| Message ID | 20221003202441.11773-1-rdunlap@infradead.org |
|---|---|
| State | New |
| Headers | show
Return-Path: <SRS0=VCEf=2E=vger.kernel.org=sparclinux-owner@ozlabs.org>
X-Original-To: incoming@patchwork.ozlabs.org
Delivered-To: patchwork-incoming@legolas.ozlabs.org
Authentication-Results: legolas.ozlabs.org;
spf=pass (sender SPF authorized) smtp.mailfrom=ozlabs.org
(client-ip=2404:9400:2221:ea00::3; helo=gandalf.ozlabs.org;
envelope-from=srs0=vcef=2e=vger.kernel.org=sparclinux-owner@ozlabs.org;
receiver=<UNKNOWN>)
Authentication-Results: legolas.ozlabs.org;
dkim=pass (2048-bit key;
secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256
header.s=casper.20170209 header.b=sYlPOgMR;
dkim-atps=neutral
Received: from gandalf.ozlabs.org (mail.ozlabs.org
[IPv6:2404:9400:2221:ea00::3])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384)
(No client certificate requested)
by legolas.ozlabs.org (Postfix) with ESMTPS id 4MhC4c21Gnz1yqm
for <incoming@patchwork.ozlabs.org>; Tue, 4 Oct 2022 07:25:03 +1100 (AEDT)
Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76])
by gandalf.ozlabs.org (Postfix) with ESMTP id 4MhC4Y6hd3z4x1R
for <incoming@patchwork.ozlabs.org>; Tue, 4 Oct 2022 07:25:01 +1100 (AEDT)
Received: by gandalf.ozlabs.org (Postfix)
id 4MhC4Y6dqXz4xGd; Tue, 4 Oct 2022 07:25:01 +1100 (AEDT)
Delivered-To: patchwork-incoming@ozlabs.org
Authentication-Results: gandalf.ozlabs.org;
dmarc=none (p=none dis=none) header.from=infradead.org
Authentication-Results: gandalf.ozlabs.org;
spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org
(client-ip=2620:137:e000::1:20; helo=out1.vger.email;
envelope-from=sparclinux-owner@vger.kernel.org; receiver=<UNKNOWN>)
Authentication-Results: gandalf.ozlabs.org;
dkim=pass (2048-bit key;
secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256
header.s=casper.20170209 header.b=sYlPOgMR;
dkim-atps=neutral
Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20])
by gandalf.ozlabs.org (Postfix) with ESMTP id 4MhC4Y6TDpz4x1R
for <patchwork-incoming@ozlabs.org>; Tue, 4 Oct 2022 07:25:01 +1100 (AEDT)
Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand
id S229932AbiJCUZA (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);
Mon, 3 Oct 2022 16:25:00 -0400
Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35384 "EHLO
lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org
with ESMTP id S229797AbiJCUYv (ORCPT
<rfc822;sparclinux@vger.kernel.org>); Mon, 3 Oct 2022 16:24:51 -0400
Received: from casper.infradead.org (casper.infradead.org
[IPv6:2001:8b0:10b:1236::1])
by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8D61013E83;
Mon, 3 Oct 2022 13:24:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
d=infradead.org; s=casper.20170209;
h=Content-Transfer-Encoding:MIME-Version:
Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID:
Content-Description:In-Reply-To:References;
bh=bDSynPiFi5yIXtWzlGRNU3puEPnwibr1DugVH+Eq8aw=;
b=sYlPOgMRndk9V8H7vLA7iMoCGF
UbxScZ0BqCdJS0wnQ+HEDHcyelJRDy32Em+P5F+3wXgdzzNBijpXrAdzNjir8E1rHGeK+R5TAcGgv
Nhn2hvimQhWFaRbeWDsINteOHFlwLgvILAbR6+sZ5A174tRpFK7J4loAElUa8+uZC+Z4KOqaNIUFC
YupM+jNtsEdzGAEDWKr60jVtWu/PljVHjPMtmIapHXv/MzZWbYz9ge7cUOpTqsQX7h0yD1ZcLg2mT
SNEA3kc3EUVK6Wtxgwt4pDTSZTu/I9xRdjebuobJPFqLFlyW8gcdDRrb5O+h9Gs5hWnhRc3xXlSVA
9o6pUO4A==;
Received: from [2601:1c2:d80:3110::a2e7] (helo=casper.infradead.org)
by casper.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
id 1ofRzd-00GdW9-4i; Mon, 03 Oct 2022 20:24:49 +0000
From: Randy Dunlap <rdunlap@infradead.org>
To: linux-kernel@vger.kernel.org
Cc: Randy Dunlap <rdunlap@infradead.org>,
Igor Zhbanov <izh1979@gmail.com>,
"David S. Miller" <davem@davemloft.net>,
sparclinux@vger.kernel.org, Sam Ravnborg <sam@ravnborg.org>,
Andrew Morton <akpm@linux-foundation.org>,
stable@vger.kernel.org, Arnd Bergmann <arnd@arndb.de>
Subject: [PATCH v4] sparc64: NMI watchdog: fix return value of __setup handler
Date: Mon, 3 Oct 2022 13:24:41 -0700
Message-Id: <20221003202441.11773-1-rdunlap@infradead.org>
X-Mailer: git-send-email 2.37.3
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,
SPF_NONE autolearn=ham autolearn_force=no version=3.4.6
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on
lindbergh.monkeyblade.net
Precedence: bulk
List-ID: <sparclinux.vger.kernel.org>
X-Mailing-List: sparclinux@vger.kernel.org
|
| Series |
[v4] sparc64: NMI watchdog: fix return value of __setup handler
|
expand
|
--- a/arch/sparc/kernel/nmi.c +++ b/arch/sparc/kernel/nmi.c @@ -274,7 +274,7 @@ static int __init setup_nmi_watchdog(cha if (!strncmp(str, "panic", 5)) panic_on_timeout = 1; - return 0; + return 1; } __setup("nmi_watchdog=", setup_nmi_watchdog);
__setup() handlers should return 1 to obsolete_checksetup() in init/main.c to indicate that the boot option has been handled. A return of 0 causes the boot option/value to be listed as an Unknown kernel parameter and added to init's (limited) argument or environment strings. Also, error return codes don't mean anything to obsolete_checksetup() -- only non-zero (usually 1) or zero. So return 1 from setup_nmi_watchdog(). Fixes: e5553a6d0442 ("sparc64: Implement NMI watchdog on capable cpus.") Signed-off-by: Randy Dunlap <rdunlap@infradead.org> Reported-by: Igor Zhbanov <izh1979@gmail.com> Link: lore.kernel.org/r/64644a2f-4a20-bab3-1e15-3b2cdd0defe3@omprussia.ru Cc: "David S. Miller" <davem@davemloft.net> Cc: sparclinux@vger.kernel.org Cc: Sam Ravnborg <sam@ravnborg.org> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: stable@vger.kernel.org Cc: Arnd Bergmann <arnd@arndb.de> --- v2: change From" Igor to Reported-by: add more Cc's v3: use Igor's current email address v4: add Arnd to Cc: list arch/sparc/kernel/nmi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)