diff options
author | Brandon Potter <brandon.potter@amd.com> | 2015-07-24 12:25:23 -0700 |
---|---|---|
committer | Brandon Potter <brandon.potter@amd.com> | 2015-07-24 12:25:23 -0700 |
commit | 4f7c969e27a7de71301724707b1db1d7ab3f0956 (patch) | |
tree | 3283c10f24744a2ca05181804ed4a3141ab021e4 /src/sim/syscall_emul.hh | |
parent | d5a7f09eb15bec3ecf2318418589d223beab02f4 (diff) | |
download | gem5-4f7c969e27a7de71301724707b1db1d7ab3f0956.tar.xz |
style: change Process function calls to use camelCase
The Process class methods were using an improper style and this subsequently
bled into the system call code. The following regular expressions should be
helpful if someone transitions private system call patches on top of these
changesets:
s/alloc_fd/allocFD/
s/sim_fd(/simFD(/
s/sim_fd_obj/getFDEntry/
s/fix_file_offsets/fixFileOffsets/
s/find_file_offsets/findFileOffsets/
Diffstat (limited to 'src/sim/syscall_emul.hh')
-rw-r--r-- | src/sim/syscall_emul.hh | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/sim/syscall_emul.hh b/src/sim/syscall_emul.hh index 5ed697314..1fd16e236 100644 --- a/src/sim/syscall_emul.hh +++ b/src/sim/syscall_emul.hh @@ -558,7 +558,7 @@ ioctlFunc(SyscallDesc *desc, int callnum, LiveProcess *process, DPRINTF(SyscallVerbose, "ioctl(%d, 0x%x, ...)\n", tgt_fd, req); - FDEntry *fde = process->get_fd_entry(tgt_fd); + FDEntry *fde = process->getFDEntry(tgt_fd); if (fde == NULL) { // doesn't map to any simulator fd: not a valid target fd @@ -650,7 +650,7 @@ openFunc(SyscallDesc *desc, int callnum, LiveProcess *process, if (fd == -1) return -local_errno; - return process->alloc_fd(fd, path.c_str(), hostFlags, mode, false); + return process->allocFD(fd, path.c_str(), hostFlags, mode, false); } /// Target open() handler. @@ -812,7 +812,7 @@ fchmodFunc(SyscallDesc *desc, int callnum, LiveProcess *process, int tgt_fd = process->getSyscallArg(tc, index); uint32_t mode = process->getSyscallArg(tc, index); - int sim_fd = process->sim_fd(tgt_fd); + int sim_fd = process->getSimFD(tgt_fd); if (sim_fd < 0) return -EBADF; @@ -1006,7 +1006,7 @@ fstat64Func(SyscallDesc *desc, int callnum, LiveProcess *process, int tgt_fd = process->getSyscallArg(tc, index); Addr bufPtr = process->getSyscallArg(tc, index); - int sim_fd = process->sim_fd(tgt_fd); + int sim_fd = process->getSimFD(tgt_fd); if (sim_fd < 0) return -EBADF; @@ -1102,7 +1102,7 @@ fstatFunc(SyscallDesc *desc, int callnum, LiveProcess *process, DPRINTF(SyscallVerbose, "fstat(%d, ...)\n", tgt_fd); - int sim_fd = process->sim_fd(tgt_fd); + int sim_fd = process->getSimFD(tgt_fd); if (sim_fd < 0) return -EBADF; @@ -1158,7 +1158,7 @@ fstatfsFunc(SyscallDesc *desc, int callnum, LiveProcess *process, int tgt_fd = process->getSyscallArg(tc, index); Addr bufPtr = process->getSyscallArg(tc, index); - int sim_fd = process->sim_fd(tgt_fd); + int sim_fd = process->getSimFD(tgt_fd); if (sim_fd < 0) return -EBADF; @@ -1183,7 +1183,7 @@ writevFunc(SyscallDesc *desc, int callnum, LiveProcess *process, int index = 0; int tgt_fd = process->getSyscallArg(tc, index); - int sim_fd = process->sim_fd(tgt_fd); + int sim_fd = process->getSimFD(tgt_fd); if (sim_fd < 0) return -EBADF; @@ -1237,7 +1237,7 @@ mmapFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) warn("mmap length argument %#x is unreasonably large.\n", length); if (!(flags & OS::TGT_MAP_ANONYMOUS)) { - FDEntry *fde = p->get_fd_entry(tgt_fd); + FDEntry *fde = p->getFDEntry(tgt_fd); if (!fde || fde->fd < 0) { warn("mmap failing: target fd %d is not valid\n", tgt_fd); return -EBADF; |