From patchwork Thu Jun 22 11:45:59 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yury Norov X-Patchwork-Id: 9804081 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 0BF5260234 for ; Thu, 22 Jun 2017 11:46:47 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id EA636204C1 for ; Thu, 22 Jun 2017 11:46:46 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id DD9C02074F; Thu, 22 Jun 2017 11:46:46 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAD_ENC_HEADER,BAYES_00, DKIM_SIGNED,DKIM_VALID autolearn=unavailable version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [65.50.211.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 104B0204C1 for ; Thu, 22 Jun 2017 11:46:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=ayWWcs9G74kBPIdHV+A221TfRjYnWGCuJiaNKTytVU4=; b=g2Z6mX2SJKY19V gyiabc7GeKbqYw0bviLYyY4SVWRKCRcs0mkz8IrlN2V3WuiGHc8nycXETggY1Tl8B7qX2BGgTtuCo BUQtqqV7t+42deCv8Cy0+FnO0YK9gK+5qPCQ/HPw03d4mzg6VhsrsQB84gpOuYpVrCKNKZth37hpE aOgrEq9FgaAsrhax4VXfFFhiiyIHlUiEwQE9Pbs8u5+Hx5zNBr4fAgcxCrbS4yEcfBF62c/x9a9yN py5QptCqCcV6zWrGruN+ZERV1ohOJaHljgPaALFMEBKbvtEqovzFuJMgxvhKOMzcUTVEbbAE+qNx+ mBMy7IIXqASV7Wafpx8A==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux)) id 1dO0ZM-000866-Ti; Thu, 22 Jun 2017 11:46:40 +0000 Received: from mail-sn1nam01on0071.outbound.protection.outlook.com ([104.47.32.71] helo=NAM01-SN1-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux)) id 1dO0ZH-0007wY-Kq for linux-arm-kernel@lists.infradead.org; Thu, 22 Jun 2017 11:46:39 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=PfdLL6SWqLSA9F+NjcF11eng2cb2F0MFfGnx0aLV2q4=; b=Hu7Taz5nrFN/CivsEQkAohv0WTlN5f0u3a8vSOXcP2qEBB2lS+BMpuxK6k7cRygaY2Jb7uA2Uc0iSscXRSGw4wQHbvFcGnYx5L5XS4HYMG/cm2wdWQW5+EPtGkqafMijHAKWtBmfSdKKcRWNzMcuJUsK5yy1zm2zeyXTwfXqyl8= Authentication-Results: arm.com; dkim=none (message not signed) header.d=none; arm.com; dmarc=none action=none header.from=caviumnetworks.com; Received: from localhost (83.251.110.98) by BLUPR0701MB1859.namprd07.prod.outlook.com (10.162.88.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1178.14; Thu, 22 Jun 2017 11:46:06 +0000 Date: Thu, 22 Jun 2017 14:45:59 +0300 From: Yury Norov To: James Morse Subject: Re: [PATCH 05/20] arm64: rename COMPAT to AARCH32_EL0 in Kconfig Message-ID: <20170622114559.ameughvz3zv3etth@yury-thinkpad> References: <20170604120009.342-1-ynorov@caviumnetworks.com> <20170604120009.342-6-ynorov@caviumnetworks.com> <5947F498.2040505@arm.com> <20170620231003.nfz6t4dutiwndyjg@yury-thinkpad> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20170620231003.nfz6t4dutiwndyjg@yury-thinkpad> User-Agent: NeoMutt/20170113 (1.7.2) X-Originating-IP: [83.251.110.98] X-ClientProxiedBy: AM5PR0402CA0011.eurprd04.prod.outlook.com (10.175.37.21) To BLUPR0701MB1859.namprd07.prod.outlook.com (10.162.88.145) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 7e820548-c1af-4522-c21f-08d4b9644508 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131423075)(201703031133081); SRVR:BLUPR0701MB1859; X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1859; 3:sqXR2xvcYBdc3wwX/KuOdDzDmaUyhXC9M6EwlpCM0nqZBNB5gvKuNts4wgBtk4ION5SQOvnqrld3PLCjArtaGa0WpQPhmCjO4rqioPW43KJI4TjCme+5PURIeCJgC7a1epj0gdZwuDFUUQdaxkpuKH2QcHD0ZMP/5HigaKf/Zc5juIodH+c/TRa4EQSORh7gok8zjLlhb6QUiclvHmzVW9wGirso93H1tks/nCPAW2PiX7JFWGwfwFrb1GFPdBGE+TgfDgqfJbExQRyRUbGZX5HDFoF0oNzA8B8osQ+z9zC5rzpGWyt5rgekoSPPWpHSpeE/zKweKSN+/lC2E81gGg==; 25:DgGPPufn+/h9krEQIiNMUZoyw1TueGRqZ0wdM3KLXCuXAPqhU5NmO60PR1sayRcet72Ylwr1kLyW9vMrfJAFYnnBnxostiJfB6ODAUfy9haTCPJT93mWZSPARodu5S0V38qcx/CTfaMGgYHDTaceO/v2U4yDg1H4kqta/R76HU2OtSfxHjtiUqD4rS5msLaQghDrRx6jiddgzXzxklFmuZXnNxVGDlH3XcqvtWktPB9KF5QAHKI+JYqlzkR/6HSOoAcwzFfwqixCoY8EIccKyEi+MQHjH4+IIbXAZY9wkFfgBy1Uh9/XzOygn8A1nDjPX9ss4Ch6rXDFn/5CFjfv/4yY3uAnnQ7X84PKp86kFQ4/KJo+FRNB4aoZs4eaCmjC21ZUA1ZogpDLl6cJl6aQXY+fiHJhjAyNZJe+r6IjoOUKcjD5f2ay/NoLX7YR194dvy64EG7cmy5bWcuf0zE6VHOuneIKEtF2dzAA78iMWqY= X-MS-TrafficTypeDiagnostic: BLUPR0701MB1859: X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1859; 31:a81LIrehqsU4C+m9QfKQoO7cWivw+/JWjmaasJexD4eWuQA5ndK+oLIBVSPlBbvDHnvJseRwySyOn8UrkIE/2F4tFS6GVhBOV8sdsihWRwW8j4sUHVnhbkTXe/i54ugIMnkTXGmBigwbm23czwg8YAB19s2HA6aXe0eKZDaRgsUlJq/6Vchb5JRQ4Fjwg86Ca7g7xe70tzltdwouVoNDWC6/VMH96gL5uuoid+MmTyg=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(166708455590820); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(93006095)(100000703101)(100105400095)(10201501046)(6041248)(20161123562025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123560025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BLUPR0701MB1859; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BLUPR0701MB1859; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BLUPR0701MB1859; 4:DIW7lIM09oWl8foQegT5kQH0HXPXMazX6159Q6od?= =?us-ascii?Q?qc9KbVtiTocva/1HygIXeKOmMzD4oIxAuJ55vpsc8kUYFIklHdar2nBoYtU8?= =?us-ascii?Q?fmwBSmZK84gvPgVSsmll4oHq10GoQR4qRDZSSh/80+FR0r4AOwruflrZ22GT?= =?us-ascii?Q?D8u3YBM6qn5evaZyZjMq8gE1hpAsKXLtP4wbPxsgjcTaLlvcq8a/QnrUkpRy?= =?us-ascii?Q?9tcMDrIupUdqHMupfWXCKElMaEtKLS9FTMmBPLo0L3YqWWDnyd2uek6TYnaD?= =?us-ascii?Q?QmCbPM/NBy0iQjOgWSIHJpDjMZiLBi3TzThSONEj5UUcQckoNyN+j70J/aL1?= =?us-ascii?Q?t8BecBh++8Uqrn9VZDpeyEGw7G2uii2iF1tY2e1pck5Y8qSIe1fsyGNu+vad?= =?us-ascii?Q?asXxAELi7l4w9BDCdAsGCkvCfWuqHtqT+eZ3g6/1/XnIPUsItE4wt0ZOGyo9?= =?us-ascii?Q?mrQwqA6dR6Bn1gqPRmwlp2kPwxUVbjqz1AcYP31DYxvqTQY0mx2hUa5x6eSl?= =?us-ascii?Q?yRKRCL4BuYA1beHSjba3APCpBAoc0JSylh7BWyEvksltWnMu7zn1O9bcgk/P?= =?us-ascii?Q?R21wBuuf3yYwXfVSVKRQ26huAoViq/oVH8srPJ9s89ZPb2LceGmUFhkmoMOM?= =?us-ascii?Q?C8w9zHSVdrJ5mi7JhCp4Xk4zrvx8dPlPth8r9wYnPFl8MKH7vzH52gXxs5Hf?= =?us-ascii?Q?y7cKjP4SvbngNt0PV0YybrHz/NgwhWXK474YrywAy/tio7jTNUs4IUjx6gjc?= =?us-ascii?Q?aqVQUR3F4BdIGY95tqOCPIzCJj7mCmSrz1BKCzlg5osR+QSQBkDOQVpPLMP+?= =?us-ascii?Q?b5cD2AMHXuimDABAIaqSDkDUFRss37l0iAvxJwG7lF6j0dnfUrWZqnWQzPue?= =?us-ascii?Q?Bc63Du4acvkxGo00VLfeuHxHiqf6N+R4UUL+RZOADZ0bWD4CtTbT1/qb89Ct?= =?us-ascii?Q?yJcLlVmTi+46lR9El+KHuOqqLGavfSNMlEcrdgPU+Gu1BVhJsg8frkz48VGO?= =?us-ascii?Q?/XnZPuf9C0u9c/gMC6y0EWTdtenF4FRx+brCLEECqUmmvHqVedZuJdYy565x?= =?us-ascii?Q?um0b1dSBItM7grn0K5n9MJrsyMngfHPYhyAQTvTAX7/JNZP/dpcsQKL7r5Jh?= =?us-ascii?Q?Ov3S/cb3fj9cWuTSH4ugRwGKmp3U6jkHirmeD1jd0J9Q+GMN7oCqdw=3D=3D?= X-Forefront-PRVS: 03468CBA43 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39410400002)(39400400002)(39450400003)(39850400002)(39840400002)(24454002)(229853002)(110136004)(38730400002)(33716001)(53936002)(7736002)(4326008)(33646002)(966005)(72206003)(50466002)(305945005)(6496005)(25786009)(4001350100001)(6306002)(54906002)(5660300001)(189998001)(9686003)(83506001)(575784001)(76176999)(50986999)(54356999)(81166006)(8676002)(7416002)(7406005)(3846002)(6116002)(478600001)(76506005)(66066001)(47776003)(6666003)(6916009)(42882006)(93886004)(2906002)(2950100002)(6486002)(42186005)(21314002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR0701MB1859; H:localhost; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BLUPR0701MB1859; 23:+Kf8aCuKSwl71qriBZ66w8mNIK5OPh/CU35MjIr?= =?us-ascii?Q?A0urzEJGniZRF2E8KRn5O4y6ZCbcH1ur1wMjWFQGwBhEsfpvIN3nfMaMfT8C?= =?us-ascii?Q?qeZ5zY2t7ik5H9wVSpTSwPBl4nsyxWaLgPrc3veUzw5C+sSzJ1SnHyHTdsvm?= =?us-ascii?Q?S5LO7VcBj3lRJbiyFnciipjw/1dTjkg981xavW0v/Z8nttwDDGr0xDMZJh5g?= =?us-ascii?Q?6WIiOxprGM2je/NHvgg01vyzFKmwxM8h1Y1cupq0aBpJ61Mnc7Z2Jdo4Eovl?= =?us-ascii?Q?rj/o6wiJwtOQeny+a3QqNcWWBHI8Mw89goJMDTgcTUDJ0UY2fobQsakqTOcv?= =?us-ascii?Q?xeTQwmg7H1vxjKHTd8oM4Wyk1Inzm6esSIhlVdw1+4UHdNz99Ede4D8TbylO?= =?us-ascii?Q?/7ACQV5vthBeUlBuZcmddtoE25qGisbv7TTu04UTd+3WNaOqfLq8pgAPmQC5?= =?us-ascii?Q?vxnT50WASWKSZemzVmHFBdQVII4jj3Vh6hIjVmtEnGJgjb7KiePK6GcV8IOP?= =?us-ascii?Q?PyS1YB03f7gr8tFu2OfRX+8ETSNUL/b99+QL5cuI/VrZffYOvHYoXfSue6y8?= =?us-ascii?Q?k2tE7TyBoKLYPxJSXoZJScMSIped+XKvNy2fPI18ZrDz6bbRuijXbwz1FE5A?= =?us-ascii?Q?Chq63Ui3Aclz/73d+89FAuZ8AYGS1fgEukSwFIKM8lGyRuvJV2tNyvDOWkvD?= =?us-ascii?Q?y8h9763vHbFvrXWsluyyvaqnN7a+gi+WU6YKw+Zoig9pMUWmJtBrRphZzYnt?= =?us-ascii?Q?hw7dNbHifc7WGVo3ZZ93xKcpnqpxWT0hF8j9aWu2Rc738u5rxX/l85e2QGxp?= =?us-ascii?Q?bJG+9p9sPSwlp7JDpVibEPhk7JVIK99/nxJENUY19fW4KeP4/UmBLI3NVITf?= =?us-ascii?Q?9kcf24B1kqU+0OFZN8yWarrhluc2KbopXHlizNv8gIxP0G0JYRoH6O7aU79L?= =?us-ascii?Q?2d0mnjOkAz2wHWJhAdvYGm0dGIg/e9rTKc/hiU+AM7e1GxwbauSXNJ7hoZGl?= =?us-ascii?Q?LcljgDPlAEBi7/nxtw/gOyECGc4AByOiaH0wrJfvSxFe1/MnYPTAY2dQlQbh?= =?us-ascii?Q?2tzaHXXyzwmC4e/7HJVNVDixvOw9LdD+sv7VVa9eGOry7z9RYMi1UXZmRh83?= =?us-ascii?Q?lGAmvaZHIIexl/gCX0Qvt05vqNv7LLLd+Ql4WkL9kBsbPiwEuIoDLcDJObHE?= =?us-ascii?Q?d9WK4zwfBp0mrJ1//+8h9Qitih7+AH2V2jVVGEiWs81tQqM6o4LLVfRWXAnk?= =?us-ascii?Q?SLiHGTuNRCXREiThbNC4+HbzoNmvvTRFXkbmW3JH0?= X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BLUPR0701MB1859; 6:S1j7Fy6tyz1knIG36aFkznm608Fnam5GQOire2DC?= =?us-ascii?Q?TZ37RmhlZq69vfQ4rf2+/lIl81pv0MJd8qgkezRFYS9Vb2Vd83FZhSF78FP8?= =?us-ascii?Q?F23lYtJ25gxOHFH51J38l1VReVtCMOs1+2J1dW5X+1LT3vcENEw1hkU8Bvj3?= =?us-ascii?Q?ItPnIUkAhhT6tVdYXCb1sYso9FM+RGX9hcIniTjlbQSQDtniYiU5uU0J69Pc?= =?us-ascii?Q?V6vQmGVP+OqrwHaONG6tGArRYAuIiovEa0rG9tSxZqpmuRU7tMqXm41FHg94?= =?us-ascii?Q?WVxfoMoexN9UEqaH13Vvpf6UWmm9P/+OUKgDu4YHns1j2lMTYGH/jRPgQf6T?= =?us-ascii?Q?OT406slT2HKR4Nnil2cQa+qY3xtPFUwREWi93Ro2XZ+S2IhJYIKUxeT6SHY4?= =?us-ascii?Q?gxd/Y4xTeV07Na/j/AOrxm9K9Rxmgx0PxXgeXpLht6BliWTvg6pjw/cLJl7x?= =?us-ascii?Q?ITOkEwXLphfuleizfpuuqcQYWo+mgv1zVhSvexAMfDDgztmzUdOAOgAOsLi6?= =?us-ascii?Q?1Rs85mMlOVMhVG4daHXFQYY6Sh30wR6qpD23EBwE+KbA003PbFoJvm713EPj?= =?us-ascii?Q?6vY9lKAO0x/KOMQ3WP79VS3pTyjfItb0Z/DV1DfORnh+6oCqmGHKAB9lB+Dm?= =?us-ascii?Q?Ailkk1CyLgalN8ZGZrehX2V4xdo1vS7PomD+4NDHReB18nLh0dFmYcAiXsdn?= =?us-ascii?Q?nv136pumcn2ksIUJuz/PFC81/S5dFAAmGeiwb14yDRXS3bHZ3H09bVY98F9K?= =?us-ascii?Q?REgi4uQqrQmTkEGzS4oMpEjLozvzYyg1RFL7vfgaREwELInkLEtNx03zEdF/?= =?us-ascii?Q?s39kNFaR/cGUwvS+IB0NlVWW9SKGz+xGRlTtPuwi42Pf3qmqk9ZJp1lC41wX?= =?us-ascii?Q?cXTjWq0TyBmno/F3Qug1gnAWhWKIcfJkdLDJ0RK/cEuVpyHEpZ/JxTB2mK3v?= =?us-ascii?Q?3Ee6A13YLUWWR7/i7pkjAHqz6vpylLy+eHfHOlCrn8fvOO68wjU26kxQN/Vg?= =?us-ascii?Q?npE=3D?= X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1859; 5: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; 24:Txd9uCVGX4rOeSHM7MxYznoNiTmyGJMwHdEcdjP+kt59ACtbcCJDKFTBRgEhCROZD1JhhUZJkWd/HfAAoc+nKs83yyHLI4dAfa35dryknsQ= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1859; 7:0FMk47ifTGqrxG5SzRODi6rSwabFQ4duF3XnUIulrNqGt4yYBfM4wbo58PWmdkgOV+mhHGfy6/mb6VNBeGQYwOmHJj5OGoXB3EbyCPVnba7zkS5Lu3PD5o6erjrH10RNTqrTVn1c6KoDhxDeSjNChUF3lNaNOOlD5JJBwGqp+9UAN5g36436LugocxSVy8T6o7Ul7z3yvznSBDaPp43zyh61YV2OZNUFPrEotUl2OnEdJmaQMcE3w4w75o0PIO1MWijQtFr3k9MvSpX3jINDvYRvc9Q2ALevBr1ASjgoLq3yamU/2lUTRFgA63TRa0aJsb7xK5lkHOgQPN1NKPj8npr+OFgxF+PC/jNv6Az9rECjvzYSymc+sEqjFilGPf0G1hhUGqCohHJREFBSQosIFRHW82ETjApZuUX/uUp87iTCvgzf8caUqJkhGhWGYNkFUQlX0SzVHVNy9+54lFoDpDtlPKyaGYqYX3SQtdIY8Tb+X5BYklLXH1ZZPwOpgSjYYcyHpS8l70hGrPaejALt3mKg89Ga73+ihRr/pN9IX5VCuQD/dTYyfPMu1cOG3nN8Qwkv3yiZ/76HQS39v+S53Ce/9gagiw6aodF+vYDShtTTJDW9UAS2zw7C+IC+shDG7beLw9z2Uo/Ael0uKIi+/2Eej2z2Lqlp+jR1DJm0b7q8AcX0K+sFIxmhjr6cm3YPBzuaRoL83dX6brjrOUMrAUWUfLafvV2GqUW7tugsACJu2eFGr47VosOnzOmjt18SAl48aMxHtyhN/SgHr5W3y7PzULYPZUG3YcMFutUHMKc= X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jun 2017 11:46:06.7949 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0701MB1859 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20170622_044635_905386_A36AB5CE X-CRM114-Status: GOOD ( 14.27 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: linux-doc@vger.kernel.org, Andrew Pinski , Catalin Marinas , Heiko Carstens , Chris Metcalf , philipp.tomsich@theobroma-systems.com, Joseph Myers , zhouchengming1@huawei.com, Steve Ellcey , Prasun.Kapoor@caviumnetworks.com, Andreas Schwab , agraf@suse.de, szabolcs.nagy@arm.com, geert@linux-m68k.org, Adam Borowski , manuel.montezelo@gmail.com, Chris Metcalf , Arnd Bergmann , Andrew Pinski , linyongting@huawei.com, klimov.linux@gmail.com, broonie@kernel.org, Bamvor Zhangjian , Bamvor Jian Zhang , linux-arm-kernel@lists.infradead.org, Maxim Kuvyrkov , Florian Weimer , Nathan_Lynch@mentor.com, linux-kernel@vger.kernel.org, Andrew Pinski , Ramana Radhakrishnan , schwidefsky@de.ibm.com, davem@davemloft.net, christoph.muellner@theobroma-systems.com Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP On Wed, Jun 21, 2017 at 02:10:03AM +0300, Yury Norov wrote: > On Mon, Jun 19, 2017 at 04:58:16PM +0100, James Morse wrote: > > Hi Yury, [...] > > This is confusing as 'is_compat_task()' matches one of aarch32 or ilp32, but > > compat_user_mode(regs) only matches aarch32 as it checks the saved spsr. I can't > > see any problem caused by this today, but its going to bite someone in the > > future. Can this be renamed aarch32_user_mode()? (turns out 'a32' is the name of > > just one of aarch32's instruction sets[0].) > > compat_thumb_mode may be also renamed, and compat_setup_frame and > compat_setup_rt_frame, and some others. If you think that it may > confuse, I'll do rename. So this is what I found for now. I'm not sure this list is complete though. Some aarch32 functions and macros with 'compat' in the name are exported to userspace, so I left them untouched. Also, we derive binfmt_elf32.c for aarch32 from general compat_binfmt, so some aarch32 functions should have 'compat' name. Maybe it was not the best idea to reuse existing 'compat' term with new meaning. But if we choose to introduce some new term for it, like 'is_32_task()', we'd finish with another portion of painful renaming. Anyway, the patch in ready. If you / anyone will find something else to rename - just let me know. rename compat functions: https://github.com/norov/linux/commit/6d46b52e1dab6490076c09ddfbcd4f4821dbadae rename compat_elf_hwcap and compat_elf_hwcap2 (I will meld with previous one): https://github.com/norov/linux/commit/a1d94452e14b2d7aa5b99a94f9f928f1ebe9566f Yury commit 6d46b52e1dab6490076c09ddfbcd4f4821dbadae Author: Yury Norov Date: Wed Jun 21 14:25:25 2017 +0300 arm64: rename functions like compat_foo() to a32_foo() The ILP32 for ARM64 patch series introduces another 'compat' mode for arm64. So to avoid confusing, aarc32-only functions renamed in according to it. diff --git a/arch/arm64/include/asm/ptrace.h b/arch/arm64/include/asm/ptrace.h index d668b3900b52..58762bd39314 100644 --- a/arch/arm64/include/asm/ptrace.h +++ b/arch/arm64/include/asm/ptrace.h @@ -126,16 +126,16 @@ struct pt_regs { #define arch_has_single_step() (1) #ifdef CONFIG_AARCH32_EL0 -#define compat_thumb_mode(regs) \ +#define a32_thumb_mode(regs) \ (((regs)->pstate & COMPAT_PSR_T_BIT)) #else -#define compat_thumb_mode(regs) (0) +#define a32_thumb_mode(regs) (0) #endif #define user_mode(regs) \ (((regs)->pstate & PSR_MODE_MASK) == PSR_MODE_EL0t) -#define compat_user_mode(regs) \ +#define a32_user_mode(regs) \ (((regs)->pstate & (PSR_MODE32_BIT | PSR_MODE_MASK)) == \ (PSR_MODE32_BIT | PSR_MODE_EL0t)) @@ -149,10 +149,10 @@ struct pt_regs { (!((regs)->pstate & PSR_F_BIT)) #define GET_USP(regs) \ - (!compat_user_mode(regs) ? (regs)->sp : (regs)->compat_sp) + (!a32_user_mode(regs) ? (regs)->sp : (regs)->compat_sp) #define SET_USP(ptregs, value) \ - (!compat_user_mode(regs) ? ((regs)->sp = value) : ((regs)->compat_sp = value)) + (!a32_user_mode(regs) ? ((regs)->sp = value) : ((regs)->compat_sp = value)) extern int regs_query_register_offset(const char *name); extern unsigned long regs_get_kernel_stack_nth(struct pt_regs *regs, diff --git a/arch/arm64/include/asm/signal32.h b/arch/arm64/include/asm/signal32.h index e68fcce538e1..0bde8a0e33c7 100644 --- a/arch/arm64/include/asm/signal32.h +++ b/arch/arm64/include/asm/signal32.h @@ -26,27 +26,27 @@ extern const compat_ulong_t aarch32_sigret_code[6]; -int compat_setup_frame(int usig, struct ksignal *ksig, sigset_t *set, +int a32_setup_frame(int usig, struct ksignal *ksig, sigset_t *set, struct pt_regs *regs); -int compat_setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set, +int a32_setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set, struct pt_regs *regs); -void compat_setup_restart_syscall(struct pt_regs *regs); +void a32_setup_restart_syscall(struct pt_regs *regs); #else -static inline int compat_setup_frame(int usid, struct ksignal *ksig, +static inline int a32_setup_frame(int usid, struct ksignal *ksig, sigset_t *set, struct pt_regs *regs) { return -ENOSYS; } -static inline int compat_setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set, +static inline int a32_setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set, struct pt_regs *regs) { return -ENOSYS; } -static inline void compat_setup_restart_syscall(struct pt_regs *regs) +static inline void a32_setup_restart_syscall(struct pt_regs *regs) { } #endif /* CONFIG_AARCH32_EL0 */ diff --git a/arch/arm64/kernel/armv8_deprecated.c b/arch/arm64/kernel/armv8_deprecated.c index f0e6d717885b..d87df439a9fc 100644 --- a/arch/arm64/kernel/armv8_deprecated.c +++ b/arch/arm64/kernel/armv8_deprecated.c @@ -562,7 +562,7 @@ static int setend_set_hw_mode(bool enable) return 0; } -static int compat_setend_handler(struct pt_regs *regs, u32 big_endian) +static int a32_setend_handler(struct pt_regs *regs, u32 big_endian) { char *insn; @@ -585,14 +585,14 @@ static int compat_setend_handler(struct pt_regs *regs, u32 big_endian) static int a32_setend_handler(struct pt_regs *regs, u32 instr) { - int rc = compat_setend_handler(regs, (instr >> 9) & 1); + int rc = a32_setend_handler(regs, (instr >> 9) & 1); regs->pc += 4; return rc; } static int t16_setend_handler(struct pt_regs *regs, u32 instr) { - int rc = compat_setend_handler(regs, (instr >> 3) & 1); + int rc = a32_setend_handler(regs, (instr >> 3) & 1); regs->pc += 2; return rc; } diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index 960b4fe86ebd..e335f4562c3e 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -903,7 +903,7 @@ static const struct arm64_cpu_capabilities arm64_elf_hwcaps[] = { {}, }; -static const struct arm64_cpu_capabilities compat_elf_hwcaps[] = { +static const struct arm64_cpu_capabilities a32_elf_hwcaps[] = { #ifdef CONFIG_AARCH32_EL0 HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 2, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_PMULL), HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_AES), @@ -1079,7 +1079,7 @@ static void verify_local_cpu_capabilities(void) verify_local_cpu_features(arm64_features); verify_local_elf_hwcaps(arm64_elf_hwcaps); if (system_supports_32bit_el0()) - verify_local_elf_hwcaps(compat_elf_hwcaps); + verify_local_elf_hwcaps(a32_elf_hwcaps); } void check_local_cpu_capabilities(void) @@ -1155,7 +1155,7 @@ void __init setup_cpu_features(void) setup_elf_hwcaps(arm64_elf_hwcaps); if (system_supports_32bit_el0()) - setup_elf_hwcaps(compat_elf_hwcaps); + setup_elf_hwcaps(a32_elf_hwcaps); /* Advertise that we have computed the system capabilities */ set_sys_caps_initialised(); diff --git a/arch/arm64/kernel/debug-monitors.c b/arch/arm64/kernel/debug-monitors.c index d618e25c3de1..06a11aad3435 100644 --- a/arch/arm64/kernel/debug-monitors.c +++ b/arch/arm64/kernel/debug-monitors.c @@ -336,10 +336,10 @@ int aarch32_break_handler(struct pt_regs *regs) bool bp = false; void __user *pc = (void __user *)instruction_pointer(regs); - if (!compat_user_mode(regs)) + if (!a32_user_mode(regs)) return -EFAULT; - if (compat_thumb_mode(regs)) { + if (a32_thumb_mode(regs)) { /* get 16-bit Thumb instruction */ get_user(thumb_instr, (u16 __user *)pc); thumb_instr = le16_to_cpu(thumb_instr); diff --git a/arch/arm64/kernel/perf_callchain.c b/arch/arm64/kernel/perf_callchain.c index 3ff41e3fec88..5d82471c8f1f 100644 --- a/arch/arm64/kernel/perf_callchain.c +++ b/arch/arm64/kernel/perf_callchain.c @@ -64,21 +64,21 @@ user_backtrace(struct frame_tail __user *tail, * The registers we're interested in are at the end of the variable * length saved register structure. The fp points at the end of this * structure so the address of this struct is: - * (struct compat_frame_tail *)(xxx->fp)-1 + * (struct a32_frame_tail *)(xxx->fp)-1 * * This code has been adapted from the ARM OProfile support. */ -struct compat_frame_tail { - compat_uptr_t fp; /* a (struct compat_frame_tail *) in compat mode */ +struct a32_frame_tail { + compat_uptr_t fp; /* a (struct a32_frame_tail *) in compat mode */ u32 sp; u32 lr; } __attribute__((packed)); -static struct compat_frame_tail __user * -compat_user_backtrace(struct compat_frame_tail __user *tail, +static struct a32_frame_tail __user * +compat_user_backtrace(struct a32_frame_tail __user *tail, struct perf_callchain_entry_ctx *entry) { - struct compat_frame_tail buftail; + struct a32_frame_tail buftail; unsigned long err; /* Also check accessibility of one struct frame_tail beyond */ @@ -98,11 +98,11 @@ compat_user_backtrace(struct compat_frame_tail __user *tail, * Frame pointers should strictly progress back up the stack * (towards higher addresses). */ - if (tail + 1 >= (struct compat_frame_tail __user *) + if (tail + 1 >= (struct a32_frame_tail __user *) compat_ptr(buftail.fp)) return NULL; - return (struct compat_frame_tail __user *)compat_ptr(buftail.fp) - 1; + return (struct a32_frame_tail __user *)compat_ptr(buftail.fp) - 1; } #endif /* CONFIG_AARCH32_EL0 */ @@ -116,7 +116,7 @@ void perf_callchain_user(struct perf_callchain_entry_ctx *entry, perf_callchain_store(entry, regs->pc); - if (!compat_user_mode(regs)) { + if (!a32_user_mode(regs)) { /* AARCH64 mode */ struct frame_tail __user *tail; @@ -128,9 +128,9 @@ void perf_callchain_user(struct perf_callchain_entry_ctx *entry, } else { #ifdef CONFIG_AARCH32_EL0 /* AARCH32 compat mode */ - struct compat_frame_tail __user *tail; + struct a32_frame_tail __user *tail; - tail = (struct compat_frame_tail __user *)regs->compat_fp - 1; + tail = (struct a32_frame_tail __user *)regs->compat_fp - 1; while ((entry->nr < entry->max_stack) && tail && !((unsigned long)tail & 0x3)) diff --git a/arch/arm64/kernel/perf_regs.c b/arch/arm64/kernel/perf_regs.c index bd1b74c2436f..5b2a4656c28a 100644 --- a/arch/arm64/kernel/perf_regs.c +++ b/arch/arm64/kernel/perf_regs.c @@ -18,7 +18,7 @@ u64 perf_reg_value(struct pt_regs *regs, int idx) * - PC has been set in the pt_regs struct in kernel_entry, * - Handle SP and LR here. */ - if (compat_user_mode(regs)) { + if (a32_user_mode(regs)) { if ((u32)idx == PERF_REG_ARM64_SP) return regs->compat_sp; if ((u32)idx == PERF_REG_ARM64_LR) diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c index af1ea258c212..258d0e30f520 100644 --- a/arch/arm64/kernel/process.c +++ b/arch/arm64/kernel/process.c @@ -175,7 +175,7 @@ void __show_regs(struct pt_regs *regs) int i, top_reg; u64 lr, sp; - if (compat_user_mode(regs)) { + if (a32_user_mode(regs)) { lr = regs->compat_lr; sp = regs->compat_sp; top_reg = 12; diff --git a/arch/arm64/kernel/signal.c b/arch/arm64/kernel/signal.c index c7b6de62f9d3..06a753b9b8af 100644 --- a/arch/arm64/kernel/signal.c +++ b/arch/arm64/kernel/signal.c @@ -277,7 +277,7 @@ static int setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set, static void setup_restart_syscall(struct pt_regs *regs) { if (is_compat_task()) - compat_setup_restart_syscall(regs); + a32_setup_restart_syscall(regs); else regs->regs[8] = __NR_restart_syscall; } @@ -297,9 +297,9 @@ static void handle_signal(struct ksignal *ksig, struct pt_regs *regs) */ if (is_compat_task()) { if (ksig->ka.sa.sa_flags & SA_SIGINFO) - ret = compat_setup_rt_frame(usig, ksig, oldset, regs); + ret = a32_setup_rt_frame(usig, ksig, oldset, regs); else - ret = compat_setup_frame(usig, ksig, oldset, regs); + ret = a32_setup_frame(usig, ksig, oldset, regs); } else { ret = setup_rt_frame(usig, ksig, oldset, regs); } @@ -340,7 +340,7 @@ static void do_signal(struct pt_regs *regs) */ if (syscall >= 0) { continue_addr = regs->pc; - restart_addr = continue_addr - (compat_thumb_mode(regs) ? 2 : 4); + restart_addr = continue_addr - (a32_thumb_mode(regs) ? 2 : 4); retval = regs->regs[0]; /* diff --git a/arch/arm64/kernel/signal32.c b/arch/arm64/kernel/signal32.c index c747a0fc5d7d..755f38040727 100644 --- a/arch/arm64/kernel/signal32.c +++ b/arch/arm64/kernel/signal32.c @@ -29,7 +29,7 @@ #include #include -struct compat_sigcontext { +struct a32_sigcontext { /* We always set these two fields to 0 */ compat_ulong_t trap_no; compat_ulong_t error_code; @@ -55,17 +55,17 @@ struct compat_sigcontext { compat_ulong_t fault_address; }; -struct compat_ucontext { +struct a32_ucontext { compat_ulong_t uc_flags; compat_uptr_t uc_link; compat_stack_t uc_stack; - struct compat_sigcontext uc_mcontext; + struct a32_sigcontext uc_mcontext; compat_sigset_t uc_sigmask; int __unused[32 - (sizeof (compat_sigset_t) / sizeof (int))]; compat_ulong_t uc_regspace[128] __attribute__((__aligned__(8))); }; -struct compat_vfp_sigframe { +struct a32_vfp_sigframe { compat_ulong_t magic; compat_ulong_t size; struct compat_user_vfp { @@ -80,25 +80,25 @@ struct compat_vfp_sigframe { } __attribute__((__aligned__(8))); #define VFP_MAGIC 0x56465001 -#define VFP_STORAGE_SIZE sizeof(struct compat_vfp_sigframe) +#define VFP_STORAGE_SIZE sizeof(struct a32_vfp_sigframe) #define FSR_WRITE_SHIFT (11) -struct compat_aux_sigframe { - struct compat_vfp_sigframe vfp; +struct a32_aux_sigframe { + struct a32_vfp_sigframe vfp; /* Something that isn't a valid magic number for any coprocessor. */ unsigned long end_magic; } __attribute__((__aligned__(8))); -struct compat_sigframe { - struct compat_ucontext uc; +struct a32_sigframe { + struct a32_ucontext uc; compat_ulong_t retcode[2]; }; -struct compat_rt_sigframe { +struct a32_rt_sigframe { struct compat_siginfo info; - struct compat_sigframe sig; + struct a32_sigframe sig; }; #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP))) @@ -214,7 +214,7 @@ int copy_siginfo_from_user32(siginfo_t *to, compat_siginfo_t __user *from) * VFP save/restore code. * * We have to be careful with endianness, since the fpsimd context-switch - * code operates on 128-bit (Q) register values whereas the compat ABI + * code operates on 128-bit (Q) register values whereas the a32 ABI * uses an array of 64-bit (D) registers. Consequently, we need to swap * the two halves of each Q register when running on a big-endian CPU. */ @@ -231,7 +231,7 @@ union __fpsimd_vreg { }; }; -static int compat_preserve_vfp_context(struct compat_vfp_sigframe __user *frame) +static int a32_preserve_vfp_context(struct a32_vfp_sigframe __user *frame) { struct fpsimd_state *fpsimd = ¤t->thread.fpsimd_state; compat_ulong_t magic = VFP_MAGIC; @@ -280,7 +280,7 @@ static int compat_preserve_vfp_context(struct compat_vfp_sigframe __user *frame) return err ? -EFAULT : 0; } -static int compat_restore_vfp_context(struct compat_vfp_sigframe __user *frame) +static int a32_restore_vfp_context(struct a32_vfp_sigframe __user *frame) { struct fpsimd_state fpsimd; compat_ulong_t magic = VFP_MAGIC; @@ -320,12 +320,12 @@ static int compat_restore_vfp_context(struct compat_vfp_sigframe __user *frame) return err ? -EFAULT : 0; } -static int compat_restore_sigframe(struct pt_regs *regs, - struct compat_sigframe __user *sf) +static int a32_restore_sigframe(struct pt_regs *regs, + struct a32_sigframe __user *sf) { int err; sigset_t set; - struct compat_aux_sigframe __user *aux; + struct a32_aux_sigframe __user *aux; err = get_sigset_t(&set, &sf->uc.uc_sigmask); if (err == 0) { @@ -358,16 +358,16 @@ static int compat_restore_sigframe(struct pt_regs *regs, err |= !valid_user_regs(®s->user_regs, current); - aux = (struct compat_aux_sigframe __user *) sf->uc.uc_regspace; + aux = (struct a32_aux_sigframe __user *) sf->uc.uc_regspace; if (err == 0) - err |= compat_restore_vfp_context(&aux->vfp); + err |= a32_restore_vfp_context(&aux->vfp); return err; } asmlinkage int compat_sys_sigreturn(struct pt_regs *regs) { - struct compat_sigframe __user *frame; + struct a32_sigframe __user *frame; /* Always make any pending restarted system calls return -EINTR */ current->restart_block.fn = do_no_restart_syscall; @@ -380,12 +380,12 @@ asmlinkage int compat_sys_sigreturn(struct pt_regs *regs) if (regs->compat_sp & 7) goto badframe; - frame = (struct compat_sigframe __user *)regs->compat_sp; + frame = (struct a32_sigframe __user *)regs->compat_sp; if (!access_ok(VERIFY_READ, frame, sizeof (*frame))) goto badframe; - if (compat_restore_sigframe(regs, frame)) + if (a32_restore_sigframe(regs, frame)) goto badframe; return regs->regs[0]; @@ -401,7 +401,7 @@ asmlinkage int compat_sys_sigreturn(struct pt_regs *regs) asmlinkage int compat_sys_rt_sigreturn(struct pt_regs *regs) { - struct compat_rt_sigframe __user *frame; + struct a32_rt_sigframe __user *frame; /* Always make any pending restarted system calls return -EINTR */ current->restart_block.fn = do_no_restart_syscall; @@ -414,12 +414,12 @@ asmlinkage int compat_sys_rt_sigreturn(struct pt_regs *regs) if (regs->compat_sp & 7) goto badframe; - frame = (struct compat_rt_sigframe __user *)regs->compat_sp; + frame = (struct a32_rt_sigframe __user *)regs->compat_sp; if (!access_ok(VERIFY_READ, frame, sizeof (*frame))) goto badframe; - if (compat_restore_sigframe(regs, &frame->sig)) + if (a32_restore_sigframe(regs, &frame->sig)) goto badframe; if (compat_restore_altstack(&frame->sig.uc.uc_stack)) @@ -436,7 +436,7 @@ asmlinkage int compat_sys_rt_sigreturn(struct pt_regs *regs) return 0; } -static void __user *compat_get_sigframe(struct ksignal *ksig, +static void __user *a32_get_sigframe(struct ksignal *ksig, struct pt_regs *regs, int framesize) { @@ -457,7 +457,7 @@ static void __user *compat_get_sigframe(struct ksignal *ksig, return frame; } -static void compat_setup_return(struct pt_regs *regs, struct k_sigaction *ka, +static void a32_setup_return(struct pt_regs *regs, struct k_sigaction *ka, compat_ulong_t __user *rc, void __user *frame, int usig) { @@ -501,10 +501,10 @@ static void compat_setup_return(struct pt_regs *regs, struct k_sigaction *ka, regs->pstate = spsr; } -static int compat_setup_sigframe(struct compat_sigframe __user *sf, +static int a32_setup_sigframe(struct a32_sigframe __user *sf, struct pt_regs *regs, sigset_t *set) { - struct compat_aux_sigframe __user *aux; + struct a32_aux_sigframe __user *aux; int err = 0; __put_user_error(regs->regs[0], &sf->uc.uc_mcontext.arm_r0, err); @@ -526,7 +526,7 @@ static int compat_setup_sigframe(struct compat_sigframe __user *sf, __put_user_error(regs->pstate, &sf->uc.uc_mcontext.arm_cpsr, err); __put_user_error((compat_ulong_t)0, &sf->uc.uc_mcontext.trap_no, err); - /* set the compat FSR WnR */ + /* set the aarch32 FSR WnR */ __put_user_error(!!(current->thread.fault_code & ESR_ELx_WNR) << FSR_WRITE_SHIFT, &sf->uc.uc_mcontext.error_code, err); __put_user_error(current->thread.fault_address, &sf->uc.uc_mcontext.fault_address, err); @@ -534,25 +534,25 @@ static int compat_setup_sigframe(struct compat_sigframe __user *sf, err |= put_sigset_t(&sf->uc.uc_sigmask, set); - aux = (struct compat_aux_sigframe __user *) sf->uc.uc_regspace; + aux = (struct a32_aux_sigframe __user *) sf->uc.uc_regspace; if (err == 0) - err |= compat_preserve_vfp_context(&aux->vfp); + err |= a32_preserve_vfp_context(&aux->vfp); __put_user_error(0, &aux->end_magic, err); return err; } /* - * 32-bit signal handling routines called from signal.c + * aarch32-bit signal handling routines called from signal.c */ -int compat_setup_rt_frame(int usig, struct ksignal *ksig, +int a32_setup_rt_frame(int usig, struct ksignal *ksig, sigset_t *set, struct pt_regs *regs) { - struct compat_rt_sigframe __user *frame; + struct a32_rt_sigframe __user *frame; int err = 0; - frame = compat_get_sigframe(ksig, regs, sizeof(*frame)); + frame = a32_get_sigframe(ksig, regs, sizeof(*frame)); if (!frame) return 1; @@ -564,10 +564,10 @@ int compat_setup_rt_frame(int usig, struct ksignal *ksig, err |= __compat_save_altstack(&frame->sig.uc.uc_stack, regs->compat_sp); - err |= compat_setup_sigframe(&frame->sig, regs, set); + err |= a32_setup_sigframe(&frame->sig, regs, set); if (err == 0) { - compat_setup_return(regs, &ksig->ka, frame->sig.retcode, frame, usig); + a32_setup_return(regs, &ksig->ka, frame->sig.retcode, frame, usig); regs->regs[1] = (compat_ulong_t)(unsigned long)&frame->info; regs->regs[2] = (compat_ulong_t)(unsigned long)&frame->sig.uc; } @@ -575,27 +575,27 @@ int compat_setup_rt_frame(int usig, struct ksignal *ksig, return err; } -int compat_setup_frame(int usig, struct ksignal *ksig, sigset_t *set, +int a32_setup_frame(int usig, struct ksignal *ksig, sigset_t *set, struct pt_regs *regs) { - struct compat_sigframe __user *frame; + struct a32_sigframe __user *frame; int err = 0; - frame = compat_get_sigframe(ksig, regs, sizeof(*frame)); + frame = a32_get_sigframe(ksig, regs, sizeof(*frame)); if (!frame) return 1; __put_user_error(0x5ac3c35a, &frame->uc.uc_flags, err); - err |= compat_setup_sigframe(frame, regs, set); + err |= a32_setup_sigframe(frame, regs, set); if (err == 0) - compat_setup_return(regs, &ksig->ka, frame->retcode, frame, usig); + a32_setup_return(regs, &ksig->ka, frame->retcode, frame, usig); return err; } -void compat_setup_restart_syscall(struct pt_regs *regs) +void a32_setup_restart_syscall(struct pt_regs *regs) { regs->regs[7] = __NR_compat_restart_syscall; } diff --git a/arch/arm64/kernel/sys_compat.c b/arch/arm64/kernel/sys_compat.c index 8b8bbd3eaa52..108fac76c43d 100644 --- a/arch/arm64/kernel/sys_compat.c +++ b/arch/arm64/kernel/sys_compat.c @@ -30,7 +30,7 @@ #include static long -__do_compat_cache_op(unsigned long start, unsigned long end) +__do_a32_cache_op(unsigned long start, unsigned long end) { long ret; @@ -52,7 +52,7 @@ __do_compat_cache_op(unsigned long start, unsigned long end) } static inline long -do_compat_cache_op(unsigned long start, unsigned long end, int flags) +do_a32_cache_op(unsigned long start, unsigned long end, int flags) { if (end < start || flags) return -EINVAL; @@ -60,12 +60,12 @@ do_compat_cache_op(unsigned long start, unsigned long end, int flags) if (!access_ok(VERIFY_READ, start, end - start)) return -EFAULT; - return __do_compat_cache_op(start, end); + return __do_a32_cache_op(start, end); } /* * Handle all unrecognised system calls. */ -long compat_arm_syscall(struct pt_regs *regs) +long a32_arm_syscall(struct pt_regs *regs) { unsigned int no = regs->regs[7]; @@ -85,7 +85,7 @@ long compat_arm_syscall(struct pt_regs *regs) * the specified region). */ case __ARM_NR_compat_cacheflush: - return do_compat_cache_op(regs->regs[0], regs->regs[1], regs->regs[2]); + return do_a32_cache_op(regs->regs[0], regs->regs[1], regs->regs[2]); case __ARM_NR_compat_set_tls: current->thread.tp_value = regs->regs[0]; diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c index 287a21ee39b3..b33e1cd1a5e4 100644 --- a/arch/arm64/kernel/traps.c +++ b/arch/arm64/kernel/traps.c @@ -342,7 +342,7 @@ static int call_undef_hook(struct pt_regs *regs) if (!user_mode(regs)) return 1; - if (compat_thumb_mode(regs)) { + if (a32_thumb_mode(regs)) { /* 16-bit Thumb instruction */ if (get_user(instr, (u16 __user *)pc)) goto exit; @@ -572,14 +572,14 @@ asmlinkage void __exception do_sysinstr(unsigned int esr, struct pt_regs *regs) do_undefinstr(regs); } -long compat_arm_syscall(struct pt_regs *regs); +long a32_arm_syscall(struct pt_regs *regs); asmlinkage long do_ni_syscall(struct pt_regs *regs) { #ifdef CONFIG_AARCH32_EL0 long ret; if (is_compat_task()) { - ret = compat_arm_syscall(regs); + ret = a32_arm_syscall(regs); if (ret != -ENOSYS) return ret; } diff --git a/arch/tile/include/asm/compat.h b/arch/tile/include/asm/compat.h index c14e36f008c8..2f114456cdbb 100644 --- a/arch/tile/include/asm/compat.h +++ b/arch/tile/include/asm/compat.h @@ -267,7 +267,7 @@ static inline int is_compat_task(void) return current_thread_info()->status & TS_COMPAT; } -extern int compat_setup_rt_frame(struct ksignal *ksig, sigset_t *set, +extern int a32_setup_rt_frame(struct ksignal *ksig, sigset_t *set, struct pt_regs *regs); /* Compat syscalls. */