[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v1 1/3] x86: x86_emulate: address violations of MISRA C Rule 19.1


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: <victorm.lira@xxxxxxx>
  • Date: Fri, 25 Apr 2025 16:42:36 -0700
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=N7c+2iaVkAQtkWehQ13fcy/pOtZ7NzflbIurrJtmhsw=; b=ton7HMwRj3/sggU1/lzrgsD2JGC+6w6kZ0Rszu4sT+BxiuioO3MS37xG6dkE+lqqp39XfVvdZiM6+F48WE3AOoWqjp7xy3Qu+UnTNmUsxB3DkviWZ/QpbAX0gXRCqmoZyMTuJj0kCKQW3MuFToGxm13UMxQUZdz9LH1mGvxVWY6y9z5r09mAG3L1O+hf47RoukVBSZN2QQ/B0DEBa0gphHboJDVSCBX0eZZFYCIpyfhVcmDwAfD3O8EyPl6GiC4AKqG5awG15BIeQVsMnhASnpZeMvUDhV4R74aGrmMQFTOBKKPuXol8Wo89elg4titVuDVc2opgpeXKN3v7oBRdJQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=hlOIj9rznXBaAV6/STA8DdCZy96od1IYBHYtotRxc/RyF1GQb602oHc90vh44fTZexmPYmMR4Ene+nv19Fj7ZJH1Jj3BLWuXjCpaaqdU8dJWRIH4m6qnh82jzeSOu1fj00MtGqMI3GF+iuNtWHqMl56gEBG5k+Hy0Xy5YL9lWkU0w708YZhNwXORK3y7xMs4RfLOhkEeA4DRhigII5LlNL8raTUMx3suWXJ0v5hFqcFdyZVPbu7OVH7FdDU9kLHAYW5CLnwolSY6Nw9PwXNIoloU9/xbW9UPLFYK3xkfh7DAMhbZQ02yigieAMFiEQ4XOgSVYqY49HN+dOXdjfli6Q==
  • Cc: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>, Federico Serafini <federico.serafini@xxxxxxxxxxx>, Victor Lira <victorm.lira@xxxxxxx>, "Andrew Cooper" <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, "Stefano Stabellini" <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>
  • Delivery-date: Fri, 25 Apr 2025 23:43:40 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

From: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>

Rule 19.1 states: "An object shall not be assigned or copied
to an overlapping object". Since the "call" and "compat_call" are
fields of the same union, reading from one member and writing to
the other violates the rule, while not causing Undefined Behavior
due to their relative sizes. However, a dummy variables are used to
address the violations and prevent the future possibility of
incurring in UB.

No functional change.

Signed-off-by: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
Signed-off-by: Federico Serafini <federico.serafini@xxxxxxxxxxx>
Signed-off-by: Victor Lira <victorm.lira@xxxxxxx>
---
Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Cc: Anthony PERARD <anthony.perard@xxxxxxxxxx>
Cc: Michal Orzel <michal.orzel@xxxxxxx>
Cc: Jan Beulich <jbeulich@xxxxxxxx>
Cc: Julien Grall <julien@xxxxxxx>
Cc: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>
Cc: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
Cc: Federico Serafini <federico.serafini@xxxxxxxxxxx>
Cc: Bertrand Marquis <bertrand.marquis@xxxxxxx>
---
 xen/arch/x86/x86_emulate/x86_emulate.c | 21 ++++++++++++++++++---
 1 file changed, 18 insertions(+), 3 deletions(-)

diff --git a/xen/arch/x86/x86_emulate/x86_emulate.c 
b/xen/arch/x86/x86_emulate/x86_emulate.c
index 8e14ebb35b..44dc3039f3 100644
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -526,9 +526,19 @@ static inline void put_loop_count(
          */                                                             \
         if ( !amd_like(ctxt) && mode_64bit() && ad_bytes == 4 )         \
         {                                                               \
+            uint64_t tmp;                                               \
+                                                                        \
             _regs.r(cx) = 0;                                            \
-            if ( extend_si ) _regs.r(si) = _regs.esi;                   \
-            if ( extend_di ) _regs.r(di) = _regs.edi;                   \
+            if ( extend_si )                                            \
+            {                                                           \
+                tmp = _regs.esi;                                        \
+                _regs.r(si) = tmp;                                      \
+            }                                                           \
+            if ( extend_di )                                            \
+            {                                                           \
+                tmp = _regs.edi;                                        \
+                _regs.r(di) = tmp;                                      \
+            }                                                           \
         }                                                               \
         goto complete_insn;                                             \
     }                                                                   \
@@ -2029,7 +2039,12 @@ x86_emulate(
         switch ( op_bytes )
         {
         case 2: _regs.ax = (int8_t)_regs.ax; break; /* cbw */
-        case 4: _regs.r(ax) = (uint32_t)(int16_t)_regs.ax; break; /* cwde */
+        case 4:
+            {
+                uint32_t tmp = (uint32_t)(int16_t)_regs.ax;
+                _regs.r(ax) = tmp;
+                break; /* cwde */
+            }
         case 8: _regs.r(ax) = (int32_t)_regs.r(ax); break; /* cdqe */
         }
         break;
--
2.47.0



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.