@@ -240,7 +240,7 @@ static void uvm_release_deferred(void *data)
240240 // Since this function is only scheduled to run when uvm_release() fails
241241 // to trylock-acquire the pm.lock, the following acquisition attempt
242242 // is expected to block this thread, and cause it to remain blocked until
243- // uvm_resume() releases the lock. As a result, the deferred release
243+ // uvm_resume() releases the lock. As a result, the deferred release
244244 // kthread queue may stall for long periods of time.
245245 uvm_down_read (& g_uvm_global .pm .lock );
246246
@@ -292,14 +292,14 @@ static int uvm_release(struct inode *inode, struct file *filp)
292292
293293 // Because the kernel discards the status code returned from this release
294294 // callback, early exit in case of a pm.lock acquisition failure is not
295- // an option. Instead, the teardown work normally performed synchronously
295+ // an option. Instead, the teardown work normally performed synchronously
296296 // needs to be scheduled to run after uvm_resume() releases the lock.
297297 if (uvm_down_read_trylock (& g_uvm_global .pm .lock )) {
298298 uvm_va_space_destroy (va_space );
299299 uvm_up_read (& g_uvm_global .pm .lock );
300300 }
301301 else {
302- // Remove references to this inode from the address_space. This isn't
302+ // Remove references to this inode from the address_space. This isn't
303303 // strictly necessary, as any CPU mappings of this file have already
304304 // been destroyed, and va_space->mapping won't be used again. Still,
305305 // the va_space survives the inode if its destruction is deferred, in
@@ -867,8 +867,8 @@ static int uvm_mmap(struct file *filp, struct vm_area_struct *vma)
867867 }
868868
869869 // If the PM lock cannot be acquired, disable the VMA and report success
870- // to the caller. The caller is expected to determine whether the
871- // map operation succeeded via an ioctl() call. This is necessary to
870+ // to the caller. The caller is expected to determine whether the
871+ // map operation succeeded via an ioctl() call. This is necessary to
872872 // safely handle MAP_FIXED, which needs to complete atomically to prevent
873873 // the loss of the virtual address range.
874874 if (!uvm_down_read_trylock (& g_uvm_global .pm .lock )) {
@@ -1233,19 +1233,8 @@ static int uvm_init(void)
12331233 goto error ;
12341234 }
12351235
1236- pr_info ("Loaded the UVM driver, major device number %d.\n" , MAJOR (g_uvm_base_dev ));
1237-
12381236 if (uvm_enable_builtin_tests )
1239- pr_info ("Built-in UVM tests are enabled. This is a security risk.\n" );
1240-
1241- // After Open RM is released, both the enclosing "#if" and this comment
1242- // block should be removed, because the uvm_hmm_is_enabled_system_wide()
1243- // check is both necessary and sufficient for reporting functionality.
1244- // Until that time, however, we need to avoid advertisting UVM's ability to
1245- // enable HMM functionality.
1246-
1247- if (uvm_hmm_is_enabled_system_wide ())
1248- UVM_INFO_PRINT ("HMM (Heterogeneous Memory Management) is enabled in the UVM driver.\n" );
1237+ UVM_INFO_PRINT ("Built-in UVM tests are enabled. This is a security risk.\n" );
12491238
12501239 return 0 ;
12511240
@@ -1274,8 +1263,6 @@ static void uvm_exit(void)
12741263 uvm_global_exit ();
12751264
12761265 uvm_test_unload_state_exit ();
1277-
1278- pr_info ("Unloaded the UVM driver.\n" );
12791266}
12801267
12811268static void __exit uvm_exit_entry (void )
0 commit comments