Length rather than size, to be consistent with FF-A spec.
Bug: 132420445
Change-Id: I9285986d947fbc43ac9de19ea4c2c9c96c44c4b7
diff --git a/inc/hf/ffa_memory.h b/inc/hf/ffa_memory.h
index c133f76..30be4d8 100644
--- a/inc/hf/ffa_memory.h
+++ b/inc/hf/ffa_memory.h
@@ -23,11 +23,11 @@
struct ffa_value ffa_memory_send(struct vm *to, struct vm_locked from_locked,
struct ffa_memory_region *memory_region,
- uint32_t memory_share_size,
+ uint32_t memory_share_length,
uint32_t share_func, struct mpool *page_pool);
struct ffa_value ffa_memory_retrieve(struct vm_locked to_locked,
struct ffa_memory_region *retrieve_request,
- uint32_t retrieve_request_size,
+ uint32_t retrieve_request_length,
struct mpool *page_pool);
struct ffa_value ffa_memory_relinquish(
struct vm_locked from_locked,
diff --git a/src/ffa_memory.c b/src/ffa_memory.c
index 30aa863..6ca8a51 100644
--- a/src/ffa_memory.c
+++ b/src/ffa_memory.c
@@ -1091,13 +1091,13 @@
*/
static struct ffa_value ffa_memory_send_validate(
struct vm *to, struct vm_locked from_locked,
- struct ffa_memory_region *memory_region, uint32_t memory_share_size,
+ struct ffa_memory_region *memory_region, uint32_t memory_share_length,
uint32_t share_func, bool *clear,
ffa_memory_access_permissions_t *permissions)
{
struct ffa_composite_memory_region *composite;
- uint32_t receivers_size;
- uint32_t constituents_size;
+ uint32_t receivers_length;
+ uint32_t constituents_length;
enum ffa_data_access data_access;
enum ffa_instruction_access instruction_access;
@@ -1120,13 +1120,13 @@
* Ensure that the composite header is within the memory bounds and
* doesn't overlap the first part of the message.
*/
- receivers_size = sizeof(struct ffa_memory_access) *
- memory_region->receiver_count;
+ receivers_length = sizeof(struct ffa_memory_access) *
+ memory_region->receiver_count;
if (memory_region->receivers[0].composite_memory_region_offset <
- sizeof(struct ffa_memory_region) + receivers_size ||
+ sizeof(struct ffa_memory_region) + receivers_length ||
memory_region->receivers[0].composite_memory_region_offset +
sizeof(struct ffa_composite_memory_region) >=
- memory_share_size) {
+ memory_share_length) {
dlog_verbose(
"Invalid composite memory region descriptor offset.\n");
return ffa_error(FFA_INVALID_PARAMETERS);
@@ -1137,14 +1137,14 @@
/*
* Ensure the number of constituents are within the memory bounds.
*/
- constituents_size = sizeof(struct ffa_memory_region_constituent) *
- composite->constituent_count;
- if (memory_share_size !=
+ constituents_length = sizeof(struct ffa_memory_region_constituent) *
+ composite->constituent_count;
+ if (memory_share_length !=
memory_region->receivers[0].composite_memory_region_offset +
sizeof(struct ffa_composite_memory_region) +
- constituents_size) {
- dlog_verbose("Invalid size %d or constituent offset %d.\n",
- memory_share_size,
+ constituents_length) {
+ dlog_verbose("Invalid length %d or constituent offset %d.\n",
+ memory_share_length,
memory_region->receivers[0]
.composite_memory_region_offset);
return ffa_error(FFA_INVALID_PARAMETERS);
@@ -1245,7 +1245,7 @@
*/
struct ffa_value ffa_memory_send(struct vm *to, struct vm_locked from_locked,
struct ffa_memory_region *memory_region,
- uint32_t memory_share_size,
+ uint32_t memory_share_length,
uint32_t share_func, struct mpool *page_pool)
{
struct ffa_composite_memory_region *composite;
@@ -1260,7 +1260,7 @@
* after all.
*/
ret = ffa_memory_send_validate(to, from_locked, memory_region,
- memory_share_size, share_func, &clear,
+ memory_share_length, share_func, &clear,
&permissions);
if (ret.func != FFA_SUCCESS_32) {
mpool_free(page_pool, memory_region);
@@ -1323,10 +1323,10 @@
struct ffa_value ffa_memory_retrieve(struct vm_locked to_locked,
struct ffa_memory_region *retrieve_request,
- uint32_t retrieve_request_size,
+ uint32_t retrieve_request_length,
struct mpool *page_pool)
{
- uint32_t expected_retrieve_request_size =
+ uint32_t expected_retrieve_request_length =
sizeof(struct ffa_memory_region) +
retrieve_request->receiver_count *
sizeof(struct ffa_memory_access);
@@ -1347,15 +1347,16 @@
struct share_states_locked share_states;
struct ffa_memory_share_state *share_state;
struct ffa_value ret;
- uint32_t response_size;
+ uint32_t response_length;
dump_share_states();
- if (retrieve_request_size != expected_retrieve_request_size) {
+ if (retrieve_request_length != expected_retrieve_request_length) {
dlog_verbose(
"Invalid length for FFA_MEM_RETRIEVE_REQ, expected %d "
"but was %d.\n",
- expected_retrieve_request_size, retrieve_request_size);
+ expected_retrieve_request_length,
+ retrieve_request_length);
return ffa_error(FFA_INVALID_PARAMETERS);
}
@@ -1547,12 +1548,12 @@
* must be done before the share_state is (possibly) freed.
*/
/* TODO: combine attributes from sender and request. */
- response_size = ffa_retrieved_memory_region_init(
+ response_length = ffa_retrieved_memory_region_init(
to_locked.vm->mailbox.recv, HF_MAILBOX_SIZE,
memory_region->sender, memory_region->attributes,
memory_region->flags, handle, to_locked.vm->id, permissions,
composite->constituents, composite->constituent_count);
- to_locked.vm->mailbox.recv_size = response_size;
+ to_locked.vm->mailbox.recv_size = response_length;
to_locked.vm->mailbox.recv_sender = HF_HYPERVISOR_VM_ID;
to_locked.vm->mailbox.recv_func = FFA_MEM_RETRIEVE_RESP_32;
to_locked.vm->mailbox.state = MAILBOX_STATE_READ;
@@ -1569,8 +1570,8 @@
}
ret = (struct ffa_value){.func = FFA_MEM_RETRIEVE_RESP_32,
- .arg1 = response_size,
- .arg2 = response_size};
+ .arg1 = response_length,
+ .arg2 = response_length};
out:
share_states_unlock(&share_states);