Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3385500ybi; Mon, 10 Jun 2019 09:20:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqwuSlACxKMXKIOaLsG8nRNMqRttL8zKThguVc3I2UoIOQ089hJV8hEOnc+fkTbuoel2PHww X-Received: by 2002:a63:520a:: with SMTP id g10mr16201263pgb.136.1560183631767; Mon, 10 Jun 2019 09:20:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560183631; cv=none; d=google.com; s=arc-20160816; b=a1XJ8DJNIWbO7jZHD+y9Bp1KJJNr48ztedXwUOmo+nFqMOzAk4mDdnHgsED/vQg+rU Qq33DpdbVrVttm//X/AJ1W/RUEC6qhyy7FRDflTBmYxXXfjmTmw7e2AQnClAVDq2qRBE owXsKN3eWAUluHNfycUJgBGMnnKrCGzpxxyVEYGJ38o15K7Wwnmyf3ORQG3S6ySkY1qU NVmjntRbYf9cgOOVh5ra0UTeRbAwCSlh9adrrtGiF/hCZ/jUDbXROD+cb20ZQRsrsK4C nXzwr/o+MpLXeq344taD/c5sT8xQrdMhq3081AU2xc8I5g3ohTKWIJG7RYX0IK4FszTH PDmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=r21zHSKdAJpM2Dm6RpTQpTe5tbOMd6gMJU26Ri+xxGE=; b=J8qYAwndwfzKhbwlS8EpzhLIDphJsCOh8gerbH4v0Yvwo2bFar+6voAPWRKK6Nkwtc SOhiV3ObT3DHK9qpqHYiUcKLig14CW7RfMzFebZp+vu3slrpg2OeblbbmxkBHWBOn/Vg /v2nGShWiCQU2M8fiZjNw96r219cnXbp7IGa4DCf3GRHxdNndOKdP3fPoLkIG1lx8J6j X76HQGm5a0W/G0A0O3ujpCYUnswgzOpcVZWuNcqCcT3V4QW7Z6X8kHfS5TVbx2Tn5hmI U1iNNVfYkpjL9WfYSRBNyIwTebsaT6i74y3DhCXuYN06CrOd/el1u9KB6FC9b3P9OaKN 7KzA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w127si11454854pfw.200.2019.06.10.09.20.15; Mon, 10 Jun 2019 09:20:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391122AbfFJPUG (ORCPT + 99 others); Mon, 10 Jun 2019 11:20:06 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:18121 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2390367AbfFJPUG (ORCPT ); Mon, 10 Jun 2019 11:20:06 -0400 Received: from DGGEMS401-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 75CD99FD8F804A894B66; Mon, 10 Jun 2019 23:19:56 +0800 (CST) Received: from localhost (10.133.213.239) by DGGEMS401-HUB.china.huawei.com (10.3.19.201) with Microsoft SMTP Server id 14.3.439.0; Mon, 10 Jun 2019 23:19:46 +0800 From: YueHaibing To: , , , , CC: , , YueHaibing Subject: [PATCH net-next] tcp: Make tcp_fastopen_alloc_ctx static Date: Mon, 10 Jun 2019 23:19:08 +0800 Message-ID: <20190610151908.23116-1-yuehaibing@huawei.com> X-Mailer: git-send-email 2.10.2.windows.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.133.213.239] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix sparse warning: net/ipv4/tcp_fastopen.c:75:29: warning: symbol 'tcp_fastopen_alloc_ctx' was not declared. Should it be static? Reported-by: Hulk Robot Signed-off-by: YueHaibing --- net/ipv4/tcp_fastopen.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/net/ipv4/tcp_fastopen.c b/net/ipv4/tcp_fastopen.c index 8e15804..7d19fa4 100644 --- a/net/ipv4/tcp_fastopen.c +++ b/net/ipv4/tcp_fastopen.c @@ -72,9 +72,9 @@ void tcp_fastopen_ctx_destroy(struct net *net) call_rcu(&ctxt->rcu, tcp_fastopen_ctx_free); } -struct tcp_fastopen_context *tcp_fastopen_alloc_ctx(void *primary_key, - void *backup_key, - unsigned int len) +static struct tcp_fastopen_context *tcp_fastopen_alloc_ctx(void *primary_key, + void *backup_key, + unsigned int len) { struct tcp_fastopen_context *new_ctx; void *key = primary_key; -- 2.7.4