coding guidelines: comply with MISRA Rule 11.8
modified parameter types to receive a const pointer when a non-const pointer is not needed Signed-off-by: Hess Nathan <nhess@baumer.com>
This commit is contained in:
parent
012c9a2847
commit
ed12a0cc35
16 changed files with 20 additions and 20 deletions
|
@ -34,7 +34,7 @@ int arch_mem_domain_max_partitions_get(void)
|
|||
/*
|
||||
* Validate the given buffer is user accessible or not
|
||||
*/
|
||||
int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
return arc_core_mpu_buffer_validate(addr, size, write);
|
||||
}
|
||||
|
|
|
@ -207,7 +207,7 @@ int arc_core_mpu_get_max_domain_partition_regions(void)
|
|||
/**
|
||||
* @brief validate the given buffer is user accessible or not
|
||||
*/
|
||||
int arc_core_mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
int arc_core_mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
/*
|
||||
* For ARC MPU, smaller region number takes priority.
|
||||
|
|
|
@ -779,7 +779,7 @@ int arc_core_mpu_get_max_domain_partition_regions(void)
|
|||
/**
|
||||
* @brief validate the given buffer is user accessible or not
|
||||
*/
|
||||
int arc_core_mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
int arc_core_mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
int r_index;
|
||||
int key = arch_irq_lock();
|
||||
|
|
|
@ -338,7 +338,7 @@ int arch_mem_domain_max_partitions_get(void)
|
|||
return ARM_CORE_MPU_MAX_DOMAIN_PARTITIONS_GET(available_regions);
|
||||
}
|
||||
|
||||
int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
return arm_core_mpu_buffer_validate(addr, size, write);
|
||||
}
|
||||
|
|
|
@ -261,7 +261,7 @@ int arm_core_mpu_get_max_available_dyn_regions(void);
|
|||
* spans multiple enabled MPU regions (even if these regions all
|
||||
* permit user access).
|
||||
*/
|
||||
int arm_core_mpu_buffer_validate(void *addr, size_t size, int write);
|
||||
int arm_core_mpu_buffer_validate(const void *addr, size_t size, int write);
|
||||
|
||||
#endif /* CONFIG_ARM_MPU */
|
||||
|
||||
|
|
|
@ -341,7 +341,7 @@ int arm_core_mpu_get_max_available_dyn_regions(void)
|
|||
*
|
||||
* Presumes the background mapping is NOT user accessible.
|
||||
*/
|
||||
int arm_core_mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
int arm_core_mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
return mpu_buffer_validate(addr, size, write);
|
||||
}
|
||||
|
|
|
@ -169,7 +169,7 @@ static inline int is_user_accessible_region(uint32_t r_index, int write)
|
|||
* This internal function validates whether a given memory buffer
|
||||
* is user accessible or not.
|
||||
*/
|
||||
static inline int mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
static inline int mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
int32_t r_index;
|
||||
int rc = -EPERM;
|
||||
|
|
|
@ -408,7 +408,7 @@ static inline int is_user_accessible_region(uint32_t rnr, int write)
|
|||
* This internal function validates whether a given memory buffer
|
||||
* is user accessible or not.
|
||||
*/
|
||||
static inline int mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
static inline int mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
int32_t rnr;
|
||||
int rc = -EPERM;
|
||||
|
@ -455,7 +455,7 @@ static inline int mpu_buffer_validate(void *addr, size_t size, int write)
|
|||
* in case the fast address range check fails.
|
||||
*
|
||||
*/
|
||||
static inline int mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
static inline int mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
uint32_t _addr = (uint32_t)addr;
|
||||
uint32_t _size = (uint32_t)size;
|
||||
|
|
|
@ -602,7 +602,7 @@ static inline int is_user_accessible_region(uint32_t r_index, int write)
|
|||
/**
|
||||
* @brief validate the given buffer is user accessible or not
|
||||
*/
|
||||
int arm_core_mpu_buffer_validate(void *addr, size_t size, int write)
|
||||
int arm_core_mpu_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
uint8_t r_index;
|
||||
|
||||
|
|
|
@ -51,7 +51,7 @@ strlen_done:
|
|||
ret
|
||||
|
||||
/*
|
||||
* int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
* int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
*/
|
||||
|
||||
GTEXT(arch_buffer_validate)
|
||||
|
|
|
@ -667,7 +667,7 @@ int arch_mem_domain_thread_remove(struct k_thread *thread)
|
|||
((inner_start) >= (outer_start) && (inner_size) <= (outer_size) && \
|
||||
((inner_start) - (outer_start)) <= ((outer_size) - (inner_size)))
|
||||
|
||||
int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
uintptr_t start = (uintptr_t)addr;
|
||||
int ret = -1;
|
||||
|
|
|
@ -848,7 +848,7 @@ static inline pentry_t pte_finalize_value(pentry_t val, bool user_table,
|
|||
__pinned_func
|
||||
static inline pentry_t atomic_pte_get(const pentry_t *target)
|
||||
{
|
||||
return (pentry_t)atomic_ptr_get((atomic_ptr_t *)target);
|
||||
return (pentry_t)atomic_ptr_get((const atomic_ptr_t *)target);
|
||||
}
|
||||
|
||||
__pinned_func
|
||||
|
@ -1301,7 +1301,7 @@ void arch_mem_unmap(void *addr, size_t size)
|
|||
{
|
||||
int ret;
|
||||
|
||||
ret = range_map_unlocked((void *)addr, 0, size, 0, 0,
|
||||
ret = range_map_unlocked(addr, 0, size, 0, 0,
|
||||
OPTION_FLUSH | OPTION_CLEAR);
|
||||
__ASSERT_NO_MSG(ret == 0);
|
||||
ARG_UNUSED(ret);
|
||||
|
@ -1387,7 +1387,7 @@ void z_x86_set_stack_guard(k_thread_stack_t *stack)
|
|||
__pinned_func
|
||||
static bool page_validate(pentry_t *ptables, uint8_t *addr, bool write)
|
||||
{
|
||||
pentry_t *table = (pentry_t *)ptables;
|
||||
pentry_t *table = ptables;
|
||||
|
||||
for (int level = 0; level < NUM_LEVELS; level++) {
|
||||
pentry_t entry = get_entry(table, addr, level);
|
||||
|
@ -1432,7 +1432,7 @@ static inline void bcb_fence(void)
|
|||
}
|
||||
|
||||
__pinned_func
|
||||
int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
pentry_t *ptables = z_x86_thread_page_tables_get(_current);
|
||||
uint8_t *virt;
|
||||
|
|
|
@ -969,7 +969,7 @@ out:
|
|||
return ret;
|
||||
}
|
||||
|
||||
int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
uintptr_t aligned_addr;
|
||||
size_t aligned_size, addr_offset;
|
||||
|
|
|
@ -1044,7 +1044,7 @@ static bool page_validate(uint32_t *ptables, uint32_t page, uint8_t ring, bool w
|
|||
return true;
|
||||
}
|
||||
|
||||
int arch_buffer_validate(void *addr, size_t size, int write)
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write)
|
||||
{
|
||||
int ret = 0;
|
||||
uint8_t *virt;
|
||||
|
|
|
@ -88,7 +88,7 @@ void arc_core_mpu_remove_mem_domain(struct k_mem_domain *mem_domain);
|
|||
void arc_core_mpu_remove_mem_partition(struct k_mem_domain *domain,
|
||||
uint32_t partition_id);
|
||||
int arc_core_mpu_get_max_domain_partition_regions(void);
|
||||
int arc_core_mpu_buffer_validate(void *addr, size_t size, int write);
|
||||
int arc_core_mpu_buffer_validate(const void *addr, size_t size, int write);
|
||||
|
||||
#endif
|
||||
|
||||
|
|
|
@ -783,7 +783,7 @@ int arch_mem_domain_partition_add(struct k_mem_domain *domain,
|
|||
*
|
||||
* @return nonzero if the permissions don't match.
|
||||
*/
|
||||
int arch_buffer_validate(void *addr, size_t size, int write);
|
||||
int arch_buffer_validate(const void *addr, size_t size, int write);
|
||||
|
||||
/**
|
||||
* Get the optimal virtual region alignment to optimize the MMU table layout
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue