]> git.infradead.org Git - users/hch/misc.git/commitdiff
minmax: add a few more MIN_T/MAX_T users
authorLinus Torvalds <torvalds@linux-foundation.org>
Sun, 28 Jul 2024 20:03:48 +0000 (13:03 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Sun, 28 Jul 2024 20:41:14 +0000 (13:41 -0700)
Commit 3a7e02c040b1 ("minmax: avoid overly complicated constant
expressions in VM code") added the simpler MIN_T/MAX_T macros in order
to avoid some excessive expansion from the rather complicated regular
min/max macros.

The complexity of those macros stems from two issues:

 (a) trying to use them in situations that require a C constant
     expression (in static initializers and for array sizes)

 (b) the type sanity checking

and MIN_T/MAX_T avoids both of these issues.

Now, in the whole (long) discussion about all this, it was pointed out
that the whole type sanity checking is entirely unnecessary for
min_t/max_t which get a fixed type that the comparison is done in.

But that still leaves min_t/max_t unnecessarily complicated due to
worries about the C constant expression case.

However, it turns out that there really aren't very many cases that use
min_t/max_t for this, and we can just force-convert those.

This does exactly that.

Which in turn will then allow for much simpler implementations of
min_t()/max_t().  All the usual "macros in all upper case will evaluate
the arguments multiple times" rules apply.

We should do all the same things for the regular min/max() vs MIN/MAX()
cases, but that has the added complexity of various drivers defining
their own local versions of MIN/MAX, so that needs another level of
fixes first.

Link: https://lore.kernel.org/all/b47fad1d0cf8449886ad148f8c013dae@AcuMS.aculab.com/
Cc: David Laight <David.Laight@aculab.com>
Cc: Lorenzo Stoakes <lorenzo.stoakes@oracle.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
arch/x86/mm/pgtable.c
drivers/edac/sb_edac.c
drivers/gpu/drm/drm_color_mgmt.c
drivers/md/dm-integrity.c
drivers/net/ethernet/stmicro/stmmac/stmmac_main.c
net/ipv4/proc.c
net/ipv6/proc.c

index 93e54ba91fbfdbfaf09ffa42a2d8c855187576d7..f5931499c2d6b8170f2555d3cdaf663caefb2d5c 100644 (file)
@@ -110,7 +110,7 @@ static inline void pgd_list_del(pgd_t *pgd)
 #define UNSHARED_PTRS_PER_PGD                          \
        (SHARED_KERNEL_PMD ? KERNEL_PGD_BOUNDARY : PTRS_PER_PGD)
 #define MAX_UNSHARED_PTRS_PER_PGD                      \
-       max_t(size_t, KERNEL_PGD_BOUNDARY, PTRS_PER_PGD)
+       MAX_T(size_t, KERNEL_PGD_BOUNDARY, PTRS_PER_PGD)
 
 
 static void pgd_set_mm(pgd_t *pgd, struct mm_struct *mm)
index cbc92d3683e65c7d8600bfba10ba30de403f4307..e5c05a8769471e1afcda7afa10fb9ab9a29a8cfb 100644 (file)
@@ -109,8 +109,8 @@ static const u32 knl_interleave_list[] = {
        0x104, 0x10c, 0x114, 0x11c,   /* 20-23 */
 };
 #define MAX_INTERLEAVE                                                 \
-       (max_t(unsigned int, ARRAY_SIZE(sbridge_interleave_list),       \
-              max_t(unsigned int, ARRAY_SIZE(ibridge_interleave_list), \
+       (MAX_T(unsigned int, ARRAY_SIZE(sbridge_interleave_list),       \
+              MAX_T(unsigned int, ARRAY_SIZE(ibridge_interleave_list), \
                     ARRAY_SIZE(knl_interleave_list))))
 
 struct interleave_pkg {
index d021497841b84665b08db26088ec67eab9c5f45e..3969dc548cff605cbdd3d56dceafb2ca00a5c886 100644 (file)
@@ -532,7 +532,7 @@ int drm_plane_create_color_properties(struct drm_plane *plane,
 {
        struct drm_device *dev = plane->dev;
        struct drm_property *prop;
-       struct drm_prop_enum_list enum_list[max_t(int, DRM_COLOR_ENCODING_MAX,
+       struct drm_prop_enum_list enum_list[MAX_T(int, DRM_COLOR_ENCODING_MAX,
                                                       DRM_COLOR_RANGE_MAX)];
        int i, len;
 
index 48ac628f471b3ba8390992b99bbd94e522669965..51e6964c130548ddc2a596e8b1e14f7a007310dc 100644 (file)
@@ -1776,7 +1776,7 @@ static void integrity_metadata(struct work_struct *w)
                struct bio *bio = dm_bio_from_per_bio_data(dio, sizeof(struct dm_integrity_io));
                char *checksums;
                unsigned int extra_space = unlikely(digest_size > ic->tag_size) ? digest_size - ic->tag_size : 0;
-               char checksums_onstack[max_t(size_t, HASH_MAX_DIGESTSIZE, MAX_TAG_SIZE)];
+               char checksums_onstack[MAX_T(size_t, HASH_MAX_DIGESTSIZE, MAX_TAG_SIZE)];
                sector_t sector;
                unsigned int sectors_to_process;
 
@@ -2064,7 +2064,7 @@ retry_kmap:
                                } while (++s < ic->sectors_per_block);
 #ifdef INTERNAL_VERIFY
                                if (ic->internal_hash) {
-                                       char checksums_onstack[max_t(size_t, HASH_MAX_DIGESTSIZE, MAX_TAG_SIZE)];
+                                       char checksums_onstack[MAX_T(size_t, HASH_MAX_DIGESTSIZE, MAX_TAG_SIZE)];
 
                                        integrity_sector_checksum(ic, logical_sector, mem + bv.bv_offset, checksums_onstack);
                                        if (unlikely(memcmp(checksums_onstack, journal_entry_tag(ic, je), ic->tag_size))) {
@@ -2837,7 +2837,7 @@ static void do_journal_write(struct dm_integrity_c *ic, unsigned int write_start
                                    unlikely(from_replay) &&
 #endif
                                    ic->internal_hash) {
-                                       char test_tag[max_t(size_t, HASH_MAX_DIGESTSIZE, MAX_TAG_SIZE)];
+                                       char test_tag[MAX_T(size_t, HASH_MAX_DIGESTSIZE, MAX_TAG_SIZE)];
 
                                        integrity_sector_checksum(ic, sec + ((l - j) << ic->sb->log2_sectors_per_block),
                                                                  (char *)access_journal_data(ic, i, l), test_tag);
index 12689774d75585db08ba38495e98913f499136e1..f3a1b179aaeaca2189974fce4724db0a175b5de3 100644 (file)
@@ -2912,7 +2912,7 @@ static void stmmac_dma_interrupt(struct stmmac_priv *priv)
        u32 channels_to_check = tx_channel_count > rx_channel_count ?
                                tx_channel_count : rx_channel_count;
        u32 chan;
-       int status[max_t(u32, MTL_MAX_TX_QUEUES, MTL_MAX_RX_QUEUES)];
+       int status[MAX_T(u32, MTL_MAX_TX_QUEUES, MTL_MAX_RX_QUEUES)];
 
        /* Make sure we never check beyond our status buffer. */
        if (WARN_ON_ONCE(channels_to_check > ARRAY_SIZE(status)))
index 6c4664c681ca530d67b9ccc54f11cbb178d32c8e..40053a02bae103a9e1617ab0457da6398d75cd85 100644 (file)
@@ -44,7 +44,7 @@
 #include <net/sock.h>
 #include <net/raw.h>
 
-#define TCPUDP_MIB_MAX max_t(u32, UDP_MIB_MAX, TCP_MIB_MAX)
+#define TCPUDP_MIB_MAX MAX_T(u32, UDP_MIB_MAX, TCP_MIB_MAX)
 
 /*
  *     Report socket allocation statistics [mea@utu.fi]
index 6d1d9221649d52720d2e6a0a6d310b3c82102f10..752327b10dde74e4ee6b17e8d1a85923931e761f 100644 (file)
@@ -27,7 +27,7 @@
 #include <net/ipv6.h>
 
 #define MAX4(a, b, c, d) \
-       max_t(u32, max_t(u32, a, b), max_t(u32, c, d))
+       MAX_T(u32, MAX_T(u32, a, b), MAX_T(u32, c, d))
 #define SNMP_MIB_MAX MAX4(UDP_MIB_MAX, TCP_MIB_MAX, \
                        IPSTATS_MIB_MAX, ICMP_MIB_MAX)