lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 23 Aug 2023 01:00:55 +0000
From:   Dexuan Cui <decui@...rosoft.com>
To:     Nathan Chancellor <nathan@...nel.org>,
        KY Srinivasan <kys@...rosoft.com>,
        Haiyang Zhang <haiyangz@...rosoft.com>,
        "wei.liu@...nel.org" <wei.liu@...nel.org>,
        "linux-hyperv@...r.kernel.org" <linux-hyperv@...r.kernel.org>
CC:     "x86@...nel.org" <x86@...nel.org>,
        "Michael Kelley (LINUX)" <mikelley@...rosoft.com>,
        Tianyu Lan <Tianyu.Lan@...rosoft.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "patches@...ts.linux.dev" <patches@...ts.linux.dev>
Subject: RE: [PATCH] x86/hyperv: Add missing 'inline' to hv_snp_boot_ap() stub

> From: Nathan Chancellor <nathan@...nel.org>
> Sent: Tuesday, August 22, 2023 11:26 AM
> [...]
> When building without CONFIG_AMD_MEM_ENCRYPT, there are several
> repeated instances of -Wunused-function due to missing 'inline' on
> the stub of hy_snp_boot_ap():
> 
>   In file included from drivers/hv/hv_common.c:29:
>   ./arch/x86/include/asm/mshyperv.h:272:12: error: 'hv_snp_boot_ap'
> defined but not used [-Werror=unused-function]
>     272 | static int hv_snp_boot_ap(int cpu, unsigned long start_ip) { return
> 0; }
>         |            ^~~~~~~~~~~~~~
>   cc1: all warnings being treated as errors
> 
> Add 'inline' to fix the warnings.
> 
> Fixes: 44676bb9d566 ("x86/hyperv: Add smp support for SEV-SNP guest")
> Signed-off-by: Nathan Chancellor <nathan@...nel.org>

Reviewed-by: Dexuan Cui <decui@...rosoft.com>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ