aboutsummaryrefslogtreecommitdiff
path: root/linux-user/sparc64
diff options
context:
space:
mode:
authorMarkus Armbruster <armbru@redhat.com>2016-06-29 10:47:26 +0200
committerMarkus Armbruster <armbru@redhat.com>2016-07-12 16:19:16 +0200
commit3622634bc665244c2fd4382301cfadcef1a9e934 (patch)
treee5aaf966e90d056d56601fea88a8494665f8999c /linux-user/sparc64
parent07f5a258750b3b9a6e10fd5ec3e29c9a943b650e (diff)
downloadqemu-3622634bc665244c2fd4382301cfadcef1a9e934.zip
qemu-3622634bc665244c2fd4382301cfadcef1a9e934.tar.gz
qemu-3622634bc665244c2fd4382301cfadcef1a9e934.tar.bz2
linux-user: Clean up target_syscall.h header guards
Some of them use guard symbol TARGET_SYSCALL_H, but we also have CRIS_SYSCALL_H, MICROBLAZE_SYSCALLS_H, TILEGX_SYSCALLS_H and __UC32_SYSCALL_H__. They all upset scripts/clean-header-guards.pl. Reuse of the same guard symbol TARGET_SYSCALL_H in multiple headers is okay as long as they cannot be included together. The script can't tell, so it warns. The script dislikes the other guard symbols, too. They don't match their file name (they should, to make guard collisions less likely), and __UC32_SYSCALL_H__ is a reserved identifier. Clean them all up: use guard symbol $target_TARGET_SYSCALL_H for linux-user/$target/target_sycall.h. Signed-off-by: Markus Armbruster <armbru@redhat.com> Reviewed-by: Richard Henderson <rth@twiddle.net>
Diffstat (limited to 'linux-user/sparc64')
-rw-r--r--linux-user/sparc64/target_syscall.h6
1 files changed, 3 insertions, 3 deletions
diff --git a/linux-user/sparc64/target_syscall.h b/linux-user/sparc64/target_syscall.h
index eb827fc..b7e3bf8 100644
--- a/linux-user/sparc64/target_syscall.h
+++ b/linux-user/sparc64/target_syscall.h
@@ -1,5 +1,5 @@
-#ifndef TARGET_SYSCALL_H
-#define TARGET_SYSCALL_H
+#ifndef SPARC64_TARGET_SYSCALL_H
+#define SPARC64_TARGET_SYSCALL_H
struct target_pt_regs {
abi_ulong u_regs[16];
@@ -23,4 +23,4 @@ struct target_pt_regs {
#define TARGET_MLOCKALL_MCL_CURRENT 0x2000
#define TARGET_MLOCKALL_MCL_FUTURE 0x4000
-#endif /* TARGET_SYSCALL_H */
+#endif /* SPARC64_TARGET_SYSCALL_H */