nov 2022 16:22:49 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 2AT0LuPwA017503, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36505.realtek.com.tw[172.21.6.25]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 2AT0LuPwA017503 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Tue, 29 Nov 2022 08:21:56 +0800 Received: from RTEXMBS03.realtek.com.tw (172.21.6.96) by RTEXH36505.realtek.com.tw (172.21.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.32; Tue, 29 Nov 2022 08:22:40 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXMBS03.realtek.com.tw (172.21.6.96) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Tue, 29 Nov 2022 08:22:40 +0800 Received: from RTEXMBS04.realtek.com.tw ([fe80::15b5:fc4b:72f3:424b]) by RTEXMBS04.realtek.com.tw ([fe80::15b5:fc4b:72f3:424b%5]) with mapi id 15.01.2375.007; Tue, 29 Nov 2022 08:22:40 +0800 From: Ping-Ke Shih To: Kalle Valo CC: Kevin Yang , "linux-wireless@vger.kernel.org" Subject: RE: [PATCH 4/6] wifi: rtw89: mac: process MCC related C2H Thread-Topic: [PATCH 4/6] wifi: rtw89: mac: process MCC related C2H Thread-Index: AQHY+wxMFA5vmLa6FUaozuPdYh37Sq5UZScwgAC00yA= Date: Tue, 29 Nov 2022 00:22:40 +0000 Message-ID: <6444fb9949e14656b3ccf0adb6babb63@realtek.com> References: <20221118051042.29968-1-pkshih@realtek.com> <20221118051042.29968-5-pkshih@realtek.com> <87o7sr5hq9.fsf@kernel.org> In-Reply-To: <87o7sr5hq9.fsf@kernel.org> Accept-Language: en-US, zh-TW Content-Language: zh-TW X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.21.69.188] x-kse-serverinfo: RTEXMBS03.realtek.com.tw, 9 x-kse-attachmentfiltering-interceptor-info: no applicable attachment filtering rules found x-kse-antivirus-interceptor-info: scan successful x-kse-antivirus-info: =?us-ascii?Q?Clean,_bases:_2022/11/28_=3F=3F_10:37:00?= x-kse-bulkmessagesfiltering-scan-result: protection disabled Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-KSE-ServerInfo: RTEXH36505.realtek.com.tw, 9 X-KSE-Attachment-Filter-Triggered-Rules: Clean X-KSE-Attachment-Filter-Triggered-Filters: Clean X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org > -----Original Message----- > From: Kalle Valo > Sent: Monday, November 28, 2022 9:31 PM > To: Ping-Ke Shih > Cc: Kevin Yang ; linux-wireless@vger.kernel.org > Subject: Re: [PATCH 4/6] wifi: rtw89: mac: process MCC related C2H > > Ping-Ke Shih writes: > > > From: Zong-Zhe Yang > > > > Process C2H(s) related to MCC (multi-channel concurrency). These handling, > > which either call rtw89_complete_cond() or show message in debug mode, can > > be considered atomic/lock-free. So, they should be safe to be processed > > directly after C2H pre-check in previous patch. > > > > Signed-off-by: Zong-Zhe Yang > > Signed-off-by: Ping-Ke Shih > > [...] > > > +static > > +void (* const rtw89_mac_c2h_mcc_handler[])(struct rtw89_dev *rtwdev, > > + struct sk_buff *c2h, u32 len) = { > > + [RTW89_MAC_C2H_FUNC_MCC_RCV_ACK] = rtw89_mac_c2h_mcc_rcv_ack, > > + [RTW89_MAC_C2H_FUNC_MCC_REQ_ACK] = rtw89_mac_c2h_mcc_req_ack, > > + [RTW89_MAC_C2H_FUNC_MCC_TSF_RPT] = rtw89_mac_c2h_mcc_tsf_rpt, > > + [RTW89_MAC_C2H_FUNC_MCC_STATUS_RPT] = rtw89_mac_c2h_mcc_status_rpt, > > +}; > > static const? > These are function pointers, so const is before instance name, i.e. '... const rtw89_mac_c2h_mcc_handler ..' Checking it with objdump, which shows '.rodata' also: $ objdump -t mac.o | grep rtw89_mac_c2h_mcc_handler 00000000000000a0 l O .rodata 0000000000000020 rtw89_mac_c2h_mcc_handler -- Ping-Ke