summaryrefslogtreecommitdiffstats
path: root/mm/page_poison.c
diff options
context:
space:
mode:
authorWei Wang <wei.w.wang@intel.com>2018-08-27 09:32:18 +0800
committerMichael S. Tsirkin <mst@redhat.com>2018-10-24 20:57:55 -0400
commitd95f58f4a6ca002126c36c530fb096519c94baef (patch)
tree82797476fab40bafabc27af059f3ec42f9aae52d /mm/page_poison.c
parent86a559787e6f5cf662c081363f64a20cad654195 (diff)
downloadlinux-d95f58f4a6ca002126c36c530fb096519c94baef.tar.gz
linux-d95f58f4a6ca002126c36c530fb096519c94baef.tar.bz2
linux-d95f58f4a6ca002126c36c530fb096519c94baef.zip
mm/page_poison: expose page_poisoning_enabled to kernel modules
In some usages, e.g. virtio-balloon, a kernel module needs to know if page poisoning is in use. This patch exposes the page_poisoning_enabled function to kernel modules. Signed-off-by: Wei Wang <wei.w.wang@intel.com> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Michal Hocko <mhocko@kernel.org> Cc: Michael S. Tsirkin <mst@redhat.com> Acked-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Diffstat (limited to 'mm/page_poison.c')
-rw-r--r--mm/page_poison.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/mm/page_poison.c b/mm/page_poison.c
index aa2b3d34e8ea..830f60489b14 100644
--- a/mm/page_poison.c
+++ b/mm/page_poison.c
@@ -17,6 +17,11 @@ static int __init early_page_poison_param(char *buf)
}
early_param("page_poison", early_page_poison_param);
+/**
+ * page_poisoning_enabled - check if page poisoning is enabled
+ *
+ * Return true if page poisoning is enabled, or false if not.
+ */
bool page_poisoning_enabled(void)
{
/*
@@ -29,6 +34,7 @@ bool page_poisoning_enabled(void)
(!IS_ENABLED(CONFIG_ARCH_SUPPORTS_DEBUG_PAGEALLOC) &&
debug_pagealloc_enabled()));
}
+EXPORT_SYMBOL_GPL(page_poisoning_enabled);
static void poison_page(struct page *page)
{