Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp2055777ybb; Fri, 29 Mar 2019 17:50:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqwlsPWHQWVjzqjCw98VSVIbkJmZtVpl61dRuM2ABko3jEkBDaihs8QU3McO6bfCxuK+LUGA X-Received: by 2002:a62:ac08:: with SMTP id v8mr6114397pfe.42.1553907039257; Fri, 29 Mar 2019 17:50:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553907039; cv=none; d=google.com; s=arc-20160816; b=HkBMc86dvGdJPCBeBNHWkk2CL/3mgvu8N6gZdoFpvgn4EBh0xo/7HMbY4flQljJdKg /O/kNU/SV3GRD2OC/wEZv2FqJYrY1KjsxyZwt+QaNd9cyIKrQv93UM2mM6RZ0X1FvN4s or4+LUNbGCUIcZrYB+yhw3D0UfYoZ38g1f6XMD63xpLbhfb5w2kFbivtGvsEE5exPVib fe9fbvXsuifMP8gP/CccwG0nbUi9GbS5cFB8XDv1Y+7MpGZ04zgxSbrbHrIZBO38EIip DM3LPQpqIRT2M+i5LYXJXFgunqr/alFlHnizsCxiZfZsEjuNoSZRfXWyTBNLElibIote IOwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=9Hv7HBeeVZKYiLPwifpGM/mDkmYtbuuPuuJDWy6FVH4=; b=zAxidF9AwOe3StQJoB0X6qgh8jSuMMxPEbgHZDj3Qx9fx0y6kg6oC56SY7dVNsCGho 1oPco0w0FQPuUkNrPZ0Zxuht8jwR/rwPb0SxbDz4JpyukTUV+dfBkKcoPoMtkYZ47nm2 U57Bqe3fN5JMJjILnzFQBr0ahPeaOBF++bh0GhLyaFK5jsiock4DTlWmwAWDnQNekntU /bgHHClG1x/ro4WqWs1BVeDu6ccXa9InqQjBkpRe/wplKgQfZMYI+jxWsvxWKdo2ZRNc owA1QFia6Vmc/z2SLrNOsyMZVZsb48DzMuRl4LuzNqn4ByXp8ZM8C3KkK58CrfX5MamJ VAFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w10si727113plz.37.2019.03.29.17.50.23; Fri, 29 Mar 2019 17:50:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730592AbfC3AsM (ORCPT + 99 others); Fri, 29 Mar 2019 20:48:12 -0400 Received: from mga06.intel.com ([134.134.136.31]:64217 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730463AbfC3Arw (ORCPT ); Fri, 29 Mar 2019 20:47:52 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Mar 2019 17:47:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,286,1549958400"; d="scan'208";a="129912806" Received: from tassilo.jf.intel.com (HELO tassilo.localdomain) ([10.7.201.137]) by orsmga008.jf.intel.com with ESMTP; 29 Mar 2019 17:47:51 -0700 Received: by tassilo.localdomain (Postfix, from userid 1000) id 21762301C79; Fri, 29 Mar 2019 17:47:51 -0700 (PDT) From: Andi Kleen To: x86@kernel.org Cc: linux-kernel@vger.kernel.org, Andi Kleen Subject: [PATCH v2 9/9] x86/cpu/bugs: Fix __initconst usage in bugs.c Date: Fri, 29 Mar 2019 17:47:43 -0700 Message-Id: <20190330004743.29541-9-andi@firstfloor.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190330004743.29541-1-andi@firstfloor.org> References: <20190330004743.29541-1-andi@firstfloor.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andi Kleen Fix some of the recently added const tables to use __initconst for const data instead of __initdata which causes section attribute conflicts. Fixes: fa1202ef2243 ("x86/speculation: Add command line control") Signed-off-by: Andi Kleen --- arch/x86/kernel/cpu/bugs.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index 2da82eff0eb4..b91b3bfa5cfb 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -275,7 +275,7 @@ static const struct { const char *option; enum spectre_v2_user_cmd cmd; bool secure; -} v2_user_options[] __initdata = { +} v2_user_options[] __initconst = { { "auto", SPECTRE_V2_USER_CMD_AUTO, false }, { "off", SPECTRE_V2_USER_CMD_NONE, false }, { "on", SPECTRE_V2_USER_CMD_FORCE, true }, @@ -419,7 +419,7 @@ static const struct { const char *option; enum spectre_v2_mitigation_cmd cmd; bool secure; -} mitigation_options[] __initdata = { +} mitigation_options[] __initconst = { { "off", SPECTRE_V2_CMD_NONE, false }, { "on", SPECTRE_V2_CMD_FORCE, true }, { "retpoline", SPECTRE_V2_CMD_RETPOLINE, false }, @@ -658,7 +658,7 @@ static const char * const ssb_strings[] = { static const struct { const char *option; enum ssb_mitigation_cmd cmd; -} ssb_mitigation_options[] __initdata = { +} ssb_mitigation_options[] __initconst = { { "auto", SPEC_STORE_BYPASS_CMD_AUTO }, /* Platform decides */ { "on", SPEC_STORE_BYPASS_CMD_ON }, /* Disable Speculative Store Bypass */ { "off", SPEC_STORE_BYPASS_CMD_NONE }, /* Don't touch Speculative Store Bypass */ -- 2.20.1