Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp269908imu; Fri, 16 Nov 2018 02:14:07 -0800 (PST) X-Google-Smtp-Source: AJdET5cLv5ubr88HLnOsIvM0nO/nNguk+ZiRd6FIGL6/Mq/e4w1HVF0MeVXCsIsHYiM9JAYxdwQS X-Received: by 2002:a62:1709:: with SMTP id 9mr10260508pfx.249.1542363247385; Fri, 16 Nov 2018 02:14:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542363247; cv=none; d=google.com; s=arc-20160816; b=TEiIKsn5OO/y+QRIhrt7P2GzXj/QoajMvpszWp5S+zQuvZ6/DWKv9WEwqgjnuK2BMi 7Z+FJaiMNxfoHx6XwL4i0jGW9DbrNcPKyx8PvAv1taEaTwM0Gi4lGM7SRAILPRp7Ikoh I0Q0citbICT0FB7eioIBFjzxg9n0SDigjAVjGETjzGr1eg/SQmSkZBkUrDqBeCE908PD tJZIMShzsYwreXlfPjUemyX4t/wQVLwbPU3XxRFXw4A4prVDrx7h0HN34f2GnLlRihye ff6GTb3zzMH7HvYu/HWFsyJ1FjXY9S3y05Uc1BoTLQvontJlYM/sTRnzEpGjLxyPnwpb KpRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=nnKpzYgW+mUuDIHSo/P3/ttMh4xsRWLqEz8xL4ND6XQ=; b=gEjpqaZs0BncBHEwlkbA9lrINHqNyi6MtDNxafZRrZaKZ+rHka6/xQOfkmu4sxxMyQ 3Lwk1f5p/X/y0PnPqOQFQohgEQLDgDA142uFaUl2NwI1hOh2bxIFPKOorcw6KxRLg6// lxIYWUC+86ih6KfyPJqvaf1gvOkCANsM+mMA9VW4u2uEvBg7cJUHph1qeSb65yxqAikP rrKWEYOdJSnxIuB1vPr7wasQSO8PjNmDqYxVeR6qKjHpzufy+s5eJFuiXPZDQuLjC4/f +b+GUk/n8ZuVtvEY4IsD023WOl4X90OvQgh6Ew+tCpsc3OtfDzQr41FM14fe+Mtm6A7W 4ZnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31-v6si30676806plj.36.2018.11.16.02.13.52; Fri, 16 Nov 2018 02:14:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389518AbeKPUYz (ORCPT + 99 others); Fri, 16 Nov 2018 15:24:55 -0500 Received: from smtp.nue.novell.com ([195.135.221.5]:59522 "EHLO smtp.nue.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727490AbeKPUYy (ORCPT ); Fri, 16 Nov 2018 15:24:54 -0500 Received: from emea4-mta.ukb.novell.com ([10.120.13.87]) by smtp.nue.novell.com with ESMTP (TLS encrypted); Fri, 16 Nov 2018 11:13:13 +0100 Received: from d104.suse.de (nwb-a10-snat.microfocus.com [10.120.13.202]) by emea4-mta.ukb.novell.com with ESMTP (NOT encrypted); Fri, 16 Nov 2018 10:12:52 +0000 From: Oscar Salvador To: linux-mm@kvack.org Cc: mhocko@suse.com, david@redhat.com, rppt@linux.vnet.ibm.com, akpm@linux-foundation.org, arunks@codeaurora.org, bhe@redhat.com, dan.j.williams@intel.com, Pavel.Tatashin@microsoft.com, Jonathan.Cameron@huawei.com, jglisse@redhat.com, linux-kernel@vger.kernel.org, Oscar Salvador Subject: [RFC PATCH 4/4] mm, sparse: rename kmalloc_section_memmap, __kfree_section_memmap Date: Fri, 16 Nov 2018 11:12:22 +0100 Message-Id: <20181116101222.16581-5-osalvador@suse.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20181116101222.16581-1-osalvador@suse.com> References: <20181116101222.16581-1-osalvador@suse.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michal Hocko Both functions will use altmap rather than kmalloc for sparsemem-vmemmap so rename them to alloc_section_memmap/free_section_memmap which better reflect the functionality. Signed-off-by: Michal Hocko Signed-off-by: Oscar Salvador --- mm/sparse.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/mm/sparse.c b/mm/sparse.c index 29cbaa0e46c3..719853ef2e55 100644 --- a/mm/sparse.c +++ b/mm/sparse.c @@ -589,13 +589,13 @@ static void free_vmemmap_range(unsigned long limit, unsigned long start, unsigne } } -static inline struct page *kmalloc_section_memmap(unsigned long pnum, int nid, +static inline struct page *alloc_section_memmap(unsigned long pnum, int nid, struct vmem_altmap *altmap) { /* This will make the necessary allocations eventually. */ return sparse_mem_map_populate(pnum, nid, altmap); } -static void __kfree_section_memmap(struct page *memmap, +static void free_section_memmap(struct page *memmap, struct vmem_altmap *altmap) { unsigned long start = (unsigned long)memmap; @@ -646,13 +646,13 @@ static struct page *__kmalloc_section_memmap(void) return ret; } -static inline struct page *kmalloc_section_memmap(unsigned long pnum, int nid, +static inline struct page *alloc_section_memmap(unsigned long pnum, int nid, struct vmem_altmap *altmap) { return __kmalloc_section_memmap(); } -static void __kfree_section_memmap(struct page *memmap, +static void free_section_memmap(struct page *memmap, struct vmem_altmap *altmap) { if (is_vmalloc_addr(memmap)) @@ -718,12 +718,12 @@ int __meminit sparse_add_one_section(struct pglist_data *pgdat, if (ret < 0 && ret != -EEXIST) return ret; ret = 0; - memmap = kmalloc_section_memmap(section_nr, pgdat->node_id, altmap); + memmap = alloc_section_memmap(section_nr, pgdat->node_id, altmap); if (!memmap) return -ENOMEM; usemap = __kmalloc_section_usemap(); if (!usemap) { - __kfree_section_memmap(memmap, altmap); + free_section_memmap(memmap, altmap); return -ENOMEM; } @@ -756,7 +756,7 @@ int __meminit sparse_add_one_section(struct pglist_data *pgdat, pgdat_resize_unlock(pgdat, &flags); if (ret < 0) { kfree(usemap); - __kfree_section_memmap(memmap, altmap); + free_section_memmap(memmap, altmap); } return ret; } @@ -798,7 +798,7 @@ static void free_section_usemap(struct page *memmap, unsigned long *usemap, if (PageSlab(usemap_page) || PageCompound(usemap_page)) { kfree(usemap); if (memmap) - __kfree_section_memmap(memmap, altmap); + free_section_memmap(memmap, altmap); return; } -- 2.13.6