... from `vaddr_t' (that is `unsigned long') to `switch_ttbr_fn*' (that is `void(*)(unsigned long)')
Signed-off-by: Dmytro Prokopchuk <dmytro_prokopch...@epam.com> --- This is just a RFC patch. The commit message is not important at this stage. I am seeking comments regarding this case. Thanks. --- automation/eclair_analysis/ECLAIR/deviations.ecl | 8 ++++++++ docs/misra/deviations.rst | 10 ++++++++++ docs/misra/rules.rst | 8 +++++++- xen/arch/arm/arm64/mmu/mm.c | 2 ++ 4 files changed, 27 insertions(+), 1 deletion(-) diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl b/automation/eclair_analysis/ECLAIR/deviations.ecl index ebce1ceab9..f9fd6076b7 100644 --- a/automation/eclair_analysis/ECLAIR/deviations.ecl +++ b/automation/eclair_analysis/ECLAIR/deviations.ecl @@ -365,6 +365,14 @@ constant expressions are required.\"" } -doc_end +-doc_begin="The conversion from unsigned long to a function pointer does not lose any information, provided that the source type has enough bits to restore it." +-config=MC3A2.R11.1,casts+={safe, + "from(type(canonical(builtin(unsigned long)))) + &&to(type(canonical(__function_pointer_types))) + &&relation(definitely_preserves_value)" +} +-doc_end + -doc_begin="The conversion from a function pointer to a boolean has a well-known semantics that do not lead to unexpected behaviour." -config=MC3A2.R11.1,casts+={safe, "from(type(canonical(__function_pointer_types))) diff --git a/docs/misra/deviations.rst b/docs/misra/deviations.rst index 3c46a1e47a..27848602f6 100644 --- a/docs/misra/deviations.rst +++ b/docs/misra/deviations.rst @@ -348,6 +348,16 @@ Deviations related to MISRA C:2012 Rules: to store it. - Tagged as `safe` for ECLAIR. + * - R11.1 + - The conversion from unsigned long to a function pointer does not lose any + information or violate type safety assumptions if the unsigned long type + is guaranteed to be at least as large as a function pointer. This ensures + that the function pointer address can be fully represented without + truncation or corruption. Macro BUILD_BUG_ON can be integrated into the + build system to confirm that 'sizeof(unsigned long) >= sizeof(void (*)())' + on all target platforms. + - Tagged as `safe` for ECLAIR. + * - R11.1 - The conversion from a function pointer to a boolean has a well-known semantics that do not lead to unexpected behaviour. diff --git a/docs/misra/rules.rst b/docs/misra/rules.rst index 6812eb7e8a..8b97ecf3f4 100644 --- a/docs/misra/rules.rst +++ b/docs/misra/rules.rst @@ -414,7 +414,13 @@ maintainers if you want to suggest a change. - All conversions to integer types are permitted if the destination type has enough bits to hold the entire value. Conversions to bool and void* are permitted. Conversions from 'void noreturn (*)(...)' - to 'void (*)(...)' are permitted. + to 'void (*)(...)' are permitted. Conversions from unsigned long to + function pointer are permitted if the unsigned long type has a size + and representation sufficient to store the entire function pointer + value without truncation or corruption. Example:: + + unsigned long func_addr = (unsigned long)&some_function; + void (*restored_func)(void) = (void (*)(void))func_addr; * - `Rule 11.2 <https://gitlab.com/MISRA/MISRA-C/MISRA-C-2012/Example-Suite/-/blob/master/R_11_02.c>`_ - Required diff --git a/xen/arch/arm/arm64/mmu/mm.c b/xen/arch/arm/arm64/mmu/mm.c index 3e64be6ae6..998d52c162 100644 --- a/xen/arch/arm/arm64/mmu/mm.c +++ b/xen/arch/arm/arm64/mmu/mm.c @@ -150,6 +150,7 @@ void __init relocate_and_switch_ttbr(uint64_t ttbr) vaddr_t id_addr = virt_to_maddr(relocate_xen); relocate_xen_fn *fn = (relocate_xen_fn *)id_addr; lpae_t pte; + BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn)); /* Enable the identity mapping in the boot page tables */ update_identity_mapping(true); @@ -178,6 +179,7 @@ void __init switch_ttbr(uint64_t ttbr) vaddr_t id_addr = virt_to_maddr(switch_ttbr_id); switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr; lpae_t pte; + BUILD_BUG_ON(sizeof(unsigned long) < sizeof(fn)); /* Enable the identity mapping in the boot page tables */ update_identity_mapping(true); -- 2.43.0