Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp793641imm; Mon, 21 May 2018 14:34:51 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrrmrznWd0X0JsPVyGkA2/JUyKAEffIqTqmolbcAoLINe7UFdJYKwgCcymSiWxIGBDGk854 X-Received: by 2002:a62:6a0a:: with SMTP id f10-v6mr21255941pfc.99.1526938491207; Mon, 21 May 2018 14:34:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526938491; cv=none; d=google.com; s=arc-20160816; b=Vp59FIgNJ2rkkmYFWKwMDI3H5ElaUoYtb8Qxo7f8QrjI6JqK8o/NxWDqvRkccKxzn9 bvkQrTjxorQaLarom1cvpqOwPfKzIHoh9KLTH8sllHqTupUkgssUgxUcO56ObLhapual 6wdwW0Iyddm0nLhanr5dDNMl+9m/JWT1aWrxCWShlWJ2uOMqBiCL1PdApwUJ4lJhCUTw TM+QqxkVTpenF6oOntBvPsSSe5WGM4YNquWsHZVvY66tgZ11e8EuFLwmebdJt79E/yAl QPBRdnjfi0Pmlm2tBIVnAHwKBMz8WJ7zyTVv5NZc0Ue5MRA+YJXpAmWnw7kKVwDSG3FS VIaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=avkhoi6OZZ/GSGEmtsvt3PVdKocOdtPnbysnSjOQ7OA=; b=GAL5Tz8qKZ9FiVq1jGcMYWotrr7LXjdKVcAzaJwV4BEyY2+EZ8i/pQNerYNbwK5qE9 ZyZpvLQJuvPPN0d/ConFPB6NZJhV4jWmUuPIcFaAHB4Upaq/XfCuhB0a5Xq39rygM9fa dRujSkDeMGG3Fv/hjo56lKsNs0iNp1wGcAcdClnF3J2z+1nOwjQO3iTqro3pbUM5MvkP 2RWA8MlfQaRYdBTNw49xFWnuJ+8hwrCyAZwjP4ig6vfGdCr4PavSPk7EYgLyXIYKCLza tGctIhsFAz4OTTI2Jmm/T6zqHUAWs/VVqWbkPeVrDpjDw4cemzvR2BoB/qVpp4/TFWe7 MT3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=O85WTu8Q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e129-v6si15239697pfa.217.2018.05.21.14.34.35; Mon, 21 May 2018 14:34:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=O85WTu8Q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754441AbeEUV0M (ORCPT + 99 others); Mon, 21 May 2018 17:26:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:40912 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932307AbeEUV0E (ORCPT ); Mon, 21 May 2018 17:26:04 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9E91020853; Mon, 21 May 2018 21:26:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526937964; bh=0cB6qmR/KYXeS0VS/fBmEbwEgpOYVX9AjbjaJhc6fc4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=O85WTu8QIdnx3v7YKuUcLlfUVTcJ73cUncE3yK3CuFm3c+rW+0deyMlhZSgg3mSWF 7FOmPm6a3AOyHY9v+bTtCFCBcbyBjL/barJMv+Uh77dc2GdJMXjjO9Q2AwxdcOml4l t4oVnx7QmZliYG8s1AytBfmVrTXOegrBlmNDdwIE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Kosina , Thomas Gleixner Subject: [PATCH 4.16 090/110] x86/bugs: Fix __ssb_select_mitigation() return type Date: Mon, 21 May 2018 23:12:27 +0200 Message-Id: <20180521210513.954849603@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180521210503.823249477@linuxfoundation.org> References: <20180521210503.823249477@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jiri Kosina commit d66d8ff3d21667b41eddbe86b35ab411e40d8c5f upstream __ssb_select_mitigation() returns one of the members of enum ssb_mitigation, not ssb_mitigation_cmd; fix the prototype to reflect that. Fixes: 24f7fc83b9204 ("x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation") Signed-off-by: Jiri Kosina Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -468,7 +468,7 @@ static enum ssb_mitigation_cmd __init ss return cmd; } -static enum ssb_mitigation_cmd __init __ssb_select_mitigation(void) +static enum ssb_mitigation __init __ssb_select_mitigation(void) { enum ssb_mitigation mode = SPEC_STORE_BYPASS_NONE; enum ssb_mitigation_cmd cmd;