Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2787271ybe; Sun, 15 Sep 2019 00:30:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqwE0nnw3BvGseJoB/izXG20OkHyUh0Hl706BET9S0DyMSX+QYsAnJyBbXkUzkszworH8C/7 X-Received: by 2002:a17:906:3087:: with SMTP id 7mr14218104ejv.212.1568532603033; Sun, 15 Sep 2019 00:30:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568532603; cv=none; d=google.com; s=arc-20160816; b=EaC6fbo0wiq/HFkEDWd0iZxI2JbEtAjCUO7g2wPF+wCKLaNUoBFv+zSwrxZvTLxOmr nVPDCuL1++sN1FgBGuCfO2q68PvrxeBJQ6gdty0j+vuDwgVRBx8XivtSzknyE2KuE20G +NvoR2YyHBJWM6xRJRlR5KPY64vJrrk6p5ygdF4EHPlsRInsFFMkC3PUwfwkZ/lX10mo 9jeurhf75Hj9aDsVeICEBqTGXv/a/mo5Q6fwacqkMHm9NOypU0eQ1fpjccEoWtZUw7Pe ora+CGuHnPXgjGRsA4qfGHD7NLfzE8QFKB4MiR+pynZOMcYsfUho5tdWzoFv0tLzp4im iPxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-disposition:mime-version:references:subject:cc:to:from:date; bh=7v9MkiZA+5lT1tSGyPdNJ4ePqDELDTEZ3BsYdCwu6BA=; b=NmJIF8zGsB6KjoRCkL08ikxo8qSmZnG4WqUIJaZDfUk4yszlJMm1E8LHDf69uE44Di e2qdMO+NA4xa7UZa6ks//bFotwHECym3DlenpEMv4w8//B57DfoQkfsK3F+NKgFLDSBo 41jpbWOZFB2T8IAxX+0fTVs+GfL/jGqIfdLuGMYaZyWU0Ye/bgJsvQILqPgXIfIhLyvi UaAsmxwpBhQKYpxuxMDFmqWLF+MuPhO8AIuy5KgRiL4az4riGgJ6IHbzE4ITw2gI55PC +SM8gHkqbZA19FXUsL3LhhJe7SV0Y6picPmC78eiZc6wVfP4o7/NnulZia0kmkDHUWqO Ga5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e22si19813890eda.300.2019.09.15.00.29.07; Sun, 15 Sep 2019 00:30:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726201AbfIOFQ4 (ORCPT + 99 others); Sun, 15 Sep 2019 01:16:56 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:46326 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725827AbfIOFQz (ORCPT ); Sun, 15 Sep 2019 01:16:55 -0400 Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x8F5GsAZ039349 for ; Sun, 15 Sep 2019 01:16:54 -0400 Received: from e06smtp03.uk.ibm.com (e06smtp03.uk.ibm.com [195.75.94.99]) by mx0a-001b2d01.pphosted.com with ESMTP id 2v1dqvshj5-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Sun, 15 Sep 2019 01:16:54 -0400 Received: from localhost by e06smtp03.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Sun, 15 Sep 2019 06:16:45 +0100 Received: from b06avi18626390.portsmouth.uk.ibm.com (9.149.26.192) by e06smtp03.uk.ibm.com (192.168.101.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Sun, 15 Sep 2019 06:16:43 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06avi18626390.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x8F5GHlo34013682 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 15 Sep 2019 05:16:17 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E148CA404D; Sun, 15 Sep 2019 05:16:42 +0000 (GMT) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 8A74CA4040; Sun, 15 Sep 2019 05:16:42 +0000 (GMT) Received: from linux.ibm.com (unknown [9.148.8.160]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Sun, 15 Sep 2019 05:16:42 +0000 (GMT) Date: Sun, 15 Sep 2019 08:16:40 +0300 From: Mike Rapoport To: Cao jin Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] mm/memblock: cleanup doc References: <20190912123127.8694-1-caoj.fnst@cn.fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190912123127.8694-1-caoj.fnst@cn.fujitsu.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-TM-AS-GCONF: 00 x-cbid: 19091505-0012-0000-0000-0000034BBAA5 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19091505-0013-0000-0000-000021862D80 Message-Id: <20190915051640.GA11429@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-09-15_02:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1909150057 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 12, 2019 at 08:31:27PM +0800, Cao jin wrote: > fix typos for: > elaboarte -> elaborate > architecure -> architecture > compltes -> completes > > And, convert the markup :c:func:`foo` to foo() as kernel documentation > toolchain can recognize foo() as a function. > > Suggested-by: Mike Rapoport > Signed-off-by: Cao jin Reviewed-by: Mike Rapoport > --- > mm/memblock.c | 44 ++++++++++++++++++++------------------------ > 1 file changed, 20 insertions(+), 24 deletions(-) > > diff --git a/mm/memblock.c b/mm/memblock.c > index 7d4f61ae666a..c23b370cc49e 100644 > --- a/mm/memblock.c > +++ b/mm/memblock.c > @@ -57,42 +57,38 @@ > * at build time. The region arrays for the "memory" and "reserved" > * types are initially sized to %INIT_MEMBLOCK_REGIONS and for the > * "physmap" type to %INIT_PHYSMEM_REGIONS. > - * The :c:func:`memblock_allow_resize` enables automatic resizing of > - * the region arrays during addition of new regions. This feature > - * should be used with care so that memory allocated for the region > - * array will not overlap with areas that should be reserved, for > - * example initrd. > + * The memblock_allow_resize() enables automatic resizing of the region > + * arrays during addition of new regions. This feature should be used > + * with care so that memory allocated for the region array will not > + * overlap with areas that should be reserved, for example initrd. > * > * The early architecture setup should tell memblock what the physical > - * memory layout is by using :c:func:`memblock_add` or > - * :c:func:`memblock_add_node` functions. The first function does not > - * assign the region to a NUMA node and it is appropriate for UMA > - * systems. Yet, it is possible to use it on NUMA systems as well and > - * assign the region to a NUMA node later in the setup process using > - * :c:func:`memblock_set_node`. The :c:func:`memblock_add_node` > - * performs such an assignment directly. > + * memory layout is by using memblock_add() or memblock_add_node() > + * functions. The first function does not assign the region to a NUMA > + * node and it is appropriate for UMA systems. Yet, it is possible to > + * use it on NUMA systems as well and assign the region to a NUMA node > + * later in the setup process using memblock_set_node(). The > + * memblock_add_node() performs such an assignment directly. > * > * Once memblock is setup the memory can be allocated using one of the > * API variants: > * > - * * :c:func:`memblock_phys_alloc*` - these functions return the > - * **physical** address of the allocated memory > - * * :c:func:`memblock_alloc*` - these functions return the **virtual** > - * address of the allocated memory. > + * * memblock_phys_alloc*() - these functions return the **physical** > + * address of the allocated memory > + * * memblock_alloc*() - these functions return the **virtual** address > + * of the allocated memory. > * > * Note, that both API variants use implict assumptions about allowed > * memory ranges and the fallback methods. Consult the documentation > - * of :c:func:`memblock_alloc_internal` and > - * :c:func:`memblock_alloc_range_nid` functions for more elaboarte > - * description. > + * of memblock_alloc_internal() and memblock_alloc_range_nid() > + * functions for more elaborate description. > * > - * As the system boot progresses, the architecture specific > - * :c:func:`mem_init` function frees all the memory to the buddy page > - * allocator. > + * As the system boot progresses, the architecture specific mem_init() > + * function frees all the memory to the buddy page allocator. > * > - * Unless an architecure enables %CONFIG_ARCH_KEEP_MEMBLOCK, the > + * Unless an architecture enables %CONFIG_ARCH_KEEP_MEMBLOCK, the > * memblock data structures will be discarded after the system > - * initialization compltes. > + * initialization completes. > */ > > #ifndef CONFIG_NEED_MULTIPLE_NODES > -- > 2.21.0 > > > -- Sincerely yours, Mike.