Received: by 10.192.165.148 with SMTP id m20csp1034071imm; Wed, 25 Apr 2018 11:28:49 -0700 (PDT) X-Google-Smtp-Source: AIpwx48eOEntpJriCQcKCuoGUZNaxtu+cXMMes8iYNPm8qIw1p9cRYBBsSinujV2WvY26kVp9Vvy X-Received: by 10.99.170.72 with SMTP id x8mr18922303pgo.398.1524680929534; Wed, 25 Apr 2018 11:28:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524680929; cv=none; d=google.com; s=arc-20160816; b=A86U9Apl+sbLr+FiU+fF7UGvtCNqWltgvboN+VAki5t7YB2UHd8mbFQ3Wv9Xzyh/uo KVeA4Mxla08ODkBdnqXysMpnuyo1StqtPYAhUSvbwj1zcsMRWQzpBDem5np77XUXPzbN SuoN+A3iY8dMYqnQv3x7W9sKewI8X8ahjy4Ypbs3X5CnfR87BDlQQEzYzBJQyzXKSahG TzZNi5cExcsf+bYfrgOC3q7OGCutgYRx4g3DMkqAx7LXno0XTdLMS033drQI7jwDcnD6 LOMjys0GbMO09H2emyDvfJDRVjYc5Y6ZdX6SekcphuX/+6JPkCCYkcp7+AMybz+WJJAh /aTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Pb/v0yddb8vQa4J+uqHsjKcijQe/BDEwMCX4Rq9/egU=; b=L+SLp6ixVsgtE/4wwowKdpXZQI/XkrSkEa84ADmAuo1fbadwY8rE3tzI+iMBHZGEG1 iIoP2kMwojAvdYL0G1AraC0Et8jJ9NafKZfntA9KHfubxRF+No75O60cjwlFvkBifroi X8Cf0HMfJq/0YzdTPLNZU6PxiH3z/oDt0tzh7tOFCMsYrerN8LNAsp13n2nkqLj2tPsp Di+Cl0weLxL+8XqvnMJe5G794B0kgTepnwBNxyVGWMpdveBPyyVtmC4X3+xDgHl5ANSZ Bs2Zf73Z7WikPXIioBD4Itom6l1XyLahfqkTUrejBnYx8MiyCGjSjkK5rDIo5SEWX5mk xx7A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v7si1156463pgq.608.2018.04.25.11.28.35; Wed, 25 Apr 2018 11:28:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756533AbeDYS11 (ORCPT + 99 others); Wed, 25 Apr 2018 14:27:27 -0400 Received: from mga02.intel.com ([134.134.136.20]:41714 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755993AbeDYSMh (ORCPT ); Wed, 25 Apr 2018 14:12:37 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Apr 2018 11:12:35 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,327,1520924400"; d="scan'208";a="35243657" Received: from rchatre-s.jf.intel.com ([10.54.70.76]) by fmsmga008.fm.intel.com with ESMTP; 25 Apr 2018 11:12:35 -0700 From: Reinette Chatre To: tglx@linutronix.de, fenghua.yu@intel.com, tony.luck@intel.com, vikas.shivappa@linux.intel.com Cc: gavin.hindman@intel.com, jithu.joseph@intel.com, dave.hansen@intel.com, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org, Reinette Chatre Subject: [PATCH V3 10/39] x86/intel_rdt: Making CBM name and type more explicit Date: Wed, 25 Apr 2018 03:09:46 -0700 Message-Id: X-Mailer: git-send-email 2.13.6 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org cbm_validate() receives a pointer to the variable that will be initialized with a validated capacity bitmask. The pointer points to a variable of type unsigned long that is immediately assigned to a variable of type u32 by the caller on return from cbm_validate(). Let cbm_validate() initialize a variable of type u32 directly. At this time also change tha variable name "data" within parse_cbm() to a name more reflective of the content: "cbm_val". This frees up the generic "data" to be used later when it is indeed used for a collection of input. Signed-off-by: Reinette Chatre --- arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c b/arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c index 9e1a455e4d9b..3bd45e6cc9ae 100644 --- a/arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c +++ b/arch/x86/kernel/cpu/intel_rdt_ctrlmondata.c @@ -86,7 +86,7 @@ int parse_bw(char *buf, struct rdt_resource *r, struct rdt_domain *d) * are allowed (e.g. FFFFH, 0FF0H, 003CH, etc.). * Additionally Haswell requires at least two bits set. */ -static bool cbm_validate(char *buf, unsigned long *data, struct rdt_resource *r) +static bool cbm_validate(char *buf, u32 *data, struct rdt_resource *r) { unsigned long first_bit, zero_bit, val; unsigned int cbm_len = r->cache.cbm_len; @@ -127,16 +127,17 @@ static bool cbm_validate(char *buf, unsigned long *data, struct rdt_resource *r) */ int parse_cbm(char *buf, struct rdt_resource *r, struct rdt_domain *d) { - unsigned long data; + u32 cbm_val; if (d->have_new_ctrl) { rdt_last_cmd_printf("duplicate domain %d\n", d->id); return -EINVAL; } - if(!cbm_validate(buf, &data, r)) + if (!cbm_validate(buf, &cbm_val, r)) return -EINVAL; - d->new_ctrl = data; + + d->new_ctrl = cbm_val; d->have_new_ctrl = true; return 0; -- 2.13.6