Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1185516ybh; Thu, 16 Jul 2020 05:42:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyVR6e98vb575MM4SAbH5/YH5JeDsR+CKcoGKyZIR1wXtX48XSyln+3a27a8Q6+NDCkd/ZJ X-Received: by 2002:aa7:d043:: with SMTP id n3mr4479464edo.102.1594903379386; Thu, 16 Jul 2020 05:42:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594903379; cv=none; d=google.com; s=arc-20160816; b=dknq0Kgd64wWVYlWlvtP9MfpKNsVUTceR0Mmxnq3257nMx5ZNg1Sv6X2vmYF60s1n+ aRK3BMAMOLGvhAGuwRdiNjfTgKXWi/twwhtiA2mQVc1Ua+F2D//I7z/w2QTYnUWKlFV1 JEHjVGc0kU0/pT+H2QHNkktx80nyU5BzpkExjnlSTHpJ9pVjew2FBJ72WXNmVcU0Y2Dr thV+W+jCpCiTvq3FL9QmNvTgZvh/SWPeR7PLG3i3Zta/lIcS5LLQhsZthY8NEhEeOErT B7Nh9DlMI674Se7vLb9gTo005/nqeksViu9KWxWbBkBnAl5RuzJIesjz9wtbvBW+fqqq OdUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=KLbwpk0mm5VqICONpYqrla8mclHcvfvkoS8f8TGivdE=; b=USDVQpcHaGtaxtP+sG26+LUqc7h4UN5Zk5ezg2pjKHyzl7ntmW0yXXaEgE356E4Az+ X5Bw9a91sHUaU6cCbK1LU960k9oSY4CJrs3krBH7H/uI2ZgUNaE1kcgiZlzGhOyy8zB3 k+RNKEWr5OpAWwYLLtipAgXBk/n4e3eX43vVtaQau1mpgzrxN+0/5INyqkkQRNHNGwSd ldr8b6UZhT3o5hDKJFSwZo8bBbrx/UCuU8VzwNxfYP9zzotHjK4BfKD0yNKnX1UeJ/k3 9leSogVBfet0ae1Qvh2zJAMKntZ8poc9K0zvyKGGGuGfhIDwceXsUrAG6te26FgOQOu/ QG0Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c5si3136132edy.429.2020.07.16.05.42.36; Thu, 16 Jul 2020 05:42:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728901AbgGPMjY (ORCPT + 99 others); Thu, 16 Jul 2020 08:39:24 -0400 Received: from mx2.suse.de ([195.135.220.15]:35962 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728780AbgGPMic (ORCPT ); Thu, 16 Jul 2020 08:38:32 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 77D44B93E; Thu, 16 Jul 2020 12:38:35 +0000 (UTC) From: Oscar Salvador To: akpm@linux-foundation.org Cc: mhocko@suse.com, linux-mm@kvack.org, mike.kravetz@oracle.com, david@redhat.com, aneesh.kumar@linux.vnet.ibm.com, naoya.horiguchi@nec.com, linux-kernel@vger.kernel.org, Oscar Salvador , Oscar Salvador Subject: [PATCH v4 06/15] mm,hwpoison: Un-export get_hwpoison_page and make it static Date: Thu, 16 Jul 2020 14:38:00 +0200 Message-Id: <20200716123810.25292-7-osalvador@suse.de> X-Mailer: git-send-email 2.13.7 In-Reply-To: <20200716123810.25292-1-osalvador@suse.de> References: <20200716123810.25292-1-osalvador@suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since get_hwpoison_page is only used in memory-failure code now, let us un-export it and make it private to that code. Signed-off-by: Oscar Salvador --- include/linux/mm.h | 1 - mm/memory-failure.c | 3 +-- 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index b3c8fd204ec4..919bcab54c26 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -3008,7 +3008,6 @@ extern int memory_failure(unsigned long pfn, int flags); extern void memory_failure_queue(unsigned long pfn, int flags); extern void memory_failure_queue_kick(int cpu); extern int unpoison_memory(unsigned long pfn); -extern int get_hwpoison_page(struct page *page); #define put_hwpoison_page(page) put_page(page) extern int sysctl_memory_failure_early_kill; extern int sysctl_memory_failure_recovery; diff --git a/mm/memory-failure.c b/mm/memory-failure.c index d2d6010764e7..48feb45047f7 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -925,7 +925,7 @@ static int page_action(struct page_state *ps, struct page *p, * Return: return 0 if failed to grab the refcount, otherwise true (some * non-zero value.) */ -int get_hwpoison_page(struct page *page) +static int get_hwpoison_page(struct page *page) { struct page *head = compound_head(page); @@ -954,7 +954,6 @@ int get_hwpoison_page(struct page *page) return 0; } -EXPORT_SYMBOL_GPL(get_hwpoison_page); /* * Do all that is necessary to remove user space mappings. Unmap -- 2.26.2