Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp4140632ybe; Mon, 9 Sep 2019 05:02:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqz+k9QdD/s9FhkBg6q1iC2NxALOEUoLNfUkrGq1kz8/wTOgUwGAJlzqOKyPaYQZt1OrgXqq X-Received: by 2002:aa7:ce89:: with SMTP id y9mr23345334edv.255.1568030531512; Mon, 09 Sep 2019 05:02:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568030531; cv=none; d=google.com; s=arc-20160816; b=y6iF8ydLSPG9g7zO5N3Jan3dMzAJjqB2BMSdOR9KNQJcsbkS+cDn69BnKFCNuk8Avz 84n22j/LD44DVdItFqskNiY7ST9o0R0+zyx57FFaqY+pX3A11Osx1IovPo185Q9+Nczy QNu1fIMtknWS8l3KlZwRlXp8z11FabbaPsKTUW8J4skJVpDj+EDo7viO8azRO5v5IlNM qrKrsBQ9NLN4J6dknwk25ZB/P/k2Ru/a/IU2d7WegyXnly9W7BNM6ITMq0IWdihY614Q Bcj787mQJNZMkq8jECwGXNUVImB60T31wWI0C41501zMtywbmnHrJVvEkImvM9yMPRdE xJcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zXhafRv2clzCZ5JqDiDSeI3oJTmc0o6zNPG6xKu26a8=; b=dVjQcjlK5XYUGYO2G8Oi+A+Rr3Pc/j9qfOKxvGIcMPeyme5WZG+TJdxwRV7qaGO1aC y1n1g+uU4r4AIJr29+Yd/zlENjkVWCPdv+QEGFZDGlJF9T8/kKSyP4gLLYSxwSwGj9o3 GwMK+aoFUkfCvk2KXQUbkLe5XvnbcaxWEZvFJmvEORukS4Cl8IjVPHdDv7uWhmgpOk8F YnjTL9pieUzNJ7TKpEgAX5p+tvYJlw7Ce8pLWKg5nUfenQHXZHhhK5LEaWS9jfg/dSTs S7Y1Qb/+kFNKSqX52cq0MKGpzSTGahmYa27K3QzyeFQjg/YpBtXFJDjIRjgyDmZeD1U5 Jd6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ndRi8wD2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o23si7062751ejx.107.2019.09.09.05.01.47; Mon, 09 Sep 2019 05:02:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ndRi8wD2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733236AbfIHMww (ORCPT + 99 others); Sun, 8 Sep 2019 08:52:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:45336 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733204AbfIHMws (ORCPT ); Sun, 8 Sep 2019 08:52:48 -0400 Received: from localhost (unknown [62.28.240.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 362A820693; Sun, 8 Sep 2019 12:52:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567947167; bh=iWdWvQj/QygSKnUvQWENMH98qfzOfZ2rLxO+WiunLmM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ndRi8wD2Clzos6Me8Qn3LH4TfkDYP8DNNzn7Hjp296PC+B66K+ATD4YksZHb1gkS9 bEKr/YfcbFyPoWehOhH318mZygTl27/w2zC4YOlLavwSnbyZvShIYQnsaymf/iIgmL FEEU6zJGc5hTTgPJV7nT3PQleCjEmts4aNbtcF5c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, YueHaibing , David Howells , Sasha Levin Subject: [PATCH 5.2 86/94] afs: use correct afs_call_type in yfs_fs_store_opaque_acl2 Date: Sun, 8 Sep 2019 13:42:22 +0100 Message-Id: <20190908121152.893198930@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190908121150.420989666@linuxfoundation.org> References: <20190908121150.420989666@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 7533be858f5b9a036b9f91556a3ed70786abca8e ] It seems that 'yfs_RXYFSStoreOpaqueACL2' should be use in yfs_fs_store_opaque_acl2(). Fixes: f5e4546347bc ("afs: Implement YFS ACL setting") Signed-off-by: YueHaibing Signed-off-by: David Howells Signed-off-by: Sasha Levin --- fs/afs/yfsclient.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/afs/yfsclient.c b/fs/afs/yfsclient.c index 18722aaeda33a..a1baf3f1f14d1 100644 --- a/fs/afs/yfsclient.c +++ b/fs/afs/yfsclient.c @@ -2155,7 +2155,7 @@ int yfs_fs_store_opaque_acl2(struct afs_fs_cursor *fc, const struct afs_acl *acl key_serial(fc->key), vnode->fid.vid, vnode->fid.vnode); size = round_up(acl->size, 4); - call = afs_alloc_flat_call(net, &yfs_RXYFSStoreStatus, + call = afs_alloc_flat_call(net, &yfs_RXYFSStoreOpaqueACL2, sizeof(__be32) * 2 + sizeof(struct yfs_xdr_YFSFid) + sizeof(__be32) + size, -- 2.20.1