target/xtensa: fix clang analyzer warning
Reworked xtensa_queue_exec_ins_wide() logic to properly handle endian issues while executing arbitrary instructions. Signed-off-by: Ian Thompson <ianst@cadence.com> Change-Id: I5752dd254ce8b8822886ffc7edecaa242a93cce8 Reviewed-on: https://review.openocd.org/c/openocd/+/7198 Tested-by: jenkins Reviewed-by: Antonio Borneo <borneo.antonio@gmail.com>
This commit is contained in:
parent
9f024dbedc
commit
27e7f5df5f
|
@ -498,17 +498,20 @@ static void xtensa_queue_exec_ins(struct xtensa *xtensa, uint32_t ins)
|
|||
|
||||
static void xtensa_queue_exec_ins_wide(struct xtensa *xtensa, uint8_t *ops, uint8_t oplen)
|
||||
{
|
||||
if ((oplen > 0) && (oplen <= 64)) {
|
||||
uint32_t opsw[8] = { 0, 0, 0, 0, 0, 0, 0, 0 }; /* 8 DIRx regs: max width 64B */
|
||||
uint8_t oplenw = (oplen + 3) / 4;
|
||||
if (xtensa->target->endianness == TARGET_BIG_ENDIAN)
|
||||
buf_bswap32((uint8_t *)opsw, ops, oplenw * 4);
|
||||
else
|
||||
memcpy(opsw, ops, oplen);
|
||||
const int max_oplen = 64; /* 8 DIRx regs: max width 64B */
|
||||
if ((oplen > 0) && (oplen <= max_oplen)) {
|
||||
uint8_t ops_padded[max_oplen];
|
||||
memcpy(ops_padded, ops, oplen);
|
||||
memset(ops_padded + oplen, 0, max_oplen - oplen);
|
||||
unsigned int oplenw = DIV_ROUND_UP(oplen, sizeof(uint32_t));
|
||||
for (int32_t i = oplenw - 1; i > 0; i--)
|
||||
xtensa_queue_dbg_reg_write(xtensa, XDMREG_DIR0 + i, opsw[i]);
|
||||
xtensa_queue_dbg_reg_write(xtensa,
|
||||
XDMREG_DIR0 + i,
|
||||
target_buffer_get_u32(xtensa->target, &ops_padded[sizeof(uint32_t)*i]));
|
||||
/* Write DIR0EXEC last */
|
||||
xtensa_queue_dbg_reg_write(xtensa, XDMREG_DIR0EXEC, opsw[0]);
|
||||
xtensa_queue_dbg_reg_write(xtensa,
|
||||
XDMREG_DIR0EXEC,
|
||||
target_buffer_get_u32(xtensa->target, &ops_padded[0]));
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue