Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp5290154rwp; Mon, 17 Jul 2023 01:01:25 -0700 (PDT) X-Google-Smtp-Source: APBJJlFMi5ZRu35vJnMwxRDmxmIV4ml/Vu91ohdj/YfYil5++dMOKSN/JXd7hvXRXjx5zkxGUgq5 X-Received: by 2002:a17:902:c3d5:b0:1b3:b3c5:1d1f with SMTP id j21-20020a170902c3d500b001b3b3c51d1fmr10980518plj.8.1689580885456; Mon, 17 Jul 2023 01:01:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689580885; cv=none; d=google.com; s=arc-20160816; b=ol5eOhxT1XCpdzuNuLdQxqvu3ae/xaFlgg8RN7Hd0D6al+eIqZcUgiVsY8RCUDScVM kkfNSbx8FGBPrwwQ++S8EWTupas2BXr4p+CJFIDZCBg4+iLou5zzZxa8Rdx8QrYrosib nBFlgecUULvS9SxZNR30R8wosq5ViPcjwF7y1UJ+sLrBfpUYcaFNlEcVan66xBS694OK s5Le2qNj3dqTHtXnrHEhWe3igs04ZA9yr01Xjyshe1qGXz6pWTi7wWWa+gzLjSTtCKVn ER7+nX3DHmD10CTZTApZ66sK9HtiGHbgIcWE3c6s9WG/F0VgtC2ITO7ZcRWPBXKPNQCF a7tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:message-id:user-agent :references:in-reply-to:subject:cc:to:from:date:mime-version :dkim-signature; bh=GC4Jbf0EA3bnqGKCj/0Q3BwsvGOVLbcKC4aVzrhLOvg=; fh=oqYpTbCV0zrKwv6uQcGQYRloYheTxXNaSbbVtevEnjI=; b=yCdL5oi+hmogbDmBS0d/DycW31dIdujKqxDKbv9RfoXJyzyCFpTEWXEoYXmVJSQ8gi syrzpUTpHHYKIFaf1sboHcELFO8jdab1DAOYUXIubvLExEp2xfI43wjQwDFpzT3LSNRq HvBsRtd58TRt14LQYDiGkyCPOG7xDQs1LUYnfGLSc0XIpxeS1aPUH1uYa59+k/URtCm3 f8Eg6VY1+Jcjt9HMQw8O24R4421eEs3x8shJTAOxwVGbece6eaQAoSRwAgDTx6Jh192d Wh9sRlfBFlYQ/pBolGHIemUUgzMIYUlDH9EYSCwl4GEgoewKtII8DitR9irui/wagsLT r3uA== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (bad version) header.i=@208.org header.s=dkim header.b=RaHuPvZw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l3-20020a170902f68300b001b9e3be3504si11916384plg.579.2023.07.17.01.01.12; Mon, 17 Jul 2023 01:01:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=neutral (bad version) header.i=@208.org header.s=dkim header.b=RaHuPvZw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230511AbjGQHpd (ORCPT + 99 others); Mon, 17 Jul 2023 03:45:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46782 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230506AbjGQHp3 (ORCPT ); Mon, 17 Jul 2023 03:45:29 -0400 Received: from mail.208.org (unknown [183.242.55.162]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76230173E for ; Mon, 17 Jul 2023 00:44:52 -0700 (PDT) Received: from mail.208.org (email.208.org [127.0.0.1]) by mail.208.org (Postfix) with ESMTP id 4R4Dcx0WnnzBL0tg for ; Mon, 17 Jul 2023 15:44:49 +0800 (CST) Authentication-Results: mail.208.org (amavisd-new); dkim=pass reason="pass (just generated, assumed good)" header.d=208.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=208.org; h= content-transfer-encoding:content-type:message-id:user-agent :references:in-reply-to:subject:to:from:date:mime-version; s= dkim; t=1689579888; x=1692171889; bh=xD/8DnT+MOxry9zA+leSfn3NtFT WtrPFC1eCKVqXrz8=; b=RaHuPvZwbZ9zns6vKGSet+bLzKr7wNEjHBVvdkmGOb8 mZYiif/wR1yD1rpRAaEhFdZUc3weng+xFePmG/JGKHs9CVhd+K7MTNsO01pahp8d yTtLpjDEV+GUsWgXWMVF+K3xCa4emZvv1Cec9U3H5iYVMHGYglsoY7aqu58yBwzb JVxOghThFtjtdv9H56IQE3vd+c+gbbDh01aMZe6HtSGY1RJWpkMB6dVPET+Z8Vvz PBGPw00blSiyG1x1538yaVn8seJVIKWJEoSUivTWKynlU7V/cOHK1wUHYWEw5ZvA m8ZNvMdhEXc5JQkmFtTHLhAEhgJk6v72z0XU4YElLZA== X-Virus-Scanned: amavisd-new at mail.208.org Received: from mail.208.org ([127.0.0.1]) by mail.208.org (mail.208.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id jFZROqdaNImn for ; Mon, 17 Jul 2023 15:44:48 +0800 (CST) Received: from localhost (email.208.org [127.0.0.1]) by mail.208.org (Postfix) with ESMTPSA id 4R4Dcw4z7szBHXgm; Mon, 17 Jul 2023 15:44:48 +0800 (CST) MIME-Version: 1.0 Date: Mon, 17 Jul 2023 15:44:48 +0800 From: shijie001@208suo.com To: andrii@kernel.org, shuah@kernel.org, daniel@iogearbox.net Cc: bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] selftests/bpf: Fix errors in btf_write.c In-Reply-To: References: User-Agent: Roundcube Webmail Message-ID: X-Sender: shijie001@208suo.com Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,RDNS_NONE,SPF_HELO_FAIL,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following checkpatch errors are removed: ERROR: Bad function definition - void test_btf_add() should probably be void test_btf_add(void) ERROR: Bad function definition - void test_btf_add_btf() should probably be void test_btf_add_btf(void) ERROR: Bad function definition - void test_btf_write() should probably be void test_btf_write(void) Signed-off-by: Jie Shi --- tools/testing/selftests/bpf/prog_tests/btf_write.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tools/testing/selftests/bpf/prog_tests/btf_write.c b/tools/testing/selftests/bpf/prog_tests/btf_write.c index 6e36de1302fc..209a230ffeec 100644 --- a/tools/testing/selftests/bpf/prog_tests/btf_write.c +++ b/tools/testing/selftests/bpf/prog_tests/btf_write.c @@ -352,7 +352,7 @@ static void gen_btf(struct btf *btf) "\t'v1' val=18446744073709551615", "raw_dump"); } -static void test_btf_add() +static void test_btf_add(void) { struct btf *btf; @@ -401,7 +401,7 @@ static void test_btf_add() btf__free(btf); } -static void test_btf_add_btf() +static void test_btf_add_btf(void) { struct btf *btf1 = NULL, *btf2 = NULL; int id; @@ -497,7 +497,7 @@ static void test_btf_add_btf() btf__free(btf2); } -void test_btf_write() +void test_btf_write(void) { if (test__start_subtest("btf_add")) test_btf_add();