[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH] xen: Add SAF deviations for MISRA C:2012 Rule 7.1


  • To: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • From: Luca Fancellu <Luca.Fancellu@xxxxxxx>
  • Date: Wed, 4 Oct 2023 10:52:06 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PGZw3uCAXhMR0FbnKuWrpcAvNv+ZkLAdFK5p1GdQEpQ=; b=gStUZ+6P7Wa2b2ygGI4bBR9IBapm+G0uquh9+zsB3rXm8fNKuHl9cuajby4uaAwKNTd5CjpB6+C/A0awTRODSFiZqviS/KhKzOYh0xeGWuT3R/0r+f36GdnmfDFiqRXv6V6YZTAioHod10jP7rRD8dKqVL68P4mN/NGCTjR8cus+2Q+5duxkNnf6urB7t5Xj07ozGyyr3oHqpAtNffemOEp4T4YEhQq+fR6QCSlbK/kDTxaYke+52qLq6VTNjECiD1wyRA+7mSsc0g+R7cw1BZ9DnXh7dQ43W7iUXo+cllCBvHUZM4g9U82+QLttCcwGh3n44UprfLj3rDUrDWlbFQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NPOe8kTzOkjiMFvp/mE6/4M3nVlUho31uMc4nx+krOonT5s34IqSz6CFOcatbixT5yJaray7nOXRBks/F5wit3RGq2DBQfidOyiIqqyBuNQ6QpE2xPqGxfnVAIvgyZNKiEBPnojVJXZ256VG/sypD2L4KNRszs4kzqNVPNldP/G+7/lJCcMUXrwM7aG79u5tVP7gptSFBZdlH+P52UOF3C3NZgfr6RB+vlxztTJBYRqvG+7Mne2V/trGcW81sI67//9MVFFOFt341cn3+lR0ss0mLsevMVdgRF8WSN93uxjPE6Nbabz2Ca2q1yoQFwitmB9QYDwa6I1OfMAS59XZew==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "michal.orzel@xxxxxxx" <michal.orzel@xxxxxxx>, "xenia.ragiadakou@xxxxxxx" <xenia.ragiadakou@xxxxxxx>, Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>, "consulting@xxxxxxxxxxx" <consulting@xxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>, Simone Ballarin <simone.ballarin@xxxxxxxxxxx>, Doug Goldstein <cardoe@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Wei Liu <wl@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Delivery-date: Wed, 04 Oct 2023 10:53:48 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHZ9qj87vFsnMRst0ybMa+ffKOLU7A5Z4mAgAAGhgCAAAYzgA==
  • Thread-topic: [XEN PATCH] xen: Add SAF deviations for MISRA C:2012 Rule 7.1


> On 4 Oct 2023, at 11:29, Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx> wrote:
> 
> On 04/10/2023 12:06, Luca Fancellu wrote:
>> Hi Nicola,
>>> On 4 Oct 2023, at 10:56, andrew.cooper3@xxxxxxxxxx wrote:
>>> On 03/10/2023 9:46 pm, Stefano Stabellini wrote:
>>>> On Tue, 3 Oct 2023, Nicola Vetrini wrote:
>>>>> As specified in rules.rst, these constants can be used
>>>>> in the code.
>>>>> Their deviation is now accomplished by using a SAF comment,
>>>>> rather than an ECLAIR configuration.
>>>>> Signed-off-by: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
>>>> "SAF" discussion aside that can be resolved elsewhere:
>>>> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
>>> Well no.  "SAF" aside (and SAF does need fixing before reposting this 
>>> patch, otherwise it's just unnecessary churn), ...
>>>>> diff --git a/xen/arch/x86/hvm/svm/svm.h b/xen/arch/x86/hvm/svm/svm.h
>>>>> index d2a781fc3fb5..d0623b72ccfa 100644
>>>>> --- a/xen/arch/x86/hvm/svm/svm.h
>>>>> +++ b/xen/arch/x86/hvm/svm/svm.h
>>>>> @@ -57,14 +57,23 @@ static inline void svm_invlpga(unsigned long linear, 
>>>>> uint32_t asid)
>>>>> #define INSTR_INT3 INSTR_ENC(X86EMUL_OPC( 0, 0xcc), 0)
>>>>> #define INSTR_ICEBP INSTR_ENC(X86EMUL_OPC( 0, 0xf1), 0)
>>>>> #define INSTR_HLT INSTR_ENC(X86EMUL_OPC( 0, 0xf4), 0)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_XSETBV INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0321)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_VMRUN INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0330)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_VMCALL INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0331)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_VMLOAD INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0332)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_VMSAVE INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0333)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_STGI INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0334)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_CLGI INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0335)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_INVLPGA INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0337)
>>>>> +/* SAF-2-safe */
>>>>> #define INSTR_RDTSCP INSTR_ENC(X86EMUL_OPC(0x0f, 0x01), 0371)
>>>>> #define INSTR_INVD INSTR_ENC(X86EMUL_OPC(0x0f, 0x08), 0)
>>>>> #define INSTR_WBINVD INSTR_ENC(X86EMUL_OPC(0x0f, 0x09), 0)
>>> ... this has broken a tabulated structure to have comments ahead of lines 
>>> with octal numbers, while ...
>>>>> diff --git a/xen/arch/x86/hvm/svm/emulate.c 
>>>>> b/xen/arch/x86/hvm/svm/emulate.c
>>>>> index aa2c61c433b3..c5e3341c6316 100644
>>>>> --- a/xen/arch/x86/hvm/svm/emulate.c
>>>>> +++ b/xen/arch/x86/hvm/svm/emulate.c
>>>>> @@ -90,9 +90,9 @@ unsigned int svm_get_insn_len(struct vcpu *v, unsigned 
>>>>> int instr_enc)
>>>>> if ( !instr_modrm )
>>>>> return emul_len;
>>>>> - if ( modrm_mod == MASK_EXTR(instr_modrm, 0300) &&
>>>>> - (modrm_reg & 7) == MASK_EXTR(instr_modrm, 0070) &&
>>>>> - (modrm_rm & 7) == MASK_EXTR(instr_modrm, 0007) )
>>>>> + if ( modrm_mod == MASK_EXTR(instr_modrm, 0300) && /* SAF-2-safe */
>>>>> + (modrm_reg & 7) == MASK_EXTR(instr_modrm, 0070) && /* SAF-2-safe */
>>>>> + (modrm_rm & 7) == MASK_EXTR(instr_modrm, 0007) ) /* SAF-2-safe */
>>>>> return emul_len;
>>>>> }
>>> ... this has comments at the end of lines with octal numbers.
>>> So which is it?
>> I agree with Andrew here in this sense: the in-code comment is
>> supposed to be on the line *before* the violation,
>> not on the same line, so I’m also wondering how it is fixing the very
>> first violation.
>> Cheers,
>> Luca
> 

Hi Nicola,

> Actually it justifies what is on either the previous line or the same because 
> it's
> translated to /* -E> safe MC3R1.R7.1 1 */, where the last number is how many 
> lines besides
> the current one are to be deviated (e.g. you can have 0 deviate only the 
> current line).

Just to understand, does this way:

<line A>
/* -E> safe MC3R1.R7.1 1 */
<line B>

Justifies only line B? Because I thought so, but now I want to be sure, 
otherwise it doesn’t act
as intended.


> Most of the times the current form is what's needed, as you would put the 
> comment on a line
> of its own. In the case of the if that would break the formatting. The 
> downside of doing the same thing on the table is that the first entry not to 
> be deviated would actually be deviated.
> 
> #define INSTR_INVD INSTR_ENC(X86EMUL_OPC(0x0f, 0x08), 0)
> 
> This may not be problematic, since 0 could be considered an octal constant, 
> but is an
> exception explicitly listed in the MISRA rule.
> For the same reason the line
> 
> return emul_len;
> 
> is deviated by the above comment, but putting an octal constant there would 
> for sure
> be the result of a deliberate choice. There's the alternative of:
> 
>                          /* SAF-2-safe */
>   if ( modrm_mod      == MASK_EXTR(instr_modrm, 0300) &&
>                          /* SAF-2-safe */
>       (modrm_reg & 7) == MASK_EXTR(instr_modrm, 0070) &&
>                          /* SAF-2-safe */
>       (modrm_rm & 7)  == MASK_EXTR(instr_modrm, 0007) )
> 
> to make it consistent with the table and avoid any "hidden" deviated line or, 
> again,
> the modification of the translation script so that it doesn't use a fixed "1" 
> offset, which
> is motivated by what you wrote on the thread of the modification of 
> xen_analysis.py.

From the documentation:

    In the Xen codebase, these tags will be used to document and suppress 
findings:

    - SAF-X-safe: This tag means that the next line of code contains a finding, 
but
      the non compliance to the checker is analysed and demonstrated to be safe.

I understand that Eclair is capable of suppressing also the line in which the 
in-code suppression
comment resides, but these generic Xen in-code suppression comment are meant to 
be used
by multiple static analysis tools and many of them suppress only the line next 
to the comment
(Coverity, cppcheck).

So I’m in favour of your approach below, clearly it depends on what the 
maintainers feedback is:

> 
>                          /* SAF-2-safe */
>   if ( modrm_mod      == MASK_EXTR(instr_modrm, 0300) &&
>                          /* SAF-2-safe */
>       (modrm_reg & 7) == MASK_EXTR(instr_modrm, 0070) &&
>                          /* SAF-2-safe */
>       (modrm_rm & 7)  == MASK_EXTR(instr_modrm, 0007) )


Cheer,
Luca




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.