From: Leif Lindholm <leif.lindholm@linaro.org>
To: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: edk2-devel@lists.01.org, lersek@redhat.com
Subject: Re: [PATCH 1/5] ArmPkg/ArmMmuLib AARCH64: use correct return type for exported functions
Date: Mon, 6 Mar 2017 14:57:59 +0000 [thread overview]
Message-ID: <20170306145759.GW16034@bivouac.eciton.net> (raw)
In-Reply-To: <1488385903-30267-2-git-send-email-ard.biesheuvel@linaro.org>
On Wed, Mar 01, 2017 at 04:31:39PM +0000, Ard Biesheuvel wrote:
> The routines ArmConfigureMmu() and SetMemoryAttributes() [*] are
> declared as returning EFI_STATUS in the respective header files,
> so align the definitions with that.
>
Ouch. Well, in general, this is just not very EDK2:ish.
> * SetMemoryAttributes() is declared in the wrong header (and defined in
> ArmMmuLib for AARCH64 and in CpuDxe for ARM)
>
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
No need to wait for rest of series (or prereqs for), this one stands alone.
> ---
> ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c | 52 ++++++++++----------
> 1 file changed, 26 insertions(+), 26 deletions(-)
>
> diff --git a/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c b/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c
> index 2f8f99d44a31..df170d20a2c2 100644
> --- a/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c
> +++ b/ArmPkg/Library/ArmMmuLib/AArch64/ArmMmuLibCore.c
> @@ -329,7 +329,7 @@ GetBlockEntryListFromAddress (
> }
>
> STATIC
> -RETURN_STATUS
> +EFI_STATUS
> UpdateRegionMapping (
> IN UINT64 *RootTable,
> IN UINT64 RegionStart,
> @@ -347,7 +347,7 @@ UpdateRegionMapping (
> // Ensure the Length is aligned on 4KB boundary
> if ((RegionLength == 0) || ((RegionLength & (SIZE_4KB - 1)) != 0)) {
> ASSERT_EFI_ERROR (EFI_INVALID_PARAMETER);
> - return RETURN_INVALID_PARAMETER;
> + return EFI_INVALID_PARAMETER;
> }
>
> do {
> @@ -357,7 +357,7 @@ UpdateRegionMapping (
> BlockEntry = GetBlockEntryListFromAddress (RootTable, RegionStart, &TableLevel, &BlockEntrySize, &LastBlockEntry);
> if (BlockEntry == NULL) {
> // GetBlockEntryListFromAddress() return NULL when it fails to allocate new pages from the Translation Tables
> - return RETURN_OUT_OF_RESOURCES;
> + return EFI_OUT_OF_RESOURCES;
> }
>
> if (TableLevel != 3) {
> @@ -385,11 +385,11 @@ UpdateRegionMapping (
> } while ((RegionLength >= BlockEntrySize) && (BlockEntry <= LastBlockEntry));
> } while (RegionLength != 0);
>
> - return RETURN_SUCCESS;
> + return EFI_SUCCESS;
> }
>
> STATIC
> -RETURN_STATUS
> +EFI_STATUS
> FillTranslationTable (
> IN UINT64 *RootTable,
> IN ARM_MEMORY_REGION_DESCRIPTOR *MemoryRegion
> @@ -446,7 +446,7 @@ GcdAttributeToPageAttribute (
> return PageAttributes | TT_AF;
> }
>
> -RETURN_STATUS
> +EFI_STATUS
> SetMemoryAttributes (
> IN EFI_PHYSICAL_ADDRESS BaseAddress,
> IN UINT64 Length,
> @@ -454,7 +454,7 @@ SetMemoryAttributes (
> IN EFI_PHYSICAL_ADDRESS VirtualMask
> )
> {
> - RETURN_STATUS Status;
> + EFI_STATUS Status;
> UINT64 *TranslationTable;
> UINT64 PageAttributes;
> UINT64 PageAttributeMask;
> @@ -480,18 +480,18 @@ SetMemoryAttributes (
> Length,
> PageAttributes,
> PageAttributeMask);
> - if (RETURN_ERROR (Status)) {
> + if (EFI_ERROR (Status)) {
> return Status;
> }
>
> // Invalidate all TLB entries so changes are synced
> ArmInvalidateTlb ();
>
> - return RETURN_SUCCESS;
> + return EFI_SUCCESS;
> }
>
> STATIC
> -RETURN_STATUS
> +EFI_STATUS
> SetMemoryRegionAttribute (
> IN EFI_PHYSICAL_ADDRESS BaseAddress,
> IN UINT64 Length,
> @@ -499,23 +499,23 @@ SetMemoryRegionAttribute (
> IN UINT64 BlockEntryMask
> )
> {
> - RETURN_STATUS Status;
> + EFI_STATUS Status;
> UINT64 *RootTable;
>
> RootTable = ArmGetTTBR0BaseAddress ();
>
> Status = UpdateRegionMapping (RootTable, BaseAddress, Length, Attributes, BlockEntryMask);
> - if (RETURN_ERROR (Status)) {
> + if (EFI_ERROR (Status)) {
> return Status;
> }
>
> // Invalidate all TLB entries so changes are synced
> ArmInvalidateTlb ();
>
> - return RETURN_SUCCESS;
> + return EFI_SUCCESS;
> }
>
> -RETURN_STATUS
> +EFI_STATUS
> ArmSetMemoryRegionNoExec (
> IN EFI_PHYSICAL_ADDRESS BaseAddress,
> IN UINT64 Length
> @@ -536,7 +536,7 @@ ArmSetMemoryRegionNoExec (
> ~TT_ADDRESS_MASK_BLOCK_ENTRY);
> }
>
> -RETURN_STATUS
> +EFI_STATUS
> ArmClearMemoryRegionNoExec (
> IN EFI_PHYSICAL_ADDRESS BaseAddress,
> IN UINT64 Length
> @@ -554,7 +554,7 @@ ArmClearMemoryRegionNoExec (
> Mask);
> }
>
> -RETURN_STATUS
> +EFI_STATUS
> ArmSetMemoryRegionReadOnly (
> IN EFI_PHYSICAL_ADDRESS BaseAddress,
> IN UINT64 Length
> @@ -567,7 +567,7 @@ ArmSetMemoryRegionReadOnly (
> ~TT_ADDRESS_MASK_BLOCK_ENTRY);
> }
>
> -RETURN_STATUS
> +EFI_STATUS
> ArmClearMemoryRegionReadOnly (
> IN EFI_PHYSICAL_ADDRESS BaseAddress,
> IN UINT64 Length
> @@ -580,7 +580,7 @@ ArmClearMemoryRegionReadOnly (
> ~(TT_ADDRESS_MASK_BLOCK_ENTRY | TT_AP_MASK));
> }
>
> -RETURN_STATUS
> +EFI_STATUS
> EFIAPI
> ArmConfigureMmu (
> IN ARM_MEMORY_REGION_DESCRIPTOR *MemoryTable,
> @@ -594,11 +594,11 @@ ArmConfigureMmu (
> UINTN T0SZ;
> UINTN RootTableEntryCount;
> UINT64 TCR;
> - RETURN_STATUS Status;
> + EFI_STATUS Status;
>
> if(MemoryTable == NULL) {
> ASSERT (MemoryTable != NULL);
> - return RETURN_INVALID_PARAMETER;
> + return EFI_INVALID_PARAMETER;
> }
>
> // Cover the entire GCD memory space
> @@ -632,7 +632,7 @@ ArmConfigureMmu (
> } else {
> DEBUG ((EFI_D_ERROR, "ArmConfigureMmu: The MaxAddress 0x%lX is not supported by this MMU configuration.\n", MaxAddress));
> ASSERT (0); // Bigger than 48-bit memory space are not supported
> - return RETURN_UNSUPPORTED;
> + return EFI_UNSUPPORTED;
> }
> } else if (ArmReadCurrentEL () == AARCH64_EL1) {
> // Due to Cortex-A57 erratum #822227 we must set TG1[1] == 1, regardless of EPD1.
> @@ -654,11 +654,11 @@ ArmConfigureMmu (
> } else {
> DEBUG ((EFI_D_ERROR, "ArmConfigureMmu: The MaxAddress 0x%lX is not supported by this MMU configuration.\n", MaxAddress));
> ASSERT (0); // Bigger than 48-bit memory space are not supported
> - return RETURN_UNSUPPORTED;
> + return EFI_UNSUPPORTED;
> }
> } else {
> ASSERT (0); // UEFI is only expected to run at EL2 and EL1, not EL3.
> - return RETURN_UNSUPPORTED;
> + return EFI_UNSUPPORTED;
> }
>
> //
> @@ -680,7 +680,7 @@ ArmConfigureMmu (
> // Allocate pages for translation table
> TranslationTable = AllocatePages (1);
> if (TranslationTable == NULL) {
> - return RETURN_OUT_OF_RESOURCES;
> + return EFI_OUT_OF_RESOURCES;
> }
> // We set TTBR0 just after allocating the table to retrieve its location from the subsequent
> // functions without needing to pass this value across the functions. The MMU is only enabled
> @@ -719,7 +719,7 @@ ArmConfigureMmu (
> DEBUG_CODE_END ();
>
> Status = FillTranslationTable (TranslationTable, MemoryTable);
> - if (RETURN_ERROR (Status)) {
> + if (EFI_ERROR (Status)) {
> goto FREE_TRANSLATION_TABLE;
> }
> MemoryTable++;
> @@ -739,7 +739,7 @@ ArmConfigureMmu (
> ArmEnableDataCache ();
>
> ArmEnableMmu ();
> - return RETURN_SUCCESS;
> + return EFI_SUCCESS;
>
> FREE_TRANSLATION_TABLE:
> FreePages (TranslationTable, 1);
> --
> 2.7.4
>
next prev parent reply other threads:[~2017-03-06 14:58 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-03-01 16:31 [PATCH 0/5] ArmPkg, ArmVirtPkg ARM: enable non-executable stack Ard Biesheuvel
2017-03-01 16:31 ` [PATCH 1/5] ArmPkg/ArmMmuLib AARCH64: use correct return type for exported functions Ard Biesheuvel
2017-03-06 14:57 ` Leif Lindholm [this message]
2017-03-01 16:31 ` [PATCH 2/5] ArmPkg: move ARM version of SetMemoryAttributes to ArmMmuLib Ard Biesheuvel
2017-03-06 16:03 ` Leif Lindholm
2017-03-06 16:05 ` Ard Biesheuvel
2017-03-06 16:21 ` Leif Lindholm
2017-03-01 16:31 ` [PATCH 3/5] ArmPkg/ArmMmuLib: remove VirtualMask arg from ArmSetMemoryAttributes Ard Biesheuvel
2017-03-06 16:06 ` Leif Lindholm
2017-03-01 16:31 ` [PATCH 4/5] ArmPkg/ArmMmuLib ARM: implement memory permission control routines Ard Biesheuvel
2017-03-06 16:11 ` Leif Lindholm
2017-03-01 16:31 ` [PATCH 5/5] ArmVirtPkg: enable non-executable DXE stack for all platforms Ard Biesheuvel
2017-03-01 19:10 ` Laszlo Ersek
2017-03-01 19:10 ` Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170306145759.GW16034@bivouac.eciton.net \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox