[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 1/7] minor (formatting) fixes
Minor fixes: - fix 80-columns formatting in some places - remove some empty lines - remove some unused includes - add 2 comments Signed-off-by: Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx> --- xen/arch/arm/domain.c | 1 - xen/arch/arm/traps.c | 1 - xen/arch/x86/hvm/event.c | 1 + xen/common/monitor.c | 1 - xen/include/asm-arm/vm_event.h | 12 ++++++------ xen/include/asm-x86/hvm/event.h | 2 -- xen/include/asm-x86/monitor.h | 3 --- xen/include/asm-x86/vm_event.h | 3 +++ xen/include/public/vm_event.h | 36 ++++++++++++++++++------------------ xen/include/xen/vm_event.h | 1 - 10 files changed, 28 insertions(+), 33 deletions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 1365b4a..d31f821 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -274,7 +274,6 @@ static void continue_new_vcpu(struct vcpu *prev) else /* check_wakeup_from_wait(); */ reset_stack_and_jump(return_to_new_vcpu64); - } void context_switch(struct vcpu *prev, struct vcpu *next) diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index aa3e3c2..7fa2ae5 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -439,7 +439,6 @@ static void inject_abt32_exception(struct cpu_user_regs *regs, far |= addr << 32; WRITE_SYSREG(far, FAR_EL1); WRITE_SYSREG(fsr, IFSR32_EL2); - #endif } else diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c index 56c5514..9c51890 100644 --- a/xen/arch/x86/hvm/event.c +++ b/xen/arch/x86/hvm/event.c @@ -23,6 +23,7 @@ #include <xen/vm_event.h> #include <asm/hvm/event.h> +#include <asm/paging.h> #include <asm/monitor.h> #include <asm/vm_event.h> #include <public/vm_event.h> diff --git a/xen/common/monitor.c b/xen/common/monitor.c index d950a7c..b30857a 100644 --- a/xen/common/monitor.c +++ b/xen/common/monitor.c @@ -22,7 +22,6 @@ #include <xen/monitor.h> #include <xen/sched.h> #include <xsm/xsm.h> -#include <public/domctl.h> #include <asm/monitor.h> #include <asm/vm_event.h> diff --git a/xen/include/asm-arm/vm_event.h b/xen/include/asm-arm/vm_event.h index 014d9ba..05c3027 100644 --- a/xen/include/asm-arm/vm_event.h +++ b/xen/include/asm-arm/vm_event.h @@ -23,21 +23,18 @@ #include <xen/vm_event.h> #include <public/domctl.h> -static inline -int vm_event_init_domain(struct domain *d) +static inline int vm_event_init_domain(struct domain *d) { /* Nothing to do. */ return 0; } -static inline -void vm_event_cleanup_domain(struct domain *d) +static inline void vm_event_cleanup_domain(struct domain *d) { memset(&d->monitor, 0, sizeof(d->monitor)); } -static inline -void vm_event_toggle_singlestep(struct domain *d, struct vcpu *v) +static inline void vm_event_toggle_singlestep(struct domain *d, struct vcpu *v) { /* Not supported on ARM. */ } @@ -59,6 +56,9 @@ static inline void vm_event_fill_regs(vm_event_request_t *req) /* Not supported on ARM. */ } +/* + * Monitor vm-events. + */ static inline uint32_t vm_event_monitor_get_capabilities(struct domain *d) { uint32_t capabilities = 0; diff --git a/xen/include/asm-x86/hvm/event.h b/xen/include/asm-x86/hvm/event.h index 03f7fee..504bd66 100644 --- a/xen/include/asm-x86/hvm/event.h +++ b/xen/include/asm-x86/hvm/event.h @@ -19,8 +19,6 @@ #ifndef __ASM_X86_HVM_EVENT_H__ #define __ASM_X86_HVM_EVENT_H__ -#include <xen/sched.h> -#include <xen/paging.h> #include <public/vm_event.h> enum hvm_event_breakpoint_type diff --git a/xen/include/asm-x86/monitor.h b/xen/include/asm-x86/monitor.h index d367099..7a662f9 100644 --- a/xen/include/asm-x86/monitor.h +++ b/xen/include/asm-x86/monitor.h @@ -23,9 +23,6 @@ #define __ASM_X86_MONITOR_H__ #include <xen/sched.h> -#include <public/domctl.h> -#include <asm/cpufeature.h> -#include <asm/hvm/hvm.h> #define monitor_ctrlreg_bitmask(ctrlreg_index) (1U << (ctrlreg_index)) diff --git a/xen/include/asm-x86/vm_event.h b/xen/include/asm-x86/vm_event.h index 0470240..df8e98d 100644 --- a/xen/include/asm-x86/vm_event.h +++ b/xen/include/asm-x86/vm_event.h @@ -44,6 +44,9 @@ void vm_event_set_registers(struct vcpu *v, vm_event_response_t *rsp); void vm_event_fill_regs(vm_event_request_t *req); +/* + * Monitor vm-events. + */ static inline uint32_t vm_event_monitor_get_capabilities(struct domain *d) { uint32_t capabilities = 0; diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h index 9270d52..586f43b 100644 --- a/xen/include/public/vm_event.h +++ b/xen/include/public/vm_event.h @@ -74,19 +74,19 @@ * VM_EVENT_FLAG_SET_EMUL_READ_DATA are set, only the latter will be honored). */ #define VM_EVENT_FLAG_SET_EMUL_READ_DATA (1 << 5) - /* - * Deny completion of the operation that triggered the event. - * Currently only useful for MSR, CR0, CR3 and CR4 write events. - */ +/* + * Deny completion of the operation that triggered the event. + * Currently only useful for MSR and control-register write events. + */ #define VM_EVENT_FLAG_DENY (1 << 6) /* * This flag can be set in a request or a response * - * On a request, indicates that the event occurred in the alternate p2m specified by - * the altp2m_idx request field. + * On a request, indicates that the event occurred in the alternate p2m + * specified by the altp2m_idx request field. * - * On a response, indicates that the VCPU should resume in the alternate p2m specified - * by the altp2m_idx response field if possible. + * On a response, indicates that the VCPU should resume in the alternate p2m + * specified by the altp2m_idx response field if possible. */ #define VM_EVENT_FLAG_ALTERNATE_P2M (1 << 7) /* @@ -177,16 +177,16 @@ struct vm_event_regs_x86 { * FAULT_WITH_GLA: If the violation was triggered by accessing gla * FAULT_IN_GPT: If the violation was triggered during translating gla */ -#define MEM_ACCESS_R (1 << 0) -#define MEM_ACCESS_W (1 << 1) -#define MEM_ACCESS_X (1 << 2) -#define MEM_ACCESS_RWX (MEM_ACCESS_R | MEM_ACCESS_W | MEM_ACCESS_X) -#define MEM_ACCESS_RW (MEM_ACCESS_R | MEM_ACCESS_W) -#define MEM_ACCESS_RX (MEM_ACCESS_R | MEM_ACCESS_X) -#define MEM_ACCESS_WX (MEM_ACCESS_W | MEM_ACCESS_X) -#define MEM_ACCESS_GLA_VALID (1 << 3) -#define MEM_ACCESS_FAULT_WITH_GLA (1 << 4) -#define MEM_ACCESS_FAULT_IN_GPT (1 << 5) +#define MEM_ACCESS_R (1 << 0) +#define MEM_ACCESS_W (1 << 1) +#define MEM_ACCESS_X (1 << 2) +#define MEM_ACCESS_RWX (MEM_ACCESS_R | MEM_ACCESS_W | MEM_ACCESS_X) +#define MEM_ACCESS_RW (MEM_ACCESS_R | MEM_ACCESS_W) +#define MEM_ACCESS_RX (MEM_ACCESS_R | MEM_ACCESS_X) +#define MEM_ACCESS_WX (MEM_ACCESS_W | MEM_ACCESS_X) +#define MEM_ACCESS_GLA_VALID (1 << 3) +#define MEM_ACCESS_FAULT_WITH_GLA (1 << 4) +#define MEM_ACCESS_FAULT_IN_GPT (1 << 5) struct vm_event_mem_access { uint64_t gfn; diff --git a/xen/include/xen/vm_event.h b/xen/include/xen/vm_event.h index beda9fe..a10ee40 100644 --- a/xen/include/xen/vm_event.h +++ b/xen/include/xen/vm_event.h @@ -85,7 +85,6 @@ void vm_event_monitor_guest_request(void); #endif /* __VM_EVENT_H__ */ - /* * Local variables: * mode: C -- 2.5.0 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |