[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] arm/guest_access: Rename vgic_access_guest_memory
commit 379c22ad5036adee5ee7f3790fae748c87965419 Author: Sergej Proskurin <proskurin@xxxxxxxxxxxxx> AuthorDate: Wed Aug 16 15:17:40 2017 +0200 Commit: Stefano Stabellini <sstabellini@xxxxxxxxxx> CommitDate: Fri Aug 18 10:27:37 2017 -0700 arm/guest_access: Rename vgic_access_guest_memory This commit renames the function vgic_access_guest_memory to access_guest_memory_by_ipa. As the function name suggests, the functions expects an IPA as argument. All invocations of this function have been adapted accordingly. Apart from that, we have adjusted all printk messages for cleanup and to eliminate artefacts of the function's previous location. Signed-off-by: Sergej Proskurin <proskurin@xxxxxxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> Signed-off-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> --- xen/arch/arm/guestcopy.c | 10 +++++----- xen/arch/arm/vgic-v3-its.c | 36 ++++++++++++++++++------------------ xen/include/asm-arm/guest_access.h | 4 ++-- 3 files changed, 25 insertions(+), 25 deletions(-) diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c index 938ffe2..4ee07fc 100644 --- a/xen/arch/arm/guestcopy.c +++ b/xen/arch/arm/guestcopy.c @@ -123,8 +123,8 @@ unsigned long raw_copy_from_guest(void *to, const void __user *from, unsigned le * Temporarily map one physical guest page and copy data to or from it. * The data to be copied cannot cross a page boundary. */ -int vgic_access_guest_memory(struct domain *d, paddr_t gpa, void *buf, - uint32_t size, bool is_write) +int access_guest_memory_by_ipa(struct domain *d, paddr_t gpa, void *buf, + uint32_t size, bool is_write) { struct page_info *page; uint64_t offset = gpa & ~PAGE_MASK; /* Offset within the mapped page */ @@ -134,7 +134,7 @@ int vgic_access_guest_memory(struct domain *d, paddr_t gpa, void *buf, /* Do not cross a page boundary. */ if ( size > (PAGE_SIZE - offset) ) { - printk(XENLOG_G_ERR "d%d: vITS: memory access would cross page boundary\n", + printk(XENLOG_G_ERR "d%d: guestcopy: memory access crosses page boundary.\n", d->domain_id); return -EINVAL; } @@ -142,7 +142,7 @@ int vgic_access_guest_memory(struct domain *d, paddr_t gpa, void *buf, page = get_page_from_gfn(d, paddr_to_pfn(gpa), &p2mt, P2M_ALLOC); if ( !page ) { - printk(XENLOG_G_ERR "d%d: vITS: Failed to get table entry\n", + printk(XENLOG_G_ERR "d%d: guestcopy: failed to get table entry.\n", d->domain_id); return -EINVAL; } @@ -150,7 +150,7 @@ int vgic_access_guest_memory(struct domain *d, paddr_t gpa, void *buf, if ( !p2m_is_ram(p2mt) ) { put_page(page); - printk(XENLOG_G_ERR "d%d: vITS: memory used by the ITS should be RAM.", + printk(XENLOG_G_ERR "d%d: guestcopy: guest memory should be RAM.\n", d->domain_id); return -EINVAL; } diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c index 1af6820..72a5c70 100644 --- a/xen/arch/arm/vgic-v3-its.c +++ b/xen/arch/arm/vgic-v3-its.c @@ -131,9 +131,9 @@ static int its_set_collection(struct virt_its *its, uint16_t collid, if ( collid >= its->max_collections ) return -ENOENT; - return vgic_access_guest_memory(its->d, - addr + collid * sizeof(coll_table_entry_t), - &vcpu_id, sizeof(vcpu_id), true); + return access_guest_memory_by_ipa(its->d, + addr + collid * sizeof(coll_table_entry_t), + &vcpu_id, sizeof(vcpu_id), true); } /* Must be called with the ITS lock held. */ @@ -149,9 +149,9 @@ static struct vcpu *get_vcpu_from_collection(struct virt_its *its, if ( collid >= its->max_collections ) return NULL; - ret = vgic_access_guest_memory(its->d, - addr + collid * sizeof(coll_table_entry_t), - &vcpu_id, sizeof(coll_table_entry_t), false); + ret = access_guest_memory_by_ipa(its->d, + addr + collid * sizeof(coll_table_entry_t), + &vcpu_id, sizeof(coll_table_entry_t), false); if ( ret ) return NULL; @@ -171,9 +171,9 @@ static int its_set_itt_address(struct virt_its *its, uint32_t devid, if ( devid >= its->max_devices ) return -ENOENT; - return vgic_access_guest_memory(its->d, - addr + devid * sizeof(dev_table_entry_t), - &itt_entry, sizeof(itt_entry), true); + return access_guest_memory_by_ipa(its->d, + addr + devid * sizeof(dev_table_entry_t), + &itt_entry, sizeof(itt_entry), true); } /* @@ -189,9 +189,9 @@ static int its_get_itt(struct virt_its *its, uint32_t devid, if ( devid >= its->max_devices ) return -EINVAL; - return vgic_access_guest_memory(its->d, - addr + devid * sizeof(dev_table_entry_t), - itt, sizeof(*itt), false); + return access_guest_memory_by_ipa(its->d, + addr + devid * sizeof(dev_table_entry_t), + itt, sizeof(*itt), false); } /* @@ -236,7 +236,7 @@ static bool read_itte(struct virt_its *its, uint32_t devid, uint32_t evid, if ( addr == INVALID_PADDR ) return false; - if ( vgic_access_guest_memory(its->d, addr, &itte, sizeof(itte), false) ) + if ( access_guest_memory_by_ipa(its->d, addr, &itte, sizeof(itte), false) ) return false; vcpu = get_vcpu_from_collection(its, itte.collection); @@ -270,7 +270,7 @@ static bool write_itte(struct virt_its *its, uint32_t devid, itte.collection = collid; itte.vlpi = vlpi; - if ( vgic_access_guest_memory(its->d, addr, &itte, sizeof(itte), true) ) + if ( access_guest_memory_by_ipa(its->d, addr, &itte, sizeof(itte), true) ) return false; return true; @@ -415,8 +415,8 @@ static int update_lpi_property(struct domain *d, struct pending_irq *p) addr = d->arch.vgic.rdist_propbase & GENMASK(51, 12); - ret = vgic_access_guest_memory(d, addr + p->irq - LPI_OFFSET, - &property, sizeof(property), false); + ret = access_guest_memory_by_ipa(d, addr + p->irq - LPI_OFFSET, + &property, sizeof(property), false); if ( ret ) return ret; @@ -920,8 +920,8 @@ static int vgic_its_handle_cmds(struct domain *d, struct virt_its *its) { int ret; - ret = vgic_access_guest_memory(d, addr + its->creadr, - command, sizeof(command), false); + ret = access_guest_memory_by_ipa(d, addr + its->creadr, + command, sizeof(command), false); if ( ret ) return ret; diff --git a/xen/include/asm-arm/guest_access.h b/xen/include/asm-arm/guest_access.h index df5737c..cc73ce8 100644 --- a/xen/include/asm-arm/guest_access.h +++ b/xen/include/asm-arm/guest_access.h @@ -11,8 +11,8 @@ unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, unsigned long raw_copy_from_guest(void *to, const void *from, unsigned len); unsigned long raw_clear_guest(void *to, unsigned len); -int vgic_access_guest_memory(struct domain *d, paddr_t gpa, void *buf, - uint32_t size, bool_t is_write); +int access_guest_memory_by_ipa(struct domain *d, paddr_t ipa, void *buf, + uint32_t size, bool_t is_write); #define __raw_copy_to_guest raw_copy_to_guest #define __raw_copy_from_guest raw_copy_from_guest -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |