[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v9 4/8] vpci: Hide extended capability when it fails to initialize


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • Date: Wed, 30 Jul 2025 12:46:52 +0200
  • Arc-authentication-results: i=1; bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Arc-message-signature: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; c=relaxed/relaxed; t=1753872412; h=DKIM-Signature:MIME-Version:Date:From:To:Cc:Subject:In-Reply-To: References:Message-ID:X-Sender:Organization:Content-Type: Content-Transfer-Encoding; bh=eMkPulg1lsZDNa1xvddMVBylp40dcQUhLrMmeO8hBjA=; b=El9uHvAQvNars3yW20piAQKZflb7yJoX2QYF6Frkwqz0atRwMTqLgdWSQgOv/TnVU79a /jfJ2YDcTs+378HzxMyYjMqj/wuC3PZQO7Q3ermzufcF4fLH3M49jJsxuSZpxni/0exXT NOpfTw8qA+fCjIw5OjHfqS6YfhBrRZKwaBY5JcBblpRzj8qE0zMaADEt7EKFxj/lfchlu /8dHJgxD8ZrmQXm4PShjQDxcqZtY+0MX9BhMXlyUwH3wUdofIVnfudbTU+dOxxbrcTHyL 6vj/m0ARWTBHW1wBZ94LptcPBlvkd+zCZGe5dY1YI53z4pJp3D/H+rC/S52gEQCtjnxcP YyguuRBtNvyofcyogTM/hDxrcKsCh3hpT6u8/2jUxdCzUesudDbVPvVxZDPKE8RI+1jVT TWjdzzabdj4HwEc1nkjZ9xvMm6kw+j7IYsbFuj1hS5tSmyVOMzf3QgAlDfHgnW3ZQqQdM lAUXHpq7bB9W0pcJVFX+Pmv7EBKeeJ46DcryjD2jkYISTNhxDLRw6mWzfvqg1dwC57WGg a9Tw71Qu13i+4IBazmdi1NwmnI8j5ikmrn7hcWECc0Ajf8YTLweFjhek0LXm1iIJ33t/S qgnqm59cpR3MThUbssCiTkvSh9+GXBHqwOV8LxrSnHnOn8P27iPJEQ0aZlvmWOg=
  • Arc-seal: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; cv=none; t=1753872412; b=tq3nHhDury2ZTo5ubF5fotrKRZ91vGKZpTr5fxZYto3shw5eDOi1Ifs4BgRYhX13siDu gdv29mgKtsrw3XcX9dtcT63jxv6r0xV1witU21MHdTA4F6VbLFTmitAbgB/VqqXkl/hB+ nQnJTihGg1Ma9VWaL5jxFpEiM6y/6CuQ4xLdo8z/pOonoJEZJ6n3diBaqiStNsLb4YyF0 ycSmXk+kJF+eP8DAPVAigYGuXiFK+w+eGyKkpFH5rESS5ex4KKTt68l7OPSipVKCgzjQU djQYBcr36OChGITMru0sYNnliS73nCHiXXpQePvYi7qFHklJJCBQOM7tUFThWIlgM1mo6 S5ngMHhYP9dZWzsID2uJl8jPjzoIuCOXHaMi+nZ23/qUoj9luG32p5i4meb58G8y7Re09 hiifebCnRLSKOnYhySpxFjwpwv9zBtfX7Fm6BOUSvKTJyLBIrg4FwNYxHbvADEB0ssIIg +f7hj8elewtDqI3TXCZ9W54Msu7xwxXWrxS1MVperRLc5ZKoS6GjA1zfeqaOpQ2XvbpPq IWUllOekgQ716SvW7LIKGYDHYPz1joOw61ltNrchjPCZg5b0JGLVmQ13TCN/NCjxcSViO r9K3OqRu4iPXSD6mFC1uiUg3zl3CvFUg+AUfOVEFACmxrdlTHG5NhNRdvYfwnLE=
  • Authentication-results: bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Cc: Jiqian Chen <Jiqian.Chen@xxxxxxx>, Huang Rui <ray.huang@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, consulting@xxxxxxxxxxx
  • Delivery-date: Wed, 30 Jul 2025 10:46:59 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2025-07-30 12:42, Nicola Vetrini wrote:
On 2025-07-30 11:50, Jan Beulich wrote:
On 28.07.2025 07:03, Jiqian Chen wrote:
+static int vpci_ext_capability_hide(
+    const struct pci_dev *pdev, unsigned int cap)
+{
+ const unsigned int offset = pci_find_ext_capability(pdev->sbdf, cap);
+    struct vpci_register *r, *prev_r;
+    struct vpci *vpci = pdev->vpci;
+    uint32_t header, pre_header;
+
+    if ( offset < PCI_CFG_SPACE_SIZE )
+    {
+        ASSERT_UNREACHABLE();
+        return 0;
+    }
+
+    spin_lock(&vpci->lock);
+    r = vpci_get_register(vpci, offset, 4);
+    if ( !r )
+    {
+        spin_unlock(&vpci->lock);
+        return -ENODEV;
+    }
+
+    header = (uint32_t)(uintptr_t)r->private;
+    if ( offset == PCI_CFG_SPACE_SIZE )
+    {
+        if ( PCI_EXT_CAP_NEXT(header) <= PCI_CFG_SPACE_SIZE )
+            r->private = (void *)(uintptr_t)0;

Eclair regards this a Misra rule 11.9 violation. Elsewhere we use (void *)0, which I then would conclude is "fine". But I can't say why that is. Cc-ing
Bugseng for a possible explanation.


Hi Jan,

I only see

0|$ git grep "(void\*)0"
xen/include/xen/types.h:#define NULL ((void*)0)

which is fine for R11.9 of course. As Andrew noted, I don't see the need for the use of uintptr_t either.

Oh, I missed forms using a space before the pointer. In any case, from the rule's Amplification: "Note: a null pointer constant of the form (void *)0 is permitted, whether or not it was expanded from NULL."

--
Nicola Vetrini, B.Sc.
Software Engineer
BUGSENG (https://bugseng.com)
LinkedIn: https://www.linkedin.com/in/nicola-vetrini-a42471253



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.