[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC PATCH V3 01/22] Clean up trailing whitespaces
On 27/02/13 14:33, Wei Liu wrote: > Affected files: > * event_channel.c > * sched.h > * event.h > * xen.h Is this sort of white space patch useful? David > Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> > --- > xen/common/event_channel.c | 16 ++++++++-------- > xen/include/public/xen.h | 22 +++++++++++----------- > xen/include/xen/event.h | 4 ++-- > xen/include/xen/sched.h | 6 +++--- > 4 files changed, 24 insertions(+), 24 deletions(-) > > diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c > index 2d7afc9..9231eb0 100644 > --- a/xen/common/event_channel.c > +++ b/xen/common/event_channel.c > @@ -1,15 +1,15 @@ > > /****************************************************************************** > * event_channel.c > - * > + * > * Event notifications from VIRQs, PIRQs, and other domains. > - * > + * > * Copyright (c) 2003-2006, K A Fraser. > - * > + * > * This program is distributed in the hope that it will be useful, > * but WITHOUT ANY WARRANTY; without even the implied warranty of > * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the > * GNU General Public License for more details. > - * > + * > * You should have received a copy of the GNU General Public License > * along with this program; if not, write to the Free Software > * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA > @@ -238,7 +238,7 @@ static long > evtchn_bind_interdomain(evtchn_bind_interdomain_t *bind) > lchn->u.interdomain.remote_dom = rd; > lchn->u.interdomain.remote_port = (u16)rport; > lchn->state = ECS_INTERDOMAIN; > - > + > rchn->u.interdomain.remote_dom = ld; > rchn->u.interdomain.remote_port = (u16)lport; > rchn->state = ECS_INTERDOMAIN; > @@ -255,7 +255,7 @@ static long > evtchn_bind_interdomain(evtchn_bind_interdomain_t *bind) > spin_unlock(&ld->event_lock); > if ( ld != rd ) > spin_unlock(&rd->event_lock); > - > + > rcu_unlock_domain(rd); > > return rc; > @@ -633,7 +633,7 @@ static void evtchn_set_pending(struct vcpu *v, int port) > { > vcpu_mark_events_pending(v); > } > - > + > /* Check if some VCPU might be polling for this event. */ > if ( likely(bitmap_empty(d->poll_mask, d->max_vcpus)) ) > return; > @@ -930,7 +930,7 @@ int evtchn_unmask(unsigned int port) > > /* > * These operations must happen in strict order. Based on > - * include/xen/event.h:evtchn_set_pending(). > + * include/xen/event.h:evtchn_set_pending(). > */ > if ( test_and_clear_bit(port, &shared_info(d, evtchn_mask)) && > test_bit (port, &shared_info(d, evtchn_pending)) && > diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h > index 99c8212..87380e6 100644 > --- a/xen/include/public/xen.h > +++ b/xen/include/public/xen.h > @@ -1,8 +1,8 @@ > > /****************************************************************************** > * xen.h > - * > + * > * Guest OS interface to Xen. > - * > + * > * Permission is hereby granted, free of charge, to any person obtaining a > copy > * of this software and associated documentation files (the "Software"), to > * deal in the Software without restriction, including without limitation the > @@ -137,11 +137,11 @@ DEFINE_XEN_GUEST_HANDLE(xen_ulong_t); > #define __HYPERVISOR_dom0_op __HYPERVISOR_platform_op > #endif > > -/* > +/* > * VIRTUAL INTERRUPTS > - * > + * > * Virtual interrupts that a guest OS may receive from Xen. > - * > + * > * In the side comments, 'V.' denotes a per-VCPU VIRQ while 'G.' denotes a > * global VIRQ. The former can be bound once per VCPU and cannot be re-bound. > * The latter can be allocated only once per guest: they must initially be > @@ -190,7 +190,7 @@ DEFINE_XEN_GUEST_HANDLE(xen_ulong_t); > * (x) encodes the PFD as follows: > * x == 0 => PFD == DOMID_SELF > * x != 0 => PFD == x - 1 > - * > + * > * Sub-commands: ptr[1:0] specifies the appropriate MMU_* command. > * ------------- > * ptr[1:0] == MMU_NORMAL_PT_UPDATE: > @@ -236,13 +236,13 @@ DEFINE_XEN_GUEST_HANDLE(xen_ulong_t); > * To deallocate the pages, the operations are the reverse of the steps > * mentioned above. The argument is MMUEXT_UNPIN_TABLE for all levels and the > * pagetable MUST not be in use (meaning that the cr3 is not set to it). > - * > + * > * ptr[1:0] == MMU_MACHPHYS_UPDATE: > * Updates an entry in the machine->pseudo-physical mapping table. > * ptr[:2] -- Machine address within the frame whose mapping to modify. > * The frame must belong to the FD, if one is specified. > * val -- Value to write into the mapping entry. > - * > + * > * ptr[1:0] == MMU_PT_UPDATE_PRESERVE_AD: > * As MMU_NORMAL_PT_UPDATE above, but A/D bits currently in the PTE are ORed > * with those in @val. > @@ -588,7 +588,7 @@ typedef struct vcpu_time_info vcpu_time_info_t; > struct vcpu_info { > /* > * 'evtchn_upcall_pending' is written non-zero by Xen to indicate > - * a pending notification for a particular VCPU. It is then cleared > + * a pending notification for a particular VCPU. It is then cleared > * by the guest OS /before/ checking for pending work, thus avoiding > * a set-and-check race. Note that the mask is only accessed by Xen > * on the CPU that is currently hosting the VCPU. This means that the > @@ -646,7 +646,7 @@ struct shared_info { > * 3. Virtual interrupts ('events'). A domain can bind an event-channel > * port to a virtual interrupt source, such as the virtual-timer > * device or the emergency console. > - * > + * > * Event channels are addressed by a "port index". Each channel is > * associated with two bits of information: > * 1. PENDING -- notifies the domain that there is a pending > notification > @@ -657,7 +657,7 @@ struct shared_info { > * becomes pending while the channel is masked then the 'edge' is > lost > * (i.e., when the channel is unmasked, the guest must manually > handle > * pending notifications as no upcall will be scheduled by Xen). > - * > + * > * To expedite scanning of pending notifications, any 0->1 pending > * transition on an unmasked channel causes a corresponding bit in a > * per-vcpu selector word to be set. Each bit in the selector covers a > diff --git a/xen/include/xen/event.h b/xen/include/xen/event.h > index 71c3e92..65ac81a 100644 > --- a/xen/include/xen/event.h > +++ b/xen/include/xen/event.h > @@ -1,8 +1,8 @@ > > /****************************************************************************** > * event.h > - * > + * > * A nice interface for passing asynchronous events to guest OSes. > - * > + * > * Copyright (c) 2002-2006, K A Fraser > */ > > diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h > index ba0f2f8..f6846d4 100644 > --- a/xen/include/xen/sched.h > +++ b/xen/include/xen/sched.h > @@ -92,7 +92,7 @@ void evtchn_destroy_final(struct domain *d); /* from > complete_domain_destroy */ > > struct waitqueue_vcpu; > > -struct vcpu > +struct vcpu > { > int vcpu_id; > > @@ -453,7 +453,7 @@ struct domain *domain_create( > /* > * rcu_lock_domain_by_id() is more efficient than get_domain_by_id(). > * This is the preferred function if the returned domain reference > - * is short lived, but it cannot be used if the domain reference needs > + * is short lived, but it cannot be used if the domain reference needs > * to be kept beyond the current scope (e.g., across a softirq). > * The returned domain reference must be discarded using rcu_unlock_domain(). > */ > @@ -574,7 +574,7 @@ void sync_local_execstate(void); > * sync_vcpu_execstate() will switch and commit @prev's state. > */ > void context_switch( > - struct vcpu *prev, > + struct vcpu *prev, > struct vcpu *next); > > /* _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |