[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RFC PATCH] misra: allow conversion from unsigned long to function pointer


  • To: Dmytro Prokopchuk1 <dmytro_prokopchuk1@xxxxxxxx>
  • From: Nicola Vetrini <nicola.vetrini@xxxxxxxxxxx>
  • Date: Mon, 18 Aug 2025 17:01:37 +0200
  • Arc-authentication-results: i=1; bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Arc-message-signature: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; c=relaxed/relaxed; t=1755529297; h=DKIM-Signature:MIME-Version:Date:From:To:Cc:Subject:In-Reply-To: References:Message-ID:X-Sender:Organization:Content-Type: Content-Transfer-Encoding; bh=1ZuPrBToaBkOGWnHFlIFT5yfpra2K8TrRBe3G1qCB+8=; b=Vdc3buTu5E1EVBiuv033mna/2zAQY56ikH9e0YZqjX0nt3CyJTexagHdr8Rrx8my9QId U0+LbMQDPwoEdpO2y6C4gbpvBgDJad8zLguR1Yb3dqpNrb1VZk8qqZHbxRobRcZEIzu8w lUa+AMHi/vCbFIzoOJYcgd/9ObTNadPlmKbZlZ2E3GFe+jacbi7IgPGYgM9V5JpH/BRyd /Wj/XwREAHdoyPOmiGsC9XXkVo69nGvl9P8LrCm+Xkgg5K9rGpbZ6M0lK/v+L30/44HHQ y1EAyWzMLJ87V9OAZkDaLwmobBNp4Vkz5WS68ZBDzphbrOZcXl1eyCSxLoreMz85Zq7x6 RbJF84Sqq0j+nMaIGunxmtOMHaiBchdFj7J9fD2NtibqQ161gEeJ1I6koBzHPAxS95dVl bkIa3qi60emKvKse4Dzfc9GkkUE5kmFG0UeyifGRRrccM4JhO71UP6vhfUzoUGpzNy4Cu otdsDzsshE+0JENGaNuLEbKJPAZ/FzTkWCi9lpGmOvVtiyyUVqWgU6n3W7FJ1BqEyxp9+ 7Q4xF1+jI88ZW2CODEUGQpowF/b9xM50VCEyh4yrertMgBMLpvR0pOUUAto7UN5oZJ6+x nsJmxUuAXUZPszcL9/OK7sE07Mfxw7k0w1ppAmIJIsw4Z/mMmIrY7FYwpaMelU4=
  • Arc-seal: i=1; d=bugseng.com; s=openarc; a=rsa-sha256; cv=none; t=1755529297; b=PZQXeXKOJ4bghzD4W7GFKMMLqwva2uVc40r9Z8/l8+UN2i87bKMgUJR4P4/1ZACjO99a xl1n7+BpGQdfJHA9aVndhCE3/PtB1SLDYhpoVlYvCuHdvurY48NMlX2NB+uO2U91DQi37 nbQJC85V5Ioq1IWrbiEiC1PQpBH/6qKQIdS2hjchKmcbrH/wHm/u5Qg5IUv6brBD/ldjT K3Mh56poxyUjYK4yzH7o9YKfepaSCR/eVT5szOfjtzeIPii5aw2I/NEINwSadfGNU5t5e GYftO2kq6ckiQts/+TdB2CpSoYYKzIJjI9jHDwHu22qhrttv7L4iLPXIBXuNxyyX8uT8y F0OgojVBDShQQ8pLD3PUjvDrjUGwO4WYZBifKdsffFidKe9kyO4Ytv9DyLNqTslfYn7i+ P4u4Q+1aZzpTUxMztc0UAGhKQMpBy04cQcPb9jZFy0TSKxeclzcPUTSmKAzboVHiUdMUB lRSihHQ9nw0cMZ69GrW1ZcOOzuTh3Pl7+EhdtpJPe46DNmG+d1TBIBfIDPPktLjueIB9A lT7RmyfiWL91OCidRnO7s55z2fC/8uJeYrz5qtcjbhkynGXo6QAsXo9LuSogRjvtJnuzc 76p18pVBJcoz04Ek1/Os84NOQPTMgkjg2utN0y39lxca2jL9T8Mt7xhECv/6UDA=
  • Authentication-results: bugseng.com; arc=none smtp.remote-ip=162.55.131.47
  • Cc: Jan Beulich <jbeulich@xxxxxxxx>, Doug Goldstein <cardoe@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Julien Grall <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Mon, 18 Aug 2025 15:02:01 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2025-08-18 12:16, Dmytro Prokopchuk1 wrote:
On 8/14/25 23:43, Nicola Vetrini wrote:
On 2025-08-14 10:36, Jan Beulich wrote:
On 13.08.2025 20:27, Dmytro Prokopchuk1 wrote:
...

from `vaddr_t' (that is `unsigned long') to `switch_ttbr_fn*' (that
is `void(*)(unsigned long)')

Signed-off-by: Dmytro Prokopchuk <dmytro_prokopchuk1@xxxxxxxx>
---
This is just a RFC patch.
The commit message is not important at this stage.

I am seeking comments regarding this case.

Thanks.
---
 automation/eclair_analysis/ECLAIR/deviations.ecl |  8 ++++++++
 docs/misra/deviations.rst                        | 10 ++++++++++
 docs/misra/rules.rst                             |  8 +++++++-
 xen/arch/arm/arm64/mmu/mm.c                      |  2 ++
 4 files changed, 27 insertions(+), 1 deletion(-)

diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl b/
automation/eclair_analysis/ECLAIR/deviations.ecl
index ebce1ceab9..f9fd6076b7 100644
--- a/automation/eclair_analysis/ECLAIR/deviations.ecl
+++ b/automation/eclair_analysis/ECLAIR/deviations.ecl
@@ -365,6 +365,14 @@ constant expressions are required.\""
 }
 -doc_end

+-doc_begin="The conversion from unsigned long to a function pointer
does not lose any information, provided that the source type has
enough bits to restore it."
+-config=MC3A2.R11.1,casts+={safe,
+  "from(type(canonical(builtin(unsigned long))))
+   &&to(type(canonical(__function_pointer_types)))
+   &&relation(definitely_preserves_value)"
+}
+-doc_end
+

This check is not quite targeted at this situation, as the behaviour of different compilers is a bit of a grey area (even GCC, though that works
in practice). The relation is mostly aimed at testing whether the
pointer are represented using the same number of bits as unsigned long
(which happens to be the case fortunately).

Hi Nicola.

Well, we're telling Eclair the conversion types from() and to(), but can
Eclair determine their sizes (in bits) for particular architecture?
I mean, is it possible to avoid this "sizeof(unsigned long) ==
sizeof(void (*)())" in source code using only Eclair configs?

Dmytro.


Unfortunately no. ECLAIR knowns the number of bytes used to represent pointer and unsigned long, but what it cannot tell is whether the bits are preserved after being converted. What we can do, as it was done here, is provide a written justification that this is indeed the case for the toolchain we care about (GCC in the specific case). I suggest having both the config and the assertion to be extra sure that the assumption is never broken (despite being very unlikely).


 -doc_begin="The conversion from a function pointer to a boolean has
a well-known semantics that do not lead to unexpected behaviour."
 -config=MC3A2.R11.1,casts+={safe,
   "from(type(canonical(__function_pointer_types)))
diff --git a/docs/misra/deviations.rst b/docs/misra/deviations.rst
index 3c46a1e47a..27848602f6 100644
--- a/docs/misra/deviations.rst
+++ b/docs/misra/deviations.rst
@@ -348,6 +348,16 @@ Deviations related to MISRA C:2012 Rules:
        to store it.
      - Tagged as `safe` for ECLAIR.

+   * - R11.1
+     - The conversion from unsigned long to a function pointer does
not lose any
+       information or violate type safety assumptions if the
unsigned long type
+       is guaranteed to be at least as large as a function pointer.
This ensures
+       that the function pointer address can be fully represented
without
+       truncation or corruption. Macro BUILD_BUG_ON can be
integrated into the
+       build system to confirm that 'sizeof(unsigned long) >=
sizeof(void (*)())'
+       on all target platforms.

If sizeof(unsigned long) > sizeof(void (*)()), there is loss of
information.
Unless (not said here) the unsigned long value itself is the result of
converting a function pointer to unsigned long. Whether all of that
together
can be properly expressed to Eclair I don't know. Hence, as Teddy already
suggested, == may want specifying instead.


+1; it might be worth to add both the eclair config and the
BUILD_BUG_ON, noting that neither is sufficient on its own: unless the
compiler guarantees not to fiddle with the value is unaltered when cast
back and forth all checks on the number of bits are moot.

--- a/xen/arch/arm/arm64/mmu/mm.c
+++ b/xen/arch/arm/arm64/mmu/mm.c
@@ -150,6 +150,7 @@ void __init relocate_and_switch_ttbr(uint64_t ttbr)
     vaddr_t id_addr = virt_to_maddr(relocate_xen);
     relocate_xen_fn *fn = (relocate_xen_fn *)id_addr;
     lpae_t pte;
+    BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn));

     /* Enable the identity mapping in the boot page tables */
     update_identity_mapping(true);
@@ -178,6 +179,7 @@ void __init switch_ttbr(uint64_t ttbr)
     vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
     switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
     lpae_t pte;
+    BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn));

     /* Enable the identity mapping in the boot page tables */
     update_identity_mapping(true);

BUILD_BUG_ON() is a statement, not a declaration, and hence wants
grouping
as such. Question is whether we indeed want to sprinkle such checks all
over the code base. (I expect the two cases here aren't all we have.)


+1 as well. I would expect such check to live e.g. in compiler.h or any
similarly general header, since this is a widespread and largely arch-
neutral property that Xen wants to be always true I believe.


--
Nicola Vetrini, B.Sc.
Software Engineer
BUGSENG (https://bugseng.com)
LinkedIn: https://www.linkedin.com/in/nicola-vetrini-a42471253



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.