diff options
author | Richard Yao <[email protected]> | 2012-06-25 13:22:21 -0400 |
---|---|---|
committer | Brian Behlendorf <[email protected]> | 2012-07-03 16:07:27 -0700 |
commit | 973e8269bd99f9440149892d598f8914113d0278 (patch) | |
tree | 18afae523a87337f8f884fd3580ea82b2527e3b0 /module/spl/spl-kmem.c | |
parent | 33f507c0f3fb9976274bcf081bc0ce6fc3d5a771 (diff) |
Constify memory management functions
This prevents warnings in ZFS that were caused by changes necessary to
support PaX patched kernels. When debugging is enabled, these warnings
become build failures.
Signed-off-by: Richard Yao <[email protected]>
Signed-off-by: Brian Behlendorf <[email protected]>
Closes #131
Diffstat (limited to 'module/spl/spl-kmem.c')
-rw-r--r-- | module/spl/spl-kmem.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/module/spl/spl-kmem.c b/module/spl/spl-kmem.c index e1d74d3c0..a6d09f9a2 100644 --- a/module/spl/spl-kmem.c +++ b/module/spl/spl-kmem.c @@ -385,7 +385,7 @@ EXPORT_SYMBOL(vmem_table); EXPORT_SYMBOL(vmem_list); static kmem_debug_t * -kmem_del_init(spinlock_t *lock, struct hlist_head *table, int bits, void *addr) +kmem_del_init(spinlock_t *lock, struct hlist_head *table, int bits, const void *addr) { struct hlist_head *head; struct hlist_node *node; @@ -504,7 +504,7 @@ out: EXPORT_SYMBOL(kmem_alloc_track); void -kmem_free_track(void *ptr, size_t size) +kmem_free_track(const void *ptr, size_t size) { kmem_debug_t *dptr; SENTRY; @@ -619,7 +619,7 @@ out: EXPORT_SYMBOL(vmem_alloc_track); void -vmem_free_track(void *ptr, size_t size) +vmem_free_track(const void *ptr, size_t size) { kmem_debug_t *dptr; SENTRY; @@ -706,7 +706,7 @@ kmem_alloc_debug(size_t size, int flags, const char *func, int line, EXPORT_SYMBOL(kmem_alloc_debug); void -kmem_free_debug(void *ptr, size_t size) +kmem_free_debug(const void *ptr, size_t size) { SENTRY; @@ -758,7 +758,7 @@ vmem_alloc_debug(size_t size, int flags, const char *func, int line) EXPORT_SYMBOL(vmem_alloc_debug); void -vmem_free_debug(void *ptr, size_t size) +vmem_free_debug(const void *ptr, size_t size) { SENTRY; |