From nobody Sat May 10 03:05:52 2025 Delivered-To: importer2@patchew.org Received-SPF: pass (zohomail.com: domain of vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; envelope-from=linux-kernel-owner@vger.kernel.org; helo=vger.kernel.org; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail(p=none dis=none) header.from=linux.alibaba.com ARC-Seal: i=1; a=rsa-sha256; t=1605257924; cv=none; d=zohomail.com; s=zohoarc; b=EVb3D4NMvSw0tLf8liKpCtUojtkgV2Q7aPgdDXamBiIq6jj/cx8xnIBkyZLKdle1smcl9tuvrInNeloRvJI6YQrwm0rR2mN1tRp3VdHsTmxl9ng8MGXrt7luuz07yT2TO15aWT2qYKxPUSEUAM6MbtdvHZeqpe+gdNXf/kBWTdA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1605257924; h=Cc:Date:From:In-Reply-To:List-Id:Message-ID:References:Subject:To; bh=VGHrFjsUKHfOvR2fIIFfU0KubKMr+NZkjCrFaRkvCB8=; b=RafltkbfXWUf+EXB777izNW6f4srupDo6yVmVdt8TgKBTUrCXL8gZx61fKTr5o2YMcYxMkXbN1bppX/L2eqjVIvGzeGcdz7Ce672Uzc+Nlb21kKpRB/KdAFv0BEIadVSPFF5C2acS6QQRmyai54bdoSBEWFOXhek9kYaCAa+9qA= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass (zohomail.com: domain of vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mx.zohomail.com with SMTP id 1605257924211872.334433698843; Fri, 13 Nov 2020 00:58:44 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726362AbgKMI6n (ORCPT ); Fri, 13 Nov 2020 03:58:43 -0500 Received: from out30-133.freemail.mail.aliyun.com ([115.124.30.133]:54211 "EHLO out30-133.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726327AbgKMI6k (ORCPT ); Fri, 13 Nov 2020 03:58:40 -0500 Received: from aliy80.localdomain(mailfrom:alex.shi@linux.alibaba.com fp:SMTPD_---0UFAepvk_1605257910) by smtp.aliyun-inc.com(127.0.0.1); Fri, 13 Nov 2020 16:58:36 +0800 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R181e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04420;MF=alex.shi@linux.alibaba.com;NM=1;PH=DS;RN=6;SR=0;TI=SMTPD_---0UFAepvk_1605257910; From: Alex Shi Cc: Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Darren Hart , Will Deacon , linux-kernel@vger.kernel.org Subject: [PATCH] locking/rtmutex: remove useless parameter for rt_mutex_proxy_unlock Date: Fri, 13 Nov 2020 16:58:12 +0800 Message-Id: <1605257895-5536-3-git-send-email-alex.shi@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1605257895-5536-1-git-send-email-alex.shi@linux.alibaba.com> References: <1605257895-5536-1-git-send-email-alex.shi@linux.alibaba.com> To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" The parameter 'proxy_owner' isn't used, so could be removed. Signed-off-by: Alex Shi Cc: Thomas Gleixner =20 Cc: Ingo Molnar =20 Cc: Peter Zijlstra =20 Cc: Darren Hart =20 Cc: Will Deacon =20 Cc: linux-kernel@vger.kernel.org=20 --- kernel/futex.c | 2 +- kernel/locking/rtmutex.c | 3 +-- kernel/locking/rtmutex_common.h | 3 +-- 3 files changed, 3 insertions(+), 5 deletions(-) diff --git a/kernel/futex.c b/kernel/futex.c index f8614ef4ff31..347deedcfd0e 100644 --- a/kernel/futex.c +++ b/kernel/futex.c @@ -796,7 +796,7 @@ static void put_pi_state(struct futex_pi_state *pi_stat= e) list_del_init(&pi_state->list); raw_spin_unlock(&owner->pi_lock); } - rt_mutex_proxy_unlock(&pi_state->pi_mutex, owner); + rt_mutex_proxy_unlock(&pi_state->pi_mutex); raw_spin_unlock_irq(&pi_state->pi_mutex.wait_lock); } =20 diff --git a/kernel/locking/rtmutex.c b/kernel/locking/rtmutex.c index 50fa521fe767..f196045f2857 100644 --- a/kernel/locking/rtmutex.c +++ b/kernel/locking/rtmutex.c @@ -1721,8 +1721,7 @@ void rt_mutex_init_proxy_locked(struct rt_mutex *lock, * possible because it belongs to the pi_state which is about to be freed * and it is not longer visible to other tasks. */ -void rt_mutex_proxy_unlock(struct rt_mutex *lock, - struct task_struct *proxy_owner) +void rt_mutex_proxy_unlock(struct rt_mutex *lock) { debug_rt_mutex_proxy_unlock(lock); rt_mutex_set_owner(lock, NULL); diff --git a/kernel/locking/rtmutex_common.h b/kernel/locking/rtmutex_commo= n.h index d1d62f942be2..ca6fb489007b 100644 --- a/kernel/locking/rtmutex_common.h +++ b/kernel/locking/rtmutex_common.h @@ -133,8 +133,7 @@ enum rtmutex_chainwalk { extern struct task_struct *rt_mutex_next_owner(struct rt_mutex *lock); extern void rt_mutex_init_proxy_locked(struct rt_mutex *lock, struct task_struct *proxy_owner); -extern void rt_mutex_proxy_unlock(struct rt_mutex *lock, - struct task_struct *proxy_owner); +extern void rt_mutex_proxy_unlock(struct rt_mutex *lock); extern void rt_mutex_init_waiter(struct rt_mutex_waiter *waiter); extern int __rt_mutex_start_proxy_lock(struct rt_mutex *lock, struct rt_mutex_waiter *waiter, --=20 2.29.GIT