Commit 323ae3c5 authored by Michael S. Tsirkin's avatar Michael S. Tsirkin

blackfin: macro whitespace fixes

While working on arch/blackfin/include/asm/uaccess.h, I noticed
that some macros within this header are made harder to read because they
violate a coding style rule: space is missing after comma.

Fix it up.
Signed-off-by: default avatarMichael S. Tsirkin <mst@redhat.com>
parent 7185820a
...@@ -27,7 +27,7 @@ static inline void set_fs(mm_segment_t fs) ...@@ -27,7 +27,7 @@ static inline void set_fs(mm_segment_t fs)
current_thread_info()->addr_limit = fs; current_thread_info()->addr_limit = fs;
} }
#define segment_eq(a,b) ((a) == (b)) #define segment_eq(a, b) ((a) == (b))
#define VERIFY_READ 0 #define VERIFY_READ 0
#define VERIFY_WRITE 1 #define VERIFY_WRITE 1
...@@ -68,11 +68,11 @@ struct exception_table_entry { ...@@ -68,11 +68,11 @@ struct exception_table_entry {
* use the right size if we just have the right pointer type. * use the right size if we just have the right pointer type.
*/ */
#define put_user(x,p) \ #define put_user(x, p) \
({ \ ({ \
int _err = 0; \ int _err = 0; \
typeof(*(p)) _x = (x); \ typeof(*(p)) _x = (x); \
typeof(*(p)) __user *_p = (p); \ typeof(*(p)) __user *_p = (p); \
if (!access_ok(VERIFY_WRITE, _p, sizeof(*(_p)))) {\ if (!access_ok(VERIFY_WRITE, _p, sizeof(*(_p)))) {\
_err = -EFAULT; \ _err = -EFAULT; \
} \ } \
...@@ -102,7 +102,7 @@ struct exception_table_entry { ...@@ -102,7 +102,7 @@ struct exception_table_entry {
_err; \ _err; \
}) })
#define __put_user(x,p) put_user(x,p) #define __put_user(x, p) put_user(x, p)
static inline int bad_user_access_length(void) static inline int bad_user_access_length(void)
{ {
panic("bad_user_access_length"); panic("bad_user_access_length");
...@@ -121,10 +121,10 @@ static inline int bad_user_access_length(void) ...@@ -121,10 +121,10 @@ static inline int bad_user_access_length(void)
#define __ptr(x) ((unsigned long __force *)(x)) #define __ptr(x) ((unsigned long __force *)(x))
#define __put_user_asm(x,p,bhw) \ #define __put_user_asm(x, p, bhw) \
__asm__ (#bhw"[%1] = %0;\n\t" \ __asm__ (#bhw"[%1] = %0;\n\t" \
: /* no outputs */ \ : /* no outputs */ \
:"d" (x),"a" (__ptr(p)) : "memory") :"d" (x), "a" (__ptr(p)) : "memory")
#define get_user(x, ptr) \ #define get_user(x, ptr) \
({ \ ({ \
...@@ -136,10 +136,10 @@ static inline int bad_user_access_length(void) ...@@ -136,10 +136,10 @@ static inline int bad_user_access_length(void)
BUILD_BUG_ON(ptr_size >= 8); \ BUILD_BUG_ON(ptr_size >= 8); \
switch (ptr_size) { \ switch (ptr_size) { \
case 1: \ case 1: \
__get_user_asm(_val, _p, B,(Z)); \ __get_user_asm(_val, _p, B, (Z)); \
break; \ break; \
case 2: \ case 2: \
__get_user_asm(_val, _p, W,(Z)); \ __get_user_asm(_val, _p, W, (Z)); \
break; \ break; \
case 4: \ case 4: \
__get_user_asm(_val, _p, , ); \ __get_user_asm(_val, _p, , ); \
...@@ -151,7 +151,7 @@ static inline int bad_user_access_length(void) ...@@ -151,7 +151,7 @@ static inline int bad_user_access_length(void)
_err; \ _err; \
}) })
#define __get_user(x,p) get_user(x,p) #define __get_user(x, p) get_user(x, p)
#define __get_user_bad() (bad_user_access_length(), (-EFAULT)) #define __get_user_bad() (bad_user_access_length(), (-EFAULT))
...@@ -168,10 +168,10 @@ static inline int bad_user_access_length(void) ...@@ -168,10 +168,10 @@ static inline int bad_user_access_length(void)
#define __copy_to_user_inatomic __copy_to_user #define __copy_to_user_inatomic __copy_to_user
#define __copy_from_user_inatomic __copy_from_user #define __copy_from_user_inatomic __copy_from_user
#define copy_to_user_ret(to,from,n,retval) ({ if (copy_to_user(to,from,n))\ #define copy_to_user_ret(to, from, n, retval) ({ if (copy_to_user(to, from, n))\
return retval; }) return retval; })
#define copy_from_user_ret(to,from,n,retval) ({ if (copy_from_user(to,from,n))\ #define copy_from_user_ret(to, from, n, retval) ({ if (copy_from_user(to, from, n))\
return retval; }) return retval; })
static inline unsigned long __must_check static inline unsigned long __must_check
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment