[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [XEN PATCH] x86: p2m-pod: address violation of MISRA C Rule 2.1
On Thu, 27 Jun 2024, Nicola Vetrini wrote: > The label 'out_unmap' is only reachable after ASSERT_UNREACHABLE, > so the code below is only executed upon erroneously reaching that > program point and calling domain_crash, thus resulting in the > for loop after 'out_unmap' to become unreachable in some configurations. > > This is a defensive coding measure to have a safe fallback that is > reachable in non-debug builds, and can thus be deviated with a > comment-based deviation. > > No functional change. > > Signed-off-by: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx> The patch needs rebasing as it doesn't apply to staging anymore Other than that: Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> This is actually going help also in terms of identifying impossible code paths for coverage > --- > docs/misra/safe.json | 8 ++++++++ > xen/arch/x86/mm/p2m-pod.c | 1 + > 2 files changed, 9 insertions(+) > > diff --git a/docs/misra/safe.json b/docs/misra/safe.json > index c213e0a0be3b..b114c9485c86 100644 > --- a/docs/misra/safe.json > +++ b/docs/misra/safe.json > @@ -60,6 +60,14 @@ > }, > { > "id": "SAF-7-safe", > + "analyser": { > + "eclair": "MC3R1.R2.1" > + }, > + "name": "MC3R1.R2.1: statement unreachable in some > configurations", > + "text": "Every path that can reach this statement is preceded by > statements that make it unreachable in certain configurations (e.g. > ASSERT_UNREACHABLE). This is understood as a means of defensive programming." > + }, > + { > + "id": "SAF-8-safe", > "analyser": {}, > "name": "Sentinel", > "text": "Next ID to be used" > diff --git a/xen/arch/x86/mm/p2m-pod.c b/xen/arch/x86/mm/p2m-pod.c > index bd84fe9e27ee..5a96c46a2286 100644 > --- a/xen/arch/x86/mm/p2m-pod.c > +++ b/xen/arch/x86/mm/p2m-pod.c > @@ -1040,6 +1040,7 @@ out_unmap: > * Something went wrong, probably crashing the domain. Unmap > * everything and return. > */ > + /* SAF-7-safe Rule 2.1: defensive programming */ > for ( i = 0; i < count; i++ ) > if ( map[i] ) > unmap_domain_page(map[i]); > -- > 2.34.1 >
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |