From patchwork Mon Jun 5 17:56:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 689216 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d8a:0:0:0:0:0 with SMTP id b10csp2232105wru; Mon, 5 Jun 2023 10:57:11 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ43ykgADgblIPtVFPDy5YiON9PeGL663rRQCwtdRmQzOs5J1wiPy0jekCvFdtzjHq8MtjQs X-Received: by 2002:a05:620a:8808:b0:75b:23a0:de9b with SMTP id qj8-20020a05620a880800b0075b23a0de9bmr570740qkn.25.1685987831616; Mon, 05 Jun 2023 10:57:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685987831; cv=none; d=google.com; s=arc-20160816; b=L+PXtTCh+DkgRysqw5TrKCtckwD8VhMkgOpn4Qx1FrVITgiYD9cFxm+dpaNOhEUFRo /dBuRcrxzkjjRrjNY75w2RP/AKlJZShS15JySRJNuqoLgjJwCL57l/zha/4Q84uRGAfP DF8SlxLNKn3xdayaBXw6nSFdD5Zo/UE6W91U+rP121u2UXpPrE0JdckPAaGskdp4o5I1 ITlfYHZDDrhGwmY7zM2ukwgvYopL8eGib0wD/5y2PplxzxbcTaAnlJNYD19YI7PRvmjz hkInwil7ieZ56cHifcLNqvivVpxoSh07JPpqpijeBLX/ccejk+u4bLAa8rU2w7OZmGpo l0LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=p+Iw/1QCn4gWIQqU6bYdv/xs2QcFa6+Ox3iNu9xY0wY=; b=b7EyMKFCqDu1BbEpNzpHLBV/aH7prUjpsQMx9bM2Bmlfx7jtF5fCO1OoiOcR9WXn0D A4D2qlnYTQvilwla3DHryxulTZHVSIYMlTpBYGJgELD0skOk+UXgfZjHD2LJ8yEX1z9o PfnmuhmG9FozGvRtkT+dcNhw4jlCAlrQhH5f4efXj4CIYLqPk5Yvtr4rgTv6oN/nqSyG kySu48XtRtSy4Xdrhbc9S0P0BILlmMS6h7rSyHNB10jqvq7y0cr+cS1LCF8FzvC3bk+u DXGRhlhOMsTtXb0R6kN65nKghJac9WzUAHZ5rhhNv5AHbb9FGF6JSxbDoB4yCz/X4uj+ ZHtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=EYcvUE2q; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id h8-20020ae9ec08000000b0075cc955b6e0si4610735qkg.557.2023.06.05.10.57.11 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 05 Jun 2023 10:57:11 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=EYcvUE2q; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1q6ERw-00062i-Uq; Mon, 05 Jun 2023 13:57:00 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1q6ERv-00061H-8m for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:56:59 -0400 Received: from mail-wm1-x32b.google.com ([2a00:1450:4864:20::32b]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1q6ERt-0001UC-OH for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:56:59 -0400 Received: by mail-wm1-x32b.google.com with SMTP id 5b1f17b1804b1-3f61530506aso52256205e9.1 for ; Mon, 05 Jun 2023 10:56:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1685987816; x=1688579816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=p+Iw/1QCn4gWIQqU6bYdv/xs2QcFa6+Ox3iNu9xY0wY=; b=EYcvUE2qaOy/LJ5rv8Urz0q81DiVWO+ZCG4mfAsG95HaBAnrbWenxPtDjy421pFkRo 27f7ipDxYr8e2f6rNqtbF5YSmF66Fm2lVlebDOw06K2j+cOWnDoE5hdg4WzjRRrXhI47 S8SBXi/uWg9wWLzjWm4n6Eo/JH92d4sO0uDEXQUSQW7EDCE63uNo7q13gApCwVLSTSZG qNCv/GkBmXISWj3QUYegi1FGe42B8lUQbj0NEzMfbeeCxp5ZwkRy8Mhyp34mMoqeL4bY rOpEuHmt2CpwAu1BYYl1DUh9a1fdsFJ8GMZzAKpYmax8NzbUa/rkGPms94ZbV8ni7Hrr WfSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685987816; x=1688579816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=p+Iw/1QCn4gWIQqU6bYdv/xs2QcFa6+Ox3iNu9xY0wY=; b=DySXHrd16UZo7hWNtytZWfZm0xyhQ/XhNhhMzycgVOGnEzZG+LNE473qDKoIkyrekh HN/LXqyDI6vDEkXwyvmGQqOX2I1aovq58UF7W2vmEni2S2RmCjRYMVljqzJFrdv8WDhe neY0SKne0WjovugBG5qEwkq6DE1niQeAkksC8Eu5lwZ2y1XQnHA5ypPtesbWCgCOu2/N HFtKDs9LVUzEsl9m6o09svVVDHG+TD6MbMPLq3vHF/yyTOeko9dIxjmXRUHIVVF5WRw6 BY1UexqMDKOvdebFCNlIaPHPI2eT86Gg3vM6gmHMPWXdiYcBJ9qnhPZyEQpw6v78LoO6 OlpA== X-Gm-Message-State: AC+VfDxqs9RFdnr3mSoqQkvGBXAxu8qEgOla8U6Gu47tlQo5Aihs+1/Q A49GaoO9fDL4y9pP7otxDTsbNoMD+YkFSwRlnpI= X-Received: by 2002:a1c:f711:0:b0:3f6:53a:6665 with SMTP id v17-20020a1cf711000000b003f6053a6665mr8873070wmh.19.1685987816071; Mon, 05 Jun 2023 10:56:56 -0700 (PDT) Received: from localhost.localdomain ([176.187.217.157]) by smtp.gmail.com with ESMTPSA id q25-20020a7bce99000000b003f182a10106sm11524598wmj.8.2023.06.05.10.56.55 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Mon, 05 Jun 2023 10:56:55 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: =?utf-8?q?Daniel_P=2E_Berrang=C3=A9?= , qemu-arm@nongnu.org, qemu-block@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= Subject: [PATCH v2 1/5] util/cacheflush: Use declarations from on Darwin Date: Mon, 5 Jun 2023 19:56:43 +0200 Message-Id: <20230605175647.88395-2-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230605175647.88395-1-philmd@linaro.org> References: <20230605175647.88395-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::32b; envelope-from=philmd@linaro.org; helo=mail-wm1-x32b.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org Per the cache(3) man page, sys_icache_invalidate() and sys_dcache_flush() are declared in . Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Richard Henderson --- util/cacheflush.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/util/cacheflush.c b/util/cacheflush.c index 06c2333a60..de35616718 100644 --- a/util/cacheflush.c +++ b/util/cacheflush.c @@ -237,8 +237,8 @@ static void __attribute__((constructor)) init_cache_info(void) #ifdef CONFIG_DARWIN /* Apple does not expose CTR_EL0, so we must use system interfaces. */ -extern void sys_icache_invalidate(void *start, size_t len); -extern void sys_dcache_flush(void *start, size_t len); +#include + void flush_idcache_range(uintptr_t rx, uintptr_t rw, size_t len) { sys_dcache_flush((void *)rw, len); From patchwork Mon Jun 5 17:56:44 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 689218 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d8a:0:0:0:0:0 with SMTP id b10csp2232537wru; Mon, 5 Jun 2023 10:58:21 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7Yj6wjmniAg/YAdI21zcal6zoEwHuArUxtBh4uyH69Rr2rDDfsTnxF05P/1w9wilxzqxlh X-Received: by 2002:a05:6808:438f:b0:397:f9f2:76b with SMTP id dz15-20020a056808438f00b00397f9f2076bmr9374497oib.30.1685987901562; Mon, 05 Jun 2023 10:58:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685987901; cv=none; d=google.com; s=arc-20160816; b=0qYMOPdXr0nbMoCQEc8eOtJE2cHGLbMbuMcLIGjnb74BEp9F+AhC4z1jdtVDOlRpyF AuN7F+prScWeGY1L3JpfVPPKh0XKoy5+LLmqov4M0YEsk2px29YYpuCB5nhnLmUCcUmB S4uAk2yggqYxPVqB7vhmSpmHa1R9JqHM+IHYnapILq/eVVqndmI/WV8laOXglF4NDATH b+umcBApXsgrHUlZAuIlXPWy2mNnLPnMQmIBrEm4HRAO/0U0slfq9a5rP5sL3k4zjk+V Ywgjvo8QE2g46hICIRn8GNc0o6gjuOup1y0f/rO5e5MsPLAEQdX5dmbvW+F20uHZ35EF Jvjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KhI/znFwSdhfbldr+0O5s0+yrpOF1eXn2lep7KpKZYc=; b=qnSfSR7LyHufa1WqzbJQRZztSvFY/owI4c9KEGBlIBz5/dsZ/ej3CkhwrzydJhMOMN USnySN44ZgnujekqNC/CcQjXj73f1ByQTctpihxrQWsqa7z0eiW0a+20v/41wmXIDOV6 E206+KxxOtzN+CFfYw4uvX6f3x/j/r+SQ21BzPo1sVorKVZ5765342qoNDA7f57eoAK2 +PHQSVMDxi9iSJtTGNQCFUMWkjP3jwL8Otj7NuXuU5kZZs54lPsxCWYN9ButRHMwAKao PQ1MuBI83wQDlKflFTKWwHrdev398muxQyJD/75tSAzsqMAsC392E9Oeo5In+2fBc89d hfLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=DFeKOM7T; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id i8-20020ac85c08000000b003f38b2e048esi5021665qti.678.2023.06.05.10.58.21 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 05 Jun 2023 10:58:21 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=DFeKOM7T; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1q6ESD-0006Bf-8a; Mon, 05 Jun 2023 13:57:17 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1q6ES4-00064I-SM for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:10 -0400 Received: from mail-wr1-x436.google.com ([2a00:1450:4864:20::436]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1q6ERz-0001Wn-CX for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:08 -0400 Received: by mail-wr1-x436.google.com with SMTP id ffacd0b85a97d-3078cc99232so4675079f8f.3 for ; Mon, 05 Jun 2023 10:57:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1685987821; x=1688579821; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=KhI/znFwSdhfbldr+0O5s0+yrpOF1eXn2lep7KpKZYc=; b=DFeKOM7TGS0wAcUYaY3EIjwqC3Gi6SUDTMP+KmiKycyZPLATFkppylrblqSSXGd0H5 ilWdpuCCGr7CiLKUq2o9+EklnNFNECobjT7XY2uUUWhLkkobpe5vawQH+i3OKnPm3c37 UcK5FVkwRRKXnFjHvnwSjnzLaUYxiJ1nC9jDJxqRNtBh73YmttPuDEQBbMkeOZqk+ud8 wPlWJJ90xxxfLbnpUcXbnbDlnC+m1bYYjMRVd3KAN0hIlhlrleFcGDrTY4Q1MvyefhJb ZmnIMSMaZfkRQsVfvcv304LqkwKcRkS48vsD8hyYgrM2VAHdhK8zhbHKJUQfcyJNzKWK iDGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685987821; x=1688579821; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KhI/znFwSdhfbldr+0O5s0+yrpOF1eXn2lep7KpKZYc=; b=Mm0Lwhryni7tyNN7gprctPTHPTYDt4keyDzz9fSVvK9Wy6TE3IyHxDrj2nJKOlm6/Q uM+sGimYTl+HgkSMHRnS4ljBnkFbAfDnuV/8+N2CnlqNFPI3AMPpNgrKmEb9egYAzxF4 +mWHfpgMAQ261NXunWgEN6JrXTuj4ppx6wihs/xOPjusMkuNh26wx9UHDIAioMU+jXLw 3xHDalUaFeoL8OuFcz/mu5NNUHa3c+5FabiQinAHBri9OPIm68uT8pmqs9zlu88DYXLk JGLDWwg82yFOQF7dwbNvQ0Dwa2ytpXQ23WV7Efp8zFbmZPJXpSVhxTYZGo9FBsYqiL8k 1bWg== X-Gm-Message-State: AC+VfDz/tZcOPdMq+zMtKtbnobgxubcbnifljGAYGSTIBmRumQECgx1L XSDoq6gA4QImLjc9Ww4gZVCLbnTWBhWfu79bSBM= X-Received: by 2002:a5d:48cc:0:b0:307:7e22:dfc3 with SMTP id p12-20020a5d48cc000000b003077e22dfc3mr6598286wrs.63.1685987821752; Mon, 05 Jun 2023 10:57:01 -0700 (PDT) Received: from localhost.localdomain ([176.187.217.157]) by smtp.gmail.com with ESMTPSA id m4-20020a5d6a04000000b0030aea925fbesm10298902wru.50.2023.06.05.10.57.00 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Mon, 05 Jun 2023 10:57:01 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: =?utf-8?q?Daniel_P=2E_Berrang=C3=A9?= , qemu-arm@nongnu.org, qemu-block@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= Subject: [PATCH v2 2/5] tcg/tcg-op-vec: Remove left over _link_error() definitions Date: Mon, 5 Jun 2023 19:56:44 +0200 Message-Id: <20230605175647.88395-3-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230605175647.88395-1-philmd@linaro.org> References: <20230605175647.88395-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::436; envelope-from=philmd@linaro.org; helo=mail-wr1-x436.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org In commit d56fea79f9 ("tcg: Move TCG_{LOW,HIGH} to tcg-internal.h") we replaced the "_link_error" definitions with modern QEMU_ERROR() attribute markup. We covered tcg-op.c but forgot to completely clean tcg-op-vec.c. Do it now. Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Richard Henderson --- tcg/tcg-op-vec.c | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/tcg/tcg-op-vec.c b/tcg/tcg-op-vec.c index aeeb2435cb..4e46b74fd7 100644 --- a/tcg/tcg-op-vec.c +++ b/tcg/tcg-op-vec.c @@ -24,17 +24,6 @@ #include "tcg/tcg-mo.h" #include "tcg-internal.h" - -/* Reduce the number of ifdefs below. This assumes that all uses of - TCGV_HIGH and TCGV_LOW are properly protected by a conditional that - the compiler can eliminate. */ -#if TCG_TARGET_REG_BITS == 64 -extern TCGv_i32 TCGV_LOW_link_error(TCGv_i64); -extern TCGv_i32 TCGV_HIGH_link_error(TCGv_i64); -#define TCGV_LOW TCGV_LOW_link_error -#define TCGV_HIGH TCGV_HIGH_link_error -#endif - /* * Vector optional opcode tracking. * Except for the basic logical operations (and, or, xor), and From patchwork Mon Jun 5 17:56:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 689219 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d8a:0:0:0:0:0 with SMTP id b10csp2232555wru; Mon, 5 Jun 2023 10:58:23 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ55rS2QfzCLIB1i9Fq+hugR7wh1UhH3XiXauPyuuPebIYvFtgYMa/wXW0K9UmM8qTGi8gUo X-Received: by 2002:ad4:5c85:0:b0:623:42c5:6125 with SMTP id o5-20020ad45c85000000b0062342c56125mr9442543qvh.7.1685987903678; Mon, 05 Jun 2023 10:58:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685987903; cv=none; d=google.com; s=arc-20160816; b=lOUBQSJOW+iJJnB7AoerLBngTUFPSsFcfCgHZ0jgzLsKF7YxsMjvWGNyUSgbJRl1U8 ZWInf2+Sel3tCS8m7ns55rY62Ia2smhvw+2Z4EI/ljf5Mqw4Ir32H83E4UmQIVXE2zp2 vt3uup4LMqvc7i/HahqULHT43Epf/s02grG4QrK/6T7zIfBgIba+ujJuM63G4wQUS/E4 Pa6n6pW2eTdl5q0qUoLeATJmVkJapRDz/jzCdPax/u20Pyy+bEW/0pdtSX2EEFR0hKNh eaGpcshUr8/CuUAzDZrKZdQkcgbXQux8JQw+jVSHkspWyorhIEc/LEkrLkvaTjAa2vrf gmUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4h08X8wNRk/W0u78n9MISqwTuuV4tVr3G/frFQxS+nI=; b=yPZeEuvrzYLtKot5FiZtlT8YhqcDnDErUq1eyW3iZggSEOGNK0w7+MUyHNvyiC48UC dpLMfP5XA2JLrTgZqDZppxuGaJv8ez2si+RFm10ASa62TNv+B+h9nUFgFcSrgrda4K/J xMz6f5NzDdkawF3DsGOKKRXtoMhkJAQJl4kDAwmPSnBAaA38ugk7YgCEqafTxg6lu85J KC92xvs6Iz/HQXfa4fCyKGotozLWXfSAvQVPbrvsLgoHatbBWmHtu1wZh7hL22wGmm9Z gMjtgHs8wliVadez3vfZdu0jFFXUlX8lGs2X52SbDM3/SjrPsmq9XoWCxUEpPzpsEV4c DKSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=fcKTKezU; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id s15-20020a0562140caf00b006260a87dc55si5078224qvs.153.2023.06.05.10.58.23 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 05 Jun 2023 10:58:23 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=fcKTKezU; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1q6ESD-0006Af-25; Mon, 05 Jun 2023 13:57:17 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1q6ES6-00064c-9C for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:10 -0400 Received: from mail-wm1-x332.google.com ([2a00:1450:4864:20::332]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1q6ES4-0001Y1-On for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:09 -0400 Received: by mail-wm1-x332.google.com with SMTP id 5b1f17b1804b1-3f735bfcbbbso16957735e9.2 for ; Mon, 05 Jun 2023 10:57:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1685987827; x=1688579827; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=4h08X8wNRk/W0u78n9MISqwTuuV4tVr3G/frFQxS+nI=; b=fcKTKezUZ/2SC65EQvQcTdBnbWzOpKzYNcwLoJiBXZ/uGvBPcBZuoXScM2Th5M20eQ poWoihXSCRNZo0BnJFQ5EJEG1YYgBZpUTcKpdZQUMpcXTJOEmbiSVVQcOwjazsl53qEe 6XkYgA+N1jaf/e8eLlJfseOFOgNM2j+BTFwtXpcr9uNw/zCP6wiel0VyUGdXY0TtLEuR f0okmS/JN4REKY+s8TIq3taaIAAAIAzzlcFgcrEozH35UcQarVcnH2W0x9cdyxlgHYz5 agEz0M7/qo3AOoBmFagcRe0aEsOwz0ZDYVlKB3Lb8Sco7PF+NeS98k/WM9On6T03xAWb mdgA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685987827; x=1688579827; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=4h08X8wNRk/W0u78n9MISqwTuuV4tVr3G/frFQxS+nI=; b=AM3cJCbI2cyz1jzp7m0pRfmC23v4BDej8d18RtLKEqUM7TgHq6cxXOtAY5yxgQgddY 5kMXrDxOeXFH8+qw06clPUj++Z3xVO6Qon2aF5YSFLlkpOGaANUDWJPYjirV7b4o5nAv TYkj07LG8F40VAiGQrEq0tNzNvH/SOdHmz8sUKgDQsnVCIfT6lsN6xTYZxftBpw++F9V W2OCXRGv+E9KqULLJUMK/owfgf9bPwE9EVmZDn8FKnC7P9uQkCfep871GIIj0ItOOk5N 5apeHmVnq+fq3zSeusVJGzIdq9KoC46shJIzmWdMAxaw0n/iE4LMdRE3haXpm4U3/XCH vabg== X-Gm-Message-State: AC+VfDzZIVNKtflBINRCf7qsdfFtNs6XzRBXKMX7abXU85KjozRumnbO YLRqWDUbLwgqu9bOUyeKHLOxzd2U6XHg13ST6lU= X-Received: by 2002:a5d:4d82:0:b0:30e:32b4:88a9 with SMTP id b2-20020a5d4d82000000b0030e32b488a9mr4196675wru.5.1685987827201; Mon, 05 Jun 2023 10:57:07 -0700 (PDT) Received: from localhost.localdomain ([176.187.217.157]) by smtp.gmail.com with ESMTPSA id z16-20020a7bc7d0000000b003f605814850sm15194456wmk.37.2023.06.05.10.57.06 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Mon, 05 Jun 2023 10:57:06 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: =?utf-8?q?Daniel_P=2E_Berrang=C3=A9?= , qemu-arm@nongnu.org, qemu-block@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= Subject: [PATCH v2 3/5] qemu/uri: Use QueryParams type definition Date: Mon, 5 Jun 2023 19:56:45 +0200 Message-Id: <20230605175647.88395-4-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230605175647.88395-1-philmd@linaro.org> References: <20230605175647.88395-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::332; envelope-from=philmd@linaro.org; helo=mail-wm1-x332.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org Follow QEMU CODING_STYLE, use the type definition. Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Peter Maydell --- include/qemu/uri.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/qemu/uri.h b/include/qemu/uri.h index b43f35a6a6..2875c51417 100644 --- a/include/qemu/uri.h +++ b/include/qemu/uri.h @@ -96,7 +96,7 @@ typedef struct QueryParams { QueryParam *p; /* array of parameters */ } QueryParams; -struct QueryParams *query_params_new (int init_alloc); +QueryParams *query_params_new (int init_alloc); extern QueryParams *query_params_parse (const char *query); extern void query_params_free (QueryParams *ps); From patchwork Mon Jun 5 17:56:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 689220 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d8a:0:0:0:0:0 with SMTP id b10csp2232553wru; Mon, 5 Jun 2023 10:58:23 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ731W0hI7R2o7FB8i7sfSIhnegSWK+/Yjppi4z1MWBTQ5nZ0fdy8umsNoLytHKvvwj2REfm X-Received: by 2002:a05:622a:11d4:b0:3f9:a618:f9c2 with SMTP id n20-20020a05622a11d400b003f9a618f9c2mr4215014qtk.41.1685987903388; Mon, 05 Jun 2023 10:58:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685987903; cv=none; d=google.com; s=arc-20160816; b=qwNbxHrSY6JV7q4eAEew8vJli7gG5U6/OtSzX8Ngv8f2VUBVKAxAQqIUAxgcxdDAxh /lmmEJnwq8cujqFzNMnARpV3Xi8AwgMU1hNpwHgMvN8/LXYi/GBaE23Ux92et/I5Oyvj xJ7EEwb1F31s3610L0JNimYu3ACnMWynM/VpMsZLDzEEL60I873l/mmso1O1p+zvaWIF t4/bdZkfxXiEM+WQ/qYuCiRHLN9ymhZAdvhYNi0wwmz4QF4JJDkKcNFA0b0S+D3eZJMJ C7utlqBcMNuvV3XOZMyEqaHdtkh22HCPwGWefNbo3AxLlCsXZ6yNArtZruk8xoxYTl3p UBeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wvDqRABIqr3Oo9TcR+X4DZIBBFFduSjhdrasWY6zw2Q=; b=DNPcHo6OFVSwAswmgOqQ+oauNbwrNq5lRM0dQbgeo4RC9OUEjgH2Yv0rs52fWYtKsH 0qpqaRi43laVyrE7Zw0LxeCEJ81xWCnoYDpKmEBGzaVRXGW2ZIOGhgnwDs+1wk3OkXsb kiuQmEpW9n637RJw9YnSnacxUk5SzV9yZkHdf5GH+Ko2top4HSuYkV/2fCZc0ly0Hdb3 p3qzVyF5r5mzoHwBSP2UA9m1CNDz6kKtSwXTPqqUxnlH57hkGVfdrvLJzqo05ONuVvTU pMWqd7L2GyMaQnZFk+oNd0R/RmZpuDDo55J6kdimzxjhAhYjKbMZ5aopcpb5z3Em0CWL 4mKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=HepwZ9DD; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id h8-20020ac85e08000000b003f68856bfe4si5084072qtx.453.2023.06.05.10.58.23 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 05 Jun 2023 10:58:23 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=HepwZ9DD; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1q6ESI-0006Gb-2H; Mon, 05 Jun 2023 13:57:22 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1q6ESF-0006Eu-Od for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:19 -0400 Received: from mail-wm1-x32d.google.com ([2a00:1450:4864:20::32d]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1q6ESA-0001ZH-Ou for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:19 -0400 Received: by mail-wm1-x32d.google.com with SMTP id 5b1f17b1804b1-3f6ffc2b314so45355475e9.0 for ; Mon, 05 Jun 2023 10:57:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1685987833; x=1688579833; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=wvDqRABIqr3Oo9TcR+X4DZIBBFFduSjhdrasWY6zw2Q=; b=HepwZ9DDulBh2zkr79aO0Tj5cCcT6IVbzqZ9EUOV2F/ttVpmjR08GCyR+JbpB3b2bL KaYB0FLahSCr/7x7coWdPri3Lm7J7GU0VYodtwJ8K4/XDDSH8lpzOcx1nWFrmFl60kjp qsdHtBrUKMKWE4ZDCBzoQgZ7RWiywWPdtkb9ih23/tHXzCsSQczjaCDcV/GNIfM9TsGR nBO6MPdgyiClkK8yTOSYHTAIZ8KSiNW/5Qm265OliBWgwsh5Sf3+93qgLAkzHCOKIDhj 1gTuNJEM4Eu1lwhyHBT/fLwJk9NDZUQXrMmN0+zVPZxSzfqeelmOn0iSkDw2pWFqnN5D J1Ig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685987833; x=1688579833; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wvDqRABIqr3Oo9TcR+X4DZIBBFFduSjhdrasWY6zw2Q=; b=CvDRtRKxpZ6tH6rqYDyewqHs0zyBfwTCIiICn08pO8yFz/9vj9T4/LoC1MaD+foUYs fHbAs4/c/GQyp/xa0zTkBPwp9jY+20vHNQ0NeSqIUzUtX8eZK2gnWlfTpPlnXJbZakkX sdYE+h9+RqV8lJ+A+nDqXfArvPcGQnGFCUFBm0JlvaGbMUCmyEenGkoCyVMeaTaw5h9B M1WYN2hugB4B+S4bIqwkMHAl5rLARMVmkM4tESjMZf8UCb3XK17J0De47NXLycJX4Ghr mkT1NA03W/c4xtdirvesnFpjRGNnHb+gRwAheEVm6Yo9NMo52ORskiatOWIuQl+RpdLw jgEw== X-Gm-Message-State: AC+VfDw+Bgzli+xKNYz9uKbxOpg/Nvo2cjt6xiN9wXK/xwbpw4WTCLSg iZkb/FWm8QpxoWqxQ3NFx9QgWP+YJUesIbf2BbY= X-Received: by 2002:a5d:6248:0:b0:306:2c20:c4fb with SMTP id m8-20020a5d6248000000b003062c20c4fbmr6775085wrv.2.1685987833084; Mon, 05 Jun 2023 10:57:13 -0700 (PDT) Received: from localhost.localdomain ([176.187.217.157]) by smtp.gmail.com with ESMTPSA id e12-20020a5d594c000000b0030ae16132besm10340768wri.12.2023.06.05.10.57.11 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Mon, 05 Jun 2023 10:57:12 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: =?utf-8?q?Daniel_P=2E_Berrang=C3=A9?= , qemu-arm@nongnu.org, qemu-block@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= Subject: [PATCH v2 4/5] bulk: Do not declare function prototypes using 'extern' keyword Date: Mon, 5 Jun 2023 19:56:46 +0200 Message-Id: <20230605175647.88395-5-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230605175647.88395-1-philmd@linaro.org> References: <20230605175647.88395-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::32d; envelope-from=philmd@linaro.org; helo=mail-wm1-x32d.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org By default, C function prototypes declared in headers are visible, so there is no need to declare them as 'extern' functions. Remove this redundancy in a single bulk commit; do not modify: - meson.build (used to check function availability at runtime) - pc-bios/ - libdecnumber/ - tests/ - *.c Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Peter Maydell --- bsd-user/bsd-file.h | 6 ++--- crypto/hmacpriv.h | 13 +++++------ hw/xen/xen_pt.h | 8 +++---- include/crypto/secret_common.h | 14 +++++------- include/exec/page-vary.h | 4 ++-- include/hw/misc/aspeed_scu.h | 2 +- include/hw/nvram/npcm7xx_otp.h | 4 ++-- include/hw/qdev-core.h | 4 ++-- include/qemu/crc-ccitt.h | 4 ++-- include/qemu/osdep.h | 4 ++-- include/qemu/rcu.h | 14 ++++++------ include/qemu/sys_membarrier.h | 4 ++-- include/qemu/uri.h | 6 ++--- include/sysemu/accel-blocker.h | 14 ++++++------ include/sysemu/os-win32.h | 4 ++-- include/user/safe-syscall.h | 4 ++-- target/i386/sev.h | 6 ++--- target/mips/cpu.h | 4 ++-- tcg/tcg-internal.h | 4 ++-- include/exec/memory_ldst.h.inc | 42 +++++++++++++++++----------------- 20 files changed, 79 insertions(+), 86 deletions(-) diff --git a/bsd-user/bsd-file.h b/bsd-user/bsd-file.h index 588e0c50d4..3c00dc0056 100644 --- a/bsd-user/bsd-file.h +++ b/bsd-user/bsd-file.h @@ -51,10 +51,8 @@ do { \ unlock_user(p1, arg1, 0); \ } while (0) -extern struct iovec *lock_iovec(int type, abi_ulong target_addr, int count, - int copy); -extern void unlock_iovec(struct iovec *vec, abi_ulong target_addr, int count, - int copy); +struct iovec *lock_iovec(int type, abi_ulong target_addr, int count, int copy); +void unlock_iovec(struct iovec *vec, abi_ulong target_addr, int count, int copy); int safe_open(const char *path, int flags, mode_t mode); int safe_openat(int fd, const char *path, int flags, mode_t mode); diff --git a/crypto/hmacpriv.h b/crypto/hmacpriv.h index 4387ca2587..62dfe8257a 100644 --- a/crypto/hmacpriv.h +++ b/crypto/hmacpriv.h @@ -28,19 +28,18 @@ struct QCryptoHmacDriver { void (*hmac_free)(QCryptoHmac *hmac); }; -extern void *qcrypto_hmac_ctx_new(QCryptoHashAlgorithm alg, - const uint8_t *key, size_t nkey, - Error **errp); +void *qcrypto_hmac_ctx_new(QCryptoHashAlgorithm alg, + const uint8_t *key, size_t nkey, + Error **errp); extern QCryptoHmacDriver qcrypto_hmac_lib_driver; #ifdef CONFIG_AF_ALG #include "afalgpriv.h" -extern QCryptoAFAlg * -qcrypto_afalg_hmac_ctx_new(QCryptoHashAlgorithm alg, - const uint8_t *key, size_t nkey, - Error **errp); +QCryptoAFAlg *qcrypto_afalg_hmac_ctx_new(QCryptoHashAlgorithm alg, + const uint8_t *key, size_t nkey, + Error **errp); extern QCryptoHmacDriver qcrypto_hmac_afalg_driver; #endif diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h index b20744f7c7..31bcfdf705 100644 --- a/hw/xen/xen_pt.h +++ b/hw/xen/xen_pt.h @@ -340,11 +340,9 @@ static inline bool xen_pt_has_msix_mapping(XenPCIPassthroughState *s, int bar) return s->msix && s->msix->bar_index == bar; } -extern void *pci_assign_dev_load_option_rom(PCIDevice *dev, - int *size, - unsigned int domain, - unsigned int bus, unsigned int slot, - unsigned int function); +void *pci_assign_dev_load_option_rom(PCIDevice *dev, int *size, + unsigned int domain, unsigned int bus, + unsigned int slot, unsigned int function); static inline bool is_igd_vga_passthrough(XenHostPCIDevice *dev) { return (xen_igd_gfx_pt_enabled() diff --git a/include/crypto/secret_common.h b/include/crypto/secret_common.h index 42c7ff7af6..a0a22e1abd 100644 --- a/include/crypto/secret_common.h +++ b/include/crypto/secret_common.h @@ -48,13 +48,11 @@ struct QCryptoSecretCommonClass { }; -extern int qcrypto_secret_lookup(const char *secretid, - uint8_t **data, - size_t *datalen, - Error **errp); -extern char *qcrypto_secret_lookup_as_utf8(const char *secretid, - Error **errp); -extern char *qcrypto_secret_lookup_as_base64(const char *secretid, - Error **errp); +int qcrypto_secret_lookup(const char *secretid, + uint8_t **data, + size_t *datalen, + Error **errp); +char *qcrypto_secret_lookup_as_utf8(const char *secretid, Error **errp); +char *qcrypto_secret_lookup_as_base64(const char *secretid, Error **errp); #endif /* QCRYPTO_SECRET_COMMON_H */ diff --git a/include/exec/page-vary.h b/include/exec/page-vary.h index ebbe9b169b..54ddde308a 100644 --- a/include/exec/page-vary.h +++ b/include/exec/page-vary.h @@ -27,8 +27,8 @@ typedef struct { } TargetPageBits; #ifdef IN_PAGE_VARY -extern bool set_preferred_target_page_bits_common(int bits); -extern void finalize_target_page_bits_common(int min); +bool set_preferred_target_page_bits_common(int bits); +void finalize_target_page_bits_common(int min); #endif /** diff --git a/include/hw/misc/aspeed_scu.h b/include/hw/misc/aspeed_scu.h index 5c7c04eedf..7cb6018dbc 100644 --- a/include/hw/misc/aspeed_scu.h +++ b/include/hw/misc/aspeed_scu.h @@ -51,7 +51,7 @@ struct AspeedSCUState { #define ASPEED_IS_AST2500(si_rev) ((((si_rev) >> 24) & 0xff) == 0x04) -extern bool is_supported_silicon_rev(uint32_t silicon_rev); +bool is_supported_silicon_rev(uint32_t silicon_rev); struct AspeedSCUClass { diff --git a/include/hw/nvram/npcm7xx_otp.h b/include/hw/nvram/npcm7xx_otp.h index 156bbd151a..ea4b5d0731 100644 --- a/include/hw/nvram/npcm7xx_otp.h +++ b/include/hw/nvram/npcm7xx_otp.h @@ -73,7 +73,7 @@ typedef struct NPCM7xxOTPClass NPCM7xxOTPClass; * Each nibble of data is encoded into a byte, so the number of bytes written * to the array will be @len * 2. */ -extern void npcm7xx_otp_array_write(NPCM7xxOTPState *s, const void *data, - unsigned int offset, unsigned int len); +void npcm7xx_otp_array_write(NPCM7xxOTPState *s, const void *data, + unsigned int offset, unsigned int len); #endif /* NPCM7XX_OTP_H */ diff --git a/include/hw/qdev-core.h b/include/hw/qdev-core.h index f1070d6dc7..16c1f6ca9b 100644 --- a/include/hw/qdev-core.h +++ b/include/hw/qdev-core.h @@ -910,7 +910,7 @@ typedef enum MachineInitPhase { PHASE_MACHINE_READY, } MachineInitPhase; -extern bool phase_check(MachineInitPhase phase); -extern void phase_advance(MachineInitPhase phase); +bool phase_check(MachineInitPhase phase); +void phase_advance(MachineInitPhase phase); #endif diff --git a/include/qemu/crc-ccitt.h b/include/qemu/crc-ccitt.h index d6eb49146d..8918dafe07 100644 --- a/include/qemu/crc-ccitt.h +++ b/include/qemu/crc-ccitt.h @@ -17,8 +17,8 @@ extern uint16_t const crc_ccitt_table[256]; extern uint16_t const crc_ccitt_false_table[256]; -extern uint16_t crc_ccitt(uint16_t crc, const uint8_t *buffer, size_t len); -extern uint16_t crc_ccitt_false(uint16_t crc, const uint8_t *buffer, size_t len); +uint16_t crc_ccitt(uint16_t crc, const uint8_t *buffer, size_t len); +uint16_t crc_ccitt_false(uint16_t crc, const uint8_t *buffer, size_t len); static inline uint16_t crc_ccitt_byte(uint16_t crc, const uint8_t c) { diff --git a/include/qemu/osdep.h b/include/qemu/osdep.h index cc61b00ba9..3210d34ded 100644 --- a/include/qemu/osdep.h +++ b/include/qemu/osdep.h @@ -237,7 +237,7 @@ extern "C" { * supports QEMU_ERROR, this will be reported at compile time; otherwise * this will be reported at link time due to the missing symbol. */ -G_NORETURN extern +G_NORETURN void QEMU_ERROR("code path is reachable") qemu_build_not_reached_always(void); #if defined(__OPTIMIZE__) && !defined(__NO_INLINE__) @@ -496,7 +496,7 @@ void qemu_anon_ram_free(void *ptr, size_t size); * See MySQL bug #7156 (http://bugs.mysql.com/bug.php?id=7156) for discussion * about Solaris missing the madvise() prototype. */ -extern int madvise(char *, size_t, int); +int madvise(char *, size_t, int); #endif #if defined(CONFIG_LINUX) diff --git a/include/qemu/rcu.h b/include/qemu/rcu.h index 661c1a1468..fea058aa9f 100644 --- a/include/qemu/rcu.h +++ b/include/qemu/rcu.h @@ -118,19 +118,19 @@ static inline void rcu_read_unlock(void) } } -extern void synchronize_rcu(void); +void synchronize_rcu(void); /* * Reader thread registration. */ -extern void rcu_register_thread(void); -extern void rcu_unregister_thread(void); +void rcu_register_thread(void); +void rcu_unregister_thread(void); /* * Support for fork(). fork() support is enabled at startup. */ -extern void rcu_enable_atfork(void); -extern void rcu_disable_atfork(void); +void rcu_enable_atfork(void); +void rcu_disable_atfork(void); struct rcu_head; typedef void RCUCBFunc(struct rcu_head *head); @@ -140,8 +140,8 @@ struct rcu_head { RCUCBFunc *func; }; -extern void call_rcu1(struct rcu_head *head, RCUCBFunc *func); -extern void drain_call_rcu(void); +void call_rcu1(struct rcu_head *head, RCUCBFunc *func); +void drain_call_rcu(void); /* The operands of the minus operator must have the same type, * which must be the one that we specify in the cast. diff --git a/include/qemu/sys_membarrier.h b/include/qemu/sys_membarrier.h index b5bfa21d52..e7774891f8 100644 --- a/include/qemu/sys_membarrier.h +++ b/include/qemu/sys_membarrier.h @@ -14,8 +14,8 @@ * side. The slow side forces processor-level ordering on all other cores * through a system call. */ -extern void smp_mb_global_init(void); -extern void smp_mb_global(void); +void smp_mb_global_init(void); +void smp_mb_global(void); #define smp_mb_placeholder() barrier() #else /* Keep it simple, execute a real memory barrier on both sides. */ diff --git a/include/qemu/uri.h b/include/qemu/uri.h index 2875c51417..1855b764f2 100644 --- a/include/qemu/uri.h +++ b/include/qemu/uri.h @@ -96,8 +96,8 @@ typedef struct QueryParams { QueryParam *p; /* array of parameters */ } QueryParams; -QueryParams *query_params_new (int init_alloc); -extern QueryParams *query_params_parse (const char *query); -extern void query_params_free (QueryParams *ps); +QueryParams *query_params_new(int init_alloc); +QueryParams *query_params_parse(const char *query); +void query_params_free(QueryParams *ps); #endif /* QEMU_URI_H */ diff --git a/include/sysemu/accel-blocker.h b/include/sysemu/accel-blocker.h index 0733783bcc..f07f368358 100644 --- a/include/sysemu/accel-blocker.h +++ b/include/sysemu/accel-blocker.h @@ -16,7 +16,7 @@ #include "sysemu/cpus.h" -extern void accel_blocker_init(void); +void accel_blocker_init(void); /* * accel_{cpu_}ioctl_begin/end: @@ -26,10 +26,10 @@ extern void accel_blocker_init(void); * called, preventing new ioctls to run. They will continue only after * accel_ioctl_inibith_end(). */ -extern void accel_ioctl_begin(void); -extern void accel_ioctl_end(void); -extern void accel_cpu_ioctl_begin(CPUState *cpu); -extern void accel_cpu_ioctl_end(CPUState *cpu); +void accel_ioctl_begin(void); +void accel_ioctl_end(void); +void accel_cpu_ioctl_begin(CPUState *cpu); +void accel_cpu_ioctl_end(CPUState *cpu); /* * accel_ioctl_inhibit_begin: start critical section @@ -42,7 +42,7 @@ extern void accel_cpu_ioctl_end(CPUState *cpu); * This allows the caller to access shared data or perform operations without * worrying of concurrent vcpus accesses. */ -extern void accel_ioctl_inhibit_begin(void); +void accel_ioctl_inhibit_begin(void); /* * accel_ioctl_inhibit_end: end critical section started by @@ -50,6 +50,6 @@ extern void accel_ioctl_inhibit_begin(void); * * This function allows blocked accel_{cpu_}ioctl_begin() to continue. */ -extern void accel_ioctl_inhibit_end(void); +void accel_ioctl_inhibit_end(void); #endif /* ACCEL_BLOCKER_H */ diff --git a/include/sysemu/os-win32.h b/include/sysemu/os-win32.h index 65f6c9ea57..f8e300d302 100644 --- a/include/sysemu/os-win32.h +++ b/include/sysemu/os-win32.h @@ -66,8 +66,8 @@ extern "C" { * setjmp to _setjmpex instead. However, they are still defined in libmingwex.a, * which gets linked automatically. */ -extern int __mingw_setjmp(jmp_buf); -extern void __attribute__((noreturn)) __mingw_longjmp(jmp_buf, int); +int __mingw_setjmp(jmp_buf); +void __attribute__((noreturn)) __mingw_longjmp(jmp_buf, int); #define setjmp(env) __mingw_setjmp(env) #define longjmp(env, val) __mingw_longjmp(env, val) #elif defined(_WIN64) diff --git a/include/user/safe-syscall.h b/include/user/safe-syscall.h index ddceef12e2..f06393c09e 100644 --- a/include/user/safe-syscall.h +++ b/include/user/safe-syscall.h @@ -126,8 +126,8 @@ */ /* The core part of this function is implemented in assembly */ -extern long safe_syscall_base(int *pending, long number, ...); -extern long safe_syscall_set_errno_tail(int value); +long safe_syscall_base(int *pending, long number, ...); +long safe_syscall_set_errno_tail(int value); /* These are defined by the safe-syscall.inc.S file */ extern char safe_syscall_start[]; diff --git a/target/i386/sev.h b/target/i386/sev.h index 7b1528248a..e7499c95b1 100644 --- a/target/i386/sev.h +++ b/target/i386/sev.h @@ -46,9 +46,9 @@ bool sev_es_enabled(void); #define sev_es_enabled() 0 #endif -extern uint32_t sev_get_cbit_position(void); -extern uint32_t sev_get_reduced_phys_bits(void); -extern bool sev_add_kernel_loader_hashes(SevKernelLoaderContext *ctx, Error **errp); +uint32_t sev_get_cbit_position(void); +uint32_t sev_get_reduced_phys_bits(void); +bool sev_add_kernel_loader_hashes(SevKernelLoaderContext *ctx, Error **errp); int sev_encrypt_flash(uint8_t *ptr, uint64_t len, Error **errp); int sev_inject_launch_secret(const char *hdr, const char *secret, diff --git a/target/mips/cpu.h b/target/mips/cpu.h index 142c55af47..2077cb29be 100644 --- a/target/mips/cpu.h +++ b/target/mips/cpu.h @@ -1187,8 +1187,8 @@ void mips_cpu_list(void); #define cpu_list mips_cpu_list -extern void cpu_wrdsp(uint32_t rs, uint32_t mask_num, CPUMIPSState *env); -extern uint32_t cpu_rddsp(uint32_t mask_num, CPUMIPSState *env); +void cpu_wrdsp(uint32_t rs, uint32_t mask_num, CPUMIPSState *env); +uint32_t cpu_rddsp(uint32_t mask_num, CPUMIPSState *env); /* * MMU modes definitions. We carefully match the indices with our diff --git a/tcg/tcg-internal.h b/tcg/tcg-internal.h index 67b698bd5c..a8c5d957b0 100644 --- a/tcg/tcg-internal.h +++ b/tcg/tcg-internal.h @@ -109,8 +109,8 @@ static inline TCGv_i32 TCGV_HIGH(TCGv_i64 t) return temp_tcgv_i32(tcgv_i64_temp(t) + !HOST_BIG_ENDIAN); } #else -extern TCGv_i32 TCGV_LOW(TCGv_i64) QEMU_ERROR("32-bit code path is reachable"); -extern TCGv_i32 TCGV_HIGH(TCGv_i64) QEMU_ERROR("32-bit code path is reachable"); +TCGv_i32 TCGV_LOW(TCGv_i64) QEMU_ERROR("32-bit code path is reachable"); +TCGv_i32 TCGV_HIGH(TCGv_i64) QEMU_ERROR("32-bit code path is reachable"); #endif static inline TCGv_i64 TCGV128_LOW(TCGv_i128 t) diff --git a/include/exec/memory_ldst.h.inc b/include/exec/memory_ldst.h.inc index 7c3a641f7e..92ad74e956 100644 --- a/include/exec/memory_ldst.h.inc +++ b/include/exec/memory_ldst.h.inc @@ -20,48 +20,48 @@ */ #ifdef TARGET_ENDIANNESS -extern uint16_t glue(address_space_lduw, SUFFIX)(ARG1_DECL, +uint16_t glue(address_space_lduw, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint32_t glue(address_space_ldl, SUFFIX)(ARG1_DECL, +uint32_t glue(address_space_ldl, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint64_t glue(address_space_ldq, SUFFIX)(ARG1_DECL, +uint64_t glue(address_space_ldq, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stl_notdirty, SUFFIX)(ARG1_DECL, +void glue(address_space_stl_notdirty, SUFFIX)(ARG1_DECL, hwaddr addr, uint32_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stw, SUFFIX)(ARG1_DECL, +void glue(address_space_stw, SUFFIX)(ARG1_DECL, hwaddr addr, uint16_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stl, SUFFIX)(ARG1_DECL, +void glue(address_space_stl, SUFFIX)(ARG1_DECL, hwaddr addr, uint32_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stq, SUFFIX)(ARG1_DECL, +void glue(address_space_stq, SUFFIX)(ARG1_DECL, hwaddr addr, uint64_t val, MemTxAttrs attrs, MemTxResult *result); #else -extern uint8_t glue(address_space_ldub, SUFFIX)(ARG1_DECL, +uint8_t glue(address_space_ldub, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint16_t glue(address_space_lduw_le, SUFFIX)(ARG1_DECL, +uint16_t glue(address_space_lduw_le, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint16_t glue(address_space_lduw_be, SUFFIX)(ARG1_DECL, +uint16_t glue(address_space_lduw_be, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint32_t glue(address_space_ldl_le, SUFFIX)(ARG1_DECL, +uint32_t glue(address_space_ldl_le, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint32_t glue(address_space_ldl_be, SUFFIX)(ARG1_DECL, +uint32_t glue(address_space_ldl_be, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint64_t glue(address_space_ldq_le, SUFFIX)(ARG1_DECL, +uint64_t glue(address_space_ldq_le, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern uint64_t glue(address_space_ldq_be, SUFFIX)(ARG1_DECL, +uint64_t glue(address_space_ldq_be, SUFFIX)(ARG1_DECL, hwaddr addr, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stb, SUFFIX)(ARG1_DECL, +void glue(address_space_stb, SUFFIX)(ARG1_DECL, hwaddr addr, uint8_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stw_le, SUFFIX)(ARG1_DECL, +void glue(address_space_stw_le, SUFFIX)(ARG1_DECL, hwaddr addr, uint16_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stw_be, SUFFIX)(ARG1_DECL, +void glue(address_space_stw_be, SUFFIX)(ARG1_DECL, hwaddr addr, uint16_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stl_le, SUFFIX)(ARG1_DECL, +void glue(address_space_stl_le, SUFFIX)(ARG1_DECL, hwaddr addr, uint32_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stl_be, SUFFIX)(ARG1_DECL, +void glue(address_space_stl_be, SUFFIX)(ARG1_DECL, hwaddr addr, uint32_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stq_le, SUFFIX)(ARG1_DECL, +void glue(address_space_stq_le, SUFFIX)(ARG1_DECL, hwaddr addr, uint64_t val, MemTxAttrs attrs, MemTxResult *result); -extern void glue(address_space_stq_be, SUFFIX)(ARG1_DECL, +void glue(address_space_stq_be, SUFFIX)(ARG1_DECL, hwaddr addr, uint64_t val, MemTxAttrs attrs, MemTxResult *result); #endif From patchwork Mon Jun 5 17:56:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 689221 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d8a:0:0:0:0:0 with SMTP id b10csp2232563wru; Mon, 5 Jun 2023 10:58:25 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4jjqncgurjgHm9mk7J47CM7MpOHygoEmHgjGDRFCte+d14/P9tTuTU8ko+ipfIzu4uQQqX X-Received: by 2002:a67:f106:0:b0:436:4065:d8d5 with SMTP id n6-20020a67f106000000b004364065d8d5mr552315vsk.32.1685987905236; Mon, 05 Jun 2023 10:58:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685987905; cv=none; d=google.com; s=arc-20160816; b=ccSEwpcP5FJR6JEpP8TXG6rduLfoBnHhaZyGPnpsLg4dmIA6nJLZKLvLMD9dgRkaqi wnJacyD/p0FH56p0Wn2H4OVkx7TQSMis5MEGLq2b1b3HtPOiqQOe4p0iRppMdRk6S49N NeeNTw2Enasv2vHDsmvRxpeiZBcdO8gR7gYMd2O6iFPundb/HBcyP4mruDj2+2fiLOTp pVaFy5YtwecpwaBVpyXt2G6CpjfwcLh1HsrCVsZESRAbhPA8PrahnPHSw78Vuf+2W1d7 ztX89KM/0ZlxO5SNkq3k6uIjJYUP74IghCRtgMJjrwKDVwo7jzRkMxkXzkasEzz7lEBh Jb2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+uFa3AhXkk8vWcOVshy7TkiBL8878/+j67TcSdApmPA=; b=rwiGMVP4AXGdFblJv23yEG0OmDNqnIaoxofUxG/O1kYDPeBpx5N9v5CMEvbAQqSLI6 Mm3LqKgT1uQqAUYL1azosNqwRAccWYq2kORFgcpgf5+I3bSqH4ND9NVX7yPjlLddEIlB pNZqRqen/Iedt5+qqsRHLNIXZ6f7ZMqBkoWYsXwMfPePeGRwjC+xfji10gZnK7rCDRa6 kNgATpatIEfT32Gh+sVJpIBGiOjJax8AZyLFiBGhTXNFSvDLmowZia/YY5jved8RPCK4 2Ktg0ydlCGjj3BXrZI62Gd6vERPNVg+91vvYxRq16LV/1MO2hdFcDS2EVLDN06LdZfNR Jh4w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=G7YWQfY4; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id p9-20020a05622a048900b003ef559eec5esi5144717qtx.350.2023.06.05.10.58.25 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 05 Jun 2023 10:58:25 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=G7YWQfY4; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1q6ESK-0006LX-Bd; Mon, 05 Jun 2023 13:57:24 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1q6ESI-0006Gz-R6 for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:22 -0400 Received: from mail-wm1-x333.google.com ([2a00:1450:4864:20::333]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1q6ESG-0001aj-P8 for qemu-devel@nongnu.org; Mon, 05 Jun 2023 13:57:22 -0400 Received: by mail-wm1-x333.google.com with SMTP id 5b1f17b1804b1-3f6e68cc738so44827255e9.1 for ; Mon, 05 Jun 2023 10:57:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1685987839; x=1688579839; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=+uFa3AhXkk8vWcOVshy7TkiBL8878/+j67TcSdApmPA=; b=G7YWQfY48+wYPu4fP4w5XSiJFFSJI3LyXRijb5EMpp0Wi4zIhP9nqCMyLgY9OpczDn 5LyC4OLmgFhameqZ/mn6cht1bduJTRtAotHwWvXgcMRSeVaJXpYp0BUmPOZs/ZurajFI d6Nd2HSpqmRmqEtnJjVKNESLvoVhQrGDf340PJCfc/2HVceDPPY1dEgAD39okyWbmNlZ GPVTnb5tS299pZl+9LzfSA3/UnM/VS507ET3oD+ZUwkszVnO+iaGZ0GqnqEH/wgg0HAl G3ZTUvqgQm4sFP7gD5mP1DmM8EsWKi7YCnPpQXA0jZKGza/y+FLmNRJuxmWZh2Op2y0y 3JZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685987839; x=1688579839; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+uFa3AhXkk8vWcOVshy7TkiBL8878/+j67TcSdApmPA=; b=L//eRsJZCpIusCNGOJ6sVJF7SXdI0ZYQzamfv1FMBLNBsH3Bk1ZyZmCnLafJwAipSj B2ERiN9/VvnZxc6q9DUppKnAn1qEKoBnvw2XkruiepuAb3OnJA6F0SaAD+4TUswjyD6m h/1BbqS2Rubr+X4HS6ILGDC5SssdnSYzaUkx0jgnA/WCETGiIqZbmsrFVaE+p5VlYePI 1KMK2dY93zBsKUyhuPs1ahFAKc+t0iv+tAtRs/bjJ//n5+oMfwxs0lKb/56eIConaIXK IkQtHkGP2HXkpdmHcYLepBW05b7LFRLpFZWvsPQiPp+cEBlKYP1F6oY1Idx/B35leGcO lsFg== X-Gm-Message-State: AC+VfDySy6fq2pRaBbF/HrOncQZcQgKRx417VSyR5kCD//VWefuh8Gnn kfbzsiQ2oQNtisf4F02C2y5wiv4ystQtZp84SJg= X-Received: by 2002:a7b:c4d5:0:b0:3f5:1728:bde9 with SMTP id g21-20020a7bc4d5000000b003f51728bde9mr7960wmk.2.1685987838888; Mon, 05 Jun 2023 10:57:18 -0700 (PDT) Received: from localhost.localdomain ([176.187.217.157]) by smtp.gmail.com with ESMTPSA id n18-20020a5d4c52000000b0030ae901bc54sm10257905wrt.62.2023.06.05.10.57.17 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Mon, 05 Jun 2023 10:57:18 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org Cc: =?utf-8?q?Daniel_P=2E_Berrang=C3=A9?= , qemu-arm@nongnu.org, qemu-block@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= , Juan Quintela Subject: [PATCH v2 5/5] bulk: Replace __attribute__((noreturn)) -> G_NORETURN Date: Mon, 5 Jun 2023 19:56:47 +0200 Message-Id: <20230605175647.88395-6-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230605175647.88395-1-philmd@linaro.org> References: <20230605175647.88395-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::333; envelope-from=philmd@linaro.org; helo=mail-wm1-x333.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org Under MSYS2, G_NORETURN is expanded to '[[noreturn]]'. Simpler to use the same definition everywhere, unifying the code style. Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Juan Quintela --- include/sysemu/os-win32.h | 2 +- tests/migration/stress.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/include/sysemu/os-win32.h b/include/sysemu/os-win32.h index f8e300d302..fb076a6eb9 100644 --- a/include/sysemu/os-win32.h +++ b/include/sysemu/os-win32.h @@ -67,7 +67,7 @@ extern "C" { * which gets linked automatically. */ int __mingw_setjmp(jmp_buf); -void __attribute__((noreturn)) __mingw_longjmp(jmp_buf, int); +G_NORETURN void __mingw_longjmp(jmp_buf, int); #define setjmp(env) __mingw_setjmp(env) #define longjmp(env, val) __mingw_longjmp(env, val) #elif defined(_WIN64) diff --git a/tests/migration/stress.c b/tests/migration/stress.c index 88acf8dc25..54a95c07f1 100644 --- a/tests/migration/stress.c +++ b/tests/migration/stress.c @@ -36,7 +36,7 @@ static int gettid(void) } #endif -static __attribute__((noreturn)) void exit_failure(void) +static G_NORETURN void exit_failure(void) { if (getpid() == 1) { sync();