[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH v2] misra: address violation of MISRA C Rule 10.1


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Dmytro Prokopchuk1 <dmytro_prokopchuk1@xxxxxxxx>
  • Date: Fri, 11 Jul 2025 11:52:40 +0000
  • Accept-language: en-US, uk-UA, ru-RU
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xGlg/ic7k5PoP8yMhjTfN8rOoU4Z4OZQd8SmQ3FK/fc=; b=mNfgLSuJf2jGTSfdg2cVDBDy4XMMeLfYYBMVxKIkdyzrTqv7xx3J4kFRV57N17ePsxbxVVjQlKwajbVfITk/edewUaVSnZu7Ir2QnhwKrdO0jvdp/0sL/N5Bqor8OHDShBbI9VmeGl4n/SMNbNoPRrQ5CVGJWnyPFNx0XcRPjuVgeGOUHmNp0lf+YetBwMeXy46Gf7zjC/apj6AraMce9XJ/tDJAgZk/3MKiP8A8XVCRC8HzdJmI10bdrL7PVez0cePThdV2WLdZgV7rBz33hi/YIL5N/1X42n8PjrseyjcsnACHnQt7qMXCvl1Pzge80Xpd7gZWw3K0kZZiUrhtpQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=oPqAcgQMse4UUTA6EZ+t4RyeffZH60j4OTPbvJq1rCdVvUg55ZcDFZZAYhskYl/B9/NpUnNWURFzrrt9TFtaCIF+LMKmWIyqcHpQ2KKsTTT6qDro6pnnTCdJGjoeufrJbIgGN465zmL63DkjE/rIDOUwpabjG+Rq9pTuUABeVhKvYR+M1jjK7FL7euURdoYVFfWE1QmCDPKuNATNmXy4+k09e+TdNLaEJ36K/heWwpQmzYA7b4MYtr8EWhA37WzM49pBVHtC/7eyRHjOd6OlfzMJp9DzK3xvVu86j/VmEzVGYXeuElAzUkf4lLlhce/gLFPvA5pUWcYKPUTvgbVpQw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Rahul Singh <rahul.singh@xxxxxxx>
  • Delivery-date: Fri, 11 Jul 2025 11:52:51 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHb8lj8U0c0yIOr5EqfSUQdGwVgzbQsz+YA
  • Thread-topic: [XEN PATCH v2] misra: address violation of MISRA C Rule 10.1

Hi All.

In this 2nd version I made changes according to the
https://patchew.org/Xen/d92cf08a64d8197a1d1a45f901e59183105d3da5.1752183472.git.dmytro._5Fprokopchuk1@xxxxxxxx/

There are 0 violations on the ARM64 as you can see in the report:
https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/people/dimaprkp4k/xen/ECLAIR_normal/fix_10.1_rule/ARM64/10650097988/PROJECT.ecd;/by_service.html#service&kind

Jan mentioned:
"As to the kind of change here - didn't we deviate applying unary minus
to unsigned types?"

Here is that deviation:
https://patchew.org/Xen/7c7b7a09e9d5ac1cc6f93fecacd8065fb6f25324.1745427770.git.victorm.lira@xxxxxxx/
As you can see from report
https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/people/dimaprkp4k/xen/ECLAIR_normal/deviate_10.1_rule/ARM64/10648749555/PROJECT.ecd;/by_service.html#service&kind
there are still 2 violations.
And they can be easily fixed.

So, Jan and Stefano,
which approach should we select?

BR, Dmytro.

On 7/11/25 14:43, Dmytro Prokopchuk1 wrote:
> Rule 10.1: Operands shall not be of an
> inappropriate essential type
>
> The following are non-compliant:
> - unary minus on unsigned type;
> - boolean used as a numeric value.
>
> Precede unary '-' operator with casting to signed type.
> Replace numeric constant '-1UL' with '~0UL'.
> Replace numeric constant '-1ULL' with '~0ULL'.
> Replace boolean with numeric value.
>
> Signed-off-by: Dmytro Prokopchuk <dmytro_prokopchuk1@xxxxxxxx>
> ---
> Changes since v1:
> - changed patch subject prefix
> - multiplication replaced with cast
> Link to v1: 
> https://patchew.org/Xen/d92cf08a64d8197a1d1a45f901e59183105d3da5.1752183472.git.dmytro._5Fprokopchuk1@xxxxxxxx/
> ---
>   xen/arch/arm/gic-vgic.c               | 2 +-
>   xen/common/memory.c                   | 2 +-
>   xen/common/page_alloc.c               | 6 +++---
>   xen/common/time.c                     | 2 +-
>   xen/drivers/passthrough/arm/smmu-v3.c | 2 +-
>   xen/lib/strtol.c                      | 2 +-
>   xen/lib/strtoll.c                     | 2 +-
>   7 files changed, 9 insertions(+), 9 deletions(-)
>
> diff --git a/xen/arch/arm/gic-vgic.c b/xen/arch/arm/gic-vgic.c
> index ea48c5375a..a35f33c5f2 100644
> --- a/xen/arch/arm/gic-vgic.c
> +++ b/xen/arch/arm/gic-vgic.c
> @@ -17,7 +17,7 @@
>   #include <asm/vgic.h>
>
>   #define lr_all_full()                                           \
> -    (this_cpu(lr_mask) == (-1ULL >> (64 - gic_get_nr_lrs())))
> +    (this_cpu(lr_mask) == (~0ULL >> (64 - gic_get_nr_lrs())))
>
>   #undef GIC_DEBUG
>
> diff --git a/xen/common/memory.c b/xen/common/memory.c
> index 46620ed825..0a5b3fab04 100644
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -773,7 +773,7 @@ static long 
> memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t) arg)
>
>                   nrspin_lock(&d->page_alloc_lock);
>                   drop_dom_ref = (dec_count &&
> -                                !domain_adjust_tot_pages(d, -dec_count));
> +                                !domain_adjust_tot_pages(d, 
> -(long)dec_count));
>                   nrspin_unlock(&d->page_alloc_lock);
>
>                   if ( drop_dom_ref )
> diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
> index 8f93a4c354..da8dddf934 100644
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -691,7 +691,7 @@ size_param("low_mem_virq_limit", opt_low_mem_virq);
>   /* Thresholds to control hysteresis. In pages */
>   /* When memory grows above this threshold, reset hysteresis.
>    * -1 initially to not reset until at least one virq issued. */
> -static unsigned long low_mem_virq_high      = -1UL;
> +static unsigned long low_mem_virq_high      = ~0UL;
>   /* Threshold at which we issue virq */
>   static unsigned long low_mem_virq_th        = 0;
>   /* Original threshold after all checks completed */
> @@ -710,7 +710,7 @@ static void __init setup_low_mem_virq(void)
>        * to ever trigger. */
>       if ( opt_low_mem_virq == 0 )
>       {
> -        low_mem_virq_th = -1UL;
> +        low_mem_virq_th = ~0UL;
>           return;
>       }
>
> @@ -778,7 +778,7 @@ static void check_low_mem_virq(void)
>           low_mem_virq_th_order++;
>           low_mem_virq_th = 1UL << low_mem_virq_th_order;
>           if ( low_mem_virq_th == low_mem_virq_orig )
> -            low_mem_virq_high = -1UL;
> +            low_mem_virq_high = ~0UL;
>           else
>               low_mem_virq_high = 1UL << (low_mem_virq_th_order + 2);
>       }
> diff --git a/xen/common/time.c b/xen/common/time.c
> index 92f7b72464..980dddee28 100644
> --- a/xen/common/time.c
> +++ b/xen/common/time.c
> @@ -84,7 +84,7 @@ struct tm gmtime(unsigned long t)
>       }
>       tbuf.tm_year = y - 1900;
>       tbuf.tm_yday = days;
> -    ip = (const unsigned short int *)__mon_lengths[__isleap(y)];
> +    ip = (const unsigned short int *)__mon_lengths[__isleap(y) ? 1 : 0];
>       for ( y = 0; days >= ip[y]; ++y )
>           days -= ip[y];
>       tbuf.tm_mon = y;
> diff --git a/xen/drivers/passthrough/arm/smmu-v3.c 
> b/xen/drivers/passthrough/arm/smmu-v3.c
> index df16235057..4058b18f2c 100644
> --- a/xen/drivers/passthrough/arm/smmu-v3.c
> +++ b/xen/drivers/passthrough/arm/smmu-v3.c
> @@ -315,7 +315,7 @@ static int queue_poll_cons(struct arm_smmu_queue *q, bool 
> sync, bool wfe)
>
>       while (queue_sync_cons_in(q),
>             (sync ? !queue_empty(&q->llq) : queue_full(&q->llq))) {
> -             if ((NOW() > timeout) > 0)
> +             if (NOW() > timeout)
>                       return -ETIMEDOUT;
>
>               if (wfe) {
> diff --git a/xen/lib/strtol.c b/xen/lib/strtol.c
> index 30dca779cf..c68d133657 100644
> --- a/xen/lib/strtol.c
> +++ b/xen/lib/strtol.c
> @@ -13,7 +13,7 @@
>   long simple_strtol(const char *cp, const char **endp, unsigned int base)
>   {
>       if ( *cp == '-' )
> -        return -simple_strtoul(cp + 1, endp, base);
> +        return -(long)simple_strtoul(cp + 1, endp, base);
>       return simple_strtoul(cp, endp, base);
>   }
>
> diff --git a/xen/lib/strtoll.c b/xen/lib/strtoll.c
> index 5d23fd80e8..6861d55929 100644
> --- a/xen/lib/strtoll.c
> +++ b/xen/lib/strtoll.c
> @@ -13,7 +13,7 @@
>   long long simple_strtoll(const char *cp, const char **endp, unsigned int 
> base)
>   {
>       if ( *cp == '-' )
> -        return -simple_strtoull(cp + 1, endp, base);
> +        return -(long long)simple_strtoull(cp + 1, endp, base);
>       return simple_strtoull(cp, endp, base);
>   }
>

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.