From patchwork Wed Dec 28 10:27:07 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Morten_Br=C3=B8rup?= X-Patchwork-Id: 121446 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5DAEBA04FD; Wed, 28 Dec 2022 11:27:12 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 052BC40FDF; Wed, 28 Dec 2022 11:27:12 +0100 (CET) Received: from smartserver.smartsharesystems.com (smartserver.smartsharesystems.com [77.243.40.215]) by mails.dpdk.org (Postfix) with ESMTP id 5460D40141 for ; Wed, 28 Dec 2022 11:27:10 +0100 (CET) Received: from dkrd2.smartsharesys.local ([192.168.4.12]) by smartserver.smartsharesystems.com with Microsoft SMTPSVC(6.0.3790.4675); Wed, 28 Dec 2022 11:27:09 +0100 From: =?utf-8?q?Morten_Br=C3=B8rup?= To: dev@dpdk.org, roretzla@linux.microsoft.com, rmody@marvell.com Cc: ruifeng.wang@arm.com, zhoumin@loongson.cn, drc@linux.vnet.ibm.com, kda@semihalf.com, bruce.richardson@intel.com, konstantin.v.ananyev@yandex.ru, =?utf-8?q?Morten_Br=C3=B8rup?= Subject: [PATCH v3 1/2] eal: add nonnull and access function attributes Date: Wed, 28 Dec 2022 11:27:07 +0100 Message-Id: <20221228102708.93208-1-mb@smartsharesystems.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221202153432.131023-1-mb@smartsharesystems.com> References: <20221202153432.131023-1-mb@smartsharesystems.com> MIME-Version: 1.0 X-OriginalArrivalTime: 28 Dec 2022 10:27:09.0880 (UTC) FILETIME=[F1440380:01D91AA6] X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add "nonnull" function attribute to help the compiler detect a NULL pointer being passed to a function not accepting NULL pointers as an argument at build time. Add "access" function attribute to tell the compiler how a function accesses its pointer arguments. Add these attributes to the rte_memcpy() function, as the first in hopefully many to come. v3: * No changes. v2: * Only define "nonnull" for GCC and CLANG. * Append _param/_params to prepare for possible future attributes attached directly to the individual parameters, like __rte_unused. * Use RTE_TOOLCHAIN_GCC instead of RTE_CC_GCC, to fix complaints about GCC_VERSION being undefined. * Try to fix Doxygen compliants. Signed-off-by: Morten Brørup Acked-by: Tyler Retzlaff Reviewed-by: Ruifeng Wang --- lib/eal/arm/include/rte_memcpy_32.h | 8 ++++++++ lib/eal/arm/include/rte_memcpy_64.h | 6 ++++++ lib/eal/include/rte_common.h | 29 +++++++++++++++++++++++++++++ lib/eal/ppc/include/rte_memcpy.h | 3 +++ lib/eal/x86/include/rte_memcpy.h | 6 ++++++ 5 files changed, 52 insertions(+) diff --git a/lib/eal/arm/include/rte_memcpy_32.h b/lib/eal/arm/include/rte_memcpy_32.h index fb3245b59c..f454c06eca 100644 --- a/lib/eal/arm/include/rte_memcpy_32.h +++ b/lib/eal/arm/include/rte_memcpy_32.h @@ -14,6 +14,8 @@ extern "C" { #include "generic/rte_memcpy.h" +#include + #ifdef RTE_ARCH_ARM_NEON_MEMCPY #ifndef __ARM_NEON @@ -125,6 +127,9 @@ rte_mov256(uint8_t *dst, const uint8_t *src) memcpy((dst), (src), (n)) : \ rte_memcpy_func((dst), (src), (n)); }) +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static inline void * rte_memcpy_func(void *dst, const void *src, size_t n) { @@ -290,6 +295,9 @@ rte_mov256(uint8_t *dst, const uint8_t *src) memcpy(dst, src, 256); } +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static inline void * rte_memcpy(void *dst, const void *src, size_t n) { diff --git a/lib/eal/arm/include/rte_memcpy_64.h b/lib/eal/arm/include/rte_memcpy_64.h index 85ad587bd3..55cbe07733 100644 --- a/lib/eal/arm/include/rte_memcpy_64.h +++ b/lib/eal/arm/include/rte_memcpy_64.h @@ -282,6 +282,9 @@ void rte_memcpy_ge64(uint8_t *dst, const uint8_t *src, size_t n) } #if RTE_CACHE_LINE_SIZE >= 128 +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static __rte_always_inline void *rte_memcpy(void *dst, const void *src, size_t n) { @@ -303,6 +306,9 @@ void *rte_memcpy(void *dst, const void *src, size_t n) } #else +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static __rte_always_inline void *rte_memcpy(void *dst, const void *src, size_t n) { diff --git a/lib/eal/include/rte_common.h b/lib/eal/include/rte_common.h index 15765b408d..6e4011aa85 100644 --- a/lib/eal/include/rte_common.h +++ b/lib/eal/include/rte_common.h @@ -149,6 +149,35 @@ typedef uint16_t unaligned_uint16_t; __attribute__((format(printf, format_index, first_arg))) #endif +/** + * Check pointer arguments at compile-time. + * + * @param ... + * Comma separated list of parameter indexes of pointer arguments. + */ +#if defined(RTE_CC_GCC) || defined(RTE_CC_CLANG) +#define __rte_nonnull_params(...) \ + __attribute__((nonnull(__VA_ARGS__))) +#else +#define __rte_nonnull_params(...) +#endif + +/** + * Tells compiler about the access mode of a pointer argument. + * + * @param access_mode + * Access mode: read_only, read_write, write_only, or none. + * @param ... + * Parameter index of pointer argument. + * Optionally followeded by comma and parameter index of size argument. + */ +#if defined(RTE_TOOLCHAIN_GCC) && (GCC_VERSION >= 100400) +#define __rte_access_param(access_mode, ...) \ + __attribute__((access(access_mode, __VA_ARGS__))) +#else +#define __rte_access_param(access_mode, ...) +#endif + /** * Tells compiler that the function returns a value that points to * memory, where the size is given by the one or two arguments. diff --git a/lib/eal/ppc/include/rte_memcpy.h b/lib/eal/ppc/include/rte_memcpy.h index 6f388c0234..59a5d86948 100644 --- a/lib/eal/ppc/include/rte_memcpy.h +++ b/lib/eal/ppc/include/rte_memcpy.h @@ -84,6 +84,9 @@ rte_mov256(uint8_t *dst, const uint8_t *src) memcpy((dst), (src), (n)) : \ rte_memcpy_func((dst), (src), (n)); }) +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static inline void * rte_memcpy_func(void *dst, const void *src, size_t n) { diff --git a/lib/eal/x86/include/rte_memcpy.h b/lib/eal/x86/include/rte_memcpy.h index d4d7a5cfc8..2e7161e4e7 100644 --- a/lib/eal/x86/include/rte_memcpy.h +++ b/lib/eal/x86/include/rte_memcpy.h @@ -42,6 +42,9 @@ extern "C" { * @return * Pointer to the destination data. */ +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static __rte_always_inline void * rte_memcpy(void *dst, const void *src, size_t n); @@ -859,6 +862,9 @@ rte_memcpy_aligned(void *dst, const void *src, size_t n) return ret; } +__rte_nonnull_params(1, 2) +__rte_access_param(write_only, 1, 3) +__rte_access_param(read_only, 2, 3) static __rte_always_inline void * rte_memcpy(void *dst, const void *src, size_t n) { From patchwork Wed Dec 28 10:27:08 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Morten_Br=C3=B8rup?= X-Patchwork-Id: 121447 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 61545A04FD; Wed, 28 Dec 2022 11:27:19 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id C84184161A; Wed, 28 Dec 2022 11:27:14 +0100 (CET) Received: from smartserver.smartsharesystems.com (smartserver.smartsharesystems.com [77.243.40.215]) by mails.dpdk.org (Postfix) with ESMTP id 5627940141 for ; Wed, 28 Dec 2022 11:27:11 +0100 (CET) Received: from dkrd2.smartsharesys.local ([192.168.4.12]) by smartserver.smartsharesystems.com with Microsoft SMTPSVC(6.0.3790.4675); Wed, 28 Dec 2022 11:27:10 +0100 From: =?utf-8?q?Morten_Br=C3=B8rup?= To: dev@dpdk.org, roretzla@linux.microsoft.com, rmody@marvell.com Cc: ruifeng.wang@arm.com, zhoumin@loongson.cn, drc@linux.vnet.ibm.com, kda@semihalf.com, bruce.richardson@intel.com, konstantin.v.ananyev@yandex.ru, =?utf-8?q?Morten_Br=C3=B8rup?= Subject: [PATCH v3 2/2] net/bnx2x: fix warnings about rte_memcopy lengths Date: Wed, 28 Dec 2022 11:27:08 +0100 Message-Id: <20221228102708.93208-2-mb@smartsharesystems.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221228102708.93208-1-mb@smartsharesystems.com> References: <20221202153432.131023-1-mb@smartsharesystems.com> <20221228102708.93208-1-mb@smartsharesystems.com> MIME-Version: 1.0 X-OriginalArrivalTime: 28 Dec 2022 10:27:10.0942 (UTC) FILETIME=[F1E60FE0:01D91AA6] X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Bugfix: The vlan in the bulletin does not contain a VLAN header, only the VLAN ID, so only copy 2 byte, not 4. The target structure has padding after the field, so copying 2 byte too many is effectively harmless. There is no need to backport this patch. Added type casts where copying arrays to the offset of a first field in a structure holding multiple fields, to avoid compiler warnings. Bugzilla ID: 1146 Signed-off-by: Morten Brørup v3: * First patch in series. --- drivers/net/bnx2x/bnx2x_stats.c | 6 +++--- drivers/net/bnx2x/bnx2x_vfpf.c | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/net/bnx2x/bnx2x_stats.c b/drivers/net/bnx2x/bnx2x_stats.c index c07b01510a..a5a7aa3b40 100644 --- a/drivers/net/bnx2x/bnx2x_stats.c +++ b/drivers/net/bnx2x/bnx2x_stats.c @@ -819,7 +819,7 @@ bnx2x_hw_stats_update(struct bnx2x_softc *sc) rte_memcpy(old, new, sizeof(struct nig_stats)); - rte_memcpy(&(estats->rx_stat_ifhcinbadoctets_hi), &(pstats->mac_stx[1]), + rte_memcpy((struct mac_stx *)&(estats->rx_stat_ifhcinbadoctets_hi), &(pstats->mac_stx[1]), sizeof(struct mac_stx)); estats->brb_drop_hi = pstats->brb_drop_hi; estats->brb_drop_lo = pstats->brb_drop_lo; @@ -1492,9 +1492,9 @@ bnx2x_stats_init(struct bnx2x_softc *sc) REG_RD(sc, NIG_REG_STAT0_BRB_TRUNCATE + port*0x38); if (!CHIP_IS_E3(sc)) { REG_RD_DMAE(sc, NIG_REG_STAT0_EGRESS_MAC_PKT0 + port*0x50, - &(sc->port.old_nig_stats.egress_mac_pkt0_lo), 2); + (uint32_t *)&(sc->port.old_nig_stats.egress_mac_pkt0_lo), 2); REG_RD_DMAE(sc, NIG_REG_STAT0_EGRESS_MAC_PKT1 + port*0x50, - &(sc->port.old_nig_stats.egress_mac_pkt1_lo), 2); + (uint32_t *)&(sc->port.old_nig_stats.egress_mac_pkt1_lo), 2); } /* function stats */ diff --git a/drivers/net/bnx2x/bnx2x_vfpf.c b/drivers/net/bnx2x/bnx2x_vfpf.c index 63953c2979..87631c76ca 100644 --- a/drivers/net/bnx2x/bnx2x_vfpf.c +++ b/drivers/net/bnx2x/bnx2x_vfpf.c @@ -54,7 +54,7 @@ bnx2x_check_bull(struct bnx2x_softc *sc) if (valid_bitmap & (1 << MAC_ADDR_VALID) && memcmp(bull->mac, sc->old_bulletin.mac, ETH_ALEN)) rte_memcpy(&sc->link_params.mac_addr, bull->mac, ETH_ALEN); if (valid_bitmap & (1 << VLAN_VALID)) - rte_memcpy(&bull->vlan, &sc->old_bulletin.vlan, RTE_VLAN_HLEN); + rte_memcpy(&bull->vlan, &sc->old_bulletin.vlan, sizeof(bull->vlan)); sc->old_bulletin = *bull;