Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp1024464rwn; Thu, 8 Sep 2022 12:09:35 -0700 (PDT) X-Google-Smtp-Source: AA6agR7boay6V06PEhx/Us4kTYwAf9sY3ypLgEvaJTaSQQdbYm8BbB/kDw0cxUjxhk1wwzch/M55 X-Received: by 2002:a05:6a00:23c1:b0:536:463e:e53b with SMTP id g1-20020a056a0023c100b00536463ee53bmr10443513pfc.43.1662664175137; Thu, 08 Sep 2022 12:09:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662664175; cv=none; d=google.com; s=arc-20160816; b=Yguc3dmkvVvfUlBOoJnRySXT1kpNWCZvAfdJGBqsEHCKvoP5D/XCAc0i2fIp1EAUi+ iflhC3+0VpFC77gx5ybz/RiJozYJbrd3jlZ5oq/Kq5+gH/fPcAu6H7LWnMPwA4NlLugY chvceCv0QNdOBbKgzLl/TnC/RAtk1SWBbFBssvMZssThGcS2yfg5Z3rpzeoBHtsedGlY u7d7SJ+hOKQQ6NUAvJQ/ziatpGTPAYUUB/IHCdCBDHCYSjpi/xUGWDmaEYg9PQVkPWgT jzbdgIJBYkqQuFsuiYU31xapNh+K8XhoJMQ65y9hf0hvB+xfDZhdmBz53os3sbh0gnlV Pldw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=jqILK8ev/qpLWoB3txp9klsB+8AIPcpeStLWfPzD6Zo=; b=g4ve/0jS7nJGvfvPX/e3t4PKCmj4+buoqrvXe+nsdaL2W9N+qL8qMNJwKm4g0FqR6I A66aAhZdbquWnAmE8STO0v80OcW0gsnvS8/jTuBEULZOLLXBJ3llhJF5dCbezmPtgy9r OozUseUDEGf2oMQ5xv+btbuRZmMX/hQM/A/Ky3WoME6if1nyInMMrBeN8l/C/THgqtMp hVm/yXY/kqy7XOjaRsUWWXPsDon914MyfJ6Z4rXiIGrLPfV0sA3GdrhK+7TIMr5AsJ2y uRZ+qY16X3Ye5zHbGlFSHnoKOFVKN0C2q3JGOxm0wlINGrN7mtQ/iVJQz2toP1klvJ+q F8XA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LUYMF6ih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bd32-20020a056a0027a000b005372b4a690bsi19998866pfb.46.2022.09.08.12.09.22; Thu, 08 Sep 2022 12:09:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LUYMF6ih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232350AbiIHSuA (ORCPT + 99 others); Thu, 8 Sep 2022 14:50:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59248 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232340AbiIHStz (ORCPT ); Thu, 8 Sep 2022 14:49:55 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A168B30546 for ; Thu, 8 Sep 2022 11:49:51 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 32ED961DCB for ; Thu, 8 Sep 2022 18:49:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 12022C433D7; Thu, 8 Sep 2022 18:49:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662662990; bh=9blEcl+kQyexkHeFxKpL4hVCHMxyX6MRyBgDynt2ggA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LUYMF6ihxRMbLcvAo6bo2tuSSmkMIp+xGcGekfAMRsJYAgB2hx3pUoob0W9ZShep4 7xx/DZ/EZc5vgUVSoMNN7y1PT7Tri5U9UjSmREmB261CbfPx108eUd4pihulssseze yFRu7JUKS3AxNeF5JUMc+MSIyphZIyLh/kNTS2pWhCOkR6a8vGNrBfCiKR6OmnX27+ z7UcDie4z0fmoQOy8gw9D8x0XXdgOiCT17IVj3ePqmRnd1VsQ86XVtJFJbsY0nlrk+ f/8qHDKwjwVyfOW9H/YgqUTq1nffhfYpZeyojGYCB/v/DaIQYFELps/7O9uHmitbdD EdkJ9T5DOMQRA== From: SeongJae Park To: Xin Hao Cc: sj@kernel.org, akpm@linux-foundation.org, damon@lists.linux.dev, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] mm/damon/sysfs: change few functions execute order Date: Thu, 8 Sep 2022 18:49:47 +0000 Message-Id: <20220908184947.103206-1-sj@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220908081932.77370-1-xhao@linux.alibaba.com> References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Xin, On Thu, 8 Sep 2022 16:19:32 +0800 Xin Hao wrote: > These nr_{schemes,regions,contexts,kdamonds}_store() functions are both call checkpatch complains as below: WARNING: Possible unwrapped commit description (prefer a maximum 75 chars per line) #10: These nr_{schemes,regions,contexts,kdamonds}_store() functions are both call > kstrtoint() to get relative values from sysfs interface, if it return an > error, there get kobject instance would be meaningless through 'container_of'. I was thinking the compiler could do that kind of optimization on its own, so I preferred to make the code shorter. This change makes the code slightly longer, while the benefit of the change is unclear. I'd like to keep it as is unless we get some clear benefit of this? Thanks, SJ > > Signed-off-by: Xin Hao > --- > mm/damon/sysfs.c | 24 ++++++++++++++---------- > 1 file changed, 14 insertions(+), 10 deletions(-) > > diff --git a/mm/damon/sysfs.c b/mm/damon/sysfs.c > index 88f208ff235d..54fdfcdbb3e4 100644 > --- a/mm/damon/sysfs.c > +++ b/mm/damon/sysfs.c > @@ -1031,8 +1031,7 @@ static ssize_t nr_schemes_show(struct kobject *kobj, > static ssize_t nr_schemes_store(struct kobject *kobj, > struct kobj_attribute *attr, const char *buf, size_t count) > { > - struct damon_sysfs_schemes *schemes = container_of(kobj, > - struct damon_sysfs_schemes, kobj); > + struct damon_sysfs_schemes *schemes; > int nr, err = kstrtoint(buf, 0, &nr); > > if (err) > @@ -1040,6 +1039,8 @@ static ssize_t nr_schemes_store(struct kobject *kobj, > if (nr < 0) > return -EINVAL; > > + schemes = container_of(kobj, struct damon_sysfs_schemes, kobj); > + > if (!mutex_trylock(&damon_sysfs_lock)) > return -EBUSY; > err = damon_sysfs_schemes_add_dirs(schemes, nr); > @@ -1237,8 +1238,7 @@ static ssize_t nr_regions_show(struct kobject *kobj, > static ssize_t nr_regions_store(struct kobject *kobj, > struct kobj_attribute *attr, const char *buf, size_t count) > { > - struct damon_sysfs_regions *regions = container_of(kobj, > - struct damon_sysfs_regions, kobj); > + struct damon_sysfs_regions *regions; > int nr, err = kstrtoint(buf, 0, &nr); > > if (err) > @@ -1246,6 +1246,8 @@ static ssize_t nr_regions_store(struct kobject *kobj, > if (nr < 0) > return -EINVAL; > > + regions = container_of(kobj, struct damon_sysfs_regions, kobj); > + > if (!mutex_trylock(&damon_sysfs_lock)) > return -EBUSY; > err = damon_sysfs_regions_add_dirs(regions, nr); > @@ -1440,8 +1442,7 @@ static ssize_t nr_targets_show(struct kobject *kobj, > static ssize_t nr_targets_store(struct kobject *kobj, > struct kobj_attribute *attr, const char *buf, size_t count) > { > - struct damon_sysfs_targets *targets = container_of(kobj, > - struct damon_sysfs_targets, kobj); > + struct damon_sysfs_targets *targets; > int nr, err = kstrtoint(buf, 0, &nr); > > if (err) > @@ -1449,6 +1450,8 @@ static ssize_t nr_targets_store(struct kobject *kobj, > if (nr < 0) > return -EINVAL; > > + targets = container_of(kobj, struct damon_sysfs_targets, kobj); > + > if (!mutex_trylock(&damon_sysfs_lock)) > return -EBUSY; > err = damon_sysfs_targets_add_dirs(targets, nr); > @@ -1962,8 +1965,7 @@ static ssize_t nr_contexts_show(struct kobject *kobj, > static ssize_t nr_contexts_store(struct kobject *kobj, > struct kobj_attribute *attr, const char *buf, size_t count) > { > - struct damon_sysfs_contexts *contexts = container_of(kobj, > - struct damon_sysfs_contexts, kobj); > + struct damon_sysfs_contexts *contexts; > int nr, err; > > err = kstrtoint(buf, 0, &nr); > @@ -1973,6 +1975,7 @@ static ssize_t nr_contexts_store(struct kobject *kobj, > if (nr < 0 || 1 < nr) > return -EINVAL; > > + contexts = container_of(kobj, struct damon_sysfs_contexts, kobj); > if (!mutex_trylock(&damon_sysfs_lock)) > return -EBUSY; > err = damon_sysfs_contexts_add_dirs(contexts, nr); > @@ -2741,8 +2744,7 @@ static ssize_t nr_kdamonds_show(struct kobject *kobj, > static ssize_t nr_kdamonds_store(struct kobject *kobj, > struct kobj_attribute *attr, const char *buf, size_t count) > { > - struct damon_sysfs_kdamonds *kdamonds = container_of(kobj, > - struct damon_sysfs_kdamonds, kobj); > + struct damon_sysfs_kdamonds *kdamonds; > int nr, err; > > err = kstrtoint(buf, 0, &nr); > @@ -2751,6 +2753,8 @@ static ssize_t nr_kdamonds_store(struct kobject *kobj, > if (nr < 0) > return -EINVAL; > > + kdamonds = container_of(kobj, struct damon_sysfs_kdamonds, kobj); > + > if (!mutex_trylock(&damon_sysfs_lock)) > return -EBUSY; > err = damon_sysfs_kdamonds_add_dirs(kdamonds, nr); > -- > 2.31.0