From nobody Thu Nov 21 15:28:30 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=bugseng.com ARC-Seal: i=1; a=rsa-sha256; t=1725554339; cv=none; d=zohomail.com; s=zohoarc; b=bASXr2MJIks0KOCaBaqcVuO+7MT0v7biOa0kJAUlp3W6VVl0ip2SQRF1vHBsebY4LcjqwvA+K+KTrGdAoIeKF292UQlZaKv7DPBRuybwfH6O5OaTv0coFLYVwrbt3gBzXbmxAAb68htYNuIFF9Zv2bblKYtTfmECnL8I0q9HXBw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1725554339; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=1V3ZyIEn3VZW6WOKnPaVnALtfpMnsRzsx29JoOBoCi0=; b=TWKVPbPjgJnwXsinUPopxgWqeDeBNNKoBCEsb9ub3B+6Z7e05RbPDyZ1mDT1m/VU4LJajj56ibnRs4ZWOsi+iL0+NAnY5ADpTPI+sOglHNgOj7/+1fkJM4LrVo2sCM45gV7srQ0ijJ1PQQLQefkS6R0Z4X79+8HI/q5GwcBOpeE= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1725554339244849.613694946723; Thu, 5 Sep 2024 09:38:59 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.791300.1201180 (Exim 4.92) (envelope-from ) id 1smFVC-0000vP-Cn; Thu, 05 Sep 2024 16:38:34 +0000 Received: by outflank-mailman (output) from mailman id 791300.1201180; Thu, 05 Sep 2024 16:38:34 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1smFVC-0000vI-9x; Thu, 05 Sep 2024 16:38:34 +0000 Received: by outflank-mailman (input) for mailman id 791300; Thu, 05 Sep 2024 16:38:32 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1smFVA-0000v8-NV for xen-devel@lists.xenproject.org; Thu, 05 Sep 2024 16:38:32 +0000 Received: from support.bugseng.com (mail.bugseng.com [162.55.131.47]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 484024ac-6ba5-11ef-99a1-01e77a169b0f; Thu, 05 Sep 2024 18:38:29 +0200 (CEST) Received: from nico.bugseng.com (unknown [46.228.253.214]) by support.bugseng.com (Postfix) with ESMTPSA id 970DA4EE07CF; Thu, 5 Sep 2024 18:38:27 +0200 (CEST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 484024ac-6ba5-11ef-99a1-01e77a169b0f DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bugseng.com; s=mail; t=1725554309; bh=/5WhGxobj+xMwraQpAWuieE0VxYdLkCjiymEqlknPGI=; h=From:To:Cc:Subject:Date:From; b=FJRyeXu0XlYsxbyhhJHt6bdJ89IIT5QdcvZb9voavO3yUO1p5t/F0xnVMjcvRomC9 tS5KlrgoxBDiSYz0ugEAJrDXQOz7HQ4RbeUyn6fVmcaNAQyBnZIhBuyc3fve9hMeNu cPPnKHuOV/aATdhSPtJtvbELyRa/yzYOgDikGq8dtbq0qCuyvKc7gqUQ6kGN0JQPKH RAiSedGlAz/4/8folTBAhuV8uOjiOkyetFA/pUQq8dgvLEowcaAhd7XJ5t+LBAwY1C 48tE60mjTROraxhBNbIqOazenbeGyUegLCrrv2V9FEqtw1qKaiDCab8AP8ovNae5hT ARf9qhJXx+v/Q== From: Nicola Vetrini To: xen-devel@lists.xenproject.org Cc: sstabellini@kernel.org, michal.orzel@amd.com, xenia.ragiadakou@amd.com, ayan.kumar.halder@amd.com, consulting@bugseng.com, Nicola Vetrini , Simone Ballarin , Doug Goldstein , Andrew Cooper , Jan Beulich , Julien Grall Subject: [XEN PATCH] automation/eclair_analysis: address violations of Rule 18.2 Date: Thu, 5 Sep 2024 18:37:57 +0200 Message-ID: X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @bugseng.com) X-ZM-MESSAGEID: 1725554341203116600 Content-Type: text/plain; charset="utf-8" MISRA C Rule 18.2 states: "Subtraction between pointers shall only be applied to pointers that address elements of the same array". Subtractions between pointer where at least one symbol is a symbol defined by the linker are safe and thus deviated, because the compiler cannot exploit the undefined behaviour that would arise from violating the rules in this case. To create an ECLAIR configuration that contains the list of linker-defined symbols, the script "linker-symbols.sh" is used after a build of xen (without static analysis) is performed. The generated file "linker_symbols.ecl" is then used as part of the static analysis configuration. Additional changes to the ECLAIR integration are: - perform a build of xen without static analysis during prepare.sh - run the scripts to generated ECL configuration during the prepare.sh, rather than analysis.sh - export ECLAIR_PROJECT_ROOT earlier, to allow such generation Additionally, the macro page_to_mfn performs a subtraction that is safe, so its uses are deviated. No functional changes. Signed-off-by: Nicola Vetrini Acked-by: Stefano Stabellini --- Macro page_to_pdx is also the cause of some caution reports: perhaps that should be deviated as well, since its definition is very similar to page_to_mfn. Relevant CI runs: - arm64: https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecd= f/xen-project/people/bugseng/xen/ECLAIR_normal/MC3R1.R18.2/ARM64/7754928624= /PROJECT.ecd;/by_service/MC3R1.R18.2.html - x86_64: https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ec= df/xen-project/people/bugseng/xen/ECLAIR_normal/MC3R1.R18.2/X86_64/77549286= 13/PROJECT.ecd;/by_service/MC3R1.R18.2.html - x86_64 (without page_to_pdx reports): https://saas.eclairit.com:3787/fs/v= ar/local/eclair/xen-project.ecdf/xen-project/people/bugseng/xen/ECLAIR_norm= al/MC3R1.R18.2/X86_64/7754928613/PROJECT.ecd;/by_service/MC3R1.R18.2.html#{= "select":true,"selection":{"hiddenAreaKinds":[],"hiddenSubareaKinds":[],"sh= ow":false,"selector":{"enabled":true,"negated":false,"kind":0,"domain":"mes= sage","inputs":[{"enabled":true,"text":"^.*expanded from macro `page_to_pdx= '"}]}}} --- automation/eclair_analysis/ECLAIR/analyze.sh | 6 ---- .../eclair_analysis/ECLAIR/deviations.ecl | 11 +++++++ .../eclair_analysis/ECLAIR/generate_ecl.sh | 3 ++ .../ECLAIR/generate_linker_symbols.sh | 31 +++++++++++++++++++ automation/eclair_analysis/prepare.sh | 6 +++- automation/scripts/eclair | 3 ++ docs/misra/deviations.rst | 10 ++++++ 7 files changed, 63 insertions(+), 7 deletions(-) create mode 100755 automation/eclair_analysis/ECLAIR/generate_linker_symbo= ls.sh diff --git a/automation/eclair_analysis/ECLAIR/analyze.sh b/automation/ecla= ir_analysis/ECLAIR/analyze.sh index e96456c3c18d..1dc63c1bc2d0 100755 --- a/automation/eclair_analysis/ECLAIR/analyze.sh +++ b/automation/eclair_analysis/ECLAIR/analyze.sh @@ -73,17 +73,11 @@ export ECLAIR_WORKSPACE=3D"${ECLAIR_DATA_DIR}/eclair_wo= rkspace" # Identifies the particular build of the project. export ECLAIR_PROJECT_NAME=3D"XEN_${VARIANT}-${SET}" -# All paths mentioned in ECLAIR reports that are below this directory -# will be presented as relative to ECLAIR_PROJECT_ROOT. -export ECLAIR_PROJECT_ROOT=3D"${PWD}" # Erase and recreate the output directory and the data directory. rm -rf "${ECLAIR_OUTPUT_DIR:?}/*" mkdir -p "${ECLAIR_DATA_DIR}" -# Generate additional configuration files -"${SCRIPT_DIR}/generate_ecl.sh" - # Perform the build (from scratch) in an ECLAIR environment. "${ECLAIR_BIN_DIR}eclair_env" \ "-config_file=3D'${SCRIPT_DIR}/analysis.ecl'" \ diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl b/automation/= eclair_analysis/ECLAIR/deviations.ecl index 9051f4160282..a56805a993cd 100644 --- a/automation/eclair_analysis/ECLAIR/deviations.ecl +++ b/automation/eclair_analysis/ECLAIR/deviations.ecl @@ -533,6 +533,17 @@ safe." # Series 18. # +-doc_begin=3D"Subtractions between pointers involving at least one of the = linker symbols specified by the regex below +are guaranteed not to be exploited by a compiler that relies on the absenc= e of +C99 Undefined Behaviour 45: Pointers that do not point into, or just beyon= d, the same array object are subtracted (6.5.6)." +-eval_file=3Dlinker_symbols.ecl +-config=3DMC3R1.R18.2,reports+=3D{safe, "any_area(stmt(operator(sub)&&chil= d(lhs||rhs, skip(__non_syntactic_paren_stmts, ref(linker_symbols)))))"} +-doc_end + +-doc_begin=3D"The following macro performs a subtraction between pointers = to obtain the mfn, but does not lead to undefined behaviour." +-config=3DMC3R1.R18.2,reports+=3D{safe, "any_area(any_loc(any_exp(macro(^p= age_to_mfn$))))"} +-doc_end + -doc_begin=3D"Flexible array members are deliberately used and XEN develop= ers are aware of the dangers related to them: unexpected result when the structure is given as argument to a sizeof() op= erator and the truncation in assignment between structures." -config=3DMC3R1.R18.7,reports+=3D{deliberate, "any()"} diff --git a/automation/eclair_analysis/ECLAIR/generate_ecl.sh b/automation= /eclair_analysis/ECLAIR/generate_ecl.sh index 66766b23abb7..f421a4a16a6c 100755 --- a/automation/eclair_analysis/ECLAIR/generate_ecl.sh +++ b/automation/eclair_analysis/ECLAIR/generate_ecl.sh @@ -17,3 +17,6 @@ accepted_rst=3D"${ECLAIR_PROJECT_ROOT}/docs/misra/rules.r= st" # Generate accepted guidelines "${script_dir}/accepted_guidelines.sh" "${accepted_rst}" + +# Generate the list of linker-defined symbols (must be run after a Xen bui= ld) +"${script_dir}/generate_linker_symbols.sh" diff --git a/automation/eclair_analysis/ECLAIR/generate_linker_symbols.sh b= /automation/eclair_analysis/ECLAIR/generate_linker_symbols.sh new file mode 100755 index 000000000000..19943ba98d46 --- /dev/null +++ b/automation/eclair_analysis/ECLAIR/generate_linker_symbols.sh @@ -0,0 +1,31 @@ +#!/bin/bash + +set -e + +script_name=3D"$(basename "$0")" +script_dir=3D"$( + cd "$(dirname "$0")" + echo "${PWD}" +)" + +fatal() { + echo "${script_name}: $*" >&2 + exit 1 +} + +arch=3D"" +if [ "${XEN_TARGET_ARCH}" =3D=3D "x86_64" ]; then + arch=3Dx86 +elif [ "${XEN_TARGET_ARCH}" =3D=3D "arm64" ]; then + arch=3Darm +else + fatal "Unknown configuration: $1" +fi + +outfile=3D${script_dir}/linker_symbols.ecl + +( + echo -n "-decl_selector+=3D{linker_symbols, \"^(" >"${outfile}" + "${script_dir}/../linker-symbols.sh" "${arch}" | sort -u | tr '\n' '|' |= sed '$ s/|//' >>"${outfile}" + echo -n ")$\"}" >>"${outfile}" +) diff --git a/automation/eclair_analysis/prepare.sh b/automation/eclair_anal= ysis/prepare.sh index 47b2a2f32a84..3a646414a392 100755 --- a/automation/eclair_analysis/prepare.sh +++ b/automation/eclair_analysis/prepare.sh @@ -39,10 +39,14 @@ fi cp "${CONFIG_FILE}" xen/.config make clean find . -type f -name "*.safparse" -print -delete + "${script_dir}/build.sh" "$1" + # Generate additional configuration files + "${script_dir}/ECLAIR/generate_ecl.sh" + make clean cd xen make -f "${script_dir}/Makefile.prepare" prepare # Translate the /* SAF-n-safe */ comments into ECLAIR CBTs scripts/xen-analysis.py --run-eclair --no-build --no-clean # Translate function-properties.json into ECLAIR properties - python3 ${script_dir}/propertyparser.py + python3 "${script_dir}/propertyparser.py" ) diff --git a/automation/scripts/eclair b/automation/scripts/eclair index 3ec760bab8b3..0a2353c20a92 100755 --- a/automation/scripts/eclair +++ b/automation/scripts/eclair @@ -3,6 +3,9 @@ ECLAIR_ANALYSIS_DIR=3Dautomation/eclair_analysis ECLAIR_DIR=3D"${ECLAIR_ANALYSIS_DIR}/ECLAIR" ECLAIR_OUTPUT_DIR=3D$(realpath "${ECLAIR_OUTPUT_DIR}") +# All paths mentioned in ECLAIR reports that are below this directory +# will be presented as relative to ECLAIR_PROJECT_ROOT. +export ECLAIR_PROJECT_ROOT=3D"${PWD}" "${ECLAIR_ANALYSIS_DIR}/prepare.sh" "${VARIANT}" diff --git a/docs/misra/deviations.rst b/docs/misra/deviations.rst index b66c271c4e7c..39cd1de1e5b2 100644 --- a/docs/misra/deviations.rst +++ b/docs/misra/deviations.rst @@ -501,6 +501,16 @@ Deviations related to MISRA C:2012 Rules: - __builtin_memset() - cpumask_check() + * - R18.2 + - Subtractions between pointers where at least one of the operand is a + pointer to a symbol defined by the linker are safe. + - Tagged as `safe` for ECLAIR. + + * - R18.2 + - Subtraction between pointers encapsulated by macro page_to_mfn + are safe. + - Tagged as `safe` for ECLAIR. + * - R20.4 - The override of the keyword \"inline\" in xen/compiler.h is present= so that section contents checks pass when the compiler chooses not to -- 2.43.0