Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp634481rwd; Wed, 31 May 2023 03:18:59 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7a1claA6v0JSBNeCkjr7v1xV+ARl4YQIreOfPG/bOJsoKvN45VI6Tcg4wxSWMvlG1KISbk X-Received: by 2002:a92:d907:0:b0:33a:9ccb:2259 with SMTP id s7-20020a92d907000000b0033a9ccb2259mr2157461iln.3.1685528338899; Wed, 31 May 2023 03:18:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685528338; cv=none; d=google.com; s=arc-20160816; b=mrCKbaEAySO+9HVqQFUUme+cVpAz5RXdQDc6fMw206ZiT/QOr4swCQnnOfVfbBLgND NFHvLnRSVYf0LmSBqU9KXGOAnZja0vK66v1djHnmRiaCJOU+M0aHsvpdOmnveHRZWTny q5dz28XsruwACdAgr7jAK0jxMrR5jpr5Rd4x2ajzex8chhJMJra1I+WH+U+RgUnftPnm QAqnKksedjRsS6CE8ohhbgAznTrHKhwEBFgOTEtDRDelii6vDSZfpKkniLRuGZyKiIY0 BAqjxS5L7MlGvZg2Mly4T8xyhDIADaP/yYSQ/nCQT+szUdFQFajhPY6U7xostG7K2zlG CGSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/+yrP7PJJrDTJFlfec0Z4gx8SGYdj6Pp6yB3C+HFcFA=; b=R+RM6MGrF7SrLPxzM3P5EjFUg646fD5RV3Qh1Cza/HY3NOoEzhUWYM/gcbBO0Yd/Kc dWdreju9PYHFCxUwnRcgs++qLHfYcrrhd/nbInK6gh0dwuIslWb44OBe0UOaejc5hhvW Xo8hK47OQdejLN88VhizBQ1N3s3A/o0b7dyMUFFfnuKKdNGrlnzKg5yzq6yKC1vMyJy7 Mmc/ZPZ1+gZSkZDxRXSB59BiAZPnxQX0BZ4o5/N/bijD7ql4tVfBp053VMEn5a2GVnTo bbwJJT/Bzz7Zb5maJdnv1N7hQxbO788FG2pWZYVYD7F0hWUkysUa8CmecbM/JaAqZeaR Zs/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex.ru header.s=mail header.b=osGjz3xk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex.ru Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e12-20020a170902b78c00b001a1eac2df75si605001pls.490.2023.05.31.03.18.43; Wed, 31 May 2023 03:18:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex.ru header.s=mail header.b=osGjz3xk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235609AbjEaJs4 (ORCPT + 99 others); Wed, 31 May 2023 05:48:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47684 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235636AbjEaJsv (ORCPT ); Wed, 31 May 2023 05:48:51 -0400 Received: from forward103c.mail.yandex.net (forward103c.mail.yandex.net [178.154.239.214]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 40B23186 for ; Wed, 31 May 2023 02:48:47 -0700 (PDT) Received: from mail-nwsmtp-smtp-production-main-46.sas.yp-c.yandex.net (mail-nwsmtp-smtp-production-main-46.sas.yp-c.yandex.net [IPv6:2a02:6b8:c08:4212:0:640:eaad:0]) by forward103c.mail.yandex.net (Yandex) with ESMTP id 4A3776012A; Wed, 31 May 2023 12:48:45 +0300 (MSK) Received: by mail-nwsmtp-smtp-production-main-46.sas.yp-c.yandex.net (smtp/Yandex) with ESMTPSA id PmJIwTgDTSw0-d00CHH58; Wed, 31 May 2023 12:48:44 +0300 X-Yandex-Fwd: 1 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1685526524; bh=/+yrP7PJJrDTJFlfec0Z4gx8SGYdj6Pp6yB3C+HFcFA=; h=Message-Id:Date:Cc:Subject:To:From; b=osGjz3xkoP0YDkppDo8ILcDt0r6Uw3SsAsyXcheW034TzenmBUZsE9+wPQOrLsbH8 S/u0uX1fwwwZoQv5UnHJ5zU8Ro/pckcycPT8j6/dIhLD+3FeXskKlsC2BBvHPGHXi3 W0/GRN6PvftQqQqW4mNHb39hPDDz73uLbX+mHU6s= Authentication-Results: mail-nwsmtp-smtp-production-main-46.sas.yp-c.yandex.net; dkim=pass header.i=@yandex.ru From: Dmitry Antipov To: Ingo Molnar Cc: Thomas Gleixner , x86@kernel.org, linux-kernel@vger.kernel.org, Dmitry Antipov , Dmitriy Antipov Subject: [PATCH] x86: add prototypes to fix 'make LLVM=1 W=1' build Date: Wed, 31 May 2023 12:47:46 +0300 Message-Id: <20230531094746.114547-1-dmantipov@yandex.ru> X-Mailer: git-send-email 2.40.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add prototypes required to fix the following 'make LLVM=1 W=1' build errors: arch/x86/entry/common.c:238:24: error: no previous prototype for function 'do_SYSENTER_32' [-Werror,-Wmissing-prototypes] __visible noinstr long do_SYSENTER_32(struct pt_regs *regs) ^ arch/x86/entry/common.c:302:24: error: no previous prototype for function 'xen_pv_evtchn_do_upcall' [-Werror,-Wmissing-prototypes] __visible noinstr void xen_pv_evtchn_do_upcall(struct pt_regs *regs) ^ Signed-off-by: Dmitriy Antipov --- arch/x86/include/asm/syscall.h | 4 ++++ arch/x86/include/asm/xen/events.h | 2 ++ 2 files changed, 6 insertions(+) diff --git a/arch/x86/include/asm/syscall.h b/arch/x86/include/asm/syscall.h index 5b85987a5e97..b7929c27dc4f 100644 --- a/arch/x86/include/asm/syscall.h +++ b/arch/x86/include/asm/syscall.h @@ -132,4 +132,8 @@ long do_fast_syscall_32(struct pt_regs *regs); #endif /* CONFIG_X86_32 */ +#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION) +extern __visible noinstr long do_SYSENTER_32(struct pt_regs *regs); +#endif + #endif /* _ASM_X86_SYSCALL_H */ diff --git a/arch/x86/include/asm/xen/events.h b/arch/x86/include/asm/xen/events.h index 62bdceb594f1..8177aa839e7c 100644 --- a/arch/x86/include/asm/xen/events.h +++ b/arch/x86/include/asm/xen/events.h @@ -34,5 +34,7 @@ static inline bool xen_support_evtchn_rebind(void) return (!xen_hvm_domain() || xen_have_vector_callback); } +extern __visible noinstr void xen_pv_evtchn_do_upcall(struct pt_regs *regs); + extern bool xen_percpu_upcall; #endif /* _ASM_X86_XEN_EVENTS_H */ -- 2.40.1