|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [XEN PATCH] IOMMU: address violations of MISRA C:2012 Rules 8.2 and 8.3
On Fri, 28 Jul 2023, Federico Serafini wrote:
> Give a name to unnamed parameters to address violations of
> MISRA C:2012 Rule 8.2 ("Function types shall be in prototype form with
> named parameters").
> Keep consistency between parameter names and types used in function
> declarations and the ones used in the corresponding function
> definitions, thus addressing violations of MISRA C:2012 Rule 8.3
> ("All declarations of an object or function shall use the same names
> and type qualifiers").
>
> No functional changes.
>
> Signed-off-by: Federico Serafini <federico.serafini@xxxxxxxxxxx>
Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
> ---
> xen/drivers/passthrough/iommu.c | 10 +++++-----
> xen/include/xen/iommu.h | 30 ++++++++++++++++--------------
> 2 files changed, 21 insertions(+), 19 deletions(-)
>
> diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c
> index 0e187f6ae3..7bbe3889a2 100644
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -25,10 +25,10 @@
> unsigned int __read_mostly iommu_dev_iotlb_timeout = 1000;
> integer_param("iommu_dev_iotlb_timeout", iommu_dev_iotlb_timeout);
>
> -bool_t __initdata iommu_enable = 1;
> -bool_t __read_mostly iommu_enabled;
> -bool_t __read_mostly force_iommu;
> -bool_t __read_mostly iommu_verbose;
> +bool __initdata iommu_enable = 1;
> +bool __read_mostly iommu_enabled;
> +bool __read_mostly force_iommu;
> +bool __read_mostly iommu_verbose;
> static bool_t __read_mostly iommu_crash_disable;
>
> #define IOMMU_quarantine_none 0 /* aka false */
> @@ -57,7 +57,7 @@ int8_t __hwdom_initdata iommu_hwdom_reserved = -1;
> bool __read_mostly iommu_hap_pt_share = true;
> #endif
>
> -bool_t __read_mostly iommu_debug;
> +bool __read_mostly iommu_debug;
>
> DEFINE_PER_CPU(bool_t, iommu_dont_flush_iotlb);
>
> diff --git a/xen/include/xen/iommu.h b/xen/include/xen/iommu.h
> index 405db59971..8c0818cd01 100644
> --- a/xen/include/xen/iommu.h
> +++ b/xen/include/xen/iommu.h
> @@ -52,7 +52,7 @@ static inline bool_t dfn_eq(dfn_t x, dfn_t y)
> }
>
> #ifdef CONFIG_HAS_PASSTHROUGH
> -extern bool_t iommu_enable, iommu_enabled;
> +extern bool iommu_enable, iommu_enabled;
> extern bool force_iommu, iommu_verbose;
> /* Boolean except for the specific purposes of drivers/passthrough/iommu.c.
> */
> extern uint8_t iommu_quarantine;
> @@ -108,8 +108,8 @@ static inline void clear_iommu_hap_pt_share(void)
> #endif
> }
>
> -extern bool_t iommu_debug;
> -extern bool_t amd_iommu_perdev_intremap;
> +extern bool iommu_debug;
> +extern bool amd_iommu_perdev_intremap;
>
> extern bool iommu_hwdom_strict, iommu_hwdom_passthrough,
> iommu_hwdom_inclusive;
> extern int8_t iommu_hwdom_reserved;
> @@ -165,10 +165,10 @@ enum
> * values indicate partial completion, which is possible only with
> * IOMMUF_preempt passed in.
> */
> -long __must_check iommu_map(struct domain *d, dfn_t dfn, mfn_t mfn,
> +long __must_check iommu_map(struct domain *d, dfn_t dfn0, mfn_t mfn0,
> unsigned long page_count, unsigned int flags,
> unsigned int *flush_flags);
> -long __must_check iommu_unmap(struct domain *d, dfn_t dfn,
> +long __must_check iommu_unmap(struct domain *d, dfn_t dfn0,
> unsigned long page_count, unsigned int flags,
> unsigned int *flush_flags);
>
> @@ -197,11 +197,13 @@ bool_t iommu_has_feature(struct domain *d, enum
> iommu_feature feature);
>
> #ifdef CONFIG_HAS_PCI
> struct pirq;
> -int hvm_do_IRQ_dpci(struct domain *, struct pirq *);
> -int pt_irq_create_bind(struct domain *, const struct xen_domctl_bind_pt_irq
> *);
> -int pt_irq_destroy_bind(struct domain *, const struct xen_domctl_bind_pt_irq
> *);
> +int hvm_do_IRQ_dpci(struct domain *d, struct pirq *pirq);
> +int pt_irq_create_bind(struct domain *d,
> + const struct xen_domctl_bind_pt_irq *pt_irq_bind);
> +int pt_irq_destroy_bind(struct domain *d,
> + const struct xen_domctl_bind_pt_irq *pt_irq_bind);
>
> -struct hvm_irq_dpci *domain_get_irq_dpci(const struct domain *);
> +struct hvm_irq_dpci *domain_get_irq_dpci(const struct domain *d);
> void free_hvm_irq_dpci(struct hvm_irq_dpci *dpci);
>
> struct msi_desc;
> @@ -229,8 +231,8 @@ int iommu_release_dt_devices(struct domain *d);
> */
> int iommu_add_dt_device(struct dt_device_node *np);
>
> -int iommu_do_dt_domctl(struct xen_domctl *, struct domain *,
> - XEN_GUEST_HANDLE_PARAM(xen_domctl_t));
> +int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d,
> + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
>
> #endif /* HAS_DEVICE_TREE */
>
> @@ -386,12 +388,12 @@ static inline int iommu_do_domctl(struct xen_domctl
> *domctl, struct domain *d,
> int __must_check iommu_suspend(void);
> void iommu_resume(void);
> void iommu_crash_shutdown(void);
> -int iommu_get_reserved_device_memory(iommu_grdm_t *, void *);
> +int iommu_get_reserved_device_memory(iommu_grdm_t *func, void *ctxt);
> int iommu_quarantine_dev_init(device_t *dev);
>
> #ifdef CONFIG_HAS_PCI
> -int iommu_do_pci_domctl(struct xen_domctl *, struct domain *d,
> - XEN_GUEST_HANDLE_PARAM(xen_domctl_t));
> +int iommu_do_pci_domctl(struct xen_domctl *domctl, struct domain *d,
> + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
> #endif
>
> void iommu_dev_iotlb_flush_timeout(struct domain *d, struct pci_dev *pdev);
> --
> 2.34.1
>
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |