[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH 12/13] xen/x86: fixed violations of MISRA C:2012 Rule 7.2



On Tue, 20 Jun 2023, Simone Ballarin wrote:
> From: Gianluca Luparini <gianluca.luparini@xxxxxxxxxxx>
> 
> The xen sources contains violations of MISRA C:2012 Rule 7.2 whose headline 
> states:
> "A "u" or "U" suffix shall be applied to all integer constants that are 
> represented in an unsigned type".
> 
> I propose to use "U" as a suffix to explicitly state when an integer constant 
> is represented in an unsigned type.
> For homogeneity, I also added the "U" suffix in some cases that the tool 
> didn't report as violations.
> 
> Signed-off-by: Simone Ballarin <simone.ballarin@xxxxxxxxxxx>
> ---
>  xen/arch/x86/apic.c                          |   2 +-
>  xen/arch/x86/cpu-policy.c                    |   8 +-
>  xen/arch/x86/cpu/mcheck/mce-apei.c           |   8 +-
>  xen/arch/x86/cpuid.c                         |   8 +-
>  xen/arch/x86/efi/efi-boot.h                  |   6 +-
>  xen/arch/x86/hvm/hypercall.c                 |   2 +-
>  xen/arch/x86/hvm/irq.c                       |   2 +-
>  xen/arch/x86/hvm/pmtimer.c                   |   4 +-
>  xen/arch/x86/hvm/stdvga.c                    |  66 +++---
>  xen/arch/x86/hvm/viridian/viridian.c         |   2 +-
>  xen/arch/x86/hvm/vlapic.c                    |   6 +-
>  xen/arch/x86/include/asm/apicdef.h           |   2 +-
>  xen/arch/x86/include/asm/config.h            |   2 +-
>  xen/arch/x86/include/asm/guest/hyperv-tlfs.h |  28 +--
>  xen/arch/x86/include/asm/hpet.h              |   2 +-
>  xen/arch/x86/include/asm/hvm/trace.h         |   4 +-
>  xen/arch/x86/include/asm/hvm/vioapic.h       |   2 +-
>  xen/arch/x86/include/asm/msi.h               |   2 +-
>  xen/arch/x86/include/asm/msr-index.h         | 204 +++++++++----------
>  xen/arch/x86/include/asm/pci.h               |   8 +-
>  xen/arch/x86/include/asm/x86-defns.h         |  24 +--
>  xen/arch/x86/percpu.c                        |   2 +-
>  xen/arch/x86/psr.c                           |   2 +-
>  xen/arch/x86/spec_ctrl.c                     |   8 +-
>  xen/arch/x86/x86_64/acpi_mmcfg.c             |   2 +-
>  xen/arch/x86/x86_64/pci.c                    |   2 +-
>  xen/arch/x86/x86_emulate/x86_emulate.h       |   2 +-
>  xen/include/public/arch-x86/xen-x86_64.h     |   8 +-
>  xen/lib/x86/cpuid.c                          |   8 +-
>  xen/lib/x86/policy.c                         |   2 +-
>  30 files changed, 214 insertions(+), 214 deletions(-)
> 
> diff --git a/xen/arch/x86/apic.c b/xen/arch/x86/apic.c
> index f71474d47d..03c5c0f2ee 100644
> --- a/xen/arch/x86/apic.c
> +++ b/xen/arch/x86/apic.c
> @@ -1211,7 +1211,7 @@ static void __init calibrate_APIC_clock(void)
>       * Setup the APIC counter to maximum. There is no way the lapic
>       * can underflow in the 100ms detection time frame.
>       */
> -    __setup_APIC_LVTT(0xffffffff);
> +    __setup_APIC_LVTT(0xffffffffU);
>  
>      bus_freq = calibrate_apic_timer();
>      if ( !bus_freq )
> diff --git a/xen/arch/x86/cpu-policy.c b/xen/arch/x86/cpu-policy.c
> index f40eeb8be8..5516249cb6 100644
> --- a/xen/arch/x86/cpu-policy.c
> +++ b/xen/arch/x86/cpu-policy.c
> @@ -321,7 +321,7 @@ static void recalculate_misc(struct cpu_policy *p)
>          p->extd.vendor_edx = p->basic.vendor_edx;
>  
>          p->extd.raw_fms = p->basic.raw_fms;
> -        p->extd.raw[0x1].b &= 0xff00ffff;
> +        p->extd.raw[0x1].b &= 0xff00ffffU;
>          p->extd.e1d |= p->basic._1d & CPUID_COMMON_1D_FEATURES;
>  
>          p->extd.raw[0x8].a &= 0x0000ffff; /* GuestMaxPhysAddr hidden. */
> @@ -378,9 +378,9 @@ static void __init calculate_host_policy(void)
>       * this information.
>       */
>      if ( cpu_has_lfence_dispatch )
> -        max_extd_leaf = max(max_extd_leaf, 0x80000021);
> +        max_extd_leaf = max(max_extd_leaf, 0x80000021U);
>  
> -    p->extd.max_leaf = 0x80000000 | min_t(uint32_t, max_extd_leaf & 0xffff,
> +    p->extd.max_leaf = 0x80000000U | min_t(uint32_t, max_extd_leaf & 0xffffU,
>                                            ARRAY_SIZE(p->extd.raw) - 1);
>  
>      x86_cpu_featureset_to_policy(boot_cpu_data.x86_capability, p);
> @@ -768,7 +768,7 @@ void recalculate_cpuid_policy(struct domain *d)
>  
>      p->basic.max_leaf   = min(p->basic.max_leaf,   max->basic.max_leaf);
>      p->feat.max_subleaf = min(p->feat.max_subleaf, max->feat.max_subleaf);
> -    p->extd.max_leaf    = 0x80000000 | min(p->extd.max_leaf & 0xffff,
> +    p->extd.max_leaf    = 0x80000000U | min(p->extd.max_leaf & 0xffff,
>                                             ((p->x86_vendor & (X86_VENDOR_AMD 
> |
>                                                                
> X86_VENDOR_HYGON))
>                                              ? CPUID_GUEST_NR_EXTD_AMD
> diff --git a/xen/arch/x86/cpu/mcheck/mce-apei.c 
> b/xen/arch/x86/cpu/mcheck/mce-apei.c
> index 53b6735896..1aa213b321 100644
> --- a/xen/arch/x86/cpu/mcheck/mce-apei.c
> +++ b/xen/arch/x86/cpu/mcheck/mce-apei.c
> @@ -37,11 +37,11 @@
>  #include "mce.h"
>  
>  #define CPER_CREATOR_MCE                                             \
> -     UUID_LE(0x75a574e3, 0x5052, 0x4b29, 0x8a, 0x8e, 0xbe, 0x2c,     \
> -             0x64, 0x90, 0xb8, 0x9d)
> +     UUID_LE(0x75a574e3U, 0x5052U, 0x4b29U, 0x8aU, 0x8eU, 0xbeU, 0x2cU,      
> \
> +             0x64U, 0x90U, 0xb8U, 0x9dU)
>  #define CPER_SECTION_TYPE_MCE                                                
> \
> -     UUID_LE(0xfe08ffbe, 0x95e4, 0x4be7, 0xbc, 0x73, 0x40, 0x96,     \
> -             0x04, 0x4a, 0x38, 0xfc)
> +     UUID_LE(0xfe08ffbeU, 0x95e4U, 0x4be7U, 0xbcU, 0x73U, 0x40U, 0x96U,      
> \
> +             0x04U, 0x4aU, 0x38U, 0xfcU)
>  
>  /*
>   * CPER specification (in UEFI specification 2.3 appendix N) requires
> diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
> index 455a09b2dd..7290a979c6 100644
> --- a/xen/arch/x86/cpuid.c
> +++ b/xen/arch/x86/cpuid.c
> @@ -93,7 +93,7 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>          }
>          break;
>  
> -    case 0x40000000 ... 0x400000ff:
> +    case 0x40000000U ... 0x400000ffU:
>          if ( is_viridian_domain(d) )
>              return cpuid_viridian_leaves(v, leaf, subleaf, res);
>  
> @@ -103,10 +103,10 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>           * Intel reserve up until 0x4fffffff for hypervisor use.  AMD reserve
>           * only until 0x400000ff, but we already use double that.
>           */
> -    case 0x40000100 ... 0x400001ff:
> +    case 0x40000100U ... 0x400001ffU:
>          return cpuid_hypervisor_leaves(v, leaf, subleaf, res);
>  
> -    case 0x80000000 ... 0x80000000 + CPUID_GUEST_NR_EXTD - 1:
> +    case 0x80000000U ... 0x80000000U + CPUID_GUEST_NR_EXTD - 1:
>          ASSERT((p->extd.max_leaf & 0xffff) < ARRAY_SIZE(p->extd.raw));
>          if ( (leaf & 0xffff) > min_t(uint32_t, p->extd.max_leaf & 0xffff,
>                                       ARRAY_SIZE(p->extd.raw) - 1) )
> @@ -352,7 +352,7 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>          }
>          break;
>  
> -    case 0x80000001:
> +    case 0x80000001U:
>          /* SYSCALL is hidden outside of long mode on Intel. */
>          if ( p->x86_vendor == X86_VENDOR_INTEL &&
>               is_hvm_domain(d) && !hvm_long_mode_active(v) )
> diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h
> index c94e53d139..9fe7b06082 100644
> --- a/xen/arch/x86/efi/efi-boot.h
> +++ b/xen/arch/x86/efi/efi-boot.h
> @@ -740,16 +740,16 @@ static void __init efi_arch_handle_module(const struct 
> file *file,
>  
>  static void __init efi_arch_cpu(void)
>  {
> -    uint32_t eax = cpuid_eax(0x80000000);
> +    uint32_t eax = cpuid_eax(0x80000000U);
>      uint32_t *caps = boot_cpu_data.x86_capability;
>  
>      boot_tsc_stamp = rdtsc();
>  
>      caps[FEATURESET_1c] = cpuid_ecx(1);
>  
> -    if ( (eax >> 16) == 0x8000 && eax > 0x80000000 )
> +    if ( (eax >> 16) == 0x8000 && eax > 0x80000000U )
>      {
> -        caps[FEATURESET_e1d] = cpuid_edx(0x80000001);
> +        caps[FEATURESET_e1d] = cpuid_edx(0x80000001U);
>  
>          if ( cpu_has_nx )
>              trampoline_efer |= EFER_NXE;
> diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
> index 20d266ffd5..eeb73e1aa5 100644
> --- a/xen/arch/x86/hvm/hypercall.c
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -129,7 +129,7 @@ int hvm_hypercall(struct cpu_user_regs *regs)
>          break;
>      }
>  
> -    if ( (eax & 0x80000000) && is_viridian_domain(currd) )
> +    if ( (eax & 0x80000000U) && is_viridian_domain(currd) )
>      {
>          int ret;
>  
> diff --git a/xen/arch/x86/hvm/irq.c b/xen/arch/x86/hvm/irq.c
> index 1258371eb0..5c00127cfc 100644
> --- a/xen/arch/x86/hvm/irq.c
> +++ b/xen/arch/x86/hvm/irq.c
> @@ -383,7 +383,7 @@ int hvm_inject_msi(struct domain *d, uint64_t addr, 
> uint32_t data)
>  
>      if ( !vector )
>      {
> -        int pirq = ((addr >> 32) & 0xffffff00) | dest;
> +        int pirq = ((addr >> 32) & 0xffffff00U) | dest;
>  
>          if ( pirq > 0 )
>          {
> diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.c
> index 2145c531b6..eb4a455763 100644
> --- a/xen/arch/x86/hvm/pmtimer.c
> +++ b/xen/arch/x86/hvm/pmtimer.c
> @@ -40,8 +40,8 @@
>  #define SCI_IRQ 9
>  
>  /* We provide a 32-bit counter (must match the TMR_VAL_EXT bit in the FADT) 
> */
> -#define TMR_VAL_MASK  (0xffffffff)
> -#define TMR_VAL_MSB   (0x80000000)
> +#define TMR_VAL_MASK  (0xffffffffU)
> +#define TMR_VAL_MSB   (0x80000000U)
>  
>  /* Dispatch SCIs based on the PM1a_STS and PM1a_EN registers */
>  static void pmt_update_sci(PMTState *s)
> diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c
> index 798a9a0549..52efa8348a 100644
> --- a/xen/arch/x86/hvm/stdvga.c
> +++ b/xen/arch/x86/hvm/stdvga.c
> @@ -39,46 +39,46 @@
>  
>  #define PAT(x) (x)
>  static const uint32_t mask16[16] = {
> -    PAT(0x00000000),
> -    PAT(0x000000ff),
> -    PAT(0x0000ff00),
> -    PAT(0x0000ffff),
> -    PAT(0x00ff0000),
> -    PAT(0x00ff00ff),
> -    PAT(0x00ffff00),
> -    PAT(0x00ffffff),
> -    PAT(0xff000000),
> -    PAT(0xff0000ff),
> -    PAT(0xff00ff00),
> -    PAT(0xff00ffff),
> -    PAT(0xffff0000),
> -    PAT(0xffff00ff),
> -    PAT(0xffffff00),
> -    PAT(0xffffffff),
> +    PAT(0x00000000U),
> +    PAT(0x000000ffU),
> +    PAT(0x0000ff00U),
> +    PAT(0x0000ffffU),
> +    PAT(0x00ff0000U),
> +    PAT(0x00ff00ffU),
> +    PAT(0x00ffff00U),
> +    PAT(0x00ffffffU),
> +    PAT(0xff000000U),
> +    PAT(0xff0000ffU),
> +    PAT(0xff00ff00U),
> +    PAT(0xff00ffffU),
> +    PAT(0xffff0000U),
> +    PAT(0xffff00ffU),
> +    PAT(0xffffff00U),
> +    PAT(0xffffffffU),
>  };
>  
>  /* force some bits to zero */
>  static const uint8_t sr_mask[8] = {
> -    (uint8_t)~0xfc,
> -    (uint8_t)~0xc2,
> -    (uint8_t)~0xf0,
> -    (uint8_t)~0xc0,
> -    (uint8_t)~0xf1,
> -    (uint8_t)~0xff,
> -    (uint8_t)~0xff,
> -    (uint8_t)~0x00,
> +    (uint8_t)~0xfcU,
> +    (uint8_t)~0xc2U,
> +    (uint8_t)~0xf0U,
> +    (uint8_t)~0xc0U,
> +    (uint8_t)~0xf1U,
> +    (uint8_t)~0xffU,
> +    (uint8_t)~0xffU,
> +    (uint8_t)~0x00U,
>  };
>  
>  static const uint8_t gr_mask[9] = {
> -    (uint8_t)~0xf0, /* 0x00 */
> -    (uint8_t)~0xf0, /* 0x01 */
> -    (uint8_t)~0xf0, /* 0x02 */
> -    (uint8_t)~0xe0, /* 0x03 */
> -    (uint8_t)~0xfc, /* 0x04 */
> -    (uint8_t)~0x84, /* 0x05 */
> -    (uint8_t)~0xf0, /* 0x06 */
> -    (uint8_t)~0xf0, /* 0x07 */
> -    (uint8_t)~0x00, /* 0x08 */
> +    (uint8_t)~0xf0U, /* 0x00 */
> +    (uint8_t)~0xf0U, /* 0x01 */
> +    (uint8_t)~0xf0U, /* 0x02 */
> +    (uint8_t)~0xe0U, /* 0x03 */
> +    (uint8_t)~0xfcU, /* 0x04 */
> +    (uint8_t)~0x84U, /* 0x05 */
> +    (uint8_t)~0xf0U, /* 0x06 */
> +    (uint8_t)~0xf0U, /* 0x07 */
> +    (uint8_t)~0x00U, /* 0x08 */
>  };
>  
>  static uint8_t *vram_getb(struct hvm_hw_stdvga *s, unsigned int a)
> diff --git a/xen/arch/x86/hvm/viridian/viridian.c 
> b/xen/arch/x86/hvm/viridian/viridian.c
> index 7405c117bc..61171e3363 100644
> --- a/xen/arch/x86/hvm/viridian/viridian.c
> +++ b/xen/arch/x86/hvm/viridian/viridian.c
> @@ -291,7 +291,7 @@ static void enable_hypercall_page(struct domain *d)
>       * calling convention) to differentiate Xen and Viridian hypercalls.
>       */
>      *(u8  *)(p + 0) = 0x0d; /* orl $0x80000000, %eax */
> -    *(u32 *)(p + 1) = 0x80000000;
> +    *(u32 *)(p + 1) = 0x80000000U;
>      *(u8  *)(p + 5) = 0x0f; /* vmcall/vmmcall */
>      *(u8  *)(p + 6) = 0x01;
>      *(u8  *)(p + 7) = (cpu_has_vmx ? 0xc1 : 0xd9);
> diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c
> index 785d5d88d9..04009007dd 100644
> --- a/xen/arch/x86/hvm/vlapic.c
> +++ b/xen/arch/x86/hvm/vlapic.c
> @@ -237,7 +237,7 @@ bool_t vlapic_match_dest(
>      case APIC_DEST_NOSHORT:
>          if ( dest_mode )
>              return vlapic_match_logical_addr(target, dest);
> -        return (dest == _VLAPIC_ID(target, 0xffffffff)) ||
> +        return (dest == _VLAPIC_ID(target, 0xffffffffU)) ||
>                 (dest == VLAPIC_ID(target));
>  
>      case APIC_DEST_SELF:
> @@ -467,7 +467,7 @@ static bool_t is_multicast_dest(struct vlapic *vlapic, 
> unsigned int short_hand,
>          return short_hand != APIC_DEST_SELF;
>  
>      if ( vlapic_x2apic_mode(vlapic) )
> -        return dest_mode ? hweight16(dest) > 1 : dest == 0xffffffff;
> +        return dest_mode ? hweight16(dest) > 1 : dest == 0xffffffffU;
>  
>      if ( dest_mode )
>          return hweight8(dest &
> @@ -831,7 +831,7 @@ void vlapic_reg_write(struct vcpu *v, unsigned int reg, 
> uint32_t val)
>          break;
>  
>      case APIC_ICR2:
> -        vlapic_set_reg(vlapic, APIC_ICR2, val & 0xff000000);
> +        vlapic_set_reg(vlapic, APIC_ICR2, val & 0xff000000U);
>          break;
>  
>      case APIC_LVTT:         /* LVT Timer Reg */
> diff --git a/xen/arch/x86/include/asm/apicdef.h 
> b/xen/arch/x86/include/asm/apicdef.h
> index 2440d83c8d..7f21d3f49c 100644
> --- a/xen/arch/x86/include/asm/apicdef.h
> +++ b/xen/arch/x86/include/asm/apicdef.h
> @@ -8,7 +8,7 @@
>   * Ingo Molnar <mingo@xxxxxxxxxx>, 1999, 2000
>   */
>  
> -#define              APIC_DEFAULT_PHYS_BASE  0xfee00000
> +#define              APIC_DEFAULT_PHYS_BASE  0xfee00000U
>   
>  #define              APIC_ID         0x20
>  #define                      APIC_ID_MASK            (0xFFu<<24)
> diff --git a/xen/arch/x86/include/asm/config.h 
> b/xen/arch/x86/include/asm/config.h
> index fbc4bb3416..bbced338be 100644
> --- a/xen/arch/x86/include/asm/config.h
> +++ b/xen/arch/x86/include/asm/config.h
> @@ -257,7 +257,7 @@ extern unsigned char boot_edid_info[128];
>  #endif /* CONFIG_PV32 */
>  
>  #define MACH2PHYS_COMPAT_VIRT_START    HYPERVISOR_COMPAT_VIRT_START
> -#define MACH2PHYS_COMPAT_VIRT_END      0xFFE00000
> +#define MACH2PHYS_COMPAT_VIRT_END      0xFFE00000U
>  #define MACH2PHYS_COMPAT_NR_ENTRIES(d) \
>      ((MACH2PHYS_COMPAT_VIRT_END-MACH2PHYS_COMPAT_VIRT_START(d))>>2)
>  
> diff --git a/xen/arch/x86/include/asm/guest/hyperv-tlfs.h 
> b/xen/arch/x86/include/asm/guest/hyperv-tlfs.h
> index 38f997a0c8..a6915ad731 100644
> --- a/xen/arch/x86/include/asm/guest/hyperv-tlfs.h
> +++ b/xen/arch/x86/include/asm/guest/hyperv-tlfs.h
> @@ -471,30 +471,30 @@ typedef struct _HV_REFERENCE_TSC_PAGE {
>  
>  /* Define hypervisor message types. */
>  enum hv_message_type {
> -     HVMSG_NONE                      = 0x00000000,
> +     HVMSG_NONE                      = 0x00000000U,
>  
>       /* Memory access messages. */
> -     HVMSG_UNMAPPED_GPA              = 0x80000000,
> -     HVMSG_GPA_INTERCEPT             = 0x80000001,
> +     HVMSG_UNMAPPED_GPA              = 0x80000000U,
> +     HVMSG_GPA_INTERCEPT             = 0x80000001U,
>  
>       /* Timer notification messages. */
> -     HVMSG_TIMER_EXPIRED                     = 0x80000010,
> +     HVMSG_TIMER_EXPIRED                     = 0x80000010U,
>  
>       /* Error messages. */
> -     HVMSG_INVALID_VP_REGISTER_VALUE = 0x80000020,
> -     HVMSG_UNRECOVERABLE_EXCEPTION   = 0x80000021,
> -     HVMSG_UNSUPPORTED_FEATURE               = 0x80000022,
> +     HVMSG_INVALID_VP_REGISTER_VALUE = 0x80000020U,
> +     HVMSG_UNRECOVERABLE_EXCEPTION   = 0x80000021U,
> +     HVMSG_UNSUPPORTED_FEATURE               = 0x80000022U,
>  
>       /* Trace buffer complete messages. */
> -     HVMSG_EVENTLOG_BUFFERCOMPLETE   = 0x80000040,
> +     HVMSG_EVENTLOG_BUFFERCOMPLETE   = 0x80000040U,
>  
>       /* Platform-specific processor intercept messages. */
> -     HVMSG_X64_IOPORT_INTERCEPT              = 0x80010000,
> -     HVMSG_X64_MSR_INTERCEPT         = 0x80010001,
> -     HVMSG_X64_CPUID_INTERCEPT               = 0x80010002,
> -     HVMSG_X64_EXCEPTION_INTERCEPT   = 0x80010003,
> -     HVMSG_X64_APIC_EOI                      = 0x80010004,
> -     HVMSG_X64_LEGACY_FP_ERROR               = 0x80010005
> +     HVMSG_X64_IOPORT_INTERCEPT              = 0x80010000U,
> +     HVMSG_X64_MSR_INTERCEPT         = 0x80010001U,
> +     HVMSG_X64_CPUID_INTERCEPT               = 0x80010002U,
> +     HVMSG_X64_EXCEPTION_INTERCEPT   = 0x80010003U,
> +     HVMSG_X64_APIC_EOI                      = 0x80010004U,
> +     HVMSG_X64_LEGACY_FP_ERROR               = 0x80010005U
>  };
>  
>  /* Define synthetic interrupt controller message flags. */
> diff --git a/xen/arch/x86/include/asm/hpet.h b/xen/arch/x86/include/asm/hpet.h
> index 9919f74730..c5e8e9c8db 100644
> --- a/xen/arch/x86/include/asm/hpet.h
> +++ b/xen/arch/x86/include/asm/hpet.h
> @@ -41,7 +41,7 @@
>  #define HPET_TN_ROUTE                0x3e00
>  #define HPET_TN_FSB          0x4000
>  #define HPET_TN_FSB_CAP              0x8000
> -#define HPET_TN_RESERVED     0xffff0081
> +#define HPET_TN_RESERVED     0xffff0081U
>  #define HPET_TN_INT_ROUTE_CAP        (0xffffffffULL << 32)
>  
>  
> diff --git a/xen/arch/x86/include/asm/hvm/trace.h 
> b/xen/arch/x86/include/asm/hvm/trace.h
> index 696e42eb94..60b88b9c1f 100644
> --- a/xen/arch/x86/include/asm/hvm/trace.h
> +++ b/xen/arch/x86/include/asm/hvm/trace.h
> @@ -58,7 +58,7 @@
>  #define DO_TRC_HVM_VLAPIC           DEFAULT_HVM_MISC
>  
>  
> -#define TRC_PAR_LONG(par) ((par)&0xFFFFFFFF),((par)>>32)
> +#define TRC_PAR_LONG(par) ((par)&0xFFFFFFFFU),((par)>>32)
>  
>  #define TRACE_2_LONG_2D(_e, d1, d2, ...) \
>      TRACE_4D(_e, d1, d2)
> @@ -93,7 +93,7 @@
>      HVMTRACE_ND(evt, 0, 0)
>  
>  #define HVMTRACE_LONG_1D(evt, d1)                  \
> -                   HVMTRACE_2D(evt ## 64, (d1) & 0xFFFFFFFF, (d1) >> 32)
> +                   HVMTRACE_2D(evt ## 64, (d1) & 0xFFFFFFFFU, (d1) >> 32)
>  #define HVMTRACE_LONG_2D(evt, d1, d2, ...)              \
>                     HVMTRACE_3D(evt ## 64, d1, d2)
>  #define HVMTRACE_LONG_3D(evt, d1, d2, d3, ...)      \
> diff --git a/xen/arch/x86/include/asm/hvm/vioapic.h 
> b/xen/arch/x86/include/asm/hvm/vioapic.h
> index 2944ec20dd..68af6dce79 100644
> --- a/xen/arch/x86/include/asm/hvm/vioapic.h
> +++ b/xen/arch/x86/include/asm/hvm/vioapic.h
> @@ -32,7 +32,7 @@
>  #define VIOAPIC_EDGE_TRIG  0
>  #define VIOAPIC_LEVEL_TRIG 1
>  
> -#define VIOAPIC_DEFAULT_BASE_ADDRESS  0xfec00000
> +#define VIOAPIC_DEFAULT_BASE_ADDRESS  0xfec00000U
>  #define VIOAPIC_MEM_LENGTH            0x100
>  
>  /* Direct registers. */
> diff --git a/xen/arch/x86/include/asm/msi.h b/xen/arch/x86/include/asm/msi.h
> index a53ade95c9..d89723d009 100644
> --- a/xen/arch/x86/include/asm/msi.h
> +++ b/xen/arch/x86/include/asm/msi.h
> @@ -37,7 +37,7 @@
>   */
>  
>  #define MSI_ADDR_BASE_HI            0
> -#define MSI_ADDR_BASE_LO            0xfee00000
> +#define MSI_ADDR_BASE_LO            0xfee00000U
>  #define MSI_ADDR_BASE_MASK          (~0xfffff)
>  #define MSI_ADDR_HEADER             MSI_ADDR_BASE_LO
>  
> diff --git a/xen/arch/x86/include/asm/msr-index.h 
> b/xen/arch/x86/include/asm/msr-index.h
> index 2749e433d2..7ed48d23cd 100644
> --- a/xen/arch/x86/include/asm/msr-index.h
> +++ b/xen/arch/x86/include/asm/msr-index.h
> @@ -30,7 +30,7 @@
>  
>  #define MSR_INTEL_CORE_THREAD_COUNT         0x00000035
>  #define  MSR_CTC_THREAD_MASK                0x0000ffff
> -#define  MSR_CTC_CORE_MASK                  0xffff0000
> +#define  MSR_CTC_CORE_MASK                  0xffff0000U
>  
>  #define MSR_SPEC_CTRL                       0x00000048
>  #define  SPEC_CTRL_IBRS                     (_AC(1, ULL) <<  0)
> @@ -168,7 +168,7 @@
>  #define MSR_UARCH_MISC_CTRL                 0x00001b01
>  #define  UARCH_CTRL_DOITM                   (_AC(1, ULL) <<  0)
>  
> -#define MSR_EFER                            0xc0000080 /* Extended Feature 
> Enable Register */
> +#define MSR_EFER                            0xc0000080U /* Extended Feature 
> Enable Register */
>  #define  EFER_SCE                           (_AC(1, ULL) <<  0) /* SYSCALL 
> Enable */
>  #define  EFER_LME                           (_AC(1, ULL) <<  8) /* Long Mode 
> Enable */
>  #define  EFER_LMA                           (_AC(1, ULL) << 10) /* Long Mode 
> Active */
> @@ -181,35 +181,35 @@
>      (EFER_SCE | EFER_LME | EFER_LMA | EFER_NXE | EFER_SVME | EFER_FFXSE | \
>       EFER_AIBRSE)
>  
> -#define MSR_STAR                            0xc0000081 /* legacy mode 
> SYSCALL target */
> -#define MSR_LSTAR                           0xc0000082 /* long mode SYSCALL 
> target */
> -#define MSR_CSTAR                           0xc0000083 /* compat mode 
> SYSCALL target */
> -#define MSR_SYSCALL_MASK                    0xc0000084 /* EFLAGS mask for 
> syscall */
> -#define MSR_FS_BASE                         0xc0000100 /* 64bit FS base */
> -#define MSR_GS_BASE                         0xc0000101 /* 64bit GS base */
> -#define MSR_SHADOW_GS_BASE                  0xc0000102 /* SwapGS GS shadow */
> -#define MSR_TSC_AUX                         0xc0000103 /* Auxiliary TSC */
> +#define MSR_STAR                            0xc0000081U /* legacy mode 
> SYSCALL target */
> +#define MSR_LSTAR                           0xc0000082U /* long mode SYSCALL 
> target */
> +#define MSR_CSTAR                           0xc0000083U /* compat mode 
> SYSCALL target */
> +#define MSR_SYSCALL_MASK                    0xc0000084U /* EFLAGS mask for 
> syscall */
> +#define MSR_FS_BASE                         0xc0000100U /* 64bit FS base */
> +#define MSR_GS_BASE                         0xc0000101U /* 64bit GS base */
> +#define MSR_SHADOW_GS_BASE                  0xc0000102U /* SwapGS GS shadow 
> */
> +#define MSR_TSC_AUX                         0xc0000103U /* Auxiliary TSC */
>  
> -#define MSR_K8_SYSCFG                       0xc0010010
> +#define MSR_K8_SYSCFG                       0xc0010010U
>  #define  SYSCFG_MTRR_FIX_DRAM_EN            (_AC(1, ULL) << 18)
>  #define  SYSCFG_MTRR_FIX_DRAM_MOD_EN        (_AC(1, ULL) << 19)
>  #define  SYSCFG_MTRR_VAR_DRAM_EN            (_AC(1, ULL) << 20)
>  #define  SYSCFG_MTRR_TOM2_EN                (_AC(1, ULL) << 21)
>  #define  SYSCFG_TOM2_FORCE_WB               (_AC(1, ULL) << 22)
>  
> -#define MSR_K8_IORR_BASE0                   0xc0010016
> -#define MSR_K8_IORR_MASK0                   0xc0010017
> -#define MSR_K8_IORR_BASE1                   0xc0010018
> -#define MSR_K8_IORR_MASK1                   0xc0010019
> +#define MSR_K8_IORR_BASE0                   0xc0010016U
> +#define MSR_K8_IORR_MASK0                   0xc0010017U
> +#define MSR_K8_IORR_BASE1                   0xc0010018U
> +#define MSR_K8_IORR_MASK1                   0xc0010019U
>  
> -#define MSR_K8_TSEG_BASE                    0xc0010112 /* AMD doc: SMMAddr */
> -#define MSR_K8_TSEG_MASK                    0xc0010113 /* AMD doc: SMMMask */
> +#define MSR_K8_TSEG_BASE                    0xc0010112U /* AMD doc: SMMAddr 
> */
> +#define MSR_K8_TSEG_MASK                    0xc0010113U /* AMD doc: SMMMask 
> */
>  
> -#define MSR_K8_VM_CR                        0xc0010114
> +#define MSR_K8_VM_CR                        0xc0010114U
>  #define  VM_CR_INIT_REDIRECTION             (_AC(1, ULL) <<  1)
>  #define  VM_CR_SVM_DISABLE                  (_AC(1, ULL) <<  4)
>  
> -#define MSR_VIRT_SPEC_CTRL                  0xc001011f /* Layout matches 
> MSR_SPEC_CTRL */
> +#define MSR_VIRT_SPEC_CTRL                  0xc001011fU /* Layout matches 
> MSR_SPEC_CTRL */
>  
>  /*
>   * Legacy MSR constants in need of cleanup.  No new MSRs below this comment.
> @@ -293,7 +293,7 @@
>  #define CMCI_EN                      (1UL<<30)
>  #define CMCI_THRESHOLD_MASK          0x7FFF
>  
> -#define MSR_AMD64_MC0_MASK           0xc0010044
> +#define MSR_AMD64_MC0_MASK           0xc0010044U
>  
>  #define MSR_IA32_MCx_CTL(x)          (MSR_IA32_MC0_CTL + 4*(x))
>  #define MSR_IA32_MCx_STATUS(x)               (MSR_IA32_MC0_STATUS + 4*(x))
> @@ -325,83 +325,83 @@
>  
>  /* K7/K8 MSRs. Not complete. See the architecture manual for a more
>     complete list. */
> -#define MSR_K7_EVNTSEL0                      0xc0010000
> -#define MSR_K7_PERFCTR0                      0xc0010004
> -#define MSR_K7_EVNTSEL1                      0xc0010001
> -#define MSR_K7_PERFCTR1                      0xc0010005
> -#define MSR_K7_EVNTSEL2                      0xc0010002
> -#define MSR_K7_PERFCTR2                      0xc0010006
> -#define MSR_K7_EVNTSEL3                      0xc0010003
> -#define MSR_K7_PERFCTR3                      0xc0010007
> -#define MSR_K8_TOP_MEM1                      0xc001001a
> -#define MSR_K7_CLK_CTL                       0xc001001b
> -#define MSR_K8_TOP_MEM2                      0xc001001d
> -
> -#define MSR_K8_HWCR                  0xc0010015
> +#define MSR_K7_EVNTSEL0                      0xc0010000U
> +#define MSR_K7_PERFCTR0                      0xc0010004U
> +#define MSR_K7_EVNTSEL1                      0xc0010001U
> +#define MSR_K7_PERFCTR1                      0xc0010005U
> +#define MSR_K7_EVNTSEL2                      0xc0010002U
> +#define MSR_K7_PERFCTR2                      0xc0010006U
> +#define MSR_K7_EVNTSEL3                      0xc0010003U
> +#define MSR_K7_PERFCTR3                      0xc0010007U
> +#define MSR_K8_TOP_MEM1                      0xc001001aU
> +#define MSR_K7_CLK_CTL                       0xc001001bU
> +#define MSR_K8_TOP_MEM2                      0xc001001dU
> +
> +#define MSR_K8_HWCR                  0xc0010015U
>  #define K8_HWCR_TSC_FREQ_SEL         (1ULL << 24)
>  #define K8_HWCR_CPUID_USER_DIS               (1ULL << 35)
>  
> -#define MSR_K7_FID_VID_CTL           0xc0010041
> -#define MSR_K7_FID_VID_STATUS                0xc0010042
> -#define MSR_K8_PSTATE_LIMIT          0xc0010061
> -#define MSR_K8_PSTATE_CTRL           0xc0010062
> -#define MSR_K8_PSTATE_STATUS         0xc0010063
> -#define MSR_K8_PSTATE0                       0xc0010064
> -#define MSR_K8_PSTATE1                       0xc0010065
> -#define MSR_K8_PSTATE2                       0xc0010066
> -#define MSR_K8_PSTATE3                       0xc0010067
> -#define MSR_K8_PSTATE4                       0xc0010068
> -#define MSR_K8_PSTATE5                       0xc0010069
> -#define MSR_K8_PSTATE6                       0xc001006A
> -#define MSR_K8_PSTATE7                       0xc001006B
> -#define MSR_K8_ENABLE_C1E            0xc0010055
> -#define MSR_K8_VM_HSAVE_PA           0xc0010117
> -
> -#define MSR_AMD_FAM15H_EVNTSEL0              0xc0010200
> -#define MSR_AMD_FAM15H_PERFCTR0              0xc0010201
> -#define MSR_AMD_FAM15H_EVNTSEL1              0xc0010202
> -#define MSR_AMD_FAM15H_PERFCTR1              0xc0010203
> -#define MSR_AMD_FAM15H_EVNTSEL2              0xc0010204
> -#define MSR_AMD_FAM15H_PERFCTR2              0xc0010205
> -#define MSR_AMD_FAM15H_EVNTSEL3              0xc0010206
> -#define MSR_AMD_FAM15H_PERFCTR3              0xc0010207
> -#define MSR_AMD_FAM15H_EVNTSEL4              0xc0010208
> -#define MSR_AMD_FAM15H_PERFCTR4              0xc0010209
> -#define MSR_AMD_FAM15H_EVNTSEL5              0xc001020a
> -#define MSR_AMD_FAM15H_PERFCTR5              0xc001020b
> -
> -#define MSR_AMD_L7S0_FEATURE_MASK    0xc0011002
> -#define MSR_AMD_THRM_FEATURE_MASK    0xc0011003
> -#define MSR_K8_FEATURE_MASK          0xc0011004
> -#define MSR_K8_EXT_FEATURE_MASK              0xc0011005
> +#define MSR_K7_FID_VID_CTL           0xc0010041U
> +#define MSR_K7_FID_VID_STATUS                0xc0010042U
> +#define MSR_K8_PSTATE_LIMIT          0xc0010061U
> +#define MSR_K8_PSTATE_CTRL           0xc0010062U
> +#define MSR_K8_PSTATE_STATUS         0xc0010063U
> +#define MSR_K8_PSTATE0                       0xc0010064U
> +#define MSR_K8_PSTATE1                       0xc0010065U
> +#define MSR_K8_PSTATE2                       0xc0010066U
> +#define MSR_K8_PSTATE3                       0xc0010067U
> +#define MSR_K8_PSTATE4                       0xc0010068U
> +#define MSR_K8_PSTATE5                       0xc0010069U
> +#define MSR_K8_PSTATE6                       0xc001006AU
> +#define MSR_K8_PSTATE7                       0xc001006BU
> +#define MSR_K8_ENABLE_C1E            0xc0010055U
> +#define MSR_K8_VM_HSAVE_PA           0xc0010117U
> +
> +#define MSR_AMD_FAM15H_EVNTSEL0              0xc0010200U
> +#define MSR_AMD_FAM15H_PERFCTR0              0xc0010201U
> +#define MSR_AMD_FAM15H_EVNTSEL1              0xc0010202U
> +#define MSR_AMD_FAM15H_PERFCTR1              0xc0010203U
> +#define MSR_AMD_FAM15H_EVNTSEL2              0xc0010204U
> +#define MSR_AMD_FAM15H_PERFCTR2              0xc0010205U
> +#define MSR_AMD_FAM15H_EVNTSEL3              0xc0010206U
> +#define MSR_AMD_FAM15H_PERFCTR3              0xc0010207U
> +#define MSR_AMD_FAM15H_EVNTSEL4              0xc0010208U
> +#define MSR_AMD_FAM15H_PERFCTR4              0xc0010209U
> +#define MSR_AMD_FAM15H_EVNTSEL5              0xc001020aU
> +#define MSR_AMD_FAM15H_PERFCTR5              0xc001020bU
> +
> +#define MSR_AMD_L7S0_FEATURE_MASK    0xc0011002U
> +#define MSR_AMD_THRM_FEATURE_MASK    0xc0011003U
> +#define MSR_K8_FEATURE_MASK                  0xc0011004U
> +#define MSR_K8_EXT_FEATURE_MASK              0xc0011005U
>  
>  /* AMD64 MSRs */
> -#define MSR_AMD64_NB_CFG             0xc001001f
> +#define MSR_AMD64_NB_CFG             0xc001001fU
>  #define AMD64_NB_CFG_CF8_EXT_ENABLE_BIT      46
> -#define MSR_AMD64_LS_CFG             0xc0011020
> -#define MSR_AMD64_IC_CFG             0xc0011021
> -#define MSR_AMD64_DC_CFG             0xc0011022
> -#define MSR_AMD64_DE_CFG             0xc0011029
> +#define MSR_AMD64_LS_CFG             0xc0011020U
> +#define MSR_AMD64_IC_CFG             0xc0011021U
> +#define MSR_AMD64_DC_CFG             0xc0011022U
> +#define MSR_AMD64_DE_CFG             0xc0011029U
>  #define AMD64_DE_CFG_LFENCE_SERIALISE        (_AC(1, ULL) << 1)
> -#define MSR_AMD64_EX_CFG             0xc001102c
> -#define MSR_AMD64_DE_CFG2            0xc00110e3
> +#define MSR_AMD64_EX_CFG             0xc001102cU
> +#define MSR_AMD64_DE_CFG2            0xc00110e3U
>  
> -#define MSR_AMD64_DR0_ADDRESS_MASK   0xc0011027
> -#define MSR_AMD64_DR1_ADDRESS_MASK   0xc0011019
> -#define MSR_AMD64_DR2_ADDRESS_MASK   0xc001101a
> -#define MSR_AMD64_DR3_ADDRESS_MASK   0xc001101b
> +#define MSR_AMD64_DR0_ADDRESS_MASK   0xc0011027U
> +#define MSR_AMD64_DR1_ADDRESS_MASK   0xc0011019U
> +#define MSR_AMD64_DR2_ADDRESS_MASK   0xc001101aU
> +#define MSR_AMD64_DR3_ADDRESS_MASK   0xc001101bU
>  
>  /* AMD Family10h machine check MSRs */
> -#define MSR_F10_MC4_MISC1            0xc0000408
> -#define MSR_F10_MC4_MISC2            0xc0000409
> -#define MSR_F10_MC4_MISC3            0xc000040A
> +#define MSR_F10_MC4_MISC1            0xc0000408U
> +#define MSR_F10_MC4_MISC2            0xc0000409U
> +#define MSR_F10_MC4_MISC3            0xc000040AU
>  
>  /* AMD Family10h Bus Unit MSRs */
> -#define MSR_F10_BU_CFG               0xc0011023
> -#define MSR_F10_BU_CFG2              0xc001102a
> +#define MSR_F10_BU_CFG               0xc0011023U
> +#define MSR_F10_BU_CFG2              0xc001102aU
>  
>  /* Other AMD Fam10h MSRs */
> -#define MSR_FAM10H_MMIO_CONF_BASE    0xc0010058
> +#define MSR_FAM10H_MMIO_CONF_BASE    0xc0010058U
>  #define FAM10H_MMIO_CONF_ENABLE         (1<<0)
>  #define FAM10H_MMIO_CONF_BUSRANGE_MASK       0xf
>  #define FAM10H_MMIO_CONF_BUSRANGE_SHIFT 2
> @@ -410,31 +410,31 @@
>  
>  /* AMD Microcode MSRs */
>  #define MSR_AMD_PATCHLEVEL           0x0000008b
> -#define MSR_AMD_PATCHLOADER          0xc0010020
> +#define MSR_AMD_PATCHLOADER          0xc0010020U
>  
>  /* AMD TSC RATE MSR */
> -#define MSR_AMD64_TSC_RATIO          0xc0000104
> +#define MSR_AMD64_TSC_RATIO          0xc0000104U
>  
>  /* AMD Lightweight Profiling MSRs */
> -#define MSR_AMD64_LWP_CFG            0xc0000105
> -#define MSR_AMD64_LWP_CBADDR         0xc0000106
> +#define MSR_AMD64_LWP_CFG            0xc0000105U
> +#define MSR_AMD64_LWP_CBADDR         0xc0000106U
>  
>  /* AMD OS Visible Workaround MSRs */
> -#define MSR_AMD_OSVW_ID_LENGTH          0xc0010140
> -#define MSR_AMD_OSVW_STATUS             0xc0010141
> +#define MSR_AMD_OSVW_ID_LENGTH          0xc0010140U
> +#define MSR_AMD_OSVW_STATUS             0xc0010141U
>  
>  /* AMD Protected Processor Inventory Number */
> -#define MSR_AMD_PPIN_CTL                0xc00102f0
> -#define MSR_AMD_PPIN                    0xc00102f1
> +#define MSR_AMD_PPIN_CTL                0xc00102f0U
> +#define MSR_AMD_PPIN                    0xc00102f1U
>  
>  /* K6 MSRs */
> -#define MSR_K6_EFER                  0xc0000080
> -#define MSR_K6_STAR                  0xc0000081
> -#define MSR_K6_WHCR                  0xc0000082
> -#define MSR_K6_UWCCR                 0xc0000085
> -#define MSR_K6_EPMR                  0xc0000086
> -#define MSR_K6_PSOR                  0xc0000087
> -#define MSR_K6_PFIR                  0xc0000088
> +#define MSR_K6_EFER                  0xc0000080U
> +#define MSR_K6_STAR                  0xc0000081U
> +#define MSR_K6_WHCR                  0xc0000082U
> +#define MSR_K6_UWCCR                 0xc0000085U
> +#define MSR_K6_EPMR                  0xc0000086U
> +#define MSR_K6_PSOR                  0xc0000087U
> +#define MSR_K6_PFIR                  0xc0000088U
>  
>  /* Centaur-Hauls/IDT defined MSRs. */
>  #define MSR_IDT_FCR1                 0x00000107
> @@ -459,10 +459,10 @@
>  #define MSR_VIA_BCR2                 0x00001147
>  
>  /* Transmeta defined MSRs */
> -#define MSR_TMTA_LONGRUN_CTRL                0x80868010
> -#define MSR_TMTA_LONGRUN_FLAGS               0x80868011
> -#define MSR_TMTA_LRTI_READOUT                0x80868018
> -#define MSR_TMTA_LRTI_VOLT_MHZ               0x8086801a
> +#define MSR_TMTA_LONGRUN_CTRL                0x80868010U
> +#define MSR_TMTA_LONGRUN_FLAGS               0x80868011U
> +#define MSR_TMTA_LRTI_READOUT                0x80868018U
> +#define MSR_TMTA_LRTI_VOLT_MHZ               0x8086801aU
>  
>  /* Intel defined MSRs. */
>  #define MSR_IA32_P5_MC_ADDR          0x00000000
> diff --git a/xen/arch/x86/include/asm/pci.h b/xen/arch/x86/include/asm/pci.h
> index f4a58c8acf..e1dd12eb19 100644
> --- a/xen/arch/x86/include/asm/pci.h
> +++ b/xen/arch/x86/include/asm/pci.h
> @@ -3,10 +3,10 @@
>  
>  #include <xen/mm.h>
>  
> -#define CF8_BDF(cf8)     (  ((cf8) & 0x00ffff00) >> 8)
> -#define CF8_ADDR_LO(cf8) (   (cf8) & 0x000000fc)
> -#define CF8_ADDR_HI(cf8) (  ((cf8) & 0x0f000000) >> 16)
> -#define CF8_ENABLED(cf8) (!!((cf8) & 0x80000000))
> +#define CF8_BDF(cf8)     (  ((cf8) & 0x00ffff00U) >> 8)
> +#define CF8_ADDR_LO(cf8) (   (cf8) & 0x000000fcU)
> +#define CF8_ADDR_HI(cf8) (  ((cf8) & 0x0f000000U) >> 16)
> +#define CF8_ENABLED(cf8) (!!((cf8) & 0x80000000U))
>  
>  #define IS_SNB_GFX(id) (id == 0x01068086 || id == 0x01168086 \
>                          || id == 0x01268086 || id == 0x01028086 \
> diff --git a/xen/arch/x86/include/asm/x86-defns.h 
> b/xen/arch/x86/include/asm/x86-defns.h
> index e350227e57..87173abc70 100644
> --- a/xen/arch/x86/include/asm/x86-defns.h
> +++ b/xen/arch/x86/include/asm/x86-defns.h
> @@ -30,17 +30,17 @@
>  /*
>   * Intel CPU flags in CR0
>   */
> -#define X86_CR0_PE              0x00000001 /* Enable Protected Mode    (RW) 
> */
> -#define X86_CR0_MP              0x00000002 /* Monitor Coprocessor      (RW) 
> */
> -#define X86_CR0_EM              0x00000004 /* Require FPU Emulation    (RO) 
> */
> -#define X86_CR0_TS              0x00000008 /* Task Switched            (RW) 
> */
> -#define X86_CR0_ET              0x00000010 /* Extension type           (RO) 
> */
> -#define X86_CR0_NE              0x00000020 /* Numeric Error Reporting  (RW) 
> */
> -#define X86_CR0_WP              0x00010000 /* Supervisor Write Protect (RW) 
> */
> -#define X86_CR0_AM              0x00040000 /* Alignment Checking       (RW) 
> */
> -#define X86_CR0_NW              0x20000000 /* Not Write-Through        (RW) 
> */
> -#define X86_CR0_CD              0x40000000 /* Cache Disable            (RW) 
> */
> -#define X86_CR0_PG              0x80000000 /* Paging                   (RW) 
> */
> +#define X86_CR0_PE              0x00000001U  /* Enable Protected Mode    
> (RW) */
> +#define X86_CR0_MP              0x00000002U  /* Monitor Coprocessor      
> (RW) */
> +#define X86_CR0_EM              0x00000004U  /* Require FPU Emulation    
> (RO) */
> +#define X86_CR0_TS              0x00000008U  /* Task Switched            
> (RW) */
> +#define X86_CR0_ET              0x00000010U  /* Extension type           
> (RO) */
> +#define X86_CR0_NE              0x00000020U  /* Numeric Error Reporting  
> (RW) */
> +#define X86_CR0_WP              0x00010000U  /* Supervisor Write Protect 
> (RW) */
> +#define X86_CR0_AM              0x00040000U  /* Alignment Checking       
> (RW) */
> +#define X86_CR0_NW              0x20000000U  /* Not Write-Through        
> (RW) */
> +#define X86_CR0_CD              0x40000000U  /* Cache Disable            
> (RW) */
> +#define X86_CR0_PG              0x80000000U  /* Paging                   
> (RW) */
>  
>  /*
>   * Intel CPU flags in CR3
> @@ -103,7 +103,7 @@
>  /*
>   * Debug status flags in DR6.
>   */
> -#define X86_DR6_DEFAULT         0xffff0ff0  /* Default %dr6 value. */
> +#define X86_DR6_DEFAULT         0xffff0ff0U  /* Default %dr6 value. */
>  
>  /*
>   * Debug control flags in DR7.
> diff --git a/xen/arch/x86/percpu.c b/xen/arch/x86/percpu.c
> index 288050cdba..1ebeb65ad6 100644
> --- a/xen/arch/x86/percpu.c
> +++ b/xen/arch/x86/percpu.c
> @@ -12,7 +12,7 @@ unsigned long __per_cpu_offset[NR_CPUS];
>   * possible #PF at (NULL + a little) which has security implications in the
>   * context of PV guests.
>   */
> -#define INVALID_PERCPU_AREA (0x8000000000000000L - (long)__per_cpu_start)
> +#define INVALID_PERCPU_AREA (0x8000000000000000UL - (long)__per_cpu_start)
>  #define PERCPU_ORDER get_order_from_bytes(__per_cpu_data_end - 
> __per_cpu_start)

Hi Jan, should this be ULL?


>  void __init percpu_init_areas(void)
> diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
> index a1e0af27c5..5581b4717a 100644
> --- a/xen/arch/x86/psr.c
> +++ b/xen/arch/x86/psr.c
> @@ -191,7 +191,7 @@ static struct feat_node *feat_l2_cat;
>  static struct feat_node *feat_mba;
>  
>  /* Common functions */
> -#define cat_default_val(len) (0xffffffff >> (32 - (len)))
> +#define cat_default_val(len) (0xffffffffU >> (32 - (len)))
>  
>  /*
>   * get_cdp_data - get DATA COS register value from input COS ID.
> diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
> index 4081cef200..b030ad8a5b 100644
> --- a/xen/arch/x86/spec_ctrl.c
> +++ b/xen/arch/x86/spec_ctrl.c
> @@ -398,8 +398,8 @@ static void __init print_details(enum ind_thunk thunk)
>          cpuid_count(7, 0, &max, &tmp, &tmp, &_7d0);
>      if ( max >= 2 )
>          cpuid_count(7, 2, &tmp, &tmp, &tmp, &_7d2);
> -    if ( boot_cpu_data.extended_cpuid_level >= 0x80000008 )
> -        cpuid(0x80000008, &tmp, &e8b, &tmp, &tmp);
> +    if ( boot_cpu_data.extended_cpuid_level >= 0x80000008U )
> +        cpuid(0x80000008U, &tmp, &e8b, &tmp, &tmp);
>      if ( cpu_has_arch_caps )
>          rdmsrl(MSR_ARCH_CAPABILITIES, caps);
>  
> @@ -1337,8 +1337,8 @@ void __init init_speculation_mitigations(void)
>           * TODO: Adjust cpu_has_svm_spec_ctrl to be usable earlier on boot.
>           */
>          if ( opt_msr_sc_hvm &&
> -             (boot_cpu_data.extended_cpuid_level >= 0x8000000a) &&
> -             (cpuid_edx(0x8000000a) & (1u << SVM_FEATURE_SPEC_CTRL)) )
> +             (boot_cpu_data.extended_cpuid_level >= 0x8000000aU) &&
> +             (cpuid_edx(0x8000000aU) & (1u << SVM_FEATURE_SPEC_CTRL)) )
>              setup_force_cpu_cap(X86_FEATURE_SC_MSR_HVM);
>      }
>  
> diff --git a/xen/arch/x86/x86_64/acpi_mmcfg.c 
> b/xen/arch/x86/x86_64/acpi_mmcfg.c
> index 2159c68189..cdde7e453c 100644
> --- a/xen/arch/x86/x86_64/acpi_mmcfg.c
> +++ b/xen/arch/x86/x86_64/acpi_mmcfg.c
> @@ -50,7 +50,7 @@ static int __init acpi_mcfg_check_entry(struct 
> acpi_table_mcfg *mcfg,
>  {
>      int year;
>  
> -    if (cfg->address < 0xFFFFFFFF)
> +    if (cfg->address < 0xFFFFFFFFU)
>          return 0;
>  
>      if (!strncmp(mcfg->header.oem_id, "SGI", 3))
> diff --git a/xen/arch/x86/x86_64/pci.c b/xen/arch/x86/x86_64/pci.c
> index aad1c3f7cf..8d33429103 100644
> --- a/xen/arch/x86/x86_64/pci.c
> +++ b/xen/arch/x86/x86_64/pci.c
> @@ -9,7 +9,7 @@
>  #include <asm/io.h>
>  
>  #define PCI_CONF_ADDRESS(sbdf, reg) \
> -    (0x80000000 | ((sbdf).bdf << 8) | ((reg) & ~3))
> +    (0x80000000U | ((sbdf).bdf << 8) | ((reg) & ~3))
>  
>  uint8_t pci_conf_read8(pci_sbdf_t sbdf, unsigned int reg)
>  {
> diff --git a/xen/arch/x86/x86_emulate/x86_emulate.h 
> b/xen/arch/x86/x86_emulate/x86_emulate.h
> index 40d5054fb7..ec6d93fb2f 100644
> --- a/xen/arch/x86/x86_emulate/x86_emulate.h
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.h
> @@ -620,7 +620,7 @@ struct x86_emulate_ctxt
>   * below).
>   * Hence no separate #define-s get added.
>   */
> -#define X86EMUL_OPC_EXT_MASK         0xffff0000
> +#define X86EMUL_OPC_EXT_MASK         0xffff0000U
>  #define X86EMUL_OPC(ext, byte)       ((uint8_t)(byte) | \
>                                        MASK_INSR((ext), X86EMUL_OPC_EXT_MASK))
>  /*
> diff --git a/xen/include/public/arch-x86/xen-x86_64.h 
> b/xen/include/public/arch-x86/xen-x86_64.h
> index 5d9035ed22..7ea579e5fb 100644
> --- a/xen/include/public/arch-x86/xen-x86_64.h
> +++ b/xen/include/public/arch-x86/xen-x86_64.h
> @@ -53,10 +53,10 @@
>  #define FLAT_USER_SS32 FLAT_RING3_SS32
>  #define FLAT_USER_SS   FLAT_USER_SS64
>  
> -#define __HYPERVISOR_VIRT_START 0xFFFF800000000000
> -#define __HYPERVISOR_VIRT_END   0xFFFF880000000000
> -#define __MACH2PHYS_VIRT_START  0xFFFF800000000000
> -#define __MACH2PHYS_VIRT_END    0xFFFF804000000000
> +#define __HYPERVISOR_VIRT_START 0xFFFF800000000000U
> +#define __HYPERVISOR_VIRT_END   0xFFFF880000000000U
> +#define __MACH2PHYS_VIRT_START  0xFFFF800000000000U
> +#define __MACH2PHYS_VIRT_END    0xFFFF804000000000U

Also here ULL?


>  #ifndef HYPERVISOR_VIRT_START
>  #define HYPERVISOR_VIRT_START xen_mk_ulong(__HYPERVISOR_VIRT_START)
> diff --git a/xen/lib/x86/cpuid.c b/xen/lib/x86/cpuid.c
> index 07e5501914..a4ea579ebe 100644
> --- a/xen/lib/x86/cpuid.c
> +++ b/xen/lib/x86/cpuid.c
> @@ -217,10 +217,10 @@ void x86_cpu_policy_fill_native(struct cpu_policy *p)
>      }
>  
>      /* Extended leaves. */
> -    cpuid_leaf(0x80000000, &p->extd.raw[0]);
> +    cpuid_leaf(0x80000000U, &p->extd.raw[0]);
>      for ( i = 1; i <= MIN(p->extd.max_leaf & 0xffffU,
>                            ARRAY_SIZE(p->extd.raw) - 1); ++i )
> -        cpuid_leaf(0x80000000 + i, &p->extd.raw[i]);
> +        cpuid_leaf(0x80000000U + i, &p->extd.raw[i]);
>  
>      /* Don't report leaves from possible lower level hypervisor, for now. */
>      p->hv_limit = 0;
> @@ -421,7 +421,7 @@ int x86_cpuid_copy_to_buffer(const struct cpu_policy *p,
>      /* Extended leaves. */
>      for ( leaf = 0; leaf <= MIN(p->extd.max_leaf & 0xfffful,
>                                  ARRAY_SIZE(p->extd.raw) - 1); ++leaf )
> -        COPY_LEAF(0x80000000 | leaf, XEN_CPUID_NO_SUBLEAF, 
> &p->extd.raw[leaf]);
> +        COPY_LEAF(0x80000000U | leaf, XEN_CPUID_NO_SUBLEAF, 
> &p->extd.raw[leaf]);
>  
>  #undef COPY_LEAF
>  
> @@ -521,7 +521,7 @@ int x86_cpuid_copy_from_buffer(struct cpu_policy *p,
>              p->hv2_limit = l.a;
>              break;
>  
> -        case 0x80000000 ... 0x80000000 + ARRAY_SIZE(p->extd.raw) - 1:
> +        case 0x80000000U ... 0x80000000U + ARRAY_SIZE(p->extd.raw) - 1:
>              if ( data.subleaf != XEN_CPUID_NO_SUBLEAF )
>                  goto out_of_range;
>  
> diff --git a/xen/lib/x86/policy.c b/xen/lib/x86/policy.c
> index a9c60000af..f033d22785 100644
> --- a/xen/lib/x86/policy.c
> +++ b/xen/lib/x86/policy.c
> @@ -22,7 +22,7 @@ int x86_cpu_policies_are_compatible(const struct cpu_policy 
> *host,
>          FAIL_CPUID(7, 0);
>  
>      if ( guest->extd.max_leaf > host->extd.max_leaf )
> -        FAIL_CPUID(0x80000000, NA);
> +        FAIL_CPUID(0x80000000U, NA);
>  
>      /* TODO: Audit more CPUID data. */
>  
> -- 
> 2.41.0
> 



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.