From patchwork Wed Mar 14 15:01:34 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michal Simek X-Patchwork-Id: 131597 Delivered-To: patch@linaro.org Received: by 10.46.84.17 with SMTP id i17csp977866ljb; Wed, 14 Mar 2018 08:01:42 -0700 (PDT) X-Google-Smtp-Source: AG47ELtPG1V3fDONE68Kfvt1xrpKO3PKmsoJjFRqWxtDoOZezjZIRmPiiwTBdwiln/2yD92ni58N X-Received: by 10.101.68.82 with SMTP id e18mr3939508pgq.329.1521039702462; Wed, 14 Mar 2018 08:01:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521039702; cv=none; d=google.com; s=arc-20160816; b=h17Y2cxSBVX5feB9WbpWuz7X5+1Dm8dVksedLVxElpP3551ximZNYYFYG5JYVQuLlg PvznvIEMwRZtOcNlBv1Z7loKsNDD3/CkFSJnw19ko8GW77Ke20molJmdtM9aLxhSnzUz 6FE8ddNSYbleyI1RGGWLvVBiKcvJrUjq7/CQZrUs4FTDkXXVWYbR2qCaX+Eq4HnLwaV7 gDie5UR9WM1hIejEZVbLpeHupAUgIuf69SI1kJkK1lEZTuMIebnXTJuwkLzTVBSKGFLr ou4x7i6LDWsM9aIsX+dJO1q6mol7tcBaPo8BWJo+U7RTCV3Ny+IAKodLKfhrw/F09OH7 LJuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=UMhbBqZGlkz493w1YcJTKpa/DYAm4rMbeQqh0WpwJtI=; b=rugVBmFVr5vLy/FxXPWxmI3zC1t17LHEOCpLp2641JphevSOWh7rVSulpohDrsSfaW +RAW0Cdihz9xL369WSrHr4Bw07Xd7qc8IZUwB433sUMeFAEPs0tK+0NVt2zzvoB2vBis 5zTPw6V7iIN6CmXGirXLdP6vuh6kW9YVq6A0s7TWdUS3ejf2NRd+ViSbhjDACeazO6Im CNWO0N+NgJXdIBLvwj9Yla+tYBy9706kSpp3aQ0PcX9+8Hh1pj6v3y5+EPqDXKG9/jFu hiT4fptHp18vYJBG5cv9KquZ2HyVKMn9KtfRWpgGIyJ0nrDuGeiicUnaTE2BpRTV2RLi ZpjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@monstr-eu.20150623.gappssmtp.com header.s=20150623 header.b=nVRfvXXB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t75si2026486pgc.287.2018.03.14.08.01.41; Wed, 14 Mar 2018 08:01:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@monstr-eu.20150623.gappssmtp.com header.s=20150623 header.b=nVRfvXXB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752187AbeCNPBj (ORCPT + 28 others); Wed, 14 Mar 2018 11:01:39 -0400 Received: from mail-wm0-f67.google.com ([74.125.82.67]:40188 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751624AbeCNPBi (ORCPT ); Wed, 14 Mar 2018 11:01:38 -0400 Received: by mail-wm0-f67.google.com with SMTP id t6so4681886wmt.5 for ; Wed, 14 Mar 2018 08:01:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monstr-eu.20150623.gappssmtp.com; s=20150623; h=sender:from:to:cc:subject:date:message-id; bh=UMhbBqZGlkz493w1YcJTKpa/DYAm4rMbeQqh0WpwJtI=; b=nVRfvXXBgt7bXXpTnLevQd0K2vWbkfJYbklO8nZ1vsOvqzsSppX1rk+MsfTIK9Cvd6 +SnzzNZsSjq5vaUFcSknh315PILjneeh92LMnLBy8ERxCkvYFmfxE79yYp7tI9gKDDxI M8OutGEIlwEzriUmF83e0AvH1n8o5/fOO2HvHOk7DmRLAfXWEEzHHiLb1Tq5IlAHSP6b CUrIoXGnUXj82Mmxk0/+qNUyw97rpnhUHSq8ya7EAVC8CJwK4oNm/EkZmlzWifd5EvON 4PQzuj3zombQ68CSdqzLIItC0GxPoGgTV+Rxzbtu3hQIqjGzcP9yqtg4hWcWpp92Yrsb +uQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id; bh=UMhbBqZGlkz493w1YcJTKpa/DYAm4rMbeQqh0WpwJtI=; b=W8W/aQcoxJjfOcgk58Zds1poF5zfYEwUJeLpvD2t0mQwte+mg3QF4YEcfI5fiOxyQd Jbow2SgZSEAz5w0hc0pTWle6OJ9j0lxqx7vPl5Ylo+4WRdqx3VhU3bDTW0LCg2CQBVjf jKvP8rDQZWTXlQODJ6tc1iBRGT+ZIm4CTDOheqXODmQ/jXo0+HEvWteAOHbxJbxjv0f8 m6q5xyD2meqK1F2fWD+Gra32+eTsOCFYK0YFytVoemOYqOHh0zJOPRpmIP73yJrGzRIt xZuTAfxRq0V0i1Q1Q3QYdPO0oeXy5f2l+Q4UPQXN2Sak524ACeanImvMmgv+7air+opx ElwQ== X-Gm-Message-State: AElRT7GPT8JjixSZA91FgT2Wn3ltxxDm2/f9fdM/Hx0ujbp1K7as07JQ oAFOEPrVJlqVS8U9wbnUz2owIOBS X-Received: by 10.28.66.197 with SMTP id k66mr2080480wmi.58.1521039696697; Wed, 14 Mar 2018 08:01:36 -0700 (PDT) Received: from localhost (nat-35.starnet.cz. [178.255.168.35]) by smtp.gmail.com with ESMTPSA id v9sm2482519wre.96.2018.03.14.08.01.35 (version=TLS1_2 cipher=AES128-SHA bits=128/128); Wed, 14 Mar 2018 08:01:36 -0700 (PDT) From: Michal Simek To: linux-kernel@vger.kernel.org, monstr@monstr.eu Cc: Rob Herring Subject: [PATCH 1/2] microblaze: remove unused alloc_maybe_bootmem Date: Wed, 14 Mar 2018 16:01:34 +0100 Message-Id: <77785f26fa882362b5e72e71845bb607f2cec757.1521039689.git.michal.simek@xilinx.com> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Rob Herring alloc_maybe_bootmem is unused, so remove it. Signed-off-by: Rob Herring Signed-off-by: Michal Simek --- arch/microblaze/include/asm/setup.h | 1 - arch/microblaze/mm/init.c | 8 -------- 2 files changed, 9 deletions(-) -- 1.9.1 diff --git a/arch/microblaze/include/asm/setup.h b/arch/microblaze/include/asm/setup.h index be84a4d3917f..7c968c1d1729 100644 --- a/arch/microblaze/include/asm/setup.h +++ b/arch/microblaze/include/asm/setup.h @@ -44,7 +44,6 @@ void machine_early_init(const char *cmdline, unsigned int ram, void machine_halt(void); void machine_power_off(void); -extern void *alloc_maybe_bootmem(size_t size, gfp_t mask); extern void *zalloc_maybe_bootmem(size_t size, gfp_t mask); # endif /* __ASSEMBLY__ */ diff --git a/arch/microblaze/mm/init.c b/arch/microblaze/mm/init.c index 434639f9a3a6..5bc9c7fbb541 100644 --- a/arch/microblaze/mm/init.c +++ b/arch/microblaze/mm/init.c @@ -414,14 +414,6 @@ void __init *early_get_page(void) #endif /* CONFIG_MMU */ -void * __ref alloc_maybe_bootmem(size_t size, gfp_t mask) -{ - if (mem_init_done) - return kmalloc(size, mask); - else - return alloc_bootmem(size); -} - void * __ref zalloc_maybe_bootmem(size_t size, gfp_t mask) { void *p;