Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13337815ybl; Sun, 29 Dec 2019 09:36:18 -0800 (PST) X-Google-Smtp-Source: APXvYqwV+Gsd1h5cg5K632sZjPLzc+n49dd645Ov+0PVpt8M/CIRZzbTEibpJC2Cs463Vj+SvtUV X-Received: by 2002:a9d:674f:: with SMTP id w15mr70910516otm.243.1577640978863; Sun, 29 Dec 2019 09:36:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577640978; cv=none; d=google.com; s=arc-20160816; b=c70c8nhQopNnN3VzUq39L2dPbIsz2mqgrVQbhxOkgpvl5YA4njdPsPxdedmoGr4GBa MCCYPVSpQLrbs/oCjWIPplPC5InHSN6PVv4vDWfQ3JNGm/q9R/JomxmVvkJE6x+HnY8+ 4w5PJ48y/wAbjwFFGVG/emjfvSeQeWLeAHkcklHzHzuf3al5wdO0vprsy4rWNiFk5mmw 9h8CFRKFoeu52pb8CuSBk2kaBum+Fa0NLu9oRpUr5gt56iMAHfbAqjC0LU8msiG6Yy0K nRrfw7flUTt6JWvkSR90L9/YDUSMXkU0i/Bg8RXGiGlX1HEF0eFR8NtniVM4qV3W49OF H3Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NBx1jjl8mnOv3mlBZsq1bLAgJtAYn1H4z86C7VhN+o0=; b=pSfoPZsCaMTGhpsHrS7i0tF+YGSa77rykV0LCctJba85DX30xEL5zUSnkUisZ6anZ9 intN7aR8c08yOqEeTMX18ZRWL7Wqi/0PIWJ0Mttso+XzK4aq2YCNZlblGzZ7UyOeaylJ +cDGv/4+DzjvUUivdN0qcX049Z8WZn/52AUP0E09MuWbwlyVddcBO5JCYZSSCuHhQhOV DUhbumahLD0FjHTwQOGBOtPXye3QUJY+4tjs4K/i0UfN84epYTXzspliKystnPkQ/5Lq XshcxjULyQdHBl/jO92Xjl6ul3X0clIxSXoMSnlfKUM0J4yGTppuIHk/wdNIQY02dlWB 650Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KvNztuR+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c24si21315328otf.14.2019.12.29.09.36.07; Sun, 29 Dec 2019 09:36:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KvNztuR+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729567AbfL2ReC (ORCPT + 99 others); Sun, 29 Dec 2019 12:34:02 -0500 Received: from mail.kernel.org ([198.145.29.99]:36494 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729557AbfL2ReA (ORCPT ); Sun, 29 Dec 2019 12:34:00 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8BD3A20409; Sun, 29 Dec 2019 17:33:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640840; bh=/4gVWON24o3gT/sJg+4JO2SrZ5r/nsfaYVwhQp0Oat4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KvNztuR+cF6fz8IuE9xMLXBKdbu2QTrE+3yks+izALegX5HUPYsWqeqfDhuaEt98y yZnqo4D5DgrVq6OkRIn/jRNQmKtqwbMQhnAyH/TJyowBLoBYP2qIkCdIhZU4e6klzF Ql39d0UZEDjDi/Uhk2JjA0p3lR5xHXg0snOk0Q+M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , Lianbo Jiang , Borislav Petkov , bhe@redhat.com, d.hatayama@fujitsu.com, dhowells@redhat.com, dyoung@redhat.com, ebiederm@xmission.com, horms@verge.net.au, "H. Peter Anvin" , Ingo Molnar , =?UTF-8?q?J=C3=BCrgen=20Gross?= , kexec@lists.infradead.org, Thomas Gleixner , Tom Lendacky , vgoyal@redhat.com, x86-ml , Sasha Levin Subject: [PATCH 4.19 159/219] x86/crash: Add a forward declaration of struct kimage Date: Sun, 29 Dec 2019 18:19:21 +0100 Message-Id: <20191229162532.764428471@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162508.458551679@linuxfoundation.org> References: <20191229162508.458551679@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lianbo Jiang [ Upstream commit 112eee5d06007dae561f14458bde7f2a4879ef4e ] Add a forward declaration of struct kimage to the crash.h header because future changes will invoke a crash-specific function from the realmode init path and the compiler will complain otherwise like this: In file included from arch/x86/realmode/init.c:11: ./arch/x86/include/asm/crash.h:5:32: warning: ‘struct kimage’ declared inside\ parameter list will not be visible outside of this definition or declaration 5 | int crash_load_segments(struct kimage *image); | ^~~~~~ ./arch/x86/include/asm/crash.h:6:37: warning: ‘struct kimage’ declared inside\ parameter list will not be visible outside of this definition or declaration 6 | int crash_copy_backup_region(struct kimage *image); | ^~~~~~ ./arch/x86/include/asm/crash.h:7:39: warning: ‘struct kimage’ declared inside\ parameter list will not be visible outside of this definition or declaration 7 | int crash_setup_memmap_entries(struct kimage *image, | [ bp: Rewrite the commit message. ] Reported-by: kbuild test robot Signed-off-by: Lianbo Jiang Signed-off-by: Borislav Petkov Cc: bhe@redhat.com Cc: d.hatayama@fujitsu.com Cc: dhowells@redhat.com Cc: dyoung@redhat.com Cc: ebiederm@xmission.com Cc: horms@verge.net.au Cc: "H. Peter Anvin" Cc: Ingo Molnar Cc: Jürgen Gross Cc: kexec@lists.infradead.org Cc: Thomas Gleixner Cc: Tom Lendacky Cc: vgoyal@redhat.com Cc: x86-ml Link: https://lkml.kernel.org/r/20191108090027.11082-4-lijiang@redhat.com Link: https://lkml.kernel.org/r/201910310233.EJRtTMWP%25lkp@intel.com Signed-off-by: Sasha Levin --- arch/x86/include/asm/crash.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/include/asm/crash.h b/arch/x86/include/asm/crash.h index a7adb2bfbf0b..6b8ad6fa3979 100644 --- a/arch/x86/include/asm/crash.h +++ b/arch/x86/include/asm/crash.h @@ -2,6 +2,8 @@ #ifndef _ASM_X86_CRASH_H #define _ASM_X86_CRASH_H +struct kimage; + int crash_load_segments(struct kimage *image); int crash_copy_backup_region(struct kimage *image); int crash_setup_memmap_entries(struct kimage *image, -- 2.20.1