All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
@ 2016-02-18 10:45 Corneliu ZUZU
  2016-02-18 10:47 ` Razvan Cojocaru
  2016-02-18 10:50 ` Andrew Cooper
  0 siblings, 2 replies; 7+ messages in thread
From: Corneliu ZUZU @ 2016-02-18 10:45 UTC (permalink / raw)
  To: xen-devel
  Cc: Andrew Cooper, Tamas K Lengyel, Keir Fraser, Jan Beulich,
	Razvan Cojocaru

c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to common-side",
introduced a use without initialization issue.
hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true that
ors some bits into req->flags which was never initialised.
Reported by Coverity Scan.

Initializes req @ hvm_event_breakpoint entry.

Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com>
---
 xen/arch/x86/hvm/event.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
index 874a36c..cb9c152 100644
--- a/xen/arch/x86/hvm/event.c
+++ b/xen/arch/x86/hvm/event.c
@@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
 {
     struct vcpu *curr = current;
     struct arch_domain *ad = &curr->domain->arch;
-    vm_event_request_t req;
+    vm_event_request_t req = {};
 
     switch ( type )
     {
-- 
2.5.0

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
  2016-02-18 10:45 [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6 Corneliu ZUZU
@ 2016-02-18 10:47 ` Razvan Cojocaru
  2016-02-18 14:10   ` Tamas K Lengyel
  2016-02-18 10:50 ` Andrew Cooper
  1 sibling, 1 reply; 7+ messages in thread
From: Razvan Cojocaru @ 2016-02-18 10:47 UTC (permalink / raw)
  To: Corneliu ZUZU, xen-devel
  Cc: Andrew Cooper, Tamas K Lengyel, Keir Fraser, Jan Beulich

On 02/18/2016 12:45 PM, Corneliu ZUZU wrote:
> c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to common-side",
> introduced a use without initialization issue.
> hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true that
> ors some bits into req->flags which was never initialised.
> Reported by Coverity Scan.
> 
> Initializes req @ hvm_event_breakpoint entry.
> 
> Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com>
> ---
>  xen/arch/x86/hvm/event.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
> index 874a36c..cb9c152 100644
> --- a/xen/arch/x86/hvm/event.c
> +++ b/xen/arch/x86/hvm/event.c
> @@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
>  {
>      struct vcpu *curr = current;
>      struct arch_domain *ad = &curr->domain->arch;
> -    vm_event_request_t req;
> +    vm_event_request_t req = {};
>  
>      switch ( type )
>      {

Acked-by: Razvan Cojocaru <rcojocaru@bitdefender.com>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
  2016-02-18 10:45 [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6 Corneliu ZUZU
  2016-02-18 10:47 ` Razvan Cojocaru
@ 2016-02-18 10:50 ` Andrew Cooper
  1 sibling, 0 replies; 7+ messages in thread
From: Andrew Cooper @ 2016-02-18 10:50 UTC (permalink / raw)
  To: Corneliu ZUZU, xen-devel
  Cc: Tamas K Lengyel, Keir Fraser, Jan Beulich, Razvan Cojocaru

On 18/02/16 10:45, Corneliu ZUZU wrote:
> c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to common-side",
> introduced a use without initialization issue.
> hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true that
> ors some bits into req->flags which was never initialised.
> Reported by Coverity Scan.
>
> Initializes req @ hvm_event_breakpoint entry.

Coverity-ID: 1353192

> Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com>

Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

> ---
>  xen/arch/x86/hvm/event.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
> index 874a36c..cb9c152 100644
> --- a/xen/arch/x86/hvm/event.c
> +++ b/xen/arch/x86/hvm/event.c
> @@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
>  {
>      struct vcpu *curr = current;
>      struct arch_domain *ad = &curr->domain->arch;
> -    vm_event_request_t req;
> +    vm_event_request_t req = {};
>  
>      switch ( type )
>      {

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
  2016-02-18 10:47 ` Razvan Cojocaru
@ 2016-02-18 14:10   ` Tamas K Lengyel
  2016-02-18 14:16     ` Razvan Cojocaru
  0 siblings, 1 reply; 7+ messages in thread
From: Tamas K Lengyel @ 2016-02-18 14:10 UTC (permalink / raw)
  To: Razvan Cojocaru
  Cc: Andrew Cooper, xen-devel, Keir Fraser, Jan Beulich, Corneliu ZUZU


[-- Attachment #1.1: Type: text/plain, Size: 1333 bytes --]

On Feb 18, 2016 03:46, "Razvan Cojocaru" <rcojocaru@bitdefender.com> wrote:
>
> On 02/18/2016 12:45 PM, Corneliu ZUZU wrote:
> > c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to
common-side",
> > introduced a use without initialization issue.
> > hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true
that
> > ors some bits into req->flags which was never initialised.
> > Reported by Coverity Scan.
> >
> > Initializes req @ hvm_event_breakpoint entry.
> >
> > Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com>
> > ---
> >  xen/arch/x86/hvm/event.c | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
> > index 874a36c..cb9c152 100644
> > --- a/xen/arch/x86/hvm/event.c
> > +++ b/xen/arch/x86/hvm/event.c
> > @@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
> >  {
> >      struct vcpu *curr = current;
> >      struct arch_domain *ad = &curr->domain->arch;
> > -    vm_event_request_t req;
> > +    vm_event_request_t req = {};

Should this be = { 0 } instead? Also, as I recall the request is not
initialized on any of the paths, so we might as well do it for all of them,
not just here. It would help avoid the listener erronously using some
fields that were not actually initialized as well.

Tamas

[-- Attachment #1.2: Type: text/html, Size: 1818 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
  2016-02-18 14:10   ` Tamas K Lengyel
@ 2016-02-18 14:16     ` Razvan Cojocaru
  2016-02-18 14:18       ` Andrew Cooper
  0 siblings, 1 reply; 7+ messages in thread
From: Razvan Cojocaru @ 2016-02-18 14:16 UTC (permalink / raw)
  To: Tamas K Lengyel
  Cc: Andrew Cooper, xen-devel, Keir Fraser, Jan Beulich, Corneliu ZUZU

On 02/18/2016 04:10 PM, Tamas K Lengyel wrote:
> 
> On Feb 18, 2016 03:46, "Razvan Cojocaru" <rcojocaru@bitdefender.com
> <mailto:rcojocaru@bitdefender.com>> wrote:
>>
>> On 02/18/2016 12:45 PM, Corneliu ZUZU wrote:
>> > c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to
> common-side",
>> > introduced a use without initialization issue.
>> > hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true
> that
>> > ors some bits into req->flags which was never initialised.
>> > Reported by Coverity Scan.
>> >
>> > Initializes req @ hvm_event_breakpoint entry.
>> >
>> > Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com
> <mailto:czuzu@bitdefender.com>>
>> > ---
>> >  xen/arch/x86/hvm/event.c | 2 +-
>> >  1 file changed, 1 insertion(+), 1 deletion(-)
>> >
>> > diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
>> > index 874a36c..cb9c152 100644
>> > --- a/xen/arch/x86/hvm/event.c
>> > +++ b/xen/arch/x86/hvm/event.c
>> > @@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
>> >  {
>> >      struct vcpu *curr = current;
>> >      struct arch_domain *ad = &curr->domain->arch;
>> > -    vm_event_request_t req;
>> > +    vm_event_request_t req = {};
> 
> Should this be = { 0 } instead? Also, as I recall the request is not
> initialized on any of the paths, so we might as well do it for all of
> them, not just here. It would help avoid the listener erronously using
> some fields that were not actually initialized as well.

That should achieve the same thing. I first looked up "= {}" in the Xen
source code and found:

$ grep -R "= {}"
arch/arm/domain_build.c: struct kernel_info kinfo = {};
arch/x86/time.c: struct vcpu_time_info *u, _u = {};
arch/x86/tboot.c: uint8_t nonce[16] = {};
arch/x86/tboot.c: uint8_t nonce[16] = {};
arch/x86/tboot.c: uint8_t nonce[16] = {};
arch/x86/traps.c: unsigned char insns_before[8] = {}, insns_after[16] = {};
arch/x86/x86_emulate/x86_emulate.c: union vex vex = {};
arch/x86/x86_emulate/x86_emulate.c: struct x86_emulate_stub stub = {};
arch/x86/cpu/mtrr/generic.c:struct mtrr_state mtrr_state = {};
arch/x86/cpu/common.c:const struct cpu_dev *__read_mostly
cpu_devs[X86_VENDOR_NUM] = {};
arch/x86/domain.c: unsigned long total[MASK_EXTR(PGT_type_mask,
PGT_type_mask) + 1] = {};
tools/kconfig/expr.c: union string_value lval = {}, rval = {};
common/grant_table.c: struct gnttab_copy_buf src = {};
common/grant_table.c: struct gnttab_copy_buf dest = {};

So I thought that that's the prevailing convention. I've now searched
for "= {0}", and I see that that has also been done, so I suppose either
way is fine as far as the coding style goes?

$ grep -R "= {0}"
arch/arm/mm.c:    lpae_t pte = {0};
arch/arm/mm.c:    lpae_t pte = {0};
drivers/char/exynos4210-uart.c:} exynos4210_com = {0};
drivers/char/pl011.c:} pl011_com = {0};
drivers/char/omap-uart.c:} omap_com = {0};
drivers/char/scif-uart.c:} scif_com = {0};
drivers/char/cadence-uart.c:} cuart_com = {0};
tools/kconfig/nconf.gui.c:attributes_t attributes[ATTR_MAX+1] = {0};
crypto/vmac.c:    uint64_t in[2] = {0}, out[2];


Thanks,
Razvan

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
  2016-02-18 14:16     ` Razvan Cojocaru
@ 2016-02-18 14:18       ` Andrew Cooper
  2016-02-18 15:37         ` Tamas K Lengyel
  0 siblings, 1 reply; 7+ messages in thread
From: Andrew Cooper @ 2016-02-18 14:18 UTC (permalink / raw)
  To: Razvan Cojocaru, Tamas K Lengyel
  Cc: xen-devel, Keir Fraser, Jan Beulich, Corneliu ZUZU

On 18/02/16 14:16, Razvan Cojocaru wrote:
> On 02/18/2016 04:10 PM, Tamas K Lengyel wrote:
>> On Feb 18, 2016 03:46, "Razvan Cojocaru" <rcojocaru@bitdefender.com
>> <mailto:rcojocaru@bitdefender.com>> wrote:
>>> On 02/18/2016 12:45 PM, Corneliu ZUZU wrote:
>>>> c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to
>> common-side",
>>>> introduced a use without initialization issue.
>>>> hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true
>> that
>>>> ors some bits into req->flags which was never initialised.
>>>> Reported by Coverity Scan.
>>>>
>>>> Initializes req @ hvm_event_breakpoint entry.
>>>>
>>>> Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com
>> <mailto:czuzu@bitdefender.com>>
>>>> ---
>>>>  xen/arch/x86/hvm/event.c | 2 +-
>>>>  1 file changed, 1 insertion(+), 1 deletion(-)
>>>>
>>>> diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
>>>> index 874a36c..cb9c152 100644
>>>> --- a/xen/arch/x86/hvm/event.c
>>>> +++ b/xen/arch/x86/hvm/event.c
>>>> @@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
>>>>  {
>>>>      struct vcpu *curr = current;
>>>>      struct arch_domain *ad = &curr->domain->arch;
>>>> -    vm_event_request_t req;
>>>> +    vm_event_request_t req = {};
>> Should this be = { 0 } instead? Also, as I recall the request is not
>> initialized on any of the paths, so we might as well do it for all of
>> them, not just here. It would help avoid the listener erronously using
>> some fields that were not actually initialized as well.
> That should achieve the same thing. I first looked up "= {}" in the Xen
> source code and found:
>
> $ grep -R "= {}"
> arch/arm/domain_build.c: struct kernel_info kinfo = {};
> arch/x86/time.c: struct vcpu_time_info *u, _u = {};
> arch/x86/tboot.c: uint8_t nonce[16] = {};
> arch/x86/tboot.c: uint8_t nonce[16] = {};
> arch/x86/tboot.c: uint8_t nonce[16] = {};
> arch/x86/traps.c: unsigned char insns_before[8] = {}, insns_after[16] = {};
> arch/x86/x86_emulate/x86_emulate.c: union vex vex = {};
> arch/x86/x86_emulate/x86_emulate.c: struct x86_emulate_stub stub = {};
> arch/x86/cpu/mtrr/generic.c:struct mtrr_state mtrr_state = {};
> arch/x86/cpu/common.c:const struct cpu_dev *__read_mostly
> cpu_devs[X86_VENDOR_NUM] = {};
> arch/x86/domain.c: unsigned long total[MASK_EXTR(PGT_type_mask,
> PGT_type_mask) + 1] = {};
> tools/kconfig/expr.c: union string_value lval = {}, rval = {};
> common/grant_table.c: struct gnttab_copy_buf src = {};
> common/grant_table.c: struct gnttab_copy_buf dest = {};
>
> So I thought that that's the prevailing convention. I've now searched
> for "= {0}", and I see that that has also been done, so I suppose either
> way is fine as far as the coding style goes?
>
> $ grep -R "= {0}"
> arch/arm/mm.c:    lpae_t pte = {0};
> arch/arm/mm.c:    lpae_t pte = {0};
> drivers/char/exynos4210-uart.c:} exynos4210_com = {0};
> drivers/char/pl011.c:} pl011_com = {0};
> drivers/char/omap-uart.c:} omap_com = {0};
> drivers/char/scif-uart.c:} scif_com = {0};
> drivers/char/cadence-uart.c:} cuart_com = {0};
> tools/kconfig/nconf.gui.c:attributes_t attributes[ATTR_MAX+1] = {0};
> crypto/vmac.c:    uint64_t in[2] = {0}, out[2];

The two are equivalent as far as C goes.  I prefer the former as it is
slightly shorter.

~Andrew

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6
  2016-02-18 14:18       ` Andrew Cooper
@ 2016-02-18 15:37         ` Tamas K Lengyel
  0 siblings, 0 replies; 7+ messages in thread
From: Tamas K Lengyel @ 2016-02-18 15:37 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: Xen-devel, Keir Fraser, Jan Beulich, Razvan Cojocaru, Corneliu ZUZU


[-- Attachment #1.1: Type: text/plain, Size: 3704 bytes --]

On Thu, Feb 18, 2016 at 7:18 AM, Andrew Cooper <andrew.cooper3@citrix.com>
wrote:

> On 18/02/16 14:16, Razvan Cojocaru wrote:
> > On 02/18/2016 04:10 PM, Tamas K Lengyel wrote:
> >> On Feb 18, 2016 03:46, "Razvan Cojocaru" <rcojocaru@bitdefender.com
> >> <mailto:rcojocaru@bitdefender.com>> wrote:
> >>> On 02/18/2016 12:45 PM, Corneliu ZUZU wrote:
> >>>> c/s f5365e6: "xen/vm-events: Move parts of monitor_domctl code to
> >> common-side",
> >>>> introduced a use without initialization issue.
> >>>> hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true
> >> that
> >>>> ors some bits into req->flags which was never initialised.
> >>>> Reported by Coverity Scan.
> >>>>
> >>>> Initializes req @ hvm_event_breakpoint entry.
> >>>>
> >>>> Signed-off-by: Corneliu ZUZU <czuzu@bitdefender.com
> >> <mailto:czuzu@bitdefender.com>>
> >>>> ---
> >>>>  xen/arch/x86/hvm/event.c | 2 +-
> >>>>  1 file changed, 1 insertion(+), 1 deletion(-)
> >>>>
> >>>> diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c
> >>>> index 874a36c..cb9c152 100644
> >>>> --- a/xen/arch/x86/hvm/event.c
> >>>> +++ b/xen/arch/x86/hvm/event.c
> >>>> @@ -173,7 +173,7 @@ int hvm_event_breakpoint(unsigned long rip,
> >>>>  {
> >>>>      struct vcpu *curr = current;
> >>>>      struct arch_domain *ad = &curr->domain->arch;
> >>>> -    vm_event_request_t req;
> >>>> +    vm_event_request_t req = {};
> >> Should this be = { 0 } instead? Also, as I recall the request is not
> >> initialized on any of the paths, so we might as well do it for all of
> >> them, not just here. It would help avoid the listener erronously using
> >> some fields that were not actually initialized as well.
> > That should achieve the same thing. I first looked up "= {}" in the Xen
> > source code and found:
> >
> > $ grep -R "= {}"
> > arch/arm/domain_build.c: struct kernel_info kinfo = {};
> > arch/x86/time.c: struct vcpu_time_info *u, _u = {};
> > arch/x86/tboot.c: uint8_t nonce[16] = {};
> > arch/x86/tboot.c: uint8_t nonce[16] = {};
> > arch/x86/tboot.c: uint8_t nonce[16] = {};
> > arch/x86/traps.c: unsigned char insns_before[8] = {}, insns_after[16] =
> {};
> > arch/x86/x86_emulate/x86_emulate.c: union vex vex = {};
> > arch/x86/x86_emulate/x86_emulate.c: struct x86_emulate_stub stub = {};
> > arch/x86/cpu/mtrr/generic.c:struct mtrr_state mtrr_state = {};
> > arch/x86/cpu/common.c:const struct cpu_dev *__read_mostly
> > cpu_devs[X86_VENDOR_NUM] = {};
> > arch/x86/domain.c: unsigned long total[MASK_EXTR(PGT_type_mask,
> > PGT_type_mask) + 1] = {};
> > tools/kconfig/expr.c: union string_value lval = {}, rval = {};
> > common/grant_table.c: struct gnttab_copy_buf src = {};
> > common/grant_table.c: struct gnttab_copy_buf dest = {};
> >
> > So I thought that that's the prevailing convention. I've now searched
> > for "= {0}", and I see that that has also been done, so I suppose either
> > way is fine as far as the coding style goes?
> >
> > $ grep -R "= {0}"
> > arch/arm/mm.c:    lpae_t pte = {0};
> > arch/arm/mm.c:    lpae_t pte = {0};
> > drivers/char/exynos4210-uart.c:} exynos4210_com = {0};
> > drivers/char/pl011.c:} pl011_com = {0};
> > drivers/char/omap-uart.c:} omap_com = {0};
> > drivers/char/scif-uart.c:} scif_com = {0};
> > drivers/char/cadence-uart.c:} cuart_com = {0};
> > tools/kconfig/nconf.gui.c:attributes_t attributes[ATTR_MAX+1] = {0};
> > crypto/vmac.c:    uint64_t in[2] = {0}, out[2];
>
> The two are equivalent as far as C goes.  I prefer the former as it is
> slightly shorter.


OK, as long as they are equivalent I'm fine with either. I always use the
{0} syntax, it looks more explicit to me, so just wanted to double-check
that it means the same thing.

Thanks,
Tamas

[-- Attachment #1.2: Type: text/html, Size: 5086 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2016-02-18 15:37 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-02-18 10:45 [PATCH] x86/hvm_event: fix uninitialized struct field usage introduced by c/s f5365e6 Corneliu ZUZU
2016-02-18 10:47 ` Razvan Cojocaru
2016-02-18 14:10   ` Tamas K Lengyel
2016-02-18 14:16     ` Razvan Cojocaru
2016-02-18 14:18       ` Andrew Cooper
2016-02-18 15:37         ` Tamas K Lengyel
2016-02-18 10:50 ` Andrew Cooper

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.