coding guidelines: comply with MISRA Rule 11.8

modified parameter types to receive a const pointer when a
non-const pointer is not needed

Signed-off-by: Hess Nathan <nhess@baumer.com>
This commit is contained in:
Hess Nathan 2024-05-07 08:53:44 +02:00 committed by Carles Cufí
commit ed12a0cc35
16 changed files with 20 additions and 20 deletions

View file

@ -34,7 +34,7 @@ int arch_mem_domain_max_partitions_get(void)
/*
* Validate the given buffer is user accessible or not
*/
int arch_buffer_validate(void *addr, size_t size, int write)
int arch_buffer_validate(const void *addr, size_t size, int write)
{
return arc_core_mpu_buffer_validate(addr, size, write);
}

View file

@ -207,7 +207,7 @@ int arc_core_mpu_get_max_domain_partition_regions(void)
/**
* @brief validate the given buffer is user accessible or not
*/
int arc_core_mpu_buffer_validate(void *addr, size_t size, int write)
int arc_core_mpu_buffer_validate(const void *addr, size_t size, int write)
{
/*
* For ARC MPU, smaller region number takes priority.

View file

@ -779,7 +779,7 @@ int arc_core_mpu_get_max_domain_partition_regions(void)
/**
* @brief validate the given buffer is user accessible or not
*/
int arc_core_mpu_buffer_validate(void *addr, size_t size, int write)
int arc_core_mpu_buffer_validate(const void *addr, size_t size, int write)
{
int r_index;
int key = arch_irq_lock();

View file

@ -338,7 +338,7 @@ int arch_mem_domain_max_partitions_get(void)
return ARM_CORE_MPU_MAX_DOMAIN_PARTITIONS_GET(available_regions);
}
int arch_buffer_validate(void *addr, size_t size, int write)
int arch_buffer_validate(const void *addr, size_t size, int write)
{
return arm_core_mpu_buffer_validate(addr, size, write);
}

View file

@ -261,7 +261,7 @@ int arm_core_mpu_get_max_available_dyn_regions(void);
* spans multiple enabled MPU regions (even if these regions all
* permit user access).
*/
int arm_core_mpu_buffer_validate(void *addr, size_t size, int write);
int arm_core_mpu_buffer_validate(const void *addr, size_t size, int write);
#endif /* CONFIG_ARM_MPU */

View file

@ -341,7 +341,7 @@ int arm_core_mpu_get_max_available_dyn_regions(void)
*
* Presumes the background mapping is NOT user accessible.
*/
int arm_core_mpu_buffer_validate(void *addr, size_t size, int write)
int arm_core_mpu_buffer_validate(const void *addr, size_t size, int write)
{
return mpu_buffer_validate(addr, size, write);
}

View file

@ -169,7 +169,7 @@ static inline int is_user_accessible_region(uint32_t r_index, int write)
* This internal function validates whether a given memory buffer
* is user accessible or not.
*/
static inline int mpu_buffer_validate(void *addr, size_t size, int write)
static inline int mpu_buffer_validate(const void *addr, size_t size, int write)
{
int32_t r_index;
int rc = -EPERM;

View file

@ -408,7 +408,7 @@ static inline int is_user_accessible_region(uint32_t rnr, int write)
* This internal function validates whether a given memory buffer
* is user accessible or not.
*/
static inline int mpu_buffer_validate(void *addr, size_t size, int write)
static inline int mpu_buffer_validate(const void *addr, size_t size, int write)
{
int32_t rnr;
int rc = -EPERM;
@ -455,7 +455,7 @@ static inline int mpu_buffer_validate(void *addr, size_t size, int write)
* in case the fast address range check fails.
*
*/
static inline int mpu_buffer_validate(void *addr, size_t size, int write)
static inline int mpu_buffer_validate(const void *addr, size_t size, int write)
{
uint32_t _addr = (uint32_t)addr;
uint32_t _size = (uint32_t)size;

View file

@ -602,7 +602,7 @@ static inline int is_user_accessible_region(uint32_t r_index, int write)
/**
* @brief validate the given buffer is user accessible or not
*/
int arm_core_mpu_buffer_validate(void *addr, size_t size, int write)
int arm_core_mpu_buffer_validate(const void *addr, size_t size, int write)
{
uint8_t r_index;

View file

@ -51,7 +51,7 @@ strlen_done:
ret
/*
* int arch_buffer_validate(void *addr, size_t size, int write)
* int arch_buffer_validate(const void *addr, size_t size, int write)
*/
GTEXT(arch_buffer_validate)

View file

@ -667,7 +667,7 @@ int arch_mem_domain_thread_remove(struct k_thread *thread)
((inner_start) >= (outer_start) && (inner_size) <= (outer_size) && \
((inner_start) - (outer_start)) <= ((outer_size) - (inner_size)))
int arch_buffer_validate(void *addr, size_t size, int write)
int arch_buffer_validate(const void *addr, size_t size, int write)
{
uintptr_t start = (uintptr_t)addr;
int ret = -1;

View file

@ -848,7 +848,7 @@ static inline pentry_t pte_finalize_value(pentry_t val, bool user_table,
__pinned_func
static inline pentry_t atomic_pte_get(const pentry_t *target)
{
return (pentry_t)atomic_ptr_get((atomic_ptr_t *)target);
return (pentry_t)atomic_ptr_get((const atomic_ptr_t *)target);
}
__pinned_func
@ -1301,7 +1301,7 @@ void arch_mem_unmap(void *addr, size_t size)
{
int ret;
ret = range_map_unlocked((void *)addr, 0, size, 0, 0,
ret = range_map_unlocked(addr, 0, size, 0, 0,
OPTION_FLUSH | OPTION_CLEAR);
__ASSERT_NO_MSG(ret == 0);
ARG_UNUSED(ret);
@ -1387,7 +1387,7 @@ void z_x86_set_stack_guard(k_thread_stack_t *stack)
__pinned_func
static bool page_validate(pentry_t *ptables, uint8_t *addr, bool write)
{
pentry_t *table = (pentry_t *)ptables;
pentry_t *table = ptables;
for (int level = 0; level < NUM_LEVELS; level++) {
pentry_t entry = get_entry(table, addr, level);
@ -1432,7 +1432,7 @@ static inline void bcb_fence(void)
}
__pinned_func
int arch_buffer_validate(void *addr, size_t size, int write)
int arch_buffer_validate(const void *addr, size_t size, int write)
{
pentry_t *ptables = z_x86_thread_page_tables_get(_current);
uint8_t *virt;

View file

@ -969,7 +969,7 @@ out:
return ret;
}
int arch_buffer_validate(void *addr, size_t size, int write)
int arch_buffer_validate(const void *addr, size_t size, int write)
{
uintptr_t aligned_addr;
size_t aligned_size, addr_offset;

View file

@ -1044,7 +1044,7 @@ static bool page_validate(uint32_t *ptables, uint32_t page, uint8_t ring, bool w
return true;
}
int arch_buffer_validate(void *addr, size_t size, int write)
int arch_buffer_validate(const void *addr, size_t size, int write)
{
int ret = 0;
uint8_t *virt;

View file

@ -88,7 +88,7 @@ void arc_core_mpu_remove_mem_domain(struct k_mem_domain *mem_domain);
void arc_core_mpu_remove_mem_partition(struct k_mem_domain *domain,
uint32_t partition_id);
int arc_core_mpu_get_max_domain_partition_regions(void);
int arc_core_mpu_buffer_validate(void *addr, size_t size, int write);
int arc_core_mpu_buffer_validate(const void *addr, size_t size, int write);
#endif

View file

@ -783,7 +783,7 @@ int arch_mem_domain_partition_add(struct k_mem_domain *domain,
*
* @return nonzero if the permissions don't match.
*/
int arch_buffer_validate(void *addr, size_t size, int write);
int arch_buffer_validate(const void *addr, size_t size, int write);
/**
* Get the optimal virtual region alignment to optimize the MMU table layout