[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RFC PATCH] misra: allow conversion from unsigned long to function pointer


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • Date: Thu, 14 Aug 2025 22:43:35 +0200
  • Arc-authentication-results: i=1; bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Arc-message-signature: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; c=relaxed/relaxed; t=1755204215; h=DKIM-Signature:MIME-Version:Date:From:To:Cc:Subject:In-Reply-To: References:Message-ID:X-Sender:Organization:Content-Type: Content-Transfer-Encoding; bh=t2i4JB2kkGIb9QprJ692xafevtOStcEc7CYsB6Tvmno=; b=vHqa7EkxvD8LefkgyMUnYUTRYJd492G5IXsj/4b1msBuHO0smZu0y4eyhm5Cm/MO4q8s FDZAfsNZ/9ut/kSzQJJ2WadaxI28XqklJVFt5Mb11XywahtEdR2oAlWGOP/hVCKlZykZo MGIU8+L3rUB+GQRC3c8wlyG0mwgCAQSqOyXplpDMP3JXzat9aR8AKyyh8TXO5s/4dK+Zw LyI9Ewea+n2K616ZoFkg2Gu4TmisIleYFdcYLkWAuxoQDV6eCA7OHMor11U+uIkcUXfoK XrT6Ij9AdBSCtGDd6eZYmMFhjJ3ekGoaTCYcIodyCq3y7B1kqeqU0sfJMpX8IK06hzazm Tw6+l3jgiyGqJeTZTcQ924u6xcY7qJoVYrtBqZNqyl8E6bwvS3nQRlUlXrXL7PaFCG26y tKn4EZPV2mkFUGSyBtFgch/5L39ntseDu3e3TAg79rHtcYcwOfoKh/O+5Y76lBcnHkyqV Yw1+zxsKDAwKdxA0h+Nfrbpyn7AYfJ4j8v5xMRHQwkWjBPGR9eYY0nMWbYsIeJdxSf8RN nnXJSGujSrhfNhUOvoO2ZFxbkXrkDuBQ+ailpMHv2N3AqJKONOsLhfYiaq0vvjxc2gn8m Ysh96isyj7FBt/BKeVyt9UpiqQq9Ib9fVJzsfVb4m9ayklMNL0covtl3pRHXZaY=
  • Arc-seal: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; cv=none; t=1755204215; b=14/b92MzxkwMZCBF5XHypzYyRxl+/hMLpZM7UuHUxhiqW0mTIxU/Um3uL/ph5HJcQHo0 /avKlISirNh8n/VtdFjxAywfv7Xh2XXDkqbG+sAffzdullnBPgIMRmBtTU8Q0yHqaPyBo l3mDwp8r8mFmsgdId1QrFy0GvKmf+CLwxG8sL2M6wqXF+bvzCOYXnNDs72wzcjI1SdMez L5n4MrK4dnn0px0DeaUfEaFBCEc8944IUY3MMWbu7lHNaUPpbRg0nWezhzhLXKOmtTKXQ XqK4hLTTrfIwvapNa5pUqu/k+Nj50AANkX1QVjBRPVL7YQ8ShXhwHyKeznKkIfZki6Wiq AZhv4dl9+Q8vwVlzVkA8drRsBriymNaWYNlS+Mqwq4RtwuKpCOxyawMk0KqokyMcu1bVX vC4VXAbiQOt4KTo9FF0B3VnJ8uTxC56kcRepZLiNkL7TIqgW2lZbKpbVcvMJkIe7YSXBk Zu7KDBMenHd1ghNkvVP0LOfX0X3CHRTupNaoY3wOBUCRpn1MREyZzf5JeRcLzoNQCZpA5 iIFeFqu1jIeOBRIfz8cehIkiQ+zfmQSRMb1SCwtyJQ0geaWYspzU5bMgyvfNrakJ0bgPJ uza1aGOQsa/GtxbVpVZx8b9Kssonhk0tbZ0KZiszNqY4q58pcdXjP55BCdrE31A=
  • Authentication-results: bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Cc: Dmytro Prokopchuk1 <dmytro_prokopchuk1@xxxxxxxx>, Doug Goldstein <cardoe@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 14 Aug 2025 20:43:42 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2025-08-14 10:36, Jan Beulich wrote:
On 13.08.2025 20:27, Dmytro Prokopchuk1 wrote:
...

from `vaddr_t' (that is `unsigned long') to `switch_ttbr_fn*' (that is `void(*)(unsigned long)')

Signed-off-by: Dmytro Prokopchuk <dmytro_prokopchuk1@xxxxxxxx>
---
This is just a RFC patch.
The commit message is not important at this stage.

I am seeking comments regarding this case.

Thanks.
---
 automation/eclair_analysis/ECLAIR/deviations.ecl |  8 ++++++++
 docs/misra/deviations.rst                        | 10 ++++++++++
 docs/misra/rules.rst                             |  8 +++++++-
 xen/arch/arm/arm64/mmu/mm.c                      |  2 ++
 4 files changed, 27 insertions(+), 1 deletion(-)

diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl b/automation/eclair_analysis/ECLAIR/deviations.ecl
index ebce1ceab9..f9fd6076b7 100644
--- a/automation/eclair_analysis/ECLAIR/deviations.ecl
+++ b/automation/eclair_analysis/ECLAIR/deviations.ecl
@@ -365,6 +365,14 @@ constant expressions are required.\""
 }
 -doc_end

+-doc_begin="The conversion from unsigned long to a function pointer does not lose any information, provided that the source type has enough bits to restore it."
+-config=MC3A2.R11.1,casts+={safe,
+  "from(type(canonical(builtin(unsigned long))))
+   &&to(type(canonical(__function_pointer_types)))
+   &&relation(definitely_preserves_value)"
+}
+-doc_end
+

This check is not quite targeted at this situation, as the behaviour of different compilers is a bit of a grey area (even GCC, though that works in practice). The relation is mostly aimed at testing whether the pointer are represented using the same number of bits as unsigned long (which happens to be the case fortunately).

-doc_begin="The conversion from a function pointer to a boolean has a well-known semantics that do not lead to unexpected behaviour."
 -config=MC3A2.R11.1,casts+={safe,
   "from(type(canonical(__function_pointer_types)))
diff --git a/docs/misra/deviations.rst b/docs/misra/deviations.rst
index 3c46a1e47a..27848602f6 100644
--- a/docs/misra/deviations.rst
+++ b/docs/misra/deviations.rst
@@ -348,6 +348,16 @@ Deviations related to MISRA C:2012 Rules:
        to store it.
      - Tagged as `safe` for ECLAIR.

+   * - R11.1
+ - The conversion from unsigned long to a function pointer does not lose any + information or violate type safety assumptions if the unsigned long type + is guaranteed to be at least as large as a function pointer. This ensures + that the function pointer address can be fully represented without + truncation or corruption. Macro BUILD_BUG_ON can be integrated into the + build system to confirm that 'sizeof(unsigned long) >= sizeof(void (*)())'
+       on all target platforms.

If sizeof(unsigned long) > sizeof(void (*)()), there is loss of information.
Unless (not said here) the unsigned long value itself is the result of
converting a function pointer to unsigned long. Whether all of that together can be properly expressed to Eclair I don't know. Hence, as Teddy already
suggested, == may want specifying instead.


+1; it might be worth to add both the eclair config and the BUILD_BUG_ON, noting that neither is sufficient on its own: unless the compiler guarantees not to fiddle with the value is unaltered when cast back and forth all checks on the number of bits are moot.

--- a/xen/arch/arm/arm64/mmu/mm.c
+++ b/xen/arch/arm/arm64/mmu/mm.c
@@ -150,6 +150,7 @@ void __init relocate_and_switch_ttbr(uint64_t ttbr)
     vaddr_t id_addr = virt_to_maddr(relocate_xen);
     relocate_xen_fn *fn = (relocate_xen_fn *)id_addr;
     lpae_t pte;
+    BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn));

     /* Enable the identity mapping in the boot page tables */
     update_identity_mapping(true);
@@ -178,6 +179,7 @@ void __init switch_ttbr(uint64_t ttbr)
     vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
     switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
     lpae_t pte;
+    BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn));

     /* Enable the identity mapping in the boot page tables */
     update_identity_mapping(true);

BUILD_BUG_ON() is a statement, not a declaration, and hence wants grouping
as such. Question is whether we indeed want to sprinkle such checks all
over the code base. (I expect the two cases here aren't all we have.)


+1 as well. I would expect such check to live e.g. in compiler.h or any similarly general header, since this is a widespread and largely arch-neutral property that Xen wants to be always true I believe.

--
Nicola Vetrini, B.Sc.
Software Engineer
BUGSENG (https://bugseng.com)
LinkedIn: https://www.linkedin.com/in/nicola-vetrini-a42471253



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.