lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20150212085404.GA52934@snb>
Date:	Thu, 12 Feb 2015 16:54:04 +0800
From:	kbuild test robot <fengguang.wu@...el.com>
To:	Andrea Arcangeli <aarcange@...hat.com>
Cc:	kbuild-all@...org, linux-mm@...ck.org, linux-kernel@...r.kernel.org
Subject: [PATCH aa] userfaultfd: double_down_read() can be static

mm/userfaultfd.c:48:6: sparse: symbol 'double_down_read' was not declared. Should it be static?
mm/userfaultfd.c:67:6: sparse: symbol 'double_up_read' was not declared. Should it be static?

Signed-off-by: Fengguang Wu <fengguang.wu@...el.com>
---
 userfaultfd.c |    4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/mm/userfaultfd.c b/mm/userfaultfd.c
index d1e89ef..88b2650 100644
--- a/mm/userfaultfd.c
+++ b/mm/userfaultfd.c
@@ -45,7 +45,7 @@ void double_pt_unlock(spinlock_t *ptl1,
 		spin_unlock(ptl2);
 }
 
-void double_down_read(struct rw_semaphore *mm1,
+static void double_down_read(struct rw_semaphore *mm1,
 		      struct rw_semaphore *mm2)
 	__acquires(mm1)
 	__acquires(mm2)
@@ -64,7 +64,7 @@ void double_down_read(struct rw_semaphore *mm1,
 		down_read_nested(mm2, SINGLE_DEPTH_NESTING);
 }
 
-void double_up_read(struct rw_semaphore *mm1,
+static void double_up_read(struct rw_semaphore *mm1,
 		    struct rw_semaphore *mm2)
 	__releases(mm1)
 	__releases(mm2)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ