Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2901303ybd; Mon, 24 Jun 2019 15:02:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqxwpV1SCJQnFPgg1b3BzLH6IPPWTqKjnyZuTvGUNMbbf94X6Ed0aadnaYBey4kOuA7VXFy7 X-Received: by 2002:a63:3f48:: with SMTP id m69mr11308215pga.17.1561413750262; Mon, 24 Jun 2019 15:02:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561413750; cv=none; d=google.com; s=arc-20160816; b=g/lXwd2vUDM1tUqP/SVjifC2Hy4Glbmj9uU+DYTMH5YHFIkpiFdEFzZ1eplzjVZYUD +MkExvJ4ofcoQCtSEq3cZ1XbrnFJruGtIW8LXi5Unl5aUMq8vT5482giA73kiaJ8Lma5 RR6Om5Te6cdOXTQBHVuUfrJvhp/HvCfVSu1s2DKCWj+FKv6gPyVScbKnBJ0Vb28OqbIw qaQ8LSjG/Yi0KTGfEgnKmdplKk7R0HftdWJYd5lsijbDx1mdA+bsPDHRXBFRp49OeGsz lmLQTyZvCTQU7R4c4mWAOhyc36M5c/MvQiPLlDT3Qtc4F9nJ5/OpwXkxLcppWhdKKSzL R2Dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=OpeuV2NpWcAJs0DpgqeEeImguRhkxqv5WYJ53PINJg8=; b=BEWZxnnXBatVqJa2MZd+cZ147iTRCIPofrhISuKqsRGvrw5HRqGf9H+g9dEp83TVHA DvQk90YJu5wFjHGI3tmgPszTonyLlxkGRVwTUTIjlhlLvyEjrXCZD9sAoz3Gr7VXc/UX QWl6vahrKJgMc6fiEvjMtXMDRzlV+o/ea21s/modDUDgCIPU1mGClXRKtLuidFMn7tSD TuzcNXT5Tyk22XuidDH+sfAMGj/MbVg8EXjDqA9Uc7agPt1qQiqs45xdJtpn/PvieDNz O3ENdzdLL0AASLKuXu9Eol3PWhLTbOxI8427BWc3LJEwFm5bv+Q5oXPpQtCACUx4uKZF DrhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b24si11622347pfd.156.2019.06.24.15.02.14; Mon, 24 Jun 2019 15:02:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728559AbfFXUgV (ORCPT + 99 others); Mon, 24 Jun 2019 16:36:21 -0400 Received: from mga04.intel.com ([192.55.52.120]:25682 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727418AbfFXUgV (ORCPT ); Mon, 24 Jun 2019 16:36:21 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Jun 2019 13:36:21 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,413,1557212400"; d="scan'208";a="312828574" Received: from rchatre-s.jf.intel.com ([10.54.70.76]) by orsmga004.jf.intel.com with ESMTP; 24 Jun 2019 13:36:20 -0700 From: Reinette Chatre To: tglx@linutronix.de, fenghua.yu@intel.com, bp@alien8.de, tony.luck@intel.com Cc: mingo@redhat.com, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org, Reinette Chatre Subject: [PATCH] x86/resctrl: Cleanup cbm_ensure_valid() Date: Mon, 24 Jun 2019 13:34:27 -0700 Message-Id: <15ba03856f1d944468ee6f44e3fd7aa548293ede.1561408280.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.17.2 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org A recent fix to the cbm_ensure_valid() function left some coding style issues that are now addressed: - Follow reverse fir tree ordering of variable declarations - Use if (!val) instead of if (val == 0) - Return a value instead of using a function parameter as input and output Suggested-by: Borislav Petkov Signed-off-by: Reinette Chatre --- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c index b63e50b1a096..e63cef0a09cc 100644 --- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c +++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c @@ -2496,21 +2496,21 @@ static int mkdir_mondata_all(struct kernfs_node *parent_kn, * modification to the CBM if the default does not satisfy the * requirements. */ -static void cbm_ensure_valid(u32 *_val, struct rdt_resource *r) +static u32 cbm_ensure_valid(u32 _val, struct rdt_resource *r) { - unsigned long val = *_val; unsigned int cbm_len = r->cache.cbm_len; unsigned long first_bit, zero_bit; + unsigned long val = _val; - if (val == 0) - return; + if (!val) + return 0; first_bit = find_first_bit(&val, cbm_len); zero_bit = find_next_zero_bit(&val, cbm_len, first_bit); /* Clear any remaining bits to ensure contiguous region */ bitmap_clear(&val, zero_bit, cbm_len - zero_bit); - *_val = (u32)val; + return (u32)val; } /* @@ -2563,7 +2563,7 @@ static int __init_one_rdt_domain(struct rdt_domain *d, struct rdt_resource *r, * Force the initial CBM to be valid, user can * modify the CBM based on system availability. */ - cbm_ensure_valid(&d->new_ctrl, r); + d->new_ctrl = cbm_ensure_valid(d->new_ctrl, r); /* * Assign the u32 CBM to an unsigned long to ensure that * bitmap_weight() does not access out-of-bound memory. -- 2.17.2