From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id F210CC46467 for ; Wed, 4 Jan 2023 10:32:37 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5AA138E0002; Wed, 4 Jan 2023 05:32:37 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 532CF8E0001; Wed, 4 Jan 2023 05:32:37 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3D3BA8E0002; Wed, 4 Jan 2023 05:32:37 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 29EB48E0001 for ; Wed, 4 Jan 2023 05:32:37 -0500 (EST) Received: from smtpin17.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 0333CC0637 for ; Wed, 4 Jan 2023 10:32:36 +0000 (UTC) X-FDA: 80316752754.17.B9553A0 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf15.hostedemail.com (Postfix) with ESMTP id 87118A0007 for ; Wed, 4 Jan 2023 10:32:35 +0000 (UTC) Authentication-Results: imf15.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=WF1R2MPV; spf=pass (imf15.hostedemail.com: domain of rppt@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=rppt@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1672828355; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Be7omOj3GYqUM8TriQzzWoiN/wEvmeCdR1t82ci01eI=; b=1KLGB3Uf+GcqYsLz6i1WvP3bPM/j17SikAVQjVqV13KhvpEJ3FEINx+BD8MZVxqsOnF+hu iEmmEdpHLQDzsaJnfApvkJ9J5q6uSMVhQwns1F+X29EZeoY0LTafSFTriIEMfenCxuCECq Y0fWu5J8zgGaTc5/+x3/5bhE7cRk24w= ARC-Authentication-Results: i=1; imf15.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=WF1R2MPV; spf=pass (imf15.hostedemail.com: domain of rppt@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=rppt@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1672828355; a=rsa-sha256; cv=none; b=zEuejtNMaDgAk3Ix3ACYK/QXM6dsjwEF9fDJGqMrqBXpeT6gWcTqr7sRZxTJ56MbLLVeuH ijcPtxqvt0yXNw11VgYv81wKjKBis4j2twty0F7+x3JpTpPvqzvuGNc+GoIJ/S24wicr5e SFFGdmvjr6LKD4+eoQQ9Am2L5MHACoI= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 873CD61698; Wed, 4 Jan 2023 10:32:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9D2C8C433D2; Wed, 4 Jan 2023 10:32:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1672828353; bh=GkTdvslnrFVBa2cyBAB43WHO7wxBxOn/8ycIzVEF8Gc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=WF1R2MPVg4cO38YS1OVSyYHzd705Ua+IW7gNEIeuwmpvMSRzWc+Md3ZjIRrjlxPGQ dhCXaOT21pgMz/Lmx9+LlB+T7XAI6QCPLImfFO/RgQU+CVnqRvyv8Svfc32cfCKm8l rIHPpibjJBtK9UtBhYNXd9X74L8r7csGZd1DXOYK9xFQILQO0dIKbpxrbl+by3m0xf X9y8bfFIyQDUY0purZazeuVj9UMNfQFKiU/ugk6jEubWF2O3q/TN6CllewABPh8hOi 3rXS5nVFNNbVPl0TWrnXkGgE6YxOxiT1bFnLKhuS5TvETHMlTZllzuw2+YOgyjhNUx SD4byWRxwrNBw== Date: Wed, 4 Jan 2023 12:32:19 +0200 From: Mike Rapoport To: Miaoqian Lin Cc: Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] memblock: Fix doc for memblock_phys_free Message-ID: References: <20221216100304.688209-1-linmq006@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221216100304.688209-1-linmq006@gmail.com> X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 87118A0007 X-Stat-Signature: sityo4i49qcf1ak9848aeq5mf79shhh1 X-HE-Tag: 1672828355-320644 X-HE-Meta: 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 pHxuKvyr oatgVyG/QEgQ5ojUilZ4ABA5Dos0Y5sNwVqbASM9bKRXSAL+tGwjaGfXwu5TVKvp5a1JFyyBfhIWBOR4= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, Dec 16, 2022 at 02:03:03PM +0400, Miaoqian Lin wrote: > memblock_phys_free() is the counterpart to memblock_phys_alloc. > Change memblock_alloc_xx() with memblock_phys_alloc_xx() to keep > a consistency. > > Signed-off-by: Miaoqian Lin > --- > mm/memblock.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/mm/memblock.c b/mm/memblock.c > index 511d4783dcf1..d036c7861310 100644 > --- a/mm/memblock.c > +++ b/mm/memblock.c > @@ -836,7 +836,7 @@ void __init_memblock memblock_free(void *ptr, size_t size) > * @base: phys starting address of the boot memory block > * @size: size of the boot memory block in bytes > * > - * Free boot memory block previously allocated by memblock_alloc_xx() API. > + * Free boot memory block previously allocated by memblock_phys_alloc_xx() API. > * The freeing memory will not be released to the buddy allocator. > */ > int __init_memblock memblock_phys_free(phys_addr_t base, phys_addr_t size) > -- > 2.25.1 Applied, thanks! -- Sincerely yours, Mike.