Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp115694imu; Wed, 21 Nov 2018 16:26:32 -0800 (PST) X-Google-Smtp-Source: AFSGD/U6M2urjXxLeCDK/VXWwxdNglcJ+TDfo1bALs2ojmbKpPqB/dkjecDHjvCuQT5u2tSRLGZd X-Received: by 2002:a65:49cd:: with SMTP id t13mr5606683pgs.376.1542846392815; Wed, 21 Nov 2018 16:26:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542846392; cv=none; d=google.com; s=arc-20160816; b=y+AgeQeAZ3uoRFnqgK/gV8lXja4cFuLxz0M4cY+Nxk5P2p0EaD8sv8UXqaYhbCifVT CPSvxm+8ZuvAVcKnqF8capCCqFYHD9+JO4bInMCLd73HllbcTuq7a9B+YZRpRpIao2Pk pdm7M9trTTiAaUzB5Yb4tADZZnya2kKjbvsL+16X2jfmr39K4QL8Ef7xHhc6XzEqrZcg pW+WVVyBbWz+IwEvt5TgezRsN/OmqD6JgBrvbUHqQqa0gVAQiXlzudH5I4CNRjH+sB0u Sy6sjVvLlo5HHU0Aen/H5zxOUF4AtSZAXR1334gEo8NjUUcivVEKaVH7Z6ciu8K3I9LL 50gA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FwQih4yw6VfDKDxBQ3kjRkv/OuDzxacw8Qm/W5LNqHI=; b=vcvAWfIAxpATS2bmCl57zAjZ/ec3AKWeroTrK8dx9u5vPM9lBZNIzwGA5i/FcnwFB3 NfCUzQwDmSafWDmEFjo6xnD+CXa6tvuSV0tmiN+JNzosYqKpsfzmNWxGSNlPlQEhpycA MDPMsyUELUcdPizZYA9209Zn41wm5ZP2KMihcm6AAVTY7awoTbLFm5ACuktTaKYf9POo Xx97/10ePPU3el3iXbUPUG3Hcn3JUtt2DZRSCd/Wwygvwpc/8T45PLxImBWcxM3C9RId l575V06xfcsW28TXIBuE694nDXiFVQVfLN+TVFo/2k3fhXdwjs9DhUu7yMwwBjXiwo2s l8ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jLy3j7Kw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 59si1736177plf.18.2018.11.21.16.26.17; Wed, 21 Nov 2018 16:26:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jLy3j7Kw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388693AbeKVFpu (ORCPT + 99 others); Thu, 22 Nov 2018 00:45:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:40804 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728508AbeKVFpt (ORCPT ); Thu, 22 Nov 2018 00:45:49 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 141A0206BB; Wed, 21 Nov 2018 19:10:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542827416; bh=HzuT/h0DRroaD8qLXSTcMq1/DgaSsfO78cH52WUr/lM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jLy3j7KwZOJmOJEElPItfSrUv9+M2qRZssYKt1C69ykCkY+aph9Nl5RMKMG+sECg0 Prpv9OTyHTjVlZzywfKpbkrwsK8KwVUppFoxWVb4APFICHkdkUO7+7BDRd2mYztCdS 05PIsThQ8mf0uiESpX6KzIhc9lPlcg89NRpNwMzI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Davidson , Herbert Xu , Nick Desaulniers Subject: [PATCH 4.9 21/59] crypto, x86: aesni - fix token pasting for clang Date: Wed, 21 Nov 2018 20:06:36 +0100 Message-Id: <20181121183509.086487223@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181121183508.262873520@linuxfoundation.org> References: <20181121183508.262873520@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Michael Davidson commit fdb2726f4e61c5e3abc052f547d5a5f6c0dc5504 upstream. aes_ctrby8_avx-x86_64.S uses the C preprocessor for token pasting of character sequences that are not valid preprocessor tokens. While this is allowed when preprocessing assembler files it exposes an incompatibilty between the clang and gcc preprocessors where clang does not strip leading white space from macro parameters, leading to the CONCAT(%xmm, i) macro expansion on line 96 resulting in a token with a space character embedded in it. While this could be resolved by deleting the offending space character, the assembler is perfectly capable of doing the token pasting correctly for itself so we can just get rid of the preprocessor macros. Signed-off-by: Michael Davidson Signed-off-by: Herbert Xu Signed-off-by: Nick Desaulniers Signed-off-by: Greg Kroah-Hartman --- arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) --- a/arch/x86/crypto/aes_ctrby8_avx-x86_64.S +++ b/arch/x86/crypto/aes_ctrby8_avx-x86_64.S @@ -65,7 +65,6 @@ #include #include -#define CONCAT(a,b) a##b #define VMOVDQ vmovdqu #define xdata0 %xmm0 @@ -92,8 +91,6 @@ #define num_bytes %r8 #define tmp %r10 -#define DDQ(i) CONCAT(ddq_add_,i) -#define XMM(i) CONCAT(%xmm, i) #define DDQ_DATA 0 #define XDATA 1 #define KEY_128 1 @@ -131,12 +128,12 @@ ddq_add_8: /* generate a unique variable for ddq_add_x */ .macro setddq n - var_ddq_add = DDQ(\n) + var_ddq_add = ddq_add_\n .endm /* generate a unique variable for xmm register */ .macro setxdata n - var_xdata = XMM(\n) + var_xdata = %xmm\n .endm /* club the numeric 'id' to the symbol 'name' */