Hao:
  For PCILIB_TO_COMMON_ADDRESS, we can't assume its usage in the consumer code. 
There may be some usage in other projects. So, I suggest to provide the safe 
fix. 

Thanks
Liming
>-----Original Message-----
>From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Wu,
>Hao A
>Sent: Wednesday, January 25, 2017 8:26 AM
>To: Laszlo Ersek <ler...@redhat.com>
>Cc: edk2-de...@ml01.01.org
>Subject: Re: [edk2] [PATCH v2 1/1] MdePkg: Refine casting expression result
>to bigger size
>
>> -----Original Message-----
>> From: Laszlo Ersek [mailto:ler...@redhat.com]
>> Sent: Tuesday, January 24, 2017 5:54 PM
>> To: Wu, Hao A
>> Cc: edk2-de...@ml01.01.org
>> Subject: Re: [edk2] [PATCH v2 1/1] MdePkg: Refine casting expression result
>to
>> bigger size
>>
>> On 01/24/17 08:25, Hao Wu wrote:
>> > There are cases that the operands of an expression are all with rank less
>> > than UINT64/INT64 and the result of the expression is explicitly casted to
>> > UINT64/INT64 to fit the target size.
>> >
>> > An example will be:
>> > UINT32 a,b;
>> > // a and b can be any unsigned int type with rank less than UINT64, like
>> > // UINT8, UINT16, etc.
>> > UINT64 c;
>> > c = (UINT64) (a + b);
>> >
>> > Some static code checkers may warn that the expression result might
>> > overflow within the rank of "int" (integer promotions) and the result is
>> > then cast to a bigger size.
>> >
>> > The commit refines codes by the following rules:
>> > 1). When the expression will not overflow within the rank of "int", remove
>> > the explicit type casts:
>> > c = a + b;
>> >
>> > 2). When the expression is possible to overflow the range of unsigned int/
>> > int:
>> > c = (UINT64)a + b;
>> >
>> > Contributed-under: TianoCore Contribution Agreement 1.0
>> > Signed-off-by: Hao Wu <hao.a...@intel.com>
>> > ---
>> >  MdePkg/Library/BaseLib/String.c                              |  4 ++--
>> >  MdePkg/Library/BasePeCoffLib/BasePeCoff.c                    | 12 
>> > +++++-------
>> >  MdePkg/Library/BaseS3PciLib/S3PciLib.c                       |  4 ++--
>> >  MdePkg/Library/SmmMemoryAllocationLib/MemoryAllocationLib.c  |  4
>++--
>> >  MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c |  4
>++--
>> >  5 files changed, 13 insertions(+), 15 deletions(-)
>> >
>> > diff --git a/MdePkg/Library/BaseLib/String.c
>> b/MdePkg/Library/BaseLib/String.c
>> > index e84bf50..4151e0e 100644
>> > --- a/MdePkg/Library/BaseLib/String.c
>> > +++ b/MdePkg/Library/BaseLib/String.c
>> > @@ -586,7 +586,7 @@ InternalHexCharToUintn (
>> >      return Char - L'0';
>> >    }
>> >
>> > -  return (UINTN) (10 + InternalCharToUpper (Char) - L'A');
>> > +  return (10 + InternalCharToUpper (Char) - L'A');
>> >  }
>> >
>> >  /**
>> > @@ -1211,7 +1211,7 @@ InternalAsciiHexCharToUintn (
>> >      return Char - '0';
>> >    }
>> >
>> > -  return (UINTN) (10 + InternalBaseLibAsciiToUpper (Char) - 'A');
>> > +  return (10 + InternalBaseLibAsciiToUpper (Char) - 'A');
>> >  }
>> >
>> >
>> > diff --git a/MdePkg/Library/BasePeCoffLib/BasePeCoff.c
>> b/MdePkg/Library/BasePeCoffLib/BasePeCoff.c
>> > index 33cad23..8d1daba 100644
>> > --- a/MdePkg/Library/BasePeCoffLib/BasePeCoff.c
>> > +++ b/MdePkg/Library/BasePeCoffLib/BasePeCoff.c
>> > @@ -15,7 +15,7 @@
>> >    PeCoffLoaderGetPeHeader() routine will do basic check for PE/COFF
>header.
>> >    PeCoffLoaderGetImageInfo() routine will do basic check for whole
>PE/COFF
>> image.
>> >
>> > -  Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR>
>> > +  Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
>> >    Portions copyright (c) 2008 - 2009, Apple Inc. All rights reserved.<BR>
>> >    This program and the accompanying materials
>> >    are licensed and made available under the terms and conditions of the
>BSD
>> License
>> > @@ -703,12 +703,10 @@ PeCoffLoaderGetImageInfo (
>> >        //
>> >        DebugDirectoryEntryFileOffset = 0;
>> >
>> > -      SectionHeaderOffset = (UINTN)(
>> > -                               ImageContext->PeCoffHeaderOffset +
>> > -                               sizeof (UINT32) +
>> > -                               sizeof (EFI_IMAGE_FILE_HEADER) +
>> > -                               Hdr.Pe32->FileHeader.SizeOfOptionalHeader
>> > -                               );
>> > +      SectionHeaderOffset = ImageContext->PeCoffHeaderOffset +
>> > +                            sizeof (UINT32) +
>> > +                            sizeof (EFI_IMAGE_FILE_HEADER) +
>> > +                            Hdr.Pe32->FileHeader.SizeOfOptionalHeader;
>> >
>> >        for (Index = 0; Index < Hdr.Pe32->FileHeader.NumberOfSections;
>Index++)
>> {
>> >          //
>> > diff --git a/MdePkg/Library/BaseS3PciLib/S3PciLib.c
>> b/MdePkg/Library/BaseS3PciLib/S3PciLib.c
>> > index e29f7fe..27342b0 100644
>> > --- a/MdePkg/Library/BaseS3PciLib/S3PciLib.c
>> > +++ b/MdePkg/Library/BaseS3PciLib/S3PciLib.c
>> > @@ -3,7 +3,7 @@
>> >    the PCI operations to be replayed during an S3 resume. This library 
>> > class
>> >    maps directly on top of the PciLib class.
>> >
>> > -  Copyright (c) 2006 - 2012, Intel Corporation. All rights reserved.<BR>
>> > +  Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
>> >
>> >    This program and the accompanying materials
>> >    are licensed and made available under the terms and conditions
>> > @@ -25,7 +25,7 @@
>> >  #include <Library/S3PciLib.h>
>> >
>> >  #define PCILIB_TO_COMMON_ADDRESS(Address) \
>> > -        ((UINT64) ((((UINTN) ((Address>>20) & 0xff)) << 24) + (((UINTN)
>> ((Address>>15) & 0x1f)) << 16) + (((UINTN) ((Address>>12) & 0x07)) << 8) +
>> ((UINTN) (Address & 0xfff ))))
>> > +        ((((UINTN) ((Address>>20) & 0xff)) << 24) + (((UINTN)
>((Address>>15) &
>> 0x1f)) << 16) + (((UINTN) ((Address>>12) & 0x07)) << 8) + ((UINTN)
>(Address &
>> 0xfff )))
>> >
>> >  /**
>> >    Saves a PCI configuration value to the boot script.
>>
>> I think this change is potentially unsafe, without auditing all uses of
>> PCILIB_TO_COMMON_ADDRESS(). In a 32-bit build, the type of the result
>> will no longer be UINT64 but UINT32, and that can cause problems in
>> several contexts. For example:
>>
>> - as an operand to the sizeof operator
>> - when it's being relied upon to cause conversion to UINT64, for example
>> another (UINT32) operand could be added to it
>> - when it is passed through a variable argument list
>>
>> It might be safe, but there's no way to tell without auditing all the
>> call sites. So let me see...
>>
>> Apparently this macro is only passed to S3BootScriptSavePciCfgWrite() as
>> second argument, within the same file, and that argument is covered by
>> the function prototype explicitly, with type UINT64. So the change
>> should be safe.
>>
>
>Thanks for the checking. I did search the whole edk2 repository for the
>reference of "PCILIB_TO_COMMON_ADDRESS" and it is only comsumed by
>the
>function you mentioned.
>
>> (I see the same macro definition and kind of invocation in
>> "QuarkPlatformPkg/Acpi/DxeSmm/AcpiSmm/AcpiSmmPlatform.c"; I didn't
>try
>> to audit that file.)
>>
>> The rest looks okay too.
>>
>> Reviewed-by: Laszlo Ersek <ler...@redhat.com>
>>
>
>Many thanks for the feedbacks and the effort for reviewing the patch.
>
>> (If you go ahead and submit a 30-part series that does this kind of
>> fixup all over the tree, please don't expect me to review it all -- I'm
>> okay reviewing OvmfPkg and ArmVirtPkg changes, but I can't take on the
>> rest. This kind of patch cannot be reviewed without consulting a really
>> wide context.)
>>
>
>I am thinking if the package level patch contains too many changes, I
>might break it into multiple module-level patches and include module
>owners/experts to help reviewing them.
>
>Best Regards,
>Hao Wu
>
>> Thanks
>> Laszlo
>>
>>
>> > diff --git
>> a/MdePkg/Library/SmmMemoryAllocationLib/MemoryAllocationLib.c
>> b/MdePkg/Library/SmmMemoryAllocationLib/MemoryAllocationLib.c
>> > index 937165a..592cced 100644
>> > --- a/MdePkg/Library/SmmMemoryAllocationLib/MemoryAllocationLib.c
>> > +++ b/MdePkg/Library/SmmMemoryAllocationLib/MemoryAllocationLib.c
>> > @@ -12,7 +12,7 @@
>> >    allocation for the Reserved memory types are not supported and will
>> always
>> >    return NULL.
>> >
>> > -  Copyright (c) 2006 - 2015, Intel Corporation. All rights reserved.<BR>
>> > +  Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
>> >    This program and the accompanying materials
>> >    are licensed and made available under the terms and conditions of the
>BSD
>> License
>> >    which accompanies this distribution.  The full text of the license may 
>> > be
>> found at
>> > @@ -343,7 +343,7 @@ InternalAllocateAlignedPages (
>> >        Status = gSmst->SmmFreePages (Memory, UnalignedPages);
>> >        ASSERT_EFI_ERROR (Status);
>> >      }
>> > -    Memory         = (EFI_PHYSICAL_ADDRESS) (AlignedMemory +
>> EFI_PAGES_TO_SIZE (Pages));
>> > +    Memory         = AlignedMemory + EFI_PAGES_TO_SIZE (Pages);
>> >      UnalignedPages = RealPages - Pages - UnalignedPages;
>> >      if (UnalignedPages > 0) {
>> >        //
>> > diff --git
>a/MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c
>> b/MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c
>> > index 3da5e211..3bd3aef 100644
>> > --- a/MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c
>> > +++ b/MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c
>> > @@ -2,7 +2,7 @@
>> >    Support routines for memory allocation routines based
>> >    on boot services for Dxe phase drivers.
>> >
>> > -  Copyright (c) 2006 - 2015, Intel Corporation. All rights reserved.<BR>
>> > +  Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
>> >    This program and the accompanying materials
>> >    are licensed and made available under the terms and conditions of the
>BSD
>> License
>> >    which accompanies this distribution.  The full text of the license may 
>> > be
>> found at
>> > @@ -216,7 +216,7 @@ InternalAllocateAlignedPages (
>> >        Status = gBS->FreePages (Memory, UnalignedPages);
>> >        ASSERT_EFI_ERROR (Status);
>> >      }
>> > -    Memory         = (EFI_PHYSICAL_ADDRESS) (AlignedMemory +
>> EFI_PAGES_TO_SIZE (Pages));
>> > +    Memory         = AlignedMemory + EFI_PAGES_TO_SIZE (Pages);
>> >      UnalignedPages = RealPages - Pages - UnalignedPages;
>> >      if (UnalignedPages > 0) {
>> >        //
>> >
>
>_______________________________________________
>edk2-devel mailing list
>edk2-devel@lists.01.org
>https://lists.01.org/mailman/listinfo/edk2-devel
_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to