Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp231965imu; Tue, 27 Nov 2018 11:31:24 -0800 (PST) X-Google-Smtp-Source: AFSGD/XLZxd7MuJ7I6/tpJFu1EKyo0QOcqxpBVIKrCAWJwyUxv1+XW7tE60Bdbd+ys1TI52wMKoD X-Received: by 2002:a17:902:9692:: with SMTP id n18mr11457569plp.333.1543347084581; Tue, 27 Nov 2018 11:31:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543347084; cv=none; d=google.com; s=arc-20160816; b=nOIsdn5IGGtxwP5j4JTt1tW/KlBrXdmtVMRkm8qOUpaIAHrKaOJf5mlaTDfE3SY4pV pYGrGURElZmSfDAXfBBMNSkbyLxA344bMl0L6HX5gNnb49RzVts2DqYnlxs5K8jQCM/w im8V4+NX/SJ7NlwlO4YuWvta66PPzW8kF4QBUmbUbbHrR9b798wuHS3fOVkaxLQb7E0G U8w32QPX0RYfsX5fQADX3NStK8ic4ipSiBdXFN4wD/X3diGvD9Lane7t58i5OjFRqOcj p33bE4VTvQ8HBUTvHx5zvhverxHK3/6zDs0OWr6gugkH+aKabgI8X8ZE7ZARHAr1z2Dz nJyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=v8hmgvK/6AZXpBspinSq+vuhl6L+xvF1b1lf17dzzmc=; b=N3eza4vC2y9iQVgvXqulB8vawpnYzDM/FVvejBxymZX7/gn406BrGwbqc7QKFsl7w3 E8GsvGqfJG01yqTeIb7ORwC1A8eaFCzEWW9r9HDyb3IHAdX3Ggu0shYY8oIm+my6mdB0 8XST72MRJbbhrrGGVPkr7NHTuREXeXsHzqGyB5SXSPmiPZr7CLAXFNAu2aiHsG0Ml3lS wEvzZbfvG9ba0WIKSQJs6g0arrq6YXg7PD6EHZfb6thZ5BN8GUF3F96QRrxB0XnVANzb ORVYtwebKbe1LivptaCNkTtgez5ORzn3ru5boF86Wy3NSCes+b9Ax7yeuIQPDWRG4/Mr PaXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b36si4487148pgl.596.2018.11.27.11.31.09; Tue, 27 Nov 2018 11:31:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726419AbeK1GTS (ORCPT + 99 others); Wed, 28 Nov 2018 01:19:18 -0500 Received: from mga04.intel.com ([192.55.52.120]:55764 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726290AbeK1GTS (ORCPT ); Wed, 28 Nov 2018 01:19:18 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Nov 2018 11:20:20 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,287,1539673200"; d="scan'208";a="94357239" Received: from rchatre-s.jf.intel.com ([10.54.70.76]) by fmsmga008.fm.intel.com with ESMTP; 27 Nov 2018 11:20:20 -0800 From: Reinette Chatre To: tglx@linutronix.de, fenghua.yu@intel.com, bp@alien8.de, tony.luck@intel.com Cc: jithu.joseph@intel.com, mingo@redhat.com, hpa@zytor.com, babu.moger@amd.com, x86@kernel.org, linux-kernel@vger.kernel.org, Reinette Chatre Subject: [PATCH V2] x86/resctrl: Fix rdt_last_cmd_printf() usage and typos within Date: Tue, 27 Nov 2018 11:19:36 -0800 Message-Id: X-Mailer: git-send-email 2.17.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The last_cmd_status seq_buf contains user visible messages (accessed via /sys/fs/resctrl/info/last_cmd_status) that details any errors encountered while interacting with the resctrl filesystem. rdt_last_cmd_puts() and rdt_last_cmd_printf() are the two calls available to respectively print an unformatted or formatted string to the last_cmd_status buffer. A few occurences exist where rdt_last_cmd_printf() is used to print an unformatted string. Using rdt_last_cmd_printf() to print a simple string does not result in incorrect result or incorrect behavior, but rdt_last_cmd_puts() is the function intended to be used in these cases. Fix these occurences to use rdt_last_cmd_puts() instead. While doing so fix two typos that were recently introduced into two of these simple strings. Fixes: 723f1a0dd8e2 ("x86/resctrl: Fixup the user-visible strings") Fixes: e0bdfe8e36f3 ("x86/intel_rdt: Support creation/removal of pseudo-locked region") Fixes: 9ab9aa15c309 ("x86/intel_rdt: Ensure requested schemata respects mode") Fixes: d48d7a57f718 ("x86/intel_rdt: Introduce resource group's mode resctrl file") Fixes: dfe9674b04ff ("x86/intel_rdt: Enable entering of pseudo-locksetup mode") Signed-off-by: Reinette Chatre --- V2: - Fix commit message to clarify why rdt_last_cmd_printf() is changed to rdt_last_cmd_puts(). arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 8 ++++---- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 4 ++-- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/ctrlmondata.c b/arch/x86/kernel/cpu/resctrl/ctrlmondata.c index 43ee3cee6494..03ee13235a45 100644 --- a/arch/x86/kernel/cpu/resctrl/ctrlmondata.c +++ b/arch/x86/kernel/cpu/resctrl/ctrlmondata.c @@ -215,7 +215,7 @@ int parse_cbm(struct rdt_parse_data *data, struct rdt_resource *r, */ if (rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP && rdtgroup_pseudo_locked_in_hierarchy(d)) { - rdt_last_cmd_printf("Pseudo-locked region in hierarchy\n"); + rdt_last_cmd_puts("Pseudo-locked region in hierarchy\n"); return -EINVAL; } @@ -225,7 +225,7 @@ int parse_cbm(struct rdt_parse_data *data, struct rdt_resource *r, if ((rdtgrp->mode == RDT_MODE_EXCLUSIVE || rdtgrp->mode == RDT_MODE_SHAREABLE) && rdtgroup_cbm_overlaps_pseudo_locked(d, cbm_val)) { - rdt_last_cmd_printf("CBM overlaps with pseudo-locked region\n"); + rdt_last_cmd_puts("CBM overlaps with pseudo-locked region\n"); return -EINVAL; } @@ -234,14 +234,14 @@ int parse_cbm(struct rdt_parse_data *data, struct rdt_resource *r, * either is exclusive. */ if (rdtgroup_cbm_overlaps(r, d, cbm_val, rdtgrp->closid, true)) { - rdt_last_cmd_printf("Overlaps with exclusive group\n"); + rdt_last_cmd_puts("Overlaps with exclusive group\n"); return -EINVAL; } if (rdtgroup_cbm_overlaps(r, d, cbm_val, rdtgrp->closid, false)) { if (rdtgrp->mode == RDT_MODE_EXCLUSIVE || rdtgrp->mode == RDT_MODE_PSEUDO_LOCKSETUP) { - rdt_last_cmd_printf("0verlaps with other group\n"); + rdt_last_cmd_puts("Overlaps with other group\n"); return -EINVAL; } } diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c index 61b102dd51a5..017505017bdb 100644 --- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c +++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c @@ -1206,7 +1206,7 @@ static ssize_t rdtgroup_mode_write(struct kernfs_open_file *of, goto out; if (mode == RDT_MODE_PSEUDO_LOCKED) { - rdt_last_cmd_printf("Cannot change pseudo-locked group\n"); + rdt_last_cmd_puts("Cannot change pseudo-locked group\n"); ret = -EINVAL; goto out; } @@ -1235,7 +1235,7 @@ static ssize_t rdtgroup_mode_write(struct kernfs_open_file *of, goto out; rdtgrp->mode = RDT_MODE_PSEUDO_LOCKSETUP; } else { - rdt_last_cmd_printf("Unknown orunsupported mode\n"); + rdt_last_cmd_puts("Unknown or unsupported mode\n"); ret = -EINVAL; } -- 2.17.0