[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [RFC PATCH] misra: allow conversion from unsigned long to function pointer
Hello, Le 13/08/2025 à 20:30, Dmytro Prokopchuk1 a écrit : > ... > > from `vaddr_t' (that is `unsigned long') to `switch_ttbr_fn*' (that is > `void(*)(unsigned long)') > > Signed-off-by: Dmytro Prokopchuk <dmytro_prokopchuk1@xxxxxxxx> > --- > This is just a RFC patch. > The commit message is not important at this stage. > > I am seeking comments regarding this case. > > Thanks. > --- > automation/eclair_analysis/ECLAIR/deviations.ecl | 8 ++++++++ > docs/misra/deviations.rst | 10 ++++++++++ > docs/misra/rules.rst | 8 +++++++- > xen/arch/arm/arm64/mmu/mm.c | 2 ++ > 4 files changed, 27 insertions(+), 1 deletion(-) > > diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl > b/automation/eclair_analysis/ECLAIR/deviations.ecl > index ebce1ceab9..f9fd6076b7 100644 > --- a/automation/eclair_analysis/ECLAIR/deviations.ecl > +++ b/automation/eclair_analysis/ECLAIR/deviations.ecl > @@ -365,6 +365,14 @@ constant expressions are required.\"" > } > -doc_end > > +-doc_begin="The conversion from unsigned long to a function pointer does not > lose any information, provided that the source type has enough bits to > restore it." > +-config=MC3A2.R11.1,casts+={safe, > + "from(type(canonical(builtin(unsigned long)))) > + &&to(type(canonical(__function_pointer_types))) > + &&relation(definitely_preserves_value)" > +} > +-doc_end > + > -doc_begin="The conversion from a function pointer to a boolean has a > well-known semantics that do not lead to unexpected behaviour." > -config=MC3A2.R11.1,casts+={safe, > "from(type(canonical(__function_pointer_types))) > diff --git a/docs/misra/deviations.rst b/docs/misra/deviations.rst > index 3c46a1e47a..27848602f6 100644 > --- a/docs/misra/deviations.rst > +++ b/docs/misra/deviations.rst > @@ -348,6 +348,16 @@ Deviations related to MISRA C:2012 Rules: > to store it. > - Tagged as `safe` for ECLAIR. > > + * - R11.1 > + - The conversion from unsigned long to a function pointer does not lose > any > + information or violate type safety assumptions if the unsigned long > type > + is guaranteed to be at least as large as a function pointer. This > ensures > + that the function pointer address can be fully represented without > + truncation or corruption. Macro BUILD_BUG_ON can be integrated into > the > + build system to confirm that 'sizeof(unsigned long) >= sizeof(void > (*)())' Wouldn't `sizeof(unsigned long) == sizeof(void (*)())` be preferable ? I assume sizeof(unsigned long) is the size of a CPU word. Having `sizeof(unsigned long) < sizeof(void (*)())` makes use of operations like cmpxchg unsuitable on function pointers (because of object size mismatch). > + on all target platforms. > + - Tagged as `safe` for ECLAIR. > + > * - R11.1 > - The conversion from a function pointer to a boolean has a well-known > semantics that do not lead to unexpected behaviour. > diff --git a/docs/misra/rules.rst b/docs/misra/rules.rst > index 6812eb7e8a..8b97ecf3f4 100644 > --- a/docs/misra/rules.rst > +++ b/docs/misra/rules.rst > @@ -414,7 +414,13 @@ maintainers if you want to suggest a change. > - All conversions to integer types are permitted if the destination > type has enough bits to hold the entire value. Conversions to bool > and void* are permitted. Conversions from 'void noreturn (*)(...)' > - to 'void (*)(...)' are permitted. > + to 'void (*)(...)' are permitted. Conversions from unsigned long to > + function pointer are permitted if the unsigned long type has a size > + and representation sufficient to store the entire function pointer > + value without truncation or corruption. Example:: > + > + unsigned long func_addr = (unsigned long)&some_function; > + void (*restored_func)(void) = (void (*)(void))func_addr; > > * - `Rule 11.2 > <https://gitlab.com/MISRA/MISRA-C/MISRA-C-2012/Example-Suite/-/blob/master/R_11_02.c>`_ > - Required > diff --git a/xen/arch/arm/arm64/mmu/mm.c b/xen/arch/arm/arm64/mmu/mm.c > index 3e64be6ae6..998d52c162 100644 > --- a/xen/arch/arm/arm64/mmu/mm.c > +++ b/xen/arch/arm/arm64/mmu/mm.c > @@ -150,6 +150,7 @@ void __init relocate_and_switch_ttbr(uint64_t ttbr) > vaddr_t id_addr = virt_to_maddr(relocate_xen); > relocate_xen_fn *fn = (relocate_xen_fn *)id_addr; > lpae_t pte; > + BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn)); > > /* Enable the identity mapping in the boot page tables */ > update_identity_mapping(true); > @@ -178,6 +179,7 @@ void __init switch_ttbr(uint64_t ttbr) > vaddr_t id_addr = virt_to_maddr(switch_ttbr_id); > switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr; > lpae_t pte; > + BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn)); > > /* Enable the identity mapping in the boot page tables */ > update_identity_mapping(true); Teddy Astie | Vates XCP-ng Developer XCP-ng & Xen Orchestra - Vates solutions web: https://vates.tech
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |