[PATCH net-next 1/2] net: stmmac: fix unsafe MTL DMA macro

Chang, Junxiao junxiao.chang at intel.com
Mon Oct 24 21:58:12 PDT 2022


Thank you for reviewing it. There is no real issue if this macro only be used in stmmac driver and parameter is not function or "i++".

I will squash these two patches.

Regards,
Junxiao

-----Original Message-----
From: Jakub Kicinski <kuba at kernel.org> 
Sent: Tuesday, October 25, 2022 12:00 PM
To: Chang, Junxiao <junxiao.chang at intel.com>
Cc: peppe.cavallaro at st.com; alexandre.torgue at foss.st.com; joabreu at synopsys.com; davem at davemloft.net; edumazet at google.com; pabeni at redhat.com; mcoquelin.stm32 at gmail.com; Joao.Pinto at synopsys.com; netdev at vger.kernel.org; linux-stm32 at st-md-mailman.stormreply.com; linux-arm-kernel at lists.infradead.org; linux-kernel at vger.kernel.org
Subject: Re: [PATCH net-next 1/2] net: stmmac: fix unsafe MTL DMA macro

On Fri, 21 Oct 2022 19:47:10 +0800 Junxiao Chang wrote:
> Macro like "#define abc(x) (x, x)" is unsafe which might introduce 
> side effects. Each MTL RxQ DMA channel mask is 4 bits, so using (0xf 
> << chan) instead of GENMASK(x + 3, x) to avoid unsafe macro.
> 
> Fixes: d43042f4da3e ("net: stmmac: mapping mtl rx to dma channel")

You need to point out an existing usage where this is causing problems, otherwise this is not a fix.

And squash the two patches together, it's going to be easier to review.



More information about the linux-arm-kernel mailing list