Module Name:    src
Committed By:   msaitoh
Date:           Wed Mar 20 23:31:54 UTC 2024

Modified Files:
        src/sys/dev/vmt: vmt_subr.c

Log Message:
KNF. No functional change.


To generate a diff of this commit:
cvs rdiff -u -r1.3 -r1.4 src/sys/dev/vmt/vmt_subr.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/dev/vmt/vmt_subr.c
diff -u src/sys/dev/vmt/vmt_subr.c:1.3 src/sys/dev/vmt/vmt_subr.c:1.4
--- src/sys/dev/vmt/vmt_subr.c:1.3	Sat Mar 27 21:23:14 2021
+++ src/sys/dev/vmt/vmt_subr.c	Wed Mar 20 23:31:54 2024
@@ -1,4 +1,4 @@
-/* $NetBSD: vmt_subr.c,v 1.3 2021/03/27 21:23:14 ryo Exp $ */
+/* $NetBSD: vmt_subr.c,v 1.4 2024/03/20 23:31:54 msaitoh Exp $ */
 /* $OpenBSD: vmt.c,v 1.11 2011/01/27 21:29:25 dtucker Exp $ */
 
 /*
@@ -175,14 +175,17 @@ vmt_common_attach(struct vmt_softc *sc)
 	sc->sc_rpc_buf = kmem_alloc(VMT_RPC_BUFLEN, KM_SLEEP);
 
 	if (vm_rpc_open(&sc->sc_tclo_rpc, VM_RPC_OPEN_TCLO) != 0) {
-		aprint_error_dev(self, "failed to open backdoor RPC channel (TCLO protocol)\n");
+		aprint_error_dev(self, "failed to open backdoor RPC channel "
+		    "(TCLO protocol)\n");
 		goto free;
 	}
 	sc->sc_tclo_rpc_open = true;
 
 	/* don't know if this is important at all yet */
-	if (vm_rpc_send_rpci_tx(sc, "tools.capability.hgfs_server toolbox 1") != 0) {
-		aprint_error_dev(self, "failed to set HGFS server capability\n");
+	if (vm_rpc_send_rpci_tx(sc,
+	    "tools.capability.hgfs_server toolbox 1") != 0) {
+		aprint_error_dev(self,
+		    "failed to set HGFS server capability\n");
 		goto free;
 	}
 
@@ -313,7 +316,7 @@ vmt_sysctl_setup_clock_sync(device_t sel
 	rv = sysctl_createv(&sc->sc_log, 0, &node, &period_node,
 	    CTLFLAG_READWRITE, CTLTYPE_INT, "period",
 	    SYSCTL_DESCR("Period, in seconds, at which to update the "
-	        "guest's clock"),
+		"guest's clock"),
 	    vmt_sysctl_update_clock_sync_period, 0, (void *)sc, 0,
 	    CTL_CREATE, CTL_EOL);
 	return rv;
@@ -380,20 +383,23 @@ vmt_update_guest_info(struct vmt_softc *
 	}
 
 	/*
-	 * we're supposed to pass the full network address information back here,
-	 * but that involves xdr (sunrpc) data encoding, which seems a bit unreasonable.
+	 * we're supposed to pass the full network address information back
+	 * here, but that involves xdr (sunrpc) data encoding, which seems
+	 * a bit unreasonable.
 	 */
 
 	if (sc->sc_set_guest_os == 0) {
 		if (vm_rpc_send_rpci_tx(sc, "SetGuestInfo  %d %s %s %s",
-		    VM_GUEST_INFO_OS_NAME_FULL, ostype, osrelease, machine_arch) != 0) {
-			device_printf(sc->sc_dev, "unable to set full guest OS\n");
+		    VM_GUEST_INFO_OS_NAME_FULL,
+		    ostype, osrelease, machine_arch) != 0) {
+			device_printf(sc->sc_dev,
+			    "unable to set full guest OS\n");
 			sc->sc_rpc_error = 1;
 		}
 
 		/*
-		 * host doesn't like it if we send an OS name it doesn't recognise,
-		 * so use "other" for i386 and "other-64" for amd64
+		 * Host doesn't like it if we send an OS name it doesn't
+		 * recognise, so use "other" for i386 and "other-64" for amd64.
 		 */
 		if (vm_rpc_send_rpci_tx(sc, "SetGuestInfo  %d %s",
 		    VM_GUEST_INFO_OS_NAME, VM_OS_NAME) != 0) {
@@ -442,7 +448,8 @@ vmt_tclo_state_change_success(struct vmt
 {
 	if (vm_rpc_send_rpci_tx(sc, "tools.os.statechange.status %d %d",
 	    success, state) != 0) {
-		device_printf(sc->sc_dev, "unable to send state change result\n");
+		device_printf(sc->sc_dev,
+		    "unable to send state change result\n");
 		sc->sc_rpc_error = 1;
 	}
 }
@@ -493,8 +500,10 @@ vmt_shutdown(device_t self, int flags)
 {
 	struct vmt_softc *sc = device_private(self);
 
-	if (vm_rpc_send_rpci_tx(sc, "tools.capability.hgfs_server toolbox 0") != 0) {
-		device_printf(sc->sc_dev, "failed to disable hgfs server capability\n");
+	if (vm_rpc_send_rpci_tx(sc,
+	    "tools.capability.hgfs_server toolbox 0") != 0) {
+		device_printf(sc->sc_dev,
+		    "failed to disable hgfs server capability\n");
 	}
 
 	if (vm_rpc_send(&sc->sc_tclo_rpc, NULL, 0) != 0) {
@@ -526,13 +535,16 @@ vmt_tclo_tick(void *xarg)
 	    sc->sc_tclo_rpc.cookie1 == 0 &&
 	    sc->sc_tclo_rpc.cookie2 == 0) {
 		if (vm_rpc_open(&sc->sc_tclo_rpc, VM_RPC_OPEN_TCLO) != 0) {
-			device_printf(sc->sc_dev, "unable to reopen TCLO channel\n");
+			device_printf(sc->sc_dev,
+			    "unable to reopen TCLO channel\n");
 			callout_schedule(&sc->sc_tclo_tick, hz * 15);
 			return;
 		}
 
-		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_RESET_REPLY) != 0) {
-			device_printf(sc->sc_dev, "failed to send reset reply\n");
+		if (vm_rpc_send_str(&sc->sc_tclo_rpc,
+		    VM_RPC_RESET_REPLY) != 0) {
+			device_printf(sc->sc_dev,
+			    "failed to send reset reply\n");
 			sc->sc_rpc_error = 1;
 			goto out;
 		} else {
@@ -542,14 +554,16 @@ vmt_tclo_tick(void *xarg)
 
 	if (sc->sc_tclo_ping) {
 		if (vm_rpc_send(&sc->sc_tclo_rpc, NULL, 0) != 0) {
-			device_printf(sc->sc_dev, "failed to send TCLO outgoing ping\n");
+			device_printf(sc->sc_dev,
+			    "failed to send TCLO outgoing ping\n");
 			sc->sc_rpc_error = 1;
 			goto out;
 		}
 	}
 
 	if (vm_rpc_get_length(&sc->sc_tclo_rpc, &rlen, &ack) != 0) {
-		device_printf(sc->sc_dev, "failed to get length of incoming TCLO data\n");
+		device_printf(sc->sc_dev,
+		    "failed to get length of incoming TCLO data\n");
 		sc->sc_rpc_error = 1;
 		goto out;
 	}
@@ -563,7 +577,8 @@ vmt_tclo_tick(void *xarg)
 		rlen = VMT_RPC_BUFLEN - 1;
 	}
 	if (vm_rpc_get_data(&sc->sc_tclo_rpc, sc->sc_rpc_buf, rlen, ack) != 0) {
-		device_printf(sc->sc_dev, "failed to get incoming TCLO data\n");
+		device_printf(sc->sc_dev,
+		    "failed to get incoming TCLO data\n");
 		sc->sc_rpc_error = 1;
 		goto out;
 	}
@@ -583,7 +598,8 @@ vmt_tclo_tick(void *xarg)
 		}
 
 		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_RESET_REPLY) != 0) {
-			device_printf(sc->sc_dev, "failed to send reset reply\n");
+			device_printf(sc->sc_dev,
+			    "failed to send reset reply\n");
 			sc->sc_rpc_error = 1;
 		}
 
@@ -591,7 +607,8 @@ vmt_tclo_tick(void *xarg)
 
 		vmt_update_guest_info(sc);
 		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_OK) != 0) {
-			device_printf(sc->sc_dev, "error sending ping response\n");
+			device_printf(sc->sc_dev,
+			    "error sending ping response\n");
 			sc->sc_rpc_error = 1;
 		}
 
@@ -602,15 +619,18 @@ vmt_tclo_tick(void *xarg)
 	} else if (strcmp(sc->sc_rpc_buf, "OS_PowerOn") == 0) {
 		vmt_tclo_state_change_success(sc, 1, VM_STATE_CHANGE_POWERON);
 		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_OK) != 0) {
-			device_printf(sc->sc_dev, "error sending poweron response\n");
+			device_printf(sc->sc_dev,
+			    "error sending poweron response\n");
 			sc->sc_rpc_error = 1;
 		}
 	} else if (strcmp(sc->sc_rpc_buf, "OS_Suspend") == 0) {
-		log(LOG_KERN | LOG_NOTICE, "VMware guest entering suspended state\n");
+		log(LOG_KERN | LOG_NOTICE,
+		    "VMware guest entering suspended state\n");
 
 		vmt_tclo_state_change_success(sc, 1, VM_STATE_CHANGE_SUSPEND);
 		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_OK) != 0) {
-			device_printf(sc->sc_dev, "error sending suspend response\n");
+			device_printf(sc->sc_dev,
+			    "error sending suspend response\n");
 			sc->sc_rpc_error = 1;
 		}
 	} else if (strcmp(sc->sc_rpc_buf, "OS_Resume") == 0) {
@@ -618,32 +638,41 @@ vmt_tclo_tick(void *xarg)
 	} else if (strcmp(sc->sc_rpc_buf, "Capabilities_Register") == 0) {
 
 		/* don't know if this is important at all */
-		if (vm_rpc_send_rpci_tx(sc, "vmx.capability.unified_loop toolbox") != 0) {
-			device_printf(sc->sc_dev, "unable to set unified loop\n");
+		if (vm_rpc_send_rpci_tx(sc,
+		    "vmx.capability.unified_loop toolbox") != 0) {
+			device_printf(sc->sc_dev,
+			    "unable to set unified loop\n");
 			sc->sc_rpc_error = 1;
 		}
 		if (vm_rpci_response_successful(sc) == 0) {
-			device_printf(sc->sc_dev, "host rejected unified loop setting\n");
+			device_printf(sc->sc_dev,
+			    "host rejected unified loop setting\n");
 		}
 
 		/* the trailing space is apparently important here */
-		if (vm_rpc_send_rpci_tx(sc, "tools.capability.statechange ") != 0) {
-			device_printf(sc->sc_dev, "unable to send statechange capability\n");
+		if (vm_rpc_send_rpci_tx(sc,
+		    "tools.capability.statechange ") != 0) {
+			device_printf(sc->sc_dev,
+			    "unable to send statechange capability\n");
 			sc->sc_rpc_error = 1;
 		}
 		if (vm_rpci_response_successful(sc) == 0) {
-			device_printf(sc->sc_dev, "host rejected statechange capability\n");
+			device_printf(sc->sc_dev,
+			    "host rejected statechange capability\n");
 		}
 
-		if (vm_rpc_send_rpci_tx(sc, "tools.set.version %u", VM_VERSION_UNMANAGED) != 0) {
-			device_printf(sc->sc_dev, "unable to set tools version\n");
+		if (vm_rpc_send_rpci_tx(sc,
+		    "tools.set.version %u", VM_VERSION_UNMANAGED) != 0) {
+			device_printf(sc->sc_dev,
+			    "unable to set tools version\n");
 			sc->sc_rpc_error = 1;
 		}
 
 		vmt_update_guest_uptime(sc);
 
 		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_OK) != 0) {
-			device_printf(sc->sc_dev, "error sending capabilities_register response\n");
+			device_printf(sc->sc_dev,
+			    "error sending capabilities_register response\n");
 			sc->sc_rpc_error = 1;
 		}
 	} else if (strcmp(sc->sc_rpc_buf, "Set_Option broadcastIP 1") == 0) {
@@ -660,7 +689,8 @@ vmt_tclo_tick(void *xarg)
 
 			/* skip loopback */
 			if (strncmp(iface->if_xname, "lo", 2) == 0 &&
-			    iface->if_xname[2] >= '0' && iface->if_xname[2] <= '9') {
+			    iface->if_xname[2] >= '0' &&
+			    iface->if_xname[2] <= '9') {
 				continue;
 			}
 
@@ -680,25 +710,32 @@ vmt_tclo_tick(void *xarg)
 		if (guest_ip != NULL) {
 			if (vm_rpc_send_rpci_tx(sc, "info-set guestinfo.ip %s",
 			    inet_ntoa(guest_ip->sin_addr)) != 0) {
-				device_printf(sc->sc_dev, "unable to send guest IP address\n");
+				device_printf(sc->sc_dev,
+				    "unable to send guest IP address\n");
 				sc->sc_rpc_error = 1;
 			}
 			ifa_release(iface_addr, &psref);
 
-			if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_OK) != 0) {
-				device_printf(sc->sc_dev, "error sending broadcastIP response\n");
+			if (vm_rpc_send_str(&sc->sc_tclo_rpc,
+			    VM_RPC_REPLY_OK) != 0) {
+				device_printf(sc->sc_dev,
+				    "error sending broadcastIP response\n");
 				sc->sc_rpc_error = 1;
 			}
 		} else {
-			if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_ERROR_IP_ADDR) != 0) {
+			if (vm_rpc_send_str(&sc->sc_tclo_rpc,
+			    VM_RPC_REPLY_ERROR_IP_ADDR) != 0) {
 				device_printf(sc->sc_dev,
-				    "error sending broadcastIP error response\n");
+				    "error sending broadcastIP"
+				    " error response\n");
 				sc->sc_rpc_error = 1;
 			}
 		}
 	} else {
-		if (vm_rpc_send_str(&sc->sc_tclo_rpc, VM_RPC_REPLY_ERROR) != 0) {
-			device_printf(sc->sc_dev, "error sending unknown command reply\n");
+		if (vm_rpc_send_str(&sc->sc_tclo_rpc,
+		    VM_RPC_REPLY_ERROR) != 0) {
+			device_printf(sc->sc_dev,
+			    "error sending unknown command reply\n");
 			sc->sc_rpc_error = 1;
 		}
 	}
@@ -928,7 +965,8 @@ vm_rpci_response_successful(struct vmt_s
 }
 
 static int
-vm_rpc_send_rpci_tx_buf(struct vmt_softc *sc, const uint8_t *buf, uint32_t length)
+vm_rpc_send_rpci_tx_buf(struct vmt_softc *sc, const uint8_t *buf,
+    uint32_t length)
 {
 	struct vm_rpc rpci;
 	u_int32_t rlen;
@@ -947,7 +985,8 @@ vm_rpc_send_rpci_tx_buf(struct vmt_softc
 	}
 
 	if (vm_rpc_get_length(&rpci, &rlen, &ack) != 0) {
-		device_printf(sc->sc_dev, "failed to get length of rpci response data\n");
+		device_printf(sc->sc_dev,
+		    "failed to get length of rpci response data\n");
 		result = EIO;
 		goto out;
 	}
@@ -958,7 +997,8 @@ vm_rpc_send_rpci_tx_buf(struct vmt_softc
 		}
 
 		if (vm_rpc_get_data(&rpci, sc->sc_rpc_buf, rlen, ack) != 0) {
-			device_printf(sc->sc_dev, "failed to get rpci response data\n");
+			device_printf(sc->sc_dev,
+			    "failed to get rpci response data\n");
 			result = EIO;
 			goto out;
 		}
@@ -983,7 +1023,8 @@ vm_rpc_send_rpci_tx(struct vmt_softc *sc
 	va_end(args);
 
 	if (len >= VMT_RPC_BUFLEN) {
-		device_printf(sc->sc_dev, "rpci command didn't fit in buffer\n");
+		device_printf(sc->sc_dev,
+		    "rpci command didn't fit in buffer\n");
 		return EIO;
 	}
 

Reply via email to