Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3182007ybv; Sun, 9 Feb 2020 17:22:05 -0800 (PST) X-Google-Smtp-Source: APXvYqxmo44Hqm8azCZLnbarm3psAsyGzMWSyhmnQhLkHFP0xbS6jQSH12qKaOxT9n6cqb3FeFTG X-Received: by 2002:aca:5746:: with SMTP id l67mr9407120oib.60.1581297725235; Sun, 09 Feb 2020 17:22:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581297725; cv=none; d=google.com; s=arc-20160816; b=O4cKS3OmdUE/7HnYy7Rwv4y5Ls/D/ijNFMs2DceBmUlKVWfDbUQhgbQqzsjzeAU2Vd vqLvpkoFP3mlKj+yh5JO/2mNxo/bA9hgAsGLsJjvwMb3XTMzczUjnUvsfYs9WToT9tRY W38ZHhQAZEUK9FRsd3l+jUFRV2/3wHnG63LTVDs7cj7EU6+3yovxCv970C+PJKv7mAAy nwlVrX0US/PFmt0FfbUSZk075gQHlhJia1qIHBzFO0E2FJQJU6jC5tjnCAmTvst0+t3R FkwXjO+Qdg7OedxI3a/gSscjgiTzXIp/JFaGazK22sNJLv7nHzNKqpIbCm5g99sYeQ0H V4rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=3RZ/JiYZBBAOwoMI0mqtMEp9/czGmILq/vIegtgyhZo=; b=urDZUtA07JdfoOe7l8cSrPqkl27EBGvizfRtdKHBrnr/cQQiP38iD6PdRc4I8We0OH UeO6cQ1PoZznnaoSVCt8XnHk0nNye1x9lMtJC+A9IVvBQVRPsAATw584xbLt+jNi3Ewq biX+oupTqWO8/6I002FYluRr5szypOIWmYGTKggplH0hmSyWF3+v2yTT3IEQiTKyMhsR 4hi/j2BXX1Rki74yQoeTVGMl5qy7XohhvYAjdSK+pz+1hTIz/8IQRORVKbBE9qU6Jrip E0gOpPv4+VwI8aFhztJuqnJadzrAvk6NeJggCCj9nZShFmx9gNDGL5oiQB4vTqTbWoCr JOzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d6si4820257oic.190.2020.02.09.17.21.44; Sun, 09 Feb 2020 17:22:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727008AbgBJBUt (ORCPT + 99 others); Sun, 9 Feb 2020 20:20:49 -0500 Received: from szxga05-in.huawei.com ([45.249.212.191]:9711 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725868AbgBJBUt (ORCPT ); Sun, 9 Feb 2020 20:20:49 -0500 Received: from DGGEMS406-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 2EB9D8629322D0A65290; Mon, 10 Feb 2020 09:20:46 +0800 (CST) Received: from localhost.localdomain.localdomain (10.175.113.25) by DGGEMS406-HUB.china.huawei.com (10.3.19.206) with Microsoft SMTP Server id 14.3.439.0; Mon, 10 Feb 2020 09:20:36 +0800 From: Hongbo Yao To: , CC: , , , , , , , , , Subject: [PATCH bpf-next] bpf: make btf_check_func_type_match() static Date: Mon, 10 Feb 2020 09:14:41 +0800 Message-ID: <20200210011441.147102-1-yaohongbo@huawei.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.113.25] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix sparse warning: kernel/bpf/btf.c:4131:5: warning: symbol 'btf_check_func_type_match' was not declared. Should it be static? Reported-by: Hulk Robot Signed-off-by: Hongbo Yao --- kernel/bpf/btf.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 8c9d8f266bef..f24868a4176a 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -4144,9 +4144,9 @@ int btf_distill_func_proto(struct bpf_verifier_log *log, * EFAULT - verifier bug * 0 - 99% match. The last 1% is validated by the verifier. */ -int btf_check_func_type_match(struct bpf_verifier_log *log, - struct btf *btf1, const struct btf_type *t1, - struct btf *btf2, const struct btf_type *t2) +static int btf_check_func_type_match(struct bpf_verifier_log *log, + struct btf *btf1, const struct btf_type *t1, + struct btf *btf2, const struct btf_type *t2) { const struct btf_param *args1, *args2; const char *fn1, *fn2, *s1, *s2; -- 2.20.1