Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2758282ybl; Mon, 20 Jan 2020 08:48:22 -0800 (PST) X-Google-Smtp-Source: APXvYqzS3WVPiof8SkVxxj8I2dv22moY02bMQleQyT8LM4xqyBNS0b0FJ0WTOcYoCrKxX1rbqdlB X-Received: by 2002:aca:b608:: with SMTP id g8mr157769oif.142.1579538902388; Mon, 20 Jan 2020 08:48:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579538902; cv=none; d=google.com; s=arc-20160816; b=kOZhCJC3LgclLUOdO7xo//9p5wveNjMrhq1SuocJtyqzQVAfKoKv1L0wpLrsnD6F/D Ngl09XornLQNyIyFpAuvYK92YfchAawqqIjWCQfly6QuHWfIQ/tf7K5PUcRW44uV8wUe BzuEvgbZOdrrvaYTE6KDwUxnqE5SnpQ9pSVi+aV6dMYyuYcQifpf1tIc0YOiYZNY9bmU e0PwhmHGEP6eJGOQ60Tj/hzgaG96GCiqotzLbGZ1bdngHeIrmB9rPIg/7R6w/+jqRqm3 1pmWpSWNCfqFPhhFwJ3nqkGrsI1hkGPMNNKOqgJmrJGgCOtNkdI2PLZEvXFTL8qseTVB qwlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :robot-unsubscribe:robot-id:message-id:mime-version:references :in-reply-to:cc:subject:to:reply-to:from:date; bh=Ukx07UooLCEggt6n2UWXhBDb+sfoaxn1XzKq3moo0Zs=; b=M30elH2CuYQlQ9RmdevU22XB75wc5ag0t/woQoW5NF0XKL67El/Ngx45SKh+djvuDg edo83izAYQUvZ6ebtr7dK6wCL99piVTSBYF+xRp78pl/KpZ23eL+ryGEeEm6Jqi74DIK Qigwqg/jJXtDQRtEE24Okoy7RQJmIgLDJJVPc7w9u5VRh89eq3wHOBKxYyIk4SUEjBLo 5jCp8NnHw6Je/8DlOtBdKO1D03lMCDHXi/q6SVu/DEJQLhUx2Fr/bvvdJPicXjEHDYvd 77T2qHYYySYl5pnX7CNOn1FLkiTLVj/A956/X5t61I+XL6BeNZiqTn2n5OGdM9CeMAZB 4VTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z4si16556923oix.48.2020.01.20.08.48.10; Mon, 20 Jan 2020 08:48:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729073AbgATQrS (ORCPT + 99 others); Mon, 20 Jan 2020 11:47:18 -0500 Received: from Galois.linutronix.de ([193.142.43.55]:33645 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726642AbgATQrS (ORCPT ); Mon, 20 Jan 2020 11:47:18 -0500 Received: from [5.158.153.53] (helo=tip-bot2.lab.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1itaCm-000438-81; Mon, 20 Jan 2020 17:47:12 +0100 Received: from [127.0.1.1] (localhost [IPv6:::1]) by tip-bot2.lab.linutronix.de (Postfix) with ESMTP id C22301C1A41; Mon, 20 Jan 2020 17:47:11 +0100 (CET) Date: Mon, 20 Jan 2020 16:47:11 -0000 From: "tip-bot2 for Xiaochen Shen" Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/urgent] x86/resctrl: Clean up unused function parameter in mkdir path Cc: Xiaochen Shen , Borislav Petkov , Reinette Chatre , Tony Luck , Thomas Gleixner , x86 , LKML In-Reply-To: <1578500886-21771-5-git-send-email-xiaochen.shen@intel.com> References: <1578500886-21771-5-git-send-email-xiaochen.shen@intel.com> MIME-Version: 1.0 Message-ID: <157953883153.396.9276824335957965312.tip-bot2@tip-bot2> X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/urgent branch of tip: Commit-ID: 32ada3b9e04c6f6d4916967bd8bbe2450ad5bc5e Gitweb: https://git.kernel.org/tip/32ada3b9e04c6f6d4916967bd8bbe2450ad5bc5e Author: Xiaochen Shen AuthorDate: Thu, 09 Jan 2020 00:28:06 +08:00 Committer: Borislav Petkov CommitterDate: Mon, 20 Jan 2020 17:00:41 +01:00 x86/resctrl: Clean up unused function parameter in mkdir path Commit 334b0f4e9b1b ("x86/resctrl: Fix a deadlock due to inaccurate reference") changed the argument to rdtgroup_kn_lock_live()/rdtgroup_kn_unlock() within mkdir_rdt_prepare(). That change resulted in an unused function parameter to mkdir_rdt_prepare(). Clean up the unused function parameter in mkdir_rdt_prepare() and its callers rdtgroup_mkdir_mon() and rdtgroup_mkdir_ctrl_mon(). Signed-off-by: Xiaochen Shen Signed-off-by: Borislav Petkov Reviewed-by: Reinette Chatre Reviewed-by: Tony Luck Acked-by: Thomas Gleixner Link: https://lkml.kernel.org/r/1578500886-21771-5-git-send-email-xiaochen.shen@intel.com --- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 16 +++++----------- 1 file changed, 5 insertions(+), 11 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c index 954fd04..2804562 100644 --- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c +++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c @@ -2644,7 +2644,6 @@ static int rdtgroup_init_alloc(struct rdtgroup *rdtgrp) } static int mkdir_rdt_prepare(struct kernfs_node *parent_kn, - struct kernfs_node *prgrp_kn, const char *name, umode_t mode, enum rdt_group_type rtype, struct rdtgroup **r) { @@ -2754,15 +2753,12 @@ static void mkdir_rdt_prepare_clean(struct rdtgroup *rgrp) * to monitor a subset of tasks and cpus in its parent ctrl_mon group. */ static int rdtgroup_mkdir_mon(struct kernfs_node *parent_kn, - struct kernfs_node *prgrp_kn, - const char *name, - umode_t mode) + const char *name, umode_t mode) { struct rdtgroup *rdtgrp, *prgrp; int ret; - ret = mkdir_rdt_prepare(parent_kn, prgrp_kn, name, mode, RDTMON_GROUP, - &rdtgrp); + ret = mkdir_rdt_prepare(parent_kn, name, mode, RDTMON_GROUP, &rdtgrp); if (ret) return ret; @@ -2784,7 +2780,6 @@ static int rdtgroup_mkdir_mon(struct kernfs_node *parent_kn, * to allocate and monitor resources. */ static int rdtgroup_mkdir_ctrl_mon(struct kernfs_node *parent_kn, - struct kernfs_node *prgrp_kn, const char *name, umode_t mode) { struct rdtgroup *rdtgrp; @@ -2792,8 +2787,7 @@ static int rdtgroup_mkdir_ctrl_mon(struct kernfs_node *parent_kn, u32 closid; int ret; - ret = mkdir_rdt_prepare(parent_kn, prgrp_kn, name, mode, RDTCTRL_GROUP, - &rdtgrp); + ret = mkdir_rdt_prepare(parent_kn, name, mode, RDTCTRL_GROUP, &rdtgrp); if (ret) return ret; @@ -2867,14 +2861,14 @@ static int rdtgroup_mkdir(struct kernfs_node *parent_kn, const char *name, * subdirectory */ if (rdt_alloc_capable && parent_kn == rdtgroup_default.kn) - return rdtgroup_mkdir_ctrl_mon(parent_kn, parent_kn, name, mode); + return rdtgroup_mkdir_ctrl_mon(parent_kn, name, mode); /* * If RDT monitoring is supported and the parent directory is a valid * "mon_groups" directory, add a monitoring subdirectory. */ if (rdt_mon_capable && is_mon_groups(parent_kn, name)) - return rdtgroup_mkdir_mon(parent_kn, parent_kn->parent, name, mode); + return rdtgroup_mkdir_mon(parent_kn, name, mode); return -EPERM; }