Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp1141008ybg; Fri, 18 Oct 2019 12:42:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqyEa40JQ4sSPL/iMwf99k08WCnCI0AeDCfagS6dXt/91Iz3UEnLupYRX8CJ2MNN/m0KayeR X-Received: by 2002:a05:6402:8cf:: with SMTP id d15mr11270176edz.225.1571427719957; Fri, 18 Oct 2019 12:41:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571427719; cv=none; d=google.com; s=arc-20160816; b=H53VL4Ed1vpBnjggCkbkBU4p8QgOhbX1Zo3GxeH96Hb4lw7sHklU/IkovqVmACIapE cQ8xNwwQ8aytyJP9uGGIPk0DXOjSr21NngMsECTu371u9WSh+GsEdY/Id1/TVmfTtSsW Hfuc0ySyWFLmMoWqloNIJgMU83YM6QXx5eMwsuz1xkFfUNCEgEKDLlEu0tdByI0NyyJe K+qCc+Z8adGgFSav4sUbG91t7EnN5vNy8cnuaVdudsyCptzSaPP02R6SHvw42G+h6gGU eFXSFRtnWZ5LqLLx2pjqDbsYbT5MiJ9vZhjKKhFLeWrd1lJR/5Dummz4ey9amlDfJSCS pEsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=uAeyRuChOBrSOyYYZPclqVnuXu6Ml/2d/aYLvtMxLEM=; b=kOZnZdWOMmlk/O6UxL580vXbY2iZ2WqCEI16aakjx67FJXp7cZaEBfpVM/hyPz54NX IPSUQTwf9uGI55YIFMnZDaBx+LuseaGMO7aIOBxcEgSp1jUx0NJx+x7JrwGC96HtzusL x960twirC8BlZ0QAsxFDEcgXosFgM7cYNyfp0BJ8c2pQ42UuB6i2+Q20d27fpnks4sWK o2PKPLjg8svq512UGo/xE1lNFS6pnTXu4RiU4emBVskWTwvFRDB0C3XssOWglhElAzEI 6nDH8plYfCTX6kA3fq9sEtQOc4MZfnOFUMgnH25zVm4nFxYpl0jpTIm8T64LPFKPxeQw HR2g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id nh5si4126694ejb.154.2019.10.18.12.41.36; Fri, 18 Oct 2019 12:41:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2440260AbfJQOWY (ORCPT + 99 others); Thu, 17 Oct 2019 10:22:24 -0400 Received: from mx2.suse.de ([195.135.220.15]:40578 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2440095AbfJQOVe (ORCPT ); Thu, 17 Oct 2019 10:21:34 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E54FCB499; Thu, 17 Oct 2019 14:21:33 +0000 (UTC) From: Oscar Salvador To: n-horiguchi@ah.jp.nec.com Cc: mhocko@kernel.org, mike.kravetz@oracle.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Oscar Salvador Subject: [RFC PATCH v2 05/16] mm,hwpoison: Un-export get_hwpoison_page and make it static Date: Thu, 17 Oct 2019 16:21:12 +0200 Message-Id: <20191017142123.24245-6-osalvador@suse.de> X-Mailer: git-send-email 2.13.7 In-Reply-To: <20191017142123.24245-1-osalvador@suse.de> References: <20191017142123.24245-1-osalvador@suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since get_hwpoison_page is only used in memory-failure code now, let us un-export it and make it private to that code. Signed-off-by: Oscar Salvador --- include/linux/mm.h | 1 - mm/memory-failure.c | 3 +-- 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 44d058723db9..a646eb4dc993 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -2788,7 +2788,6 @@ enum mf_flags { extern int memory_failure(unsigned long pfn, int flags); extern void memory_failure_queue(unsigned long pfn, int flags); extern int unpoison_memory(unsigned long pfn); -extern int get_hwpoison_page(struct page *page); #define put_hwpoison_page(page) put_page(page) extern int sysctl_memory_failure_early_kill; extern int sysctl_memory_failure_recovery; diff --git a/mm/memory-failure.c b/mm/memory-failure.c index 2cbadb58c7df..5ce634ddf9fa 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -913,7 +913,7 @@ static int page_action(struct page_state *ps, struct page *p, * Return: return 0 if failed to grab the refcount, otherwise true (some * non-zero value.) */ -int get_hwpoison_page(struct page *page) +static int get_hwpoison_page(struct page *page) { struct page *head = compound_head(page); @@ -942,7 +942,6 @@ int get_hwpoison_page(struct page *page) return 0; } -EXPORT_SYMBOL_GPL(get_hwpoison_page); /* * Do all that is necessary to remove user space mappings. Unmap -- 2.12.3