From nobody Mon Oct 6 17:10:27 2025 Received: from mail.zytor.com (terminus.zytor.com [198.137.202.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 49EF11D5ACE; Sun, 20 Jul 2025 06:53:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.136 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1752994387; cv=none; b=LXww5cRQlpUZj9qO4UT3HkUUJV9CIrqiIzP4NNTBk+SQEENs5Krfw6B1L4/oWHiuFXmY1eNUAuCGchSuHUR9OULTgwp6AU1kuj43a9AaseuYWT9sn3j+RA4Npr5FeE8EpRpe65l4O4hft2yWyY1LnvRL05/wKfH/IK/cTAM0mv4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1752994387; c=relaxed/simple; bh=9B/wZBYPyvWNFbB8mrngMegZ+e9l8dZ1E6sWkULHdTM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=YKUb4h2NcU+Unxq2WuS3ouhX+LC+poyC8ZvSSciMTBFskIjGHbmmBdu0D2uXlLtnrms/I5YxSkhgZW5IhnBzyy8keUk8VLY8GNn7mdvSRJtApkrZ2TtWFru4cqz3VuY2QqN4hFPWt1jjByoxstodABOnr/mJqeGLzgTeNTcw+KM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com; spf=pass smtp.mailfrom=zytor.com; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b=Ry7MIVIx; arc=none smtp.client-ip=198.137.202.136 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zytor.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zytor.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=zytor.com header.i=@zytor.com header.b="Ry7MIVIx" Received: from mail.zytor.com ([IPv6:2601:646:8081:9484:f04a:f27d:fd66:5c61]) (authenticated bits=0) by mail.zytor.com (8.18.1/8.17.1) with ESMTPSA id 56K6oq0c3555973 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sat, 19 Jul 2025 23:51:15 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 mail.zytor.com 56K6oq0c3555973 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2025062101; t=1752994278; bh=V2V/3vlTdgN2wHrrKIvEmPjf5zfLF1VkrRaHOul8IRg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ry7MIVIxeKq+bj1PugdLx+b8KBvlRo2m387QkOsip2r+oO1aleuLsDvEAwrWBPWCl OdvIjWMaHy3VUCBee13XBWTDHBNQk9UpWZRS+ds/TcUJBLkE6B9GLHulITRZXpgXaa 0O7dvDWhugfiJMB1TBSBzQkpCnWO4oiAR9RSYf1gTh3OMPlvqPimJRYFZTPNNHrXQ3 8+a1A0iEhQj6vsucmJxNflT/DTHC3PMVnaVKmRBxFUc93sNR1C7B7RJ9XVpqx8I/W/ juEN8cuZkNcgwyw0gwqoEozoqnQOX8hagcQTGejl2AhZGO3ngUumGLDSdsZEz3zInc OTV6hW0uZGYJQ== From: "H. Peter Anvin" To: Cc: "H. Peter Anvin" , =?UTF-8?q?Eugenio=20P=C3=A9rez?= , =?UTF-8?q?Ilpo=20J=C3=A4rvinen?= , "Michael S. Tsirkin" , Al Viro , Alexei Starovoitov , Alexey Dobriyan , Andrew Morton , Andrii Nakryiko , Arnd Bergmann , Borislav Petkov , Dan Williams , Daniel Borkmann , Dave Hansen , David Laight , David Lechner , Dinh Nguyen , Eduard Zingerman , Gatlin Newhouse , Hao Luo , Ingo Molnar , Linus Torvalds , Jakub Sitnicki , Jan Hendrik Farr , Jason Wang , Jiri Olsa , John Fastabend , Jonathan Cameron , Josh Poimboeuf , KP Singh , Kees Cook , Luc Van Oostenryck , Marc Herbert , Martin KaFai Lau , Mateusz Guzik , Michal Luczaj , Miguel Ojeda , Mykola Lysenko , NeilBrown , Peter Zijlstra , Przemek Kitszel , Sami Tolvanen , Shuah Khan , Song Liu , Stanislav Fomichev , Thomas Gleixner , Thorsten Blum , Uros Bizjak , Xuan Zhuo , Yafang Shao , Ye Bin , Yonghong Song , Yufeng Wang , bpf@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-sparse@vger.kernel.org, virtualization@lists.linux.dev, x86@kernel.org Subject: [PATCH v2 5/7] arch/x86: replace "__auto_type" with "auto" Date: Sat, 19 Jul 2025 23:50:42 -0700 Message-ID: <20250720065045.2859105-6-hpa@zytor.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20250720065045.2859105-1-hpa@zytor.com> References: <20250720065045.2859105-1-hpa@zytor.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Replace instances of "__auto_type" with "auto" in: arch/x86/include/asm/bug.h arch/x86/include/asm/string_64.h arch/x86/include/asm/uaccess_64.h Signed-off-by: H. Peter Anvin (Intel) --- arch/x86/include/asm/bug.h | 2 +- arch/x86/include/asm/string_64.h | 6 +++--- arch/x86/include/asm/uaccess_64.h | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/arch/x86/include/asm/bug.h b/arch/x86/include/asm/bug.h index f0e9acf72547..05e166faf9a6 100644 --- a/arch/x86/include/asm/bug.h +++ b/arch/x86/include/asm/bug.h @@ -94,7 +94,7 @@ do { \ */ #define __WARN_FLAGS(flags) \ do { \ - __auto_type __flags =3D BUGFLAG_WARNING|(flags); \ + auto __flags =3D BUGFLAG_WARNING|(flags); \ instrumentation_begin(); \ _BUG_FLAGS(ASM_UD2, __flags, ANNOTATE_REACHABLE(1b)); \ instrumentation_end(); \ diff --git a/arch/x86/include/asm/string_64.h b/arch/x86/include/asm/string= _64.h index 79e9695dc13e..4635616863f5 100644 --- a/arch/x86/include/asm/string_64.h +++ b/arch/x86/include/asm/string_64.h @@ -31,7 +31,7 @@ KCFI_REFERENCE(__memset); #define __HAVE_ARCH_MEMSET16 static inline void *memset16(uint16_t *s, uint16_t v, size_t n) { - const __auto_type s0 =3D s; + const auto s0 =3D s; asm volatile ( "rep stosw" : "+D" (s), "+c" (n) @@ -44,7 +44,7 @@ static inline void *memset16(uint16_t *s, uint16_t v, siz= e_t n) #define __HAVE_ARCH_MEMSET32 static inline void *memset32(uint32_t *s, uint32_t v, size_t n) { - const __auto_type s0 =3D s; + const auto s0 =3D s; asm volatile ( "rep stosl" : "+D" (s), "+c" (n) @@ -57,7 +57,7 @@ static inline void *memset32(uint32_t *s, uint32_t v, siz= e_t n) #define __HAVE_ARCH_MEMSET64 static inline void *memset64(uint64_t *s, uint64_t v, size_t n) { - const __auto_type s0 =3D s; + const auto s0 =3D s; asm volatile ( "rep stosq" : "+D" (s), "+c" (n) diff --git a/arch/x86/include/asm/uaccess_64.h b/arch/x86/include/asm/uacce= ss_64.h index c8a5ae35c871..b0e4533ce625 100644 --- a/arch/x86/include/asm/uaccess_64.h +++ b/arch/x86/include/asm/uaccess_64.h @@ -72,7 +72,7 @@ static inline void __user *mask_user_address(const void _= _user *ptr) return ret; } #define masked_user_access_begin(x) ({ \ - __auto_type __masked_ptr =3D (x); \ + auto __masked_ptr =3D (x); \ __masked_ptr =3D mask_user_address(__masked_ptr); \ __uaccess_begin(); __masked_ptr; }) =20 --=20 2.50.1