From nobody Sat May 18 04:46:18 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1687503332392409.8069313980434; Thu, 22 Jun 2023 23:55:32 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.554236.865316 (Exim 4.92) (envelope-from ) id 1qCahG-00008f-5m; Fri, 23 Jun 2023 06:55:06 +0000 Received: by outflank-mailman (output) from mailman id 554236.865316; Fri, 23 Jun 2023 06:55:06 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qCahG-00008X-2l; Fri, 23 Jun 2023 06:55:06 +0000 Received: by outflank-mailman (input) for mailman id 554236; Fri, 23 Jun 2023 06:55:05 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1qCahE-00008M-Sa for xen-devel@lists.xenproject.org; Fri, 23 Jun 2023 06:55:04 +0000 Received: from support.bugseng.com (mail.bugseng.com [162.55.131.47]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id e04f4137-1192-11ee-b237-6b7b168915f2; Fri, 23 Jun 2023 08:55:02 +0200 (CEST) Received: from Dell.bugseng.com (unknown [37.163.242.22]) by support.bugseng.com (Postfix) with ESMTPSA id 3FE4D4EE0737; Fri, 23 Jun 2023 08:55:00 +0200 (CEST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: e04f4137-1192-11ee-b237-6b7b168915f2 From: Federico Serafini To: xen-devel@lists.xenproject.org Cc: consulting@bugseng.com, Federico Serafini , Stefano Stabellini , Julien Grall , Bertrand Marquis , Volodymyr Babchuk , Michal Orzel , Xenia Ragiadakou , Ayan Kumar Halder Subject: [XEN PATCH v2] xen/arm: fix violations of MISRA C:2012 R8.3 on parameter names. Date: Fri, 23 Jun 2023 08:54:49 +0200 Message-Id: <11c50030015014ff1a80dca849a4262133b2707a.1687502320.git.federico.serafini@bugseng.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZM-MESSAGEID: 1687503334367100001 Content-Type: text/plain; charset="utf-8" To comply with Rule 8.3 ("All declarations of an object or function shall use the same names and type qualifiers") change the parameter names in order to have function declarations consistent with the corresponding definitions. Change the function identifier 'access_guest_memory_by_ipa' to 'access_guest_memory_by_gpa' in accordance with modifications on its formal parameters: 'gpa' is used more frequently than 'ipa' and is therefore preferable. Signed-off-by: Federico Serafini --- Changes in v2: - adapted parameter names in function definitions to the names used in function declarations when the context requires it; - reflected changes to the function identifier in order to maintain consistency with modifications on parameter names; - extended changes to definitions under xen/arch/arm/vgic. --- xen/arch/arm/domain.c | 10 +++++----- xen/arch/arm/guest_walk.c | 6 +++--- xen/arch/arm/guestcopy.c | 2 +- xen/arch/arm/include/asm/fixmap.h | 2 +- xen/arch/arm/include/asm/gic.h | 2 +- xen/arch/arm/include/asm/gic_v3_its.h | 5 +++-- xen/arch/arm/include/asm/grant_table.h | 4 ++-- xen/arch/arm/include/asm/guest_access.h | 4 ++-- xen/arch/arm/include/asm/irq.h | 2 +- xen/arch/arm/include/asm/regs.h | 2 +- xen/arch/arm/include/asm/vgic.h | 4 ++-- xen/arch/arm/mm.c | 10 +++++----- xen/arch/arm/tee/optee.c | 10 +++++----- xen/arch/arm/vgic-v3-its.c | 16 ++++++++-------- xen/arch/arm/vgic/vgic-init.c | 12 ++++++------ 15 files changed, 46 insertions(+), 45 deletions(-) diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index add9929b79..8c18e92079 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -1155,15 +1155,15 @@ void vcpu_block_unless_event_pending(struct vcpu *v) vcpu_unblock(current); } =20 -void vcpu_kick(struct vcpu *vcpu) +void vcpu_kick(struct vcpu *v) { - bool running =3D vcpu->is_running; + bool running =3D v->is_running; =20 - vcpu_unblock(vcpu); - if ( running && vcpu !=3D current ) + vcpu_unblock(v); + if ( running && v !=3D current ) { perfc_incr(vcpu_kick); - smp_send_event_check_mask(cpumask_of(vcpu->processor)); + smp_send_event_check_mask(cpumask_of(v->processor)); } } =20 diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c index c80a0ce55b..d99b411f3b 100644 --- a/xen/arch/arm/guest_walk.c +++ b/xen/arch/arm/guest_walk.c @@ -85,7 +85,7 @@ static bool guest_walk_sd(const struct vcpu *v, paddr |=3D (gva & mask) >> 18; =20 /* Access the guest's memory to read only one PTE. */ - ret =3D access_guest_memory_by_ipa(d, paddr, &pte, sizeof(short_desc_t= ), false); + ret =3D access_guest_memory_by_gpa(d, paddr, &pte, sizeof(short_desc_t= ), false); if ( ret ) return false; =20 @@ -110,7 +110,7 @@ static bool guest_walk_sd(const struct vcpu *v, paddr =3D ((paddr_t)pte.walk.base << 10) | ((gva & mask) >> 10); =20 /* Access the guest's memory to read only one PTE. */ - ret =3D access_guest_memory_by_ipa(d, paddr, &pte, sizeof(short_de= sc_t), false); + ret =3D access_guest_memory_by_gpa(d, paddr, &pte, sizeof(short_de= sc_t), false); if ( ret ) return false; =20 @@ -481,7 +481,7 @@ static bool guest_walk_ld(const struct vcpu *v, paddr |=3D LPAE_TABLE_INDEX_GS(grainsizes[gran], level, gva) << 3; =20 /* Access the guest's memory to read only one PTE. */ - ret =3D access_guest_memory_by_ipa(d, paddr, &pte, sizeof(lpae_t),= false); + ret =3D access_guest_memory_by_gpa(d, paddr, &pte, sizeof(lpae_t),= false); if ( ret ) return false; =20 diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c index 225fd343dd..6716b03561 100644 --- a/xen/arch/arm/guestcopy.c +++ b/xen/arch/arm/guestcopy.c @@ -142,7 +142,7 @@ unsigned long copy_to_guest_phys_flush_dcache(struct do= main *d, COPY_to_guest | COPY_ipa | COPY_flush_dcache); } =20 -int access_guest_memory_by_ipa(struct domain *d, paddr_t gpa, void *buf, +int access_guest_memory_by_gpa(struct domain *d, paddr_t gpa, void *buf, uint32_t size, bool is_write) { unsigned long left; diff --git a/xen/arch/arm/include/asm/fixmap.h b/xen/arch/arm/include/asm/f= ixmap.h index d0c9a52c8c..734eb9b1d4 100644 --- a/xen/arch/arm/include/asm/fixmap.h +++ b/xen/arch/arm/include/asm/fixmap.h @@ -30,7 +30,7 @@ extern lpae_t xen_fixmap[XEN_PT_LPAE_ENTRIES]; =20 /* Map a page in a fixmap entry */ -extern void set_fixmap(unsigned int map, mfn_t mfn, unsigned int attribute= s); +extern void set_fixmap(unsigned int map, mfn_t mfn, unsigned int flags); /* Remove a mapping from a fixmap entry */ extern void clear_fixmap(unsigned int map); =20 diff --git a/xen/arch/arm/include/asm/gic.h b/xen/arch/arm/include/asm/gic.h index 76e3fa5dc4..f1ef347edc 100644 --- a/xen/arch/arm/include/asm/gic.h +++ b/xen/arch/arm/include/asm/gic.h @@ -257,7 +257,7 @@ int gic_remove_irq_from_guest(struct domain *d, unsigne= d int virq, extern void gic_clear_pending_irqs(struct vcpu *v); =20 extern void init_maintenance_interrupt(void); -extern void gic_raise_guest_irq(struct vcpu *v, unsigned int irq, +extern void gic_raise_guest_irq(struct vcpu *v, unsigned int virtual_irq, unsigned int priority); extern void gic_raise_inflight_irq(struct vcpu *v, unsigned int virtual_ir= q); =20 diff --git a/xen/arch/arm/include/asm/gic_v3_its.h b/xen/arch/arm/include/a= sm/gic_v3_its.h index fae3f6ecef..c24d4752d0 100644 --- a/xen/arch/arm/include/asm/gic_v3_its.h +++ b/xen/arch/arm/include/asm/gic_v3_its.h @@ -190,8 +190,9 @@ struct pending_irq *gicv3_its_get_event_pending_irq(str= uct domain *d, uint32_t eventid); int gicv3_remove_guest_event(struct domain *d, paddr_t vdoorbell_address, uint32_t vdevid, uint32_t eventid); -struct pending_irq *gicv3_assign_guest_event(struct domain *d, paddr_t doo= rbell, - uint32_t devid, uint32_t even= tid, +struct pending_irq *gicv3_assign_guest_event(struct domain *d, + paddr_t vdoorbell_address, + uint32_t vdevid, uint32_t eve= ntid, uint32_t virt_lpi); void gicv3_lpi_update_host_entry(uint32_t host_lpi, int domain_id, uint32_t virt_lpi); diff --git a/xen/arch/arm/include/asm/grant_table.h b/xen/arch/arm/include/= asm/grant_table.h index e13dfeefa5..c2b0dbc806 100644 --- a/xen/arch/arm/include/asm/grant_table.h +++ b/xen/arch/arm/include/asm/grant_table.h @@ -36,10 +36,10 @@ static inline bool gnttab_release_host_mappings(const s= truct domain *d) return true; } =20 -int create_grant_host_mapping(unsigned long gpaddr, mfn_t mfn, +int create_grant_host_mapping(unsigned long gpaddr, mfn_t frame, unsigned int flags, unsigned int cache_flags= ); int replace_grant_host_mapping(unsigned long gpaddr, mfn_t mfn, - unsigned long new_gpaddr, unsigned int flag= s); + unsigned long new_addr, unsigned int flags); =20 /* * The region used by Xen on the memory will never be mapped in DOM0 diff --git a/xen/arch/arm/include/asm/guest_access.h b/xen/arch/arm/include= /asm/guest_access.h index 4421e43611..18c88b70d7 100644 --- a/xen/arch/arm/include/asm/guest_access.h +++ b/xen/arch/arm/include/asm/guest_access.h @@ -12,11 +12,11 @@ unsigned long raw_clear_guest(void *to, unsigned int le= n); =20 /* Copy data to guest physical address, then clean the region. */ unsigned long copy_to_guest_phys_flush_dcache(struct domain *d, - paddr_t phys, + paddr_t gpa, void *buf, unsigned int len); =20 -int access_guest_memory_by_ipa(struct domain *d, paddr_t ipa, void *buf, +int access_guest_memory_by_gpa(struct domain *d, paddr_t gpa, void *buf, uint32_t size, bool is_write); =20 #define __raw_copy_to_guest raw_copy_to_guest diff --git a/xen/arch/arm/include/asm/irq.h b/xen/arch/arm/include/asm/irq.h index 11bc85d111..105b33b37d 100644 --- a/xen/arch/arm/include/asm/irq.h +++ b/xen/arch/arm/include/asm/irq.h @@ -76,7 +76,7 @@ void init_IRQ(void); =20 int route_irq_to_guest(struct domain *d, unsigned int virq, unsigned int irq, const char *devname); -int release_guest_irq(struct domain *d, unsigned int irq); +int release_guest_irq(struct domain *d, unsigned int virq); =20 void arch_move_irqs(struct vcpu *v); =20 diff --git a/xen/arch/arm/include/asm/regs.h b/xen/arch/arm/include/asm/reg= s.h index 0693a68131..ef34b38aa1 100644 --- a/xen/arch/arm/include/asm/regs.h +++ b/xen/arch/arm/include/asm/regs.h @@ -58,7 +58,7 @@ static inline bool guest_mode(const struct cpu_user_regs = *r) } =20 register_t get_user_reg(struct cpu_user_regs *regs, int reg); -void set_user_reg(struct cpu_user_regs *regs, int reg, register_t val); +void set_user_reg(struct cpu_user_regs *regs, int reg, register_t value); =20 #endif =20 diff --git a/xen/arch/arm/include/asm/vgic.h b/xen/arch/arm/include/asm/vgi= c.h index 328fd46d1b..aa9f49409e 100644 --- a/xen/arch/arm/include/asm/vgic.h +++ b/xen/arch/arm/include/asm/vgic.h @@ -355,8 +355,8 @@ bool vgic_evtchn_irq_pending(struct vcpu *v); int domain_vgic_register(struct domain *d, int *mmio_count); int domain_vgic_init(struct domain *d, unsigned int nr_spis); void domain_vgic_free(struct domain *d); -int vcpu_vgic_init(struct vcpu *vcpu); -int vcpu_vgic_free(struct vcpu *vcpu); +int vcpu_vgic_init(struct vcpu *v); +int vcpu_vgic_free(struct vcpu *v); =20 void vgic_inject_irq(struct domain *d, struct vcpu *v, unsigned int virq, bool level); diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c index e460249736..2e9860a754 100644 --- a/xen/arch/arm/mm.c +++ b/xen/arch/arm/mm.c @@ -736,10 +736,10 @@ void *__init arch_vmap_virt_end(void) * This function should only be used to remap device address ranges * TODO: add a check to verify this assumption */ -void *ioremap_attr(paddr_t pa, size_t len, unsigned int attributes) +void *ioremap_attr(paddr_t start, size_t len, unsigned int attributes) { - mfn_t mfn =3D _mfn(PFN_DOWN(pa)); - unsigned int offs =3D pa & (PAGE_SIZE - 1); + mfn_t mfn =3D _mfn(PFN_DOWN(start)); + unsigned int offs =3D start & (PAGE_SIZE - 1); unsigned int nr =3D PFN_UP(offs + len); void *ptr =3D __vmap(&mfn, nr, 1, 1, attributes, VMAP_DEFAULT); =20 @@ -1579,7 +1579,7 @@ void put_page_type(struct page_info *page) return; } =20 -int create_grant_host_mapping(unsigned long addr, mfn_t frame, +int create_grant_host_mapping(unsigned long gpaddr, mfn_t frame, unsigned int flags, unsigned int cache_flags) { int rc; @@ -1591,7 +1591,7 @@ int create_grant_host_mapping(unsigned long addr, mfn= _t frame, if ( flags & GNTMAP_readonly ) t =3D p2m_grant_map_ro; =20 - rc =3D guest_physmap_add_entry(current->domain, gaddr_to_gfn(addr), + rc =3D guest_physmap_add_entry(current->domain, gaddr_to_gfn(gpaddr), frame, 0, t); =20 if ( rc ) diff --git a/xen/arch/arm/tee/optee.c b/xen/arch/arm/tee/optee.c index 9cb9f16d43..301d205a36 100644 --- a/xen/arch/arm/tee/optee.c +++ b/xen/arch/arm/tee/optee.c @@ -951,7 +951,7 @@ static bool copy_std_request(struct cpu_user_regs *regs, =20 map_xen_arg(call); =20 - if ( access_guest_memory_by_ipa(current->domain, call->guest_arg_ipa, + if ( access_guest_memory_by_gpa(current->domain, call->guest_arg_ipa, call->xen_arg, OPTEE_MSG_NONCONTIG_PAGE_SIZE, false) ) { @@ -1106,7 +1106,7 @@ static int handle_rpc_return(struct optee_domain *ctx, =20 shm_rpc->xen_arg =3D __map_domain_page(shm_rpc->xen_arg_pg); =20 - if ( access_guest_memory_by_ipa(current->domain, + if ( access_guest_memory_by_gpa(current->domain, gfn_to_gaddr(shm_rpc->gfn), shm_rpc->xen_arg, OPTEE_MSG_GET_ARG_SIZE(shm_rpc->xen_arg->num_param= s), @@ -1329,7 +1329,7 @@ static bool issue_rpc_cmd_free(struct optee_domain *c= tx, shm_rpc->xen_arg->params[0].u.value.a =3D call->rpc_buffer_type; shm_rpc->xen_arg->params[0].u.value.b =3D cookie; =20 - if ( access_guest_memory_by_ipa(current->domain, + if ( access_guest_memory_by_gpa(current->domain, gfn_to_gaddr(shm_rpc->gfn), shm_rpc->xen_arg, OPTEE_MSG_GET_ARG_SIZE(1), @@ -1462,7 +1462,7 @@ static void handle_rpc_cmd(struct optee_domain *ctx, = struct cpu_user_regs *regs, shm_rpc->xen_arg =3D __map_domain_page(shm_rpc->xen_arg_pg); =20 /* First, copy only header to read number of arguments */ - if ( access_guest_memory_by_ipa(current->domain, + if ( access_guest_memory_by_gpa(current->domain, gfn_to_gaddr(shm_rpc->gfn), shm_rpc->xen_arg, sizeof(struct optee_msg_arg), @@ -1480,7 +1480,7 @@ static void handle_rpc_cmd(struct optee_domain *ctx, = struct cpu_user_regs *regs, } =20 /* Read the whole command structure */ - if ( access_guest_memory_by_ipa(current->domain, gfn_to_gaddr(shm_rpc-= >gfn), + if ( access_guest_memory_by_gpa(current->domain, gfn_to_gaddr(shm_rpc-= >gfn), shm_rpc->xen_arg, arg_size, false) ) { shm_rpc->xen_arg->ret =3D TEEC_ERROR_GENERIC; diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c index 299b384250..05429030b5 100644 --- a/xen/arch/arm/vgic-v3-its.c +++ b/xen/arch/arm/vgic-v3-its.c @@ -121,7 +121,7 @@ static int its_set_collection(struct virt_its *its, uin= t16_t collid, if ( collid >=3D its->max_collections ) return -ENOENT; =20 - return access_guest_memory_by_ipa(its->d, + return access_guest_memory_by_gpa(its->d, addr + collid * sizeof(coll_table_en= try_t), &vcpu_id, sizeof(vcpu_id), true); } @@ -139,7 +139,7 @@ static struct vcpu *get_vcpu_from_collection(struct vir= t_its *its, if ( collid >=3D its->max_collections ) return NULL; =20 - ret =3D access_guest_memory_by_ipa(its->d, + ret =3D access_guest_memory_by_gpa(its->d, addr + collid * sizeof(coll_table_ent= ry_t), &vcpu_id, sizeof(coll_table_entry_t),= false); if ( ret ) @@ -161,7 +161,7 @@ static int its_set_itt_address(struct virt_its *its, ui= nt32_t devid, if ( devid >=3D its->max_devices ) return -ENOENT; =20 - return access_guest_memory_by_ipa(its->d, + return access_guest_memory_by_gpa(its->d, addr + devid * sizeof(dev_table_entr= y_t), &itt_entry, sizeof(itt_entry), true); } @@ -179,7 +179,7 @@ static int its_get_itt(struct virt_its *its, uint32_t d= evid, if ( devid >=3D its->max_devices ) return -EINVAL; =20 - return access_guest_memory_by_ipa(its->d, + return access_guest_memory_by_gpa(its->d, addr + devid * sizeof(dev_table_entr= y_t), itt, sizeof(*itt), false); } @@ -226,7 +226,7 @@ static bool read_itte(struct virt_its *its, uint32_t de= vid, uint32_t evid, if ( addr =3D=3D INVALID_PADDR ) return false; =20 - if ( access_guest_memory_by_ipa(its->d, addr, &itte, sizeof(itte), fal= se) ) + if ( access_guest_memory_by_gpa(its->d, addr, &itte, sizeof(itte), fal= se) ) return false; =20 vcpu =3D get_vcpu_from_collection(its, itte.collection); @@ -260,7 +260,7 @@ static bool write_itte(struct virt_its *its, uint32_t d= evid, itte.collection =3D collid; itte.vlpi =3D vlpi; =20 - if ( access_guest_memory_by_ipa(its->d, addr, &itte, sizeof(itte), tru= e) ) + if ( access_guest_memory_by_gpa(its->d, addr, &itte, sizeof(itte), tru= e) ) return false; =20 return true; @@ -405,7 +405,7 @@ static int update_lpi_property(struct domain *d, struct= pending_irq *p) =20 addr =3D d->arch.vgic.rdist_propbase & GENMASK(51, 12); =20 - ret =3D access_guest_memory_by_ipa(d, addr + p->irq - LPI_OFFSET, + ret =3D access_guest_memory_by_gpa(d, addr + p->irq - LPI_OFFSET, &property, sizeof(property), false); if ( ret ) return ret; @@ -910,7 +910,7 @@ static int vgic_its_handle_cmds(struct domain *d, struc= t virt_its *its) { int ret; =20 - ret =3D access_guest_memory_by_ipa(d, addr + its->creadr, + ret =3D access_guest_memory_by_gpa(d, addr + its->creadr, command, sizeof(command), false); if ( ret ) return ret; diff --git a/xen/arch/arm/vgic/vgic-init.c b/xen/arch/arm/vgic/vgic-init.c index ea739d081e..76b85ea823 100644 --- a/xen/arch/arm/vgic/vgic-init.c +++ b/xen/arch/arm/vgic/vgic-init.c @@ -196,16 +196,16 @@ int domain_vgic_init(struct domain *d, unsigned int n= r_spis) * vcpu_vgic_init() - Register VCPU-specific KVM iodevs * was: kvm_vgic_vcpu_init() * Xen: adding vgic_vx_enable() call - * @vcpu: pointer to the VCPU being created and initialized + * @v: pointer to the VCPU being created and initialized */ -int vcpu_vgic_init(struct vcpu *vcpu) +int vcpu_vgic_init(struct vcpu *v) { int ret =3D 0; =20 - vgic_vcpu_early_init(vcpu); + vgic_vcpu_early_init(v); =20 if ( gic_hw_version() =3D=3D GIC_V2 ) - vgic_v2_enable(vcpu); + vgic_v2_enable(v); else ret =3D -ENXIO; =20 @@ -239,9 +239,9 @@ void domain_vgic_free(struct domain *d) dist->nr_spis =3D 0; } =20 -int vcpu_vgic_free(struct vcpu *vcpu) +int vcpu_vgic_free(struct vcpu *v) { - struct vgic_cpu *vgic_cpu =3D &vcpu->arch.vgic; + struct vgic_cpu *vgic_cpu =3D &v->arch.vgic; =20 INIT_LIST_HEAD(&vgic_cpu->ap_list_head); =20 --=20 2.34.1