X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=mm%2Fhwpoison-inject.c;h=cc448bb983babf65bd0e643047353a32f787b5e6;hb=cd42f4a3b2b1c4cbd997363dc57821953d73fd87;hp=c7fc7fd00e32695a62f8a55363e8b1b88f4815a8;hpb=dc47ce90c3a822cd7c9e9339fe4d5f61dcb26b50;p=platform%2Fadaptation%2Frenesas_rcar%2Frenesas_kernel.git diff --git a/mm/hwpoison-inject.c b/mm/hwpoison-inject.c index c7fc7fd..cc448bb 100644 --- a/mm/hwpoison-inject.c +++ b/mm/hwpoison-inject.c @@ -45,7 +45,7 @@ static int hwpoison_inject(void *data, u64 val) * do a racy check with elevated page count, to make sure PG_hwpoison * will only be set for the targeted owner (or on a free page). * We temporarily take page lock for try_get_mem_cgroup_from_page(). - * __memory_failure() will redo the check reliably inside page lock. + * memory_failure() will redo the check reliably inside page lock. */ lock_page(hpage); err = hwpoison_filter(hpage); @@ -55,7 +55,7 @@ static int hwpoison_inject(void *data, u64 val) inject: printk(KERN_INFO "Injecting memory failure at pfn %lx\n", pfn); - return __memory_failure(pfn, 18, MF_COUNT_INCREASED); + return memory_failure(pfn, 18, MF_COUNT_INCREASED); } static int hwpoison_unpoison(void *data, u64 val)