[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] xen: update ECLAIR service identifiers from MC3R1 to MC3A2.
On Tue, 10 Dec 2024, Alessandro Zucchelli wrote: > Rename all instances of ECLAIR MISRA C:2012 service identifiers, > identified by the prefix MC3R1, to use the prefix MC3A2, which > refers to MISRA C:2012 Amendment 2 guidelines. > > This update is motivated by the need to upgrade ECLAIR GitLab runners > that use the new naming scheme for MISRA C:2012 Amendment 2 guidelines. > > Changes to the docs/misra directory are needed in order to keep > comment-based deviation up to date. > > Signed-off-by: Alessandro Zucchelli <alessandro.zucchelli@xxxxxxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> > --- > The change was made using the following command: > find . -type f -exec sed -i 's/MC3R1/MC3A2/g' {} + > > In order to avoid CI failures this patch and the ECLAIR runners must > be updated at roughly the same time. This backwards-incompatible > change is needed to bring to the runners other bugfixes. > --- > .../eclair_analysis/ECLAIR/B.UNEVALEFF.ecl | 2 +- > .../ECLAIR/accepted_guidelines.sh | 2 +- > .../eclair_analysis/ECLAIR/analysis.ecl | 6 +- > .../eclair_analysis/ECLAIR/deviations.ecl | 244 +++++++++--------- > .../eclair_analysis/ECLAIR/monitored.ecl | 208 +++++++-------- > automation/eclair_analysis/ECLAIR/tagging.ecl | 176 ++++++------- > docs/misra/documenting-violations.rst | 6 +- > docs/misra/safe.json | 32 +-- > 8 files changed, 338 insertions(+), 338 deletions(-) > > diff --git a/automation/eclair_analysis/ECLAIR/B.UNEVALEFF.ecl > b/automation/eclair_analysis/ECLAIR/B.UNEVALEFF.ecl > index 92d8db8986..fa249b8e36 100644 > --- a/automation/eclair_analysis/ECLAIR/B.UNEVALEFF.ecl > +++ b/automation/eclair_analysis/ECLAIR/B.UNEVALEFF.ecl > @@ -1,4 +1,4 @@ > --clone_service=MC3R1.R13.6,B.UNEVALEFF > +-clone_service=MC3A2.R13.6,B.UNEVALEFF > > -config=B.UNEVALEFF,summary="The operand of the `alignof' and `typeof' > operators shall not contain any expression which has potential side effects" > -config=B.UNEVALEFF,stmt_child_matcher= > diff --git a/automation/eclair_analysis/ECLAIR/accepted_guidelines.sh > b/automation/eclair_analysis/ECLAIR/accepted_guidelines.sh > index 368135122c..2c4b339d0d 100755 > --- a/automation/eclair_analysis/ECLAIR/accepted_guidelines.sh > +++ b/automation/eclair_analysis/ECLAIR/accepted_guidelines.sh > @@ -10,6 +10,6 @@ script_dir="$( > accepted_rst=$1 > > grep -Eo "\`(Dir|Rule) [0-9]+\.[0-9]+" ${accepted_rst} \ > - | sed -e 's/`Rule /MC3R1.R/' -e 's/`Dir /MC3R1.D/' -e > 's/.*/-enable=&/' > ${script_dir}/accepted.ecl > + | sed -e 's/`Rule /MC3A2.R/' -e 's/`Dir /MC3A2.D/' -e > 's/.*/-enable=&/' > ${script_dir}/accepted.ecl > > echo "-enable=B.UNEVALEFF" >> ${script_dir}/accepted.ecl > diff --git a/automation/eclair_analysis/ECLAIR/analysis.ecl > b/automation/eclair_analysis/ECLAIR/analysis.ecl > index df0b551812..824283a989 100644 > --- a/automation/eclair_analysis/ECLAIR/analysis.ecl > +++ b/automation/eclair_analysis/ECLAIR/analysis.ecl > @@ -22,15 +22,15 @@ setq(analysis_kind,getenv("ANALYSIS_KIND")) > -doc_begin="These configurations serve the purpose of recognizing the 'mem*' > macros as > their Standard Library equivalents." > > --config=MC3R1.R21.14,call_select+= > +-config=MC3A2.R21.14,call_select+= > {"macro(^memcmp$)&&any_arg(1..2, skip(__non_syntactic_paren_cast_stmts, > node(string_literal)))", > "any()", violation, "%{__callslct_any_base_fmt()}", {{arg, > "%{__callslct_arg_fmt()}"}}} > > --config=MC3R1.R21.15,call_args+= > +-config=MC3A2.R21.15,call_args+= > {"macro(^mem(cmp|move|cpy)$)", {1, 2}, "unqual_pointee_compatible", > "%{__argscmpr_culprit_fmt()}", "%{__argscmpr_evidence_fmt()}"} > > --config=MC3R1.R21.16,call_select+= > +-config=MC3A2.R21.16,call_select+= > {"macro(^memcmp$)&&any_arg(1..2, skip(__non_syntactic_paren_stmts, > type(canonical(__memcmp_pte_types))))", > "any()", violation, "%{__callslct_any_base_fmt()}", > {{arg,"%{__callslct_arg_type_fmt()}"}}} > > diff --git a/automation/eclair_analysis/ECLAIR/deviations.ecl > b/automation/eclair_analysis/ECLAIR/deviations.ecl > index 2f58f29203..ae25eeb76a 100644 > --- a/automation/eclair_analysis/ECLAIR/deviations.ecl > +++ b/automation/eclair_analysis/ECLAIR/deviations.ecl > @@ -4,36 +4,36 @@ > > -doc_begin="The compiler implementation guarantees that the unreachable code > is removed. > Constant expressions and unreachable branches of if and switch statements > are expected." > --config=MC3R1.R2.1,+reports={safe,"first_area(^.*has an invariantly.*$)"} > --config=MC3R1.R2.1,+reports={safe,"first_area(^.*incompatible with labeled > statement$)"} > +-config=MC3A2.R2.1,+reports={safe,"first_area(^.*has an invariantly.*$)"} > +-config=MC3A2.R2.1,+reports={safe,"first_area(^.*incompatible with labeled > statement$)"} > -doc_end > > -doc_begin="Some functions are intended to be not referenced." > --config=MC3R1.R2.1,+reports={deliberate,"first_area(^.*is never > referenced$)"} > +-config=MC3A2.R2.1,+reports={deliberate,"first_area(^.*is never > referenced$)"} > -doc_end > > -doc_begin="Unreachability caused by calls to the following functions or > macros is deliberate and there is no risk of code being unexpectedly left > out." > --config=MC3R1.R2.1,statements+={deliberate,"macro(name(BUG||assert_failed))"} > --config=MC3R1.R2.1,statements+={deliberate, > "call(decl(name(__builtin_unreachable||panic||do_unexpected_trap||machine_halt||machine_restart||reboot_or_halt)))"} > +-config=MC3A2.R2.1,statements+={deliberate,"macro(name(BUG||assert_failed))"} > +-config=MC3A2.R2.1,statements+={deliberate, > "call(decl(name(__builtin_unreachable||panic||do_unexpected_trap||machine_halt||machine_restart||reboot_or_halt)))"} > -doc_end > > -doc_begin="Unreachability inside an ASSERT_UNREACHABLE() and analogous > macro calls is deliberate and safe." > --config=MC3R1.R2.1,reports+={deliberate, > "any_area(any_loc(any_exp(macro(name(ASSERT_UNREACHABLE||PARSE_ERR_RET||PARSE_ERR||FAIL_MSR||FAIL_CPUID)))))"} > +-config=MC3A2.R2.1,reports+={deliberate, > "any_area(any_loc(any_exp(macro(name(ASSERT_UNREACHABLE||PARSE_ERR_RET||PARSE_ERR||FAIL_MSR||FAIL_CPUID)))))"} > -doc_end > > -doc_begin="The asm-offset files are not linked deliberately, since they are > used to generate definitions for asm modules." > -file_tag+={asm_offsets, > "^xen/arch/(arm|x86)/(arm32|arm64|x86_64)/asm-offsets\\.c$"} > --config=MC3R1.R2.1,reports+={deliberate, > "any_area(any_loc(file(asm_offsets)))"} > +-config=MC3A2.R2.1,reports+={deliberate, > "any_area(any_loc(file(asm_offsets)))"} > -doc_end > > -doc_begin="Pure declarations (i.e., declarations without initialization) are > not executable, and therefore it is safe for them to be unreachable." > --config=MC3R1.R2.1,ignored_stmts+={"any()", "pure_decl()"} > +-config=MC3A2.R2.1,ignored_stmts+={"any()", "pure_decl()"} > -doc_end > > -doc_begin="The following autogenerated file is not linked deliberately." > > -file_tag+={C_runtime_failures,"^automation/eclair_analysis/C-runtime-failures\\.rst\\.c$"} > --config=MC3R1.R2.1,reports+={deliberate, > "any_area(any_loc(file(C_runtime_failures)))"} > +-config=MC3A2.R2.1,reports+={deliberate, > "any_area(any_loc(file(C_runtime_failures)))"} > -doc_end > > -doc_begin="Proving compliance with respect to Rule 2.2 is generally > impossible: > @@ -42,11 +42,11 @@ confidence that no evidence of errors in the program's > logic has been missed due > to undetected violations of Rule 2.2, if any. Testing on time behavior gives > us > confidence on the fact that, should the program contain dead code that is not > removed by the compiler, the resulting slowdown is negligible." > --config=MC3R1.R2.2,reports+={disapplied,"any()"} > +-config=MC3A2.R2.2,reports+={disapplied,"any()"} > -doc_end > > -doc_begin="Some labels are unused in certain build configurations, or are > deliberately marked as unused, so that the compiler is entitled to remove > them." > --config=MC3R1.R2.6,reports+={deliberate, > "any_area(text(^.*__maybe_unused.*$))"} > +-config=MC3A2.R2.6,reports+={deliberate, > "any_area(text(^.*__maybe_unused.*$))"} > -doc_end > > # > @@ -55,7 +55,7 @@ removed by the compiler, the resulting slowdown is > negligible." > > -doc_begin="Comments starting with '/*' and containing hyperlinks are safe as > they are not instances of commented-out code." > --config=MC3R1.R3.1,reports+={safe, "first_area(text(^.*https?://.*$))"} > +-config=MC3A2.R3.1,reports+={safe, "first_area(text(^.*https?://.*$))"} > -doc_end > > # > @@ -63,25 +63,25 @@ they are not instances of commented-out code." > # > > -doc_begin="The directive has been accepted only for the ARM codebase." > --config=MC3R1.D4.3,reports+={disapplied,"!(any_area(any_loc(file(^xen/arch/arm/arm64/.*$))))"} > +-config=MC3A2.D4.3,reports+={disapplied,"!(any_area(any_loc(file(^xen/arch/arm/arm64/.*$))))"} > -doc_end > > -doc_begin="The inline asm in 'arm64/lib/bitops.c' is tightly coupled with > the surronding C code that acts as a wrapper, so it has been decided not to > add an additional encapsulation layer." > -file_tag+={arm64_bitops, "^xen/arch/arm/arm64/lib/bitops\\.c$"} > --config=MC3R1.D4.3,reports+={deliberate, > "all_area(any_loc(file(arm64_bitops)&&any_exp(macro(^(bit|test)op$))))"} > --config=MC3R1.D4.3,reports+={deliberate, > "any_area(any_loc(file(arm64_bitops))&&context(name(int_clear_mask16)))"} > +-config=MC3A2.D4.3,reports+={deliberate, > "all_area(any_loc(file(arm64_bitops)&&any_exp(macro(^(bit|test)op$))))"} > +-config=MC3A2.D4.3,reports+={deliberate, > "any_area(any_loc(file(arm64_bitops))&&context(name(int_clear_mask16)))"} > -doc_end > > -doc_begin="Files that are intended to be included more than once do not > need to > conform to the directive." > --config=MC3R1.D4.10,reports+={safe, "first_area(text(^/\\* This file is > legitimately included multiple times\\. \\*/$, begin-4))"} > --config=MC3R1.D4.10,reports+={safe, "first_area(text(^/\\* Generated file, > do not edit! \\*/$, begin-3))"} > --config=MC3R1.D4.10,reports+={safe, > "all_area(all_loc(file(^xen/include/generated/autoconf.h$)))"} > +-config=MC3A2.D4.10,reports+={safe, "first_area(text(^/\\* This file is > legitimately included multiple times\\. \\*/$, begin-4))"} > +-config=MC3A2.D4.10,reports+={safe, "first_area(text(^/\\* Generated file, > do not edit! \\*/$, begin-3))"} > +-config=MC3A2.D4.10,reports+={safe, > "all_area(all_loc(file(^xen/include/generated/autoconf.h$)))"} > -doc_end > > -doc_begin="Including multiple times a .c file is safe because every > function or data item > it defines would (in the common case) be already defined. Peer reviewed by > the community." > --config=MC3R1.D4.10,reports+={safe, "all_area(all_loc(^.*\\.c$))"} > +-config=MC3A2.D4.10,reports+={safe, "all_area(all_loc(^.*\\.c$))"} > -doc_end > > # > @@ -90,50 +90,50 @@ it defines would (in the common case) be already defined. > Peer reviewed by the c > > -doc_begin="The project adopted the rule with an exception listed in > 'docs/misra/rules.rst'" > --config=MC3R1.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^READ_SYSREG$))&&any_exp(macro(^WRITE_SYSREG$))))"} > --config=MC3R1.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^max(_t)?$))&&any_exp(macro(^min(_t)?$))))"} > --config=MC3R1.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^read[bwlq]$))&&any_exp(macro(^read[bwlq]_relaxed$))))"} > --config=MC3R1.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^per_cpu$))&&any_exp(macro(^this_cpu$))))"} > --config=MC3R1.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^__emulate_2op$))&&any_exp(macro(^__emulate_2op_nobyte$))))"} > --config=MC3R1.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^read_debugreg$))&&any_exp(macro(^write_debugreg$))))"} > +-config=MC3A2.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^READ_SYSREG$))&&any_exp(macro(^WRITE_SYSREG$))))"} > +-config=MC3A2.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^max(_t)?$))&&any_exp(macro(^min(_t)?$))))"} > +-config=MC3A2.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^read[bwlq]$))&&any_exp(macro(^read[bwlq]_relaxed$))))"} > +-config=MC3A2.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^per_cpu$))&&any_exp(macro(^this_cpu$))))"} > +-config=MC3A2.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^__emulate_2op$))&&any_exp(macro(^__emulate_2op_nobyte$))))"} > +-config=MC3A2.R5.3,reports+={safe, > "any_area(any_loc(any_exp(macro(^read_debugreg$))&&any_exp(macro(^write_debugreg$))))"} > -doc_end > > -doc_begin="Macros expanding to their own identifier (e.g., \"#define x x\") > are deliberate." > --config=MC3R1.R5.5,reports+={deliberate, > "all_area(macro(same_id_body())||!macro(!same_id_body()))"} > +-config=MC3A2.R5.5,reports+={deliberate, > "all_area(macro(same_id_body())||!macro(!same_id_body()))"} > -doc_end > > -doc_begin="There is no clash between function like macros and not callable > objects." > --config=MC3R1.R5.5,reports+={deliberate, > "all_area(macro(function_like())||decl(any()))&&all_area(macro(any())||!decl(kind(function))&&!decl(__function_pointer_decls))"} > +-config=MC3A2.R5.5,reports+={deliberate, > "all_area(macro(function_like())||decl(any()))&&all_area(macro(any())||!decl(kind(function))&&!decl(__function_pointer_decls))"} > -doc_end > > -doc_begin="Clashes between function names and macros are deliberate for > string handling functions since some architectures may want to use their own > arch-specific implementation." > --config=MC3R1.R5.5,reports+={deliberate, > "all_area(all_loc(file(^xen/arch/x86/string\\.c|xen/include/xen/string\\.h|xen/lib/.*$)))"} > +-config=MC3A2.R5.5,reports+={deliberate, > "all_area(all_loc(file(^xen/arch/x86/string\\.c|xen/include/xen/string\\.h|xen/lib/.*$)))"} > -doc_end > > -doc_begin="In libelf, clashes between macros and function names are > deliberate and needed to prevent the use of undecorated versions of memcpy, > memset and memmove." > --config=MC3R1.R5.5,reports+={deliberate, > "any_area(decl(kind(function))||any_loc(macro(name(memcpy||memset||memmove))))&&any_area(any_loc(file(^xen/common/libelf/libelf-private\\.h$)))"} > +-config=MC3A2.R5.5,reports+={deliberate, > "any_area(decl(kind(function))||any_loc(macro(name(memcpy||memset||memmove))))&&any_area(any_loc(file(^xen/common/libelf/libelf-private\\.h$)))"} > -doc_end > > -doc_begin="The type \"ret_t\" is deliberately defined multiple times, > depending on the guest." > --config=MC3R1.R5.6,reports+={deliberate,"any_area(any_loc(text(^.*ret_t.*$)))"} > +-config=MC3A2.R5.6,reports+={deliberate,"any_area(any_loc(text(^.*ret_t.*$)))"} > -doc_end > > -doc_begin="On X86, the types \"guest_intpte_t\", \"guest_l1e_t\" and > \"guest_l2e_t\" are deliberately defined multiple times, depending on the > number of guest paging levels." > --config=MC3R1.R5.6,reports+={deliberate,"any_area(any_loc(file(^xen/arch/x86/include/asm/guest_pt\\.h$)))&&any_area(any_loc(text(^.*(guest_intpte_t|guest_l[12]e_t).*$)))"} > +-config=MC3A2.R5.6,reports+={deliberate,"any_area(any_loc(file(^xen/arch/x86/include/asm/guest_pt\\.h$)))&&any_area(any_loc(text(^.*(guest_intpte_t|guest_l[12]e_t).*$)))"} > -doc_end > > -doc_begin="The following files are imported from the gnu-efi package." > -file_tag+={adopted_r5_6,"^xen/include/efi/.*$"} > -file_tag+={adopted_r5_6,"^xen/arch/.*/include/asm/.*/efibind\\.h$"} > --config=MC3R1.R5.6,reports+={deliberate,"any_area(any_loc(file(adopted_r5_6)))"} > +-config=MC3A2.R5.6,reports+={deliberate,"any_area(any_loc(file(adopted_r5_6)))"} > -doc_end > > -doc_begin="The project intentionally reuses tag names in order to have > identifiers matching the applicable external specifications as well as > established internal conventions. > As there is little possibility for developer confusion not resulting into > compilation errors, the risk of renaming outweighs the potential advantages > of compliance." > --config=MC3R1.R5.7,reports+={deliberate,"any()"} > +-config=MC3A2.R5.7,reports+={deliberate,"any()"} > -doc_end > > # > @@ -142,7 +142,7 @@ As there is little possibility for developer confusion > not resulting into compil > > -doc_begin="It is safe to use certain octal constants the way they are > defined > in specifications, manuals, and algorithm descriptions." > --config=MC3R1.R7.1,reports+={safe, > "any_area(any_loc(any_exp(text(^.*octal-ok.*$))))"} > +-config=MC3A2.R7.1,reports+={safe, > "any_area(any_loc(any_exp(text(^.*octal-ok.*$))))"} > -doc_end > > -doc_begin="Violations in files that maintainers have asked to not modify in > the > @@ -155,17 +155,17 @@ context of R7.2." > -file_tag+={adopted_r7_2,"^xen/arch/x86/cpu/intel\\.c$"} > -file_tag+={adopted_r7_2,"^xen/arch/x86/cpu/amd\\.c$"} > -file_tag+={adopted_r7_2,"^xen/arch/x86/cpu/common\\.c$"} > --config=MC3R1.R7.2,reports+={deliberate,"any_area(any_loc(file(adopted_r7_2)))"} > +-config=MC3A2.R7.2,reports+={deliberate,"any_area(any_loc(file(adopted_r7_2)))"} > -doc_end > > -doc_begin="Violations caused by __HYPERVISOR_VIRT_START are related to the > particular use of it done in xen_mk_ulong." > --config=MC3R1.R7.2,reports+={deliberate,"any_area(any_loc(macro(name(BUILD_BUG_ON))))"} > +-config=MC3A2.R7.2,reports+={deliberate,"any_area(any_loc(macro(name(BUILD_BUG_ON))))"} > -doc_end > > -doc_begin="Allow pointers of non-character type as long as the pointee is > const-qualified." > --config=MC3R1.R7.4,same_pointee=false > +-config=MC3A2.R7.4,same_pointee=false > -doc_end > > # > @@ -173,7 +173,7 @@ const-qualified." > # > > -doc_begin="The type ret_t is deliberately used and defined as int or long > depending on the architecture." > --config=MC3R1.R8.3,reports+={deliberate,"any_area(any_loc(text(^.*ret_t.*$)))"} > +-config=MC3A2.R8.3,reports+={deliberate,"any_area(any_loc(text(^.*ret_t.*$)))"} > -doc_end > > -doc_begin="The following files are imported from Linux and decompress.h > defines a unique and documented interface towards all the (adopted) > decompress functions." > @@ -183,71 +183,71 @@ const-qualified." > -file_tag+={adopted_decompress_r8_3,"^xen/common/unlzo\\.c$"} > -file_tag+={adopted_decompress_r8_3,"^xen/common/unxz\\.c$"} > -file_tag+={adopted_decompress_r8_3,"^xen/common/unzstd\\.c$"} > --config=MC3R1.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_decompress_r8_3)))&&any_area(any_loc(file(^xen/include/xen/decompress\\.h$)))"} > +-config=MC3A2.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_decompress_r8_3)))&&any_area(any_loc(file(^xen/include/xen/decompress\\.h$)))"} > -doc_end > > -doc_begin="Parameter name \"unused\" (with an optional numeric suffix) is > deliberate and makes explicit the intention of not using such parameter > within the function." > --config=MC3R1.R8.3,reports+={deliberate, "any_area(^.*parameter > `unused[0-9]*'.*$)"} > +-config=MC3A2.R8.3,reports+={deliberate, "any_area(^.*parameter > `unused[0-9]*'.*$)"} > -doc_end > > -doc_begin="The following file is imported from Linux: ignore for now." > -file_tag+={adopted_time_r8_3,"^xen/arch/x86/time\\.c$"} > --config=MC3R1.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_time_r8_3)))&&(any_area(any_loc(file(^xen/include/xen/time\\.h$)))||any_area(any_loc(file(^xen/arch/x86/include/asm/setup\\.h$))))"} > +-config=MC3A2.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_time_r8_3)))&&(any_area(any_loc(file(^xen/include/xen/time\\.h$)))||any_area(any_loc(file(^xen/arch/x86/include/asm/setup\\.h$))))"} > -doc_end > > -doc_begin="The following file is imported from Linux: ignore for now." > -file_tag+={adopted_cpu_idle_r8_3,"^xen/arch/x86/acpi/cpu_idle\\.c$"} > --config=MC3R1.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_cpu_idle_r8_3)))&&any_area(any_loc(file(^xen/include/xen/pmstat\\.h$)))"} > +-config=MC3A2.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_cpu_idle_r8_3)))&&any_area(any_loc(file(^xen/include/xen/pmstat\\.h$)))"} > -doc_end > > -doc_begin="The following file is imported from Linux: ignore for now." > -file_tag+={adopted_mpparse_r8_3,"^xen/arch/x86/mpparse\\.c$"} > --config=MC3R1.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_mpparse_r8_3)))&&any_area(any_loc(file(^xen/arch/x86/include/asm/mpspec\\.h$)))"} > +-config=MC3A2.R8.3,reports+={deliberate,"any_area(any_loc(file(adopted_mpparse_r8_3)))&&any_area(any_loc(file(^xen/arch/x86/include/asm/mpspec\\.h$)))"} > -doc_end > > -doc_begin="The definitions present in this file are meant to generate > definitions for asm modules, and are not called by C code. Therefore the > absence of prior declarations is safe." > -file_tag+={asm_offsets, > "^xen/arch/(arm|x86)/(arm32|arm64|x86_64)/asm-offsets\\.c$"} > --config=MC3R1.R8.4,reports+={safe, "first_area(any_loc(file(asm_offsets)))"} > +-config=MC3A2.R8.4,reports+={safe, "first_area(any_loc(file(asm_offsets)))"} > -doc_end > > -doc_begin="The functions defined in this file are meant to be called from > gcc-generated code in a non-release build configuration. > Therefore the absence of prior declarations is safe." > -file_tag+={gcov, "^xen/common/coverage/gcov_base\\.c$"} > --config=MC3R1.R8.4,reports+={safe, "first_area(any_loc(file(gcov)))"} > +-config=MC3A2.R8.4,reports+={safe, "first_area(any_loc(file(gcov)))"} > -doc_end > > -doc_begin="Recognize the occurrence of current_stack_pointer as a > declaration." > -file_tag+={asm_defns, "^xen/arch/x86/include/asm/asm_defns\\.h$"} > --config=MC3R1.R8.4,declarations+={safe, > "loc(file(asm_defns))&&^current_stack_pointer$"} > +-config=MC3A2.R8.4,declarations+={safe, > "loc(file(asm_defns))&&^current_stack_pointer$"} > -doc_end > > -doc_begin="The function apei_(read|check|clear)_mce are dead code and are > excluded from non-debug builds, therefore the absence of prior declarations > is safe." > --config=MC3R1.R8.4,declarations+={safe, "^apei_(read|check|clear)_mce\\(.*$"} > +-config=MC3A2.R8.4,declarations+={safe, "^apei_(read|check|clear)_mce\\(.*$"} > -doc_end > > -doc_begin="asmlinkage is a marker to indicate that the function is only > used to interface with asm modules." > --config=MC3R1.R8.4,declarations+={safe,"loc(text(^(?s).*asmlinkage.*$, > -1..0))"} > +-config=MC3A2.R8.4,declarations+={safe,"loc(text(^(?s).*asmlinkage.*$, > -1..0))"} > -doc_end > > -doc_begin="Given that bsearch and sort are defined with the attribute > 'gnu_inline', it's deliberate not to have a prior declaration. > See Section \"6.33.1 Common Function Attributes\" of \"GCC_MANUAL\" for a > full explanation of gnu_inline." > -file_tag+={bsearch_sort, "^xen/include/xen/(sort|lib)\\.h$"} > --config=MC3R1.R8.4,reports+={deliberate, > "any_area(any_loc(file(bsearch_sort))&&decl(name(bsearch||sort)))"} > +-config=MC3A2.R8.4,reports+={deliberate, > "any_area(any_loc(file(bsearch_sort))&&decl(name(bsearch||sort)))"} > -doc_end > > -doc_begin="first_valid_mfn is defined in this way because the current lack > of NUMA support in Arm and PPC requires it." > -file_tag+={first_valid_mfn, "^xen/common/page_alloc\\.c$"} > --config=MC3R1.R8.4,declarations+={deliberate,"loc(file(first_valid_mfn))"} > +-config=MC3A2.R8.4,declarations+={deliberate,"loc(file(first_valid_mfn))"} > -doc_end > > -doc_begin="The following variables are compiled in multiple translation > units > belonging to different executables and therefore are safe." > --config=MC3R1.R8.6,declarations+={safe, > "name(current_stack_pointer||bsearch||sort)"} > +-config=MC3A2.R8.6,declarations+={safe, > "name(current_stack_pointer||bsearch||sort)"} > -doc_end > > -doc_begin="Declarations without definitions are allowed (specifically when > the > definition is compiled-out or optimized-out by the compiler)" > --config=MC3R1.R8.6,reports+={deliberate, "first_area(^.*has no definition$)"} > +-config=MC3A2.R8.6,reports+={deliberate, "first_area(^.*has no definition$)"} > -doc_end > > -doc_begin="The search procedure for Unix linkers is well defined, see ld(1) > @@ -258,11 +258,11 @@ the linker will include the appropriate file(s) from > the archive\". > In Xen, thanks to the order in which file names appear in the build commands, > if arch-specific definitions are present, they get always linked in before > searching in the lib.a archive resulting from xen/lib." > --config=MC3R1.R8.6,declarations+={deliberate, "loc(file(^xen/lib/.*$))"} > +-config=MC3A2.R8.6,declarations+={deliberate, "loc(file(^xen/lib/.*$))"} > -doc_end > > -doc_begin="The gnu_inline attribute without static is deliberately allowed." > --config=MC3R1.R8.10,declarations+={deliberate,"property(gnu_inline)"} > +-config=MC3A2.R8.10,declarations+={deliberate,"property(gnu_inline)"} > -doc_end > > # > @@ -272,12 +272,12 @@ searching in the lib.a archive resulting from xen/lib." > -doc_begin="Violations in files that maintainers have asked to not modify in > the > context of R9.1." > -file_tag+={adopted_r9_1,"^xen/arch/arm/arm64/lib/find_next_bit\\.c$"} > --config=MC3R1.R9.1,reports+={deliberate,"any_area(any_loc(file(adopted_r9_1)))"} > +-config=MC3A2.R9.1,reports+={deliberate,"any_area(any_loc(file(adopted_r9_1)))"} > -doc_end > > -doc_begin="The possibility of committing mistakes by specifying an explicit > dimension is higher than omitting the dimension." > --config=MC3R1.R9.5,reports+={deliberate, "any()"} > +-config=MC3A2.R9.5,reports+={deliberate, "any()"} > -doc_end > > # > @@ -285,45 +285,45 @@ dimension is higher than omitting the dimension." > # > > -doc_begin="The value-preserving conversions of integer constants are safe" > --config=MC3R1.R10.1,etypes={safe,"any()","preserved_integer_constant()"} > --config=MC3R1.R10.3,etypes={safe,"any()","preserved_integer_constant()"} > --config=MC3R1.R10.4,etypes={safe,"any()","preserved_integer_constant()||sibling(rhs,preserved_integer_constant())"} > +-config=MC3A2.R10.1,etypes={safe,"any()","preserved_integer_constant()"} > +-config=MC3A2.R10.3,etypes={safe,"any()","preserved_integer_constant()"} > +-config=MC3A2.R10.4,etypes={safe,"any()","preserved_integer_constant()||sibling(rhs,preserved_integer_constant())"} > -doc_end > > -doc_begin="Shifting non-negative integers to the right is safe." > --config=MC3R1.R10.1,etypes+={safe, > +-config=MC3A2.R10.1,etypes+={safe, > "stmt(node(binary_operator)&&operator(shr))", > "src_expr(definitely_in(0..))"} > -doc_end > > -doc_begin="Shifting non-negative integers to the left is safe if the result > is > still non-negative." > --config=MC3R1.R10.1,etypes+={safe, > +-config=MC3A2.R10.1,etypes+={safe, > "stmt(node(binary_operator)&&operator(shl)&&definitely_in(0..))", > "src_expr(definitely_in(0..))"} > -doc_end > > -doc_begin="Bitwise logical operations on non-negative integers are safe." > --config=MC3R1.R10.1,etypes+={safe, > +-config=MC3A2.R10.1,etypes+={safe, > "stmt(node(binary_operator)&&operator(and||or||xor))", > "src_expr(definitely_in(0..))"} > -doc_end > > -doc_begin="The implicit conversion to Boolean for logical operator > arguments is well known to all Xen developers to be a comparison with 0" > --config=MC3R1.R10.1,etypes+={safe, > "stmt(operator(logical)||node(conditional_operator||binary_conditional_operator))", > "dst_type(ebool||boolean)"} > +-config=MC3A2.R10.1,etypes+={safe, > "stmt(operator(logical)||node(conditional_operator||binary_conditional_operator))", > "dst_type(ebool||boolean)"} > -doc_end > > -doc_begin="The macro ISOLATE_LSB encapsulates a well-known pattern to obtain > a mask where only the lowest bit set in the argument is set, if any, for > unsigned > integers arguments on two's complement architectures > (all the architectures supported by Xen satisfy this requirement)." > --config=MC3R1.R10.1,reports+={safe, > "any_area(any_loc(any_exp(macro(^ISOLATE_LSB$))))"} > +-config=MC3A2.R10.1,reports+={safe, > "any_area(any_loc(any_exp(macro(^ISOLATE_LSB$))))"} > -doc_end > > -doc_begin="XEN only supports architectures where signed integers are > representend using two's complement and all the XEN developers are aware of > this." > --config=MC3R1.R10.1,etypes+={safe, > +-config=MC3A2.R10.1,etypes+={safe, > "stmt(operator(and||or||xor||not||and_assign||or_assign||xor_assign))", > "any()"} > -doc_end > @@ -334,7 +334,7 @@ C language, GCC does not use the latitude given in C99 > and C11 only to treat > certain aspects of signed `<<' as undefined. However, -fsanitize=shift (and > -fsanitize=undefined) will diagnose such cases. They are also diagnosed where > constant expressions are required.\"" > --config=MC3R1.R10.1,etypes+={safe, > +-config=MC3A2.R10.1,etypes+={safe, > "stmt(operator(shl||shr||shl_assign||shr_assign))", > "any()"} > -doc_end > @@ -344,7 +344,7 @@ constant expressions are required.\"" > # > > -doc_begin="The conversion from a function pointer to unsigned long or (void > *) does not lose any information, provided that the target type has enough > bits to store it." > --config=MC3R1.R11.1,casts+={safe, > +-config=MC3A2.R11.1,casts+={safe, > "from(type(canonical(__function_pointer_types))) > &&to(type(canonical(builtin(unsigned long)||pointer(builtin(void))))) > &&relation(definitely_preserves_value)" > @@ -352,14 +352,14 @@ constant expressions are required.\"" > -doc_end > > -doc_begin="The conversion from a function pointer to a boolean has a > well-known semantics that do not lead to unexpected behaviour." > --config=MC3R1.R11.1,casts+={safe, > +-config=MC3A2.R11.1,casts+={safe, > "from(type(canonical(__function_pointer_types))) > &&kind(pointer_to_boolean)" > } > -doc_end > > -doc_begin="The conversion from a pointer to an incomplete type to unsigned > long does not lose any information, provided that the target type has enough > bits to store it." > --config=MC3R1.R11.2,casts+={safe, > +-config=MC3A2.R11.2,casts+={safe, > "from(type(any())) > &&to(type(canonical(builtin(unsigned long)))) > &&relation(definitely_preserves_value)" > @@ -367,20 +367,20 @@ constant expressions are required.\"" > -doc_end > > -doc_begin="Conversions to object pointers that have a pointee type with a > smaller (i.e., less strict) alignment requirement are safe." > --config=MC3R1.R11.3,casts+={safe, > +-config=MC3A2.R11.3,casts+={safe, > "!relation(more_aligned_pointee)" > } > -doc_end > > -doc_begin="Conversions from and to integral types are safe, in the > assumption that the target type has enough bits to store the value. > See also Section \"4.7 Arrays and Pointers\" of \"GCC_MANUAL\"" > --config=MC3R1.R11.6,casts+={safe, > +-config=MC3A2.R11.6,casts+={safe, > "(from(type(canonical(integral())))||to(type(canonical(integral())))) > &&relation(definitely_preserves_value)"} > -doc_end > > -doc_begin="The conversion from a pointer to a boolean has a well-known > semantics that do not lead to unexpected behaviour." > --config=MC3R1.R11.6,casts+={safe, > +-config=MC3A2.R11.6,casts+={safe, > "from(type(canonical(__pointer_types))) > &&kind(pointer_to_boolean)" > } > @@ -390,11 +390,11 @@ See also Section \"4.7 Arrays and Pointers\" of > \"GCC_MANUAL\"" > with the provided offset. The resulting pointer is then immediately cast > back to its > original type, which preserves the qualifier. This use is deemed safe. > Fixing this violation would require to increase code complexity and lower > readability." > --config=MC3R1.R11.8,reports+={safe,"any_area(any_loc(any_exp(macro(^container_of$))))"} > +-config=MC3A2.R11.8,reports+={safe,"any_area(any_loc(any_exp(macro(^container_of$))))"} > -doc_end > > -doc_begin="This construct is used to check if the type is scalar, and for > this purpose the use of 0 as a null pointer constant is deliberate." > --config=MC3R1.R11.9,reports+={deliberate, > "any_area(any_loc(any_exp(macro(^__ACCESS_ONCE$))))" > +-config=MC3A2.R11.9,reports+={deliberate, > "any_area(any_loc(any_exp(macro(^__ACCESS_ONCE$))))" > } > -doc_end > > @@ -404,16 +404,16 @@ Fixing this violation would require to increase code > complexity and lower readab > > -doc_begin="All developers and reviewers can be safely assumed to be well > aware > of the short-circuit evaluation strategy of such logical operators." > --config=MC3R1.R13.5,reports+={disapplied,"any()"} > +-config=MC3A2.R13.5,reports+={disapplied,"any()"} > -doc_end > > -doc_begin="Macros alternative_v?call[0-9] use sizeof and typeof to check > that the argument types match the corresponding parameter ones." > --config=MC3R1.R13.6,reports+={deliberate,"any_area(any_loc(any_exp(macro(^alternative_vcall[0-9]$))&&file(^xen/arch/x86/include/asm/alternative\\.h*$)))"} > +-config=MC3A2.R13.6,reports+={deliberate,"any_area(any_loc(any_exp(macro(^alternative_vcall[0-9]$))&&file(^xen/arch/x86/include/asm/alternative\\.h*$)))"} > > -config=B.UNEVALEFF,reports+={deliberate,"any_area(any_loc(any_exp(macro(^alternative_v?call[0-9]$))&&file(^xen/arch/x86/include/asm/alterantive\\.h*$)))"} > -doc_end > > -doc_begin="Anything, no matter how complicated, inside the BUILD_BUG_ON > macro is subject to a compile-time evaluation without relevant side effects." > --config=MC3R1.R13.6,reports+={safe,"any_area(any_loc(any_exp(macro(name(BUILD_BUG_ON)))))"} > +-config=MC3A2.R13.6,reports+={safe,"any_area(any_loc(any_exp(macro(name(BUILD_BUG_ON)))))"} > > -config=B.UNEVALEFF,reports+={safe,"any_area(any_loc(any_exp(macro(name(BUILD_BUG_ON)))))"} > -doc_end > > @@ -424,31 +424,31 @@ of the short-circuit evaluation strategy of such > logical operators." > -doc_begin="The severe restrictions imposed by this rule on the use of for > statements are not balanced by the presumed facilitation of the peer review > activity." > --config=MC3R1.R14.2,reports+={disapplied,"any()"} > +-config=MC3A2.R14.2,reports+={disapplied,"any()"} > -doc_end > > -doc_begin="The XEN team relies on the fact that invariant conditions of > 'if' statements and conditional operators are deliberate" > --config=MC3R1.R14.3,statements+={deliberate, > "wrapped(any(),node(if_stmt||conditional_operator||binary_conditional_operator))" > } > +-config=MC3A2.R14.3,statements+={deliberate, > "wrapped(any(),node(if_stmt||conditional_operator||binary_conditional_operator))" > } > -doc_end > > -doc_begin="Switches having a 'sizeof' operator as the condition are > deliberate and have limited scope." > --config=MC3R1.R14.3,statements+={deliberate, > "wrapped(any(),node(switch_stmt)&&child(cond, operator(sizeof)))" } > +-config=MC3A2.R14.3,statements+={deliberate, > "wrapped(any(),node(switch_stmt)&&child(cond, operator(sizeof)))" } > -doc_end > > -doc_begin="The use of an invariant size argument in {put,get}_unsafe_size > and array_access_ok, as defined in arch/x86(_64)?/include/asm/uaccess.h is > deliberate and is deemed safe." > -file_tag+={x86_uaccess, "^xen/arch/x86(_64)?/include/asm/uaccess\\.h$"} > --config=MC3R1.R14.3,reports+={deliberate, > "any_area(any_loc(file(x86_uaccess)&&any_exp(macro(^(put|get)_unsafe_size$))))"} > --config=MC3R1.R14.3,reports+={deliberate, > "any_area(any_loc(file(x86_uaccess)&&any_exp(macro(^array_access_ok$))))"} > +-config=MC3A2.R14.3,reports+={deliberate, > "any_area(any_loc(file(x86_uaccess)&&any_exp(macro(^(put|get)_unsafe_size$))))"} > +-config=MC3A2.R14.3,reports+={deliberate, > "any_area(any_loc(file(x86_uaccess)&&any_exp(macro(^array_access_ok$))))"} > -doc_end > > -doc_begin="A controlling expression of 'if' and iteration statements having > integer, character or pointer type has a semantics that is well-known to all > Xen developers." > --config=MC3R1.R14.4,etypes+={deliberate, "any()", > "src_type(integer||character)||src_expr(type(desugar(pointer(any()))))"} > +-config=MC3A2.R14.4,etypes+={deliberate, "any()", > "src_type(integer||character)||src_expr(type(desugar(pointer(any()))))"} > -doc_end > > -doc_begin="The XEN team relies on the fact that the enum is_dying has the > constant with assigned value 0 act as false and the other ones as true, > therefore have the same behavior of a boolean" > --config=MC3R1.R14.4,etypes+={deliberate, > "stmt(child(cond,child(expr,ref(^<?domain>?::is_dying$))))","src_type(enum)"} > +-config=MC3A2.R14.4,etypes+={deliberate, > "stmt(child(cond,child(expr,ref(^<?domain>?::is_dying$))))","src_type(enum)"} > -doc_end > > # > @@ -459,58 +459,58 @@ therefore have the same behavior of a boolean" > therefore it is deemed better to leave such files as is." > -file_tag+={x86_emulate,"^xen/arch/x86/x86_emulate/.*$"} > -file_tag+={x86_svm_emulate,"^xen/arch/x86/hvm/svm/emulate\\.c$"} > --config=MC3R1.R16.2,reports+={deliberate, > "any_area(any_loc(file(x86_emulate||x86_svm_emulate)))"} > +-config=MC3A2.R16.2,reports+={deliberate, > "any_area(any_loc(file(x86_emulate||x86_svm_emulate)))"} > -doc_end > > -doc_begin="Statements that change the control flow (i.e., break, continue, > goto, return) and calls to functions that do not return the control back are > \"allowed terminal statements\"." > -stmt_selector+={r16_3_allowed_terminal, > "node(break_stmt||continue_stmt||goto_stmt||return_stmt)||call(property(noreturn))"} > --config=MC3R1.R16.3,terminals+={safe, "r16_3_allowed_terminal"} > +-config=MC3A2.R16.3,terminals+={safe, "r16_3_allowed_terminal"} > -doc_end > > -doc_begin="An if-else statement having both branches ending with an allowed > terminal statement is itself an allowed terminal statement." > -stmt_selector+={r16_3_if, > "node(if_stmt)&&(child(then,r16_3_allowed_terminal)||child(then,any_stmt(stmt,-1,r16_3_allowed_terminal)))"} > -stmt_selector+={r16_3_else, > "node(if_stmt)&&(child(else,r16_3_allowed_terminal)||child(else,any_stmt(stmt,-1,r16_3_allowed_terminal)))"} > -stmt_selector+={r16_3_if_else, "r16_3_if&&r16_3_else"} > --config=MC3R1.R16.3,terminals+={safe, "r16_3_if_else"} > +-config=MC3A2.R16.3,terminals+={safe, "r16_3_if_else"} > -doc_end > > -doc_begin="An if-else statement having an always true condition and the > true branch ending with an allowed terminal statement is itself an allowed > terminal statement." > -stmt_selector+={r16_3_if_true, "r16_3_if&&child(cond,definitely_in(1..))"} > --config=MC3R1.R16.3,terminals+={safe, "r16_3_if_true"} > +-config=MC3A2.R16.3,terminals+={safe, "r16_3_if_true"} > -doc_end > > -doc_begin="A switch clause ending with a statement expression which, in > turn, ends with an allowed terminal statement is safe." > --config=MC3R1.R16.3,terminals+={safe, > "node(stmt_expr)&&child(stmt,node(compound_stmt)&&any_stmt(stmt,-1,r16_3_allowed_terminal||r16_3_if_else||r16_3_if_true))"} > +-config=MC3A2.R16.3,terminals+={safe, > "node(stmt_expr)&&child(stmt,node(compound_stmt)&&any_stmt(stmt,-1,r16_3_allowed_terminal||r16_3_if_else||r16_3_if_true))"} > -doc_end > > -doc_begin="A switch clause ending with a do-while-false the body of which, > in turn, ends with an allowed terminal statement is safe. > An exception to that is the macro ASSERT_UNREACHABLE() which is effective in > debug build only: a switch clause ending with ASSERT_UNREACHABLE() is not > considered safe." > --config=MC3R1.R16.3,terminals+={safe, > "!macro(name(ASSERT_UNREACHABLE))&&node(do_stmt)&&child(cond,definitely_in(0))&&child(body,any_stmt(stmt,-1,r16_3_allowed_terminal||r16_3_if_else||r16_3_if_true))"} > +-config=MC3A2.R16.3,terminals+={safe, > "!macro(name(ASSERT_UNREACHABLE))&&node(do_stmt)&&child(cond,definitely_in(0))&&child(body,any_stmt(stmt,-1,r16_3_allowed_terminal||r16_3_if_else||r16_3_if_true))"} > -doc_end > > -doc_begin="Switch clauses ending with pseudo-keyword \"fallthrough\" are > safe." > --config=MC3R1.R16.3,reports+={safe, > "any_area(end_loc(any_exp(text(/fallthrough;/))))"} > +-config=MC3A2.R16.3,reports+={safe, > "any_area(end_loc(any_exp(text(/fallthrough;/))))"} > -doc_end > > -doc_begin="Switch clauses ending with failure method \"BUG()\" are safe." > --config=MC3R1.R16.3,reports+={safe, > "any_area(end_loc(any_exp(text(/BUG\\(\\);/))))"} > +-config=MC3A2.R16.3,reports+={safe, > "any_area(end_loc(any_exp(text(/BUG\\(\\);/))))"} > -doc_end > > -doc_begin="Switch clauses ending with an explicit comment indicating the > fallthrough intention are safe." > --config=MC3R1.R16.3,reports+={safe, > "any_area(end_loc(any_exp(text(^(?s).*/\\* [fF]all ?through\\.? > \\*/.*$,0..2))))"} > +-config=MC3A2.R16.3,reports+={safe, > "any_area(end_loc(any_exp(text(^(?s).*/\\* [fF]all ?through\\.? > \\*/.*$,0..2))))"} > -doc_end > > -doc_begin="Switch statements having a controlling expression of enum type > deliberately do not have a default case: gcc -Wall enables -Wswitch which > warns (and breaks the build as we use -Werror) if one of the enum labels is > missing from the switch." > --config=MC3R1.R16.4,reports+={deliberate,'any_area(kind(context)&&^.* has no > `default.*$&&stmt(node(switch_stmt)&&child(cond,skip(__non_syntactic_paren_stmts,type(canonical(enum_underlying_type(any())))))))'} > +-config=MC3A2.R16.4,reports+={deliberate,'any_area(kind(context)&&^.* has no > `default.*$&&stmt(node(switch_stmt)&&child(cond,skip(__non_syntactic_paren_stmts,type(canonical(enum_underlying_type(any())))))))'} > -doc_end > > -doc_begin="A switch statement with a single switch clause and no default > label may be used in place of an equivalent if statement if it is considered > to improve readability." > --config=MC3R1.R16.4,switch_clauses+={deliberate,"switch(1)&&default(0)"} > +-config=MC3A2.R16.4,switch_clauses+={deliberate,"switch(1)&&default(0)"} > -doc_end > > -doc_begin="A switch statement with a single switch clause and no default > label may be used in place of an equivalent if statement if it is considered > to improve readability." > --config=MC3R1.R16.6,switch_clauses+={deliberate, "default(0)"} > +-config=MC3A2.R16.6,switch_clauses+={deliberate, "default(0)"} > -doc_end > > # > @@ -518,16 +518,16 @@ safe." > # > > -doc_begin="printf()-like functions are allowed to use the variadic features > provided by stdarg.h." > --config=MC3R1.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(^.*printk\\(.*\\)$)))"} > --config=MC3R1.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(^.*printf\\(.*\\)$)))"} > --config=MC3R1.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(name(panic)&&kind(function))))"} > --config=MC3R1.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(name(elf_call_log_callback)&&kind(function))))"} > --config=MC3R1.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(name(vprintk_common)&&kind(function))))"} > --config=MC3R1.R17.1,macros+={hide , "^va_(arg|start|copy|end)$"} > +-config=MC3A2.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(^.*printk\\(.*\\)$)))"} > +-config=MC3A2.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(^.*printf\\(.*\\)$)))"} > +-config=MC3A2.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(name(panic)&&kind(function))))"} > +-config=MC3A2.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(name(elf_call_log_callback)&&kind(function))))"} > +-config=MC3A2.R17.1,reports+={deliberate,"any_area(^.*va_list.*$&&context(ancestor_or_self(name(vprintk_common)&&kind(function))))"} > +-config=MC3A2.R17.1,macros+={hide , "^va_(arg|start|copy|end)$"} > -doc_end > > -doc_begin="Not using the return value of a function does not endanger > safety if it coincides with an actual argument." > --config=MC3R1.R17.7,calls+={safe, "any()", > "decl(name(__builtin_memcpy||__builtin_memmove||__builtin_memset||cpumask_check))"} > +-config=MC3A2.R17.7,calls+={safe, "any()", > "decl(name(__builtin_memcpy||__builtin_memmove||__builtin_memset||cpumask_check))"} > -doc_end > > # > @@ -538,16 +538,16 @@ safe." > are guaranteed not to be exploited by a compiler that relies on the absence > of > C99 Undefined Behaviour 45: Pointers that do not point into, or just beyond, > the same array object are subtracted (6.5.6)." > -eval_file=linker_symbols.ecl > --config=MC3R1.R18.2,reports+={safe, > "any_area(stmt(operator(sub)&&child(lhs||rhs, > skip(__non_syntactic_paren_stmts, ref(linker_symbols)))))"} > +-config=MC3A2.R18.2,reports+={safe, > "any_area(stmt(operator(sub)&&child(lhs||rhs, > skip(__non_syntactic_paren_stmts, ref(linker_symbols)))))"} > -doc_end > > -doc_begin="The following macro performs a subtraction between pointers to > obtain the mfn, but does not lead to undefined behaviour." > --config=MC3R1.R18.2,reports+={safe, > "any_area(any_loc(any_exp(macro(^page_to_mfn$))))"} > +-config=MC3A2.R18.2,reports+={safe, > "any_area(any_loc(any_exp(macro(^page_to_mfn$))))"} > -doc_end > > -doc_begin="Flexible array members are deliberately used and XEN developers > are aware of the dangers related to them: > unexpected result when the structure is given as argument to a sizeof() > operator and the truncation in assignment between structures." > --config=MC3R1.R18.7,reports+={deliberate, "any()"} > +-config=MC3A2.R18.7,reports+={deliberate, "any()"} > -doc_end > > # > @@ -558,7 +558,7 @@ unexpected result when the structure is given as argument > to a sizeof() operator > as function arguments; (2) as macro arguments; (3) as array indices; (4) as > lhs > in assignments; (5) as initializers, possibly designated, in initalizer > lists; > (6) as the constant expression in a switch clause label." > --config=MC3R1.R20.7,expansion_context= > +-config=MC3A2.R20.7,expansion_context= > {safe, "context(__call_expr_arg_contexts)"}, > {safe, "left_right(^[(,\\[]$,^[),\\]]$)"}, > {safe, "context(skip_to(__expr_non_syntactic_contexts, > stmt_child(node(array_subscript_expr), subscript)))"}, > @@ -571,62 +571,62 @@ in assignments; (5) as initializers, possibly > designated, in initalizer lists; > breaking the macro's logic; futhermore, the macro is only ever used in the > context > of the IS_ENABLED or STATIC_IF/STATIC_IF_NOT macros, so it always receives a > literal > 0 or 1 as input, posing no risk to safety." > --config=MC3R1.R20.7,reports+={safe, > "any_area(any_loc(any_exp(macro(^___config_enabled$))))"} > +-config=MC3A2.R20.7,reports+={safe, > "any_area(any_loc(any_exp(macro(^___config_enabled$))))"} > -doc_end > > -doc_begin="Violations due to the use of macros defined in files that are > not in scope for compliance are allowed, as that is imported code." > -file_tag+={gnu_efi_include, "^xen/include/efi/.*$"} > -file_tag+={acpi_cpu_idle, "^xen/arch/x86/acpi/cpu_idle\\.c$"} > --config=MC3R1.R20.7,reports+={safe, > "any_area(any_loc(file(gnu_efi_include)||any_exp(macro(^NextMemoryDescriptor$))))"} > --config=MC3R1.R20.7,reports+={safe, "any_area(any_loc(file(acpi_cpu_idle)))"} > +-config=MC3A2.R20.7,reports+={safe, > "any_area(any_loc(file(gnu_efi_include)||any_exp(macro(^NextMemoryDescriptor$))))"} > +-config=MC3A2.R20.7,reports+={safe, "any_area(any_loc(file(acpi_cpu_idle)))"} > -doc_end > > -doc_begin="To avoid compromising readability, the macros > alternative_(v)?call[0-9] are allowed > not to parenthesize their arguments." > --config=MC3R1.R20.7,reports+={safe, > "any_area(any_loc(any_exp(macro(^alternative_(v)?call[0-9]$))))"} > +-config=MC3A2.R20.7,reports+={safe, > "any_area(any_loc(any_exp(macro(^alternative_(v)?call[0-9]$))))"} > -doc_end > > -doc_begin="The argument 'x' of the count_args_ macro can't be parenthesized > as > the rule would require, without breaking the functionality of the macro. The > uses > of this macro do not lead to developer confusion, and can thus be deviated." > --config=MC3R1.R20.7,reports+={safe, > "any_area(any_loc(any_exp(macro(^count_args_$))))"} > +-config=MC3A2.R20.7,reports+={safe, > "any_area(any_loc(any_exp(macro(^count_args_$))))"} > -doc_end > > -doc_begin="The argument \"fn\" in macros {COMPILE,RUNTIME}_CHECK is not > parenthesized > on purpose, to be able to test function-like macros. Given the specialized > and limited > use of this macro, it is deemed ok to deviate them." > --config=MC3R1.R20.7,reports+={deliberate, > "any_area(any_loc(any_exp(macro(^(COMPILE_CHECK|RUNTIME_CHECK)$))))"} > +-config=MC3A2.R20.7,reports+={deliberate, > "any_area(any_loc(any_exp(macro(^(COMPILE_CHECK|RUNTIME_CHECK)$))))"} > -doc_end > > -doc_begin="Problems related to operator precedence can not occur if the > expansion of the macro argument is surrounded by tokens '{', '}' and ';'." > --config=MC3R1.R20.7,expansion_context+={safe, > "left_right(^[\\{;]$,^[;\\}]$)"} > +-config=MC3A2.R20.7,expansion_context+={safe, > "left_right(^[\\{;]$,^[;\\}]$)"} > -doc_end > > -doc_begin="Uses of variadic macros that have one of their arguments defined > as > a macro and used within the body for both ordinary parameter expansion and > as an > operand to the # or ## operators have a behavior that is well-understood and > deliberate." > --config=MC3R1.R20.12,macros+={deliberate, "variadic()"} > +-config=MC3A2.R20.12,macros+={deliberate, "variadic()"} > -doc_end > > -doc_begin="Uses of a macro parameter for ordinary expansion and as an > operand > to the # or ## operators within the following macros are deliberate, to > provide > useful diagnostic messages to the user." > --config=MC3R1.R20.12,macros+={deliberate, > "name(ASSERT||BUILD_BUG_ON||BUILD_BUG_ON_ZERO||RUNTIME_CHECK)"} > +-config=MC3A2.R20.12,macros+={deliberate, > "name(ASSERT||BUILD_BUG_ON||BUILD_BUG_ON_ZERO||RUNTIME_CHECK)"} > -doc_end > > -doc_begin="The helper macro GENERATE_CASE may use a macro parameter for > ordinary > expansion and token pasting to improve readability. Only instances where this > leads to a violation of the Rule are deviated." > -file_tag+={deliberate_generate_case, "^xen/arch/arm/vcpreg\\.c$"} > --config=MC3R1.R20.12,macros+={deliberate, > "name(GENERATE_CASE)&&loc(file(deliberate_generate_case))"} > +-config=MC3A2.R20.12,macros+={deliberate, > "name(GENERATE_CASE)&&loc(file(deliberate_generate_case))"} > -doc_end > > -doc_begin="The macro DEFINE is defined and used in excluded files > asm-offsets.c. > This may still cause violations if entities outside these files are referred > to > in the expansion." > --config=MC3R1.R20.12,macros+={deliberate, > "name(DEFINE)&&loc(file(asm_offsets))"} > +-config=MC3A2.R20.12,macros+={deliberate, > "name(DEFINE)&&loc(file(asm_offsets))"} > -doc_end > > # > @@ -636,7 +636,7 @@ in the expansion." > -doc_begin="or, and and xor are reserved identifiers because they constitute > alternate > spellings for the corresponding operators (they are defined as macros by > iso646.h). > However, Xen doesn't use standard library headers, so there is no risk of > overlap." > --config=MC3R1.R21.2,reports+={safe, > "any_area(stmt(ref(kind(label)&&^(or|and|xor|not)$)))"} > +-config=MC3A2.R21.2,reports+={safe, > "any_area(stmt(ref(kind(label)&&^(or|and|xor|not)$)))"} > -doc_end > > -doc_begin="Xen does not use the functions provided by the Standard Library, > but > @@ -645,8 +645,8 @@ The implementation of these functions is available in > source form, so the undefi > or implementation-defined behaviors contemplated by the C Standard do not > apply. > If some undefined or unspecified behavior does arise in the implementation, > it > falls under the jurisdiction of other MISRA rules." > --config=MC3R1.R21.9,reports+={deliberate, "any()"} > --config=MC3R1.R21.10,reports+={deliberate, "any()"} > +-config=MC3A2.R21.9,reports+={deliberate, "any()"} > +-config=MC3A2.R21.10,reports+={deliberate, "any()"} > -doc_end > > # > @@ -671,7 +671,7 @@ falls under the jurisdiction of other MISRA rules." > programmers:no developers' confusion is not possible. In addition, adopted > code > is assumed to work as is. Reports that are fully contained in adopted code > are > hidden/tagged with the 'adopted' tag." > --service_selector={developer_confusion_guidelines,"^(MC3R1\\.R2\\.1|MC3R1\\.R2\\.2|MC3R1\\.R2\\.3|MC3R1\\.R2\\.4|MC3R1\\.R2\\.5|MC3R1\\.R2\\.6|MC3R1\\.R2\\.7|MC3R1\\.R4\\.1|MC3R1\\.R5\\.3|MC3R1\\.R5\\.6|MC3R1\\.R5\\.7|MC3R1\\.R5\\.8|MC3R1\\.R5\\.9|MC3R1\\.R7\\.1|MC3R1\\.R7\\.2|MC3R1\\.R7\\.3|MC3R1\\.R8\\.7|MC3R1\\.R8\\.8|MC3R1\\.R8\\.9|MC3R1\\.R8\\.11|MC3R1\\.R8\\.12|MC3R1\\.R8\\.13|MC3R1\\.R9\\.3|MC3R1\\.R9\\.4|MC3R1\\.R9\\.5|MC3R1\\.R10\\.2|MC3R1\\.R10\\.5|MC3R1\\.R10\\.6|MC3R1\\.R10\\.7|MC3R1\\.R10\\.8|MC3R1\\.R11\\.9|MC3R1\\.R12\\.1|MC3R1\\.R12\\.3|MC3R1\\.R12\\.4|MC3R1\\.R13\\.5|MC3R1\\.R14\\.1|MC3R1\\.R14\\.2|MC3R1\\.R14\\.3|MC3R1\\.R15\\.1|MC3R1\\.R15\\.2|MC3R1\\.R15\\.3|MC3R1\\.R15\\.4|MC3R1\\.R15\\.5|MC3R1\\.R15\\.6|MC3R1\\.R15\\.7|MC3R1\\.R16\\.1|MC3R1\\.R16\\.2|MC3R1\\.R16\\.3|MC3R1\\.R16\\.4|MC3R1\\.R16\\.5|MC3R1\\.R16\\.6|MC3R1\\.R16\\.7|MC3R1\\.R17\\.7|MC3R1\\.R17\\.8|MC3R1\\.R18\\.4|MC3R1\\.R18\\.5)$" > +-service_selector={developer_confusion_guidelines,"^(MC3A2\\.R2\\.1|MC3A2\\.R2\\.2|MC3A2\\.R2\\.3|MC3A2\\.R2\\.4|MC3A2\\.R2\\.5|MC3A2\\.R2\\.6|MC3A2\\.R2\\.7|MC3A2\\.R4\\.1|MC3A2\\.R5\\.3|MC3A2\\.R5\\.6|MC3A2\\.R5\\.7|MC3A2\\.R5\\.8|MC3A2\\.R5\\.9|MC3A2\\.R7\\.1|MC3A2\\.R7\\.2|MC3A2\\.R7\\.3|MC3A2\\.R8\\.7|MC3A2\\.R8\\.8|MC3A2\\.R8\\.9|MC3A2\\.R8\\.11|MC3A2\\.R8\\.12|MC3A2\\.R8\\.13|MC3A2\\.R9\\.3|MC3A2\\.R9\\.4|MC3A2\\.R9\\.5|MC3A2\\.R10\\.2|MC3A2\\.R10\\.5|MC3A2\\.R10\\.6|MC3A2\\.R10\\.7|MC3A2\\.R10\\.8|MC3A2\\.R11\\.9|MC3A2\\.R12\\.1|MC3A2\\.R12\\.3|MC3A2\\.R12\\.4|MC3A2\\.R13\\.5|MC3A2\\.R14\\.1|MC3A2\\.R14\\.2|MC3A2\\.R14\\.3|MC3A2\\.R15\\.1|MC3A2\\.R15\\.2|MC3A2\\.R15\\.3|MC3A2\\.R15\\.4|MC3A2\\.R15\\.5|MC3A2\\.R15\\.6|MC3A2\\.R15\\.7|MC3A2\\.R16\\.1|MC3A2\\.R16\\.2|MC3A2\\.R16\\.3|MC3A2\\.R16\\.4|MC3A2\\.R16\\.5|MC3A2\\.R16\\.6|MC3A2\\.R16\\.7|MC3A2\\.R17\\.7|MC3A2\\.R17\\.8|MC3A2\\.R18\\.4|MC3A2\\.R18\\.5)$" > } > -config=developer_confusion_guidelines,reports+={relied,adopted_report} > -doc_end > diff --git a/automation/eclair_analysis/ECLAIR/monitored.ecl > b/automation/eclair_analysis/ECLAIR/monitored.ecl > index 4e1deef7a7..8351996ec8 100644 > --- a/automation/eclair_analysis/ECLAIR/monitored.ecl > +++ b/automation/eclair_analysis/ECLAIR/monitored.ecl > @@ -1,106 +1,106 @@ > -doc_begin="A set of guidelines that are clean or that only have few > violations left." > --enable=MC3R1.D1.1 > --enable=MC3R1.D2.1 > --enable=MC3R1.D4.1 > --enable=MC3R1.D4.3 > --enable=MC3R1.D4.7 > --enable=MC3R1.D4.10 > --enable=MC3R1.D4.11 > --enable=MC3R1.D4.14 > --enable=MC3R1.R1.1 > --enable=MC3R1.R1.3 > --enable=MC3R1.R1.4 > --enable=MC3R1.R2.1 > --enable=MC3R1.R2.6 > --enable=MC3R1.R3.1 > --enable=MC3R1.R3.2 > --enable=MC3R1.R4.1 > --enable=MC3R1.R4.2 > --enable=MC3R1.R5.1 > --enable=MC3R1.R5.2 > --enable=MC3R1.R5.3 > --enable=MC3R1.R5.4 > --enable=MC3R1.R5.5 > --enable=MC3R1.R5.6 > --enable=MC3R1.R6.1 > --enable=MC3R1.R6.2 > --enable=MC3R1.R7.1 > --enable=MC3R1.R7.2 > --enable=MC3R1.R7.3 > --enable=MC3R1.R7.4 > --enable=MC3R1.R8.1 > --enable=MC3R1.R8.2 > --enable=MC3R1.R8.3 > --enable=MC3R1.R8.4 > --enable=MC3R1.R8.5 > --enable=MC3R1.R8.6 > --enable=MC3R1.R8.8 > --enable=MC3R1.R8.10 > --enable=MC3R1.R8.12 > --enable=MC3R1.R8.14 > --enable=MC3R1.R9.2 > --enable=MC3R1.R9.3 > --enable=MC3R1.R9.4 > --enable=MC3R1.R10.1 > --enable=MC3R1.R10.2 > --enable=MC3R1.R11.1 > --enable=MC3R1.R11.2 > --enable=MC3R1.R11.7 > --enable=MC3R1.R11.8 > --enable=MC3R1.R11.9 > --enable=MC3R1.R12.5 > --enable=MC3R1.R13.1 > --enable=MC3R1.R13.2 > --enable=MC3R1.R13.6 > --enable=MC3R1.R14.1 > --enable=MC3R1.R14.4 > --enable=MC3R1.R16.2 > --enable=MC3R1.R16.3 > --enable=MC3R1.R16.4 > --enable=MC3R1.R16.6 > --enable=MC3R1.R16.7 > --enable=MC3R1.R17.1 > --enable=MC3R1.R17.3 > --enable=MC3R1.R17.4 > --enable=MC3R1.R17.5 > --enable=MC3R1.R17.6 > --enable=MC3R1.R18.1 > --enable=MC3R1.R18.2 > --enable=MC3R1.R18.6 > --enable=MC3R1.R18.8 > --enable=MC3R1.R19.1 > --enable=MC3R1.R20.2 > --enable=MC3R1.R20.3 > --enable=MC3R1.R20.4 > --enable=MC3R1.R20.6 > --enable=MC3R1.R20.7 > --enable=MC3R1.R20.9 > --enable=MC3R1.R20.11 > --enable=MC3R1.R20.12 > --enable=MC3R1.R20.13 > --enable=MC3R1.R20.14 > --enable=MC3R1.R21.3 > --enable=MC3R1.R21.4 > --enable=MC3R1.R21.5 > --enable=MC3R1.R21.7 > --enable=MC3R1.R21.8 > --enable=MC3R1.R21.9 > --enable=MC3R1.R21.10 > --enable=MC3R1.R21.12 > --enable=MC3R1.R21.13 > --enable=MC3R1.R21.17 > --enable=MC3R1.R21.18 > --enable=MC3R1.R21.19 > --enable=MC3R1.R21.20 > --enable=MC3R1.R21.21 > --enable=MC3R1.R22.1 > --enable=MC3R1.R22.2 > --enable=MC3R1.R22.3 > --enable=MC3R1.R22.4 > --enable=MC3R1.R22.5 > --enable=MC3R1.R22.6 > --enable=MC3R1.R22.7 > --enable=MC3R1.R22.8 > --enable=MC3R1.R22.9 > --enable=MC3R1.R22.10 > +-enable=MC3A2.D1.1 > +-enable=MC3A2.D2.1 > +-enable=MC3A2.D4.1 > +-enable=MC3A2.D4.3 > +-enable=MC3A2.D4.7 > +-enable=MC3A2.D4.10 > +-enable=MC3A2.D4.11 > +-enable=MC3A2.D4.14 > +-enable=MC3A2.R1.1 > +-enable=MC3A2.R1.3 > +-enable=MC3A2.R1.4 > +-enable=MC3A2.R2.1 > +-enable=MC3A2.R2.6 > +-enable=MC3A2.R3.1 > +-enable=MC3A2.R3.2 > +-enable=MC3A2.R4.1 > +-enable=MC3A2.R4.2 > +-enable=MC3A2.R5.1 > +-enable=MC3A2.R5.2 > +-enable=MC3A2.R5.3 > +-enable=MC3A2.R5.4 > +-enable=MC3A2.R5.5 > +-enable=MC3A2.R5.6 > +-enable=MC3A2.R6.1 > +-enable=MC3A2.R6.2 > +-enable=MC3A2.R7.1 > +-enable=MC3A2.R7.2 > +-enable=MC3A2.R7.3 > +-enable=MC3A2.R7.4 > +-enable=MC3A2.R8.1 > +-enable=MC3A2.R8.2 > +-enable=MC3A2.R8.3 > +-enable=MC3A2.R8.4 > +-enable=MC3A2.R8.5 > +-enable=MC3A2.R8.6 > +-enable=MC3A2.R8.8 > +-enable=MC3A2.R8.10 > +-enable=MC3A2.R8.12 > +-enable=MC3A2.R8.14 > +-enable=MC3A2.R9.2 > +-enable=MC3A2.R9.3 > +-enable=MC3A2.R9.4 > +-enable=MC3A2.R10.1 > +-enable=MC3A2.R10.2 > +-enable=MC3A2.R11.1 > +-enable=MC3A2.R11.2 > +-enable=MC3A2.R11.7 > +-enable=MC3A2.R11.8 > +-enable=MC3A2.R11.9 > +-enable=MC3A2.R12.5 > +-enable=MC3A2.R13.1 > +-enable=MC3A2.R13.2 > +-enable=MC3A2.R13.6 > +-enable=MC3A2.R14.1 > +-enable=MC3A2.R14.4 > +-enable=MC3A2.R16.2 > +-enable=MC3A2.R16.3 > +-enable=MC3A2.R16.4 > +-enable=MC3A2.R16.6 > +-enable=MC3A2.R16.7 > +-enable=MC3A2.R17.1 > +-enable=MC3A2.R17.3 > +-enable=MC3A2.R17.4 > +-enable=MC3A2.R17.5 > +-enable=MC3A2.R17.6 > +-enable=MC3A2.R18.1 > +-enable=MC3A2.R18.2 > +-enable=MC3A2.R18.6 > +-enable=MC3A2.R18.8 > +-enable=MC3A2.R19.1 > +-enable=MC3A2.R20.2 > +-enable=MC3A2.R20.3 > +-enable=MC3A2.R20.4 > +-enable=MC3A2.R20.6 > +-enable=MC3A2.R20.7 > +-enable=MC3A2.R20.9 > +-enable=MC3A2.R20.11 > +-enable=MC3A2.R20.12 > +-enable=MC3A2.R20.13 > +-enable=MC3A2.R20.14 > +-enable=MC3A2.R21.3 > +-enable=MC3A2.R21.4 > +-enable=MC3A2.R21.5 > +-enable=MC3A2.R21.7 > +-enable=MC3A2.R21.8 > +-enable=MC3A2.R21.9 > +-enable=MC3A2.R21.10 > +-enable=MC3A2.R21.12 > +-enable=MC3A2.R21.13 > +-enable=MC3A2.R21.17 > +-enable=MC3A2.R21.18 > +-enable=MC3A2.R21.19 > +-enable=MC3A2.R21.20 > +-enable=MC3A2.R21.21 > +-enable=MC3A2.R22.1 > +-enable=MC3A2.R22.2 > +-enable=MC3A2.R22.3 > +-enable=MC3A2.R22.4 > +-enable=MC3A2.R22.5 > +-enable=MC3A2.R22.6 > +-enable=MC3A2.R22.7 > +-enable=MC3A2.R22.8 > +-enable=MC3A2.R22.9 > +-enable=MC3A2.R22.10 > -doc_end > diff --git a/automation/eclair_analysis/ECLAIR/tagging.ecl > b/automation/eclair_analysis/ECLAIR/tagging.ecl > index 755ea3271f..b524318591 100644 > --- a/automation/eclair_analysis/ECLAIR/tagging.ecl > +++ b/automation/eclair_analysis/ECLAIR/tagging.ecl > @@ -20,93 +20,93 @@ > -doc_begin="Clean guidelines: new violations for these guidelines are not > accepted." > > -service_selector={clean_guidelines_common, > -"MC3R1.D1.1|| > -MC3R1.D2.1|| > -MC3R1.D4.1|| > -MC3R1.D4.11|| > -MC3R1.D4.14|| > -MC3R1.R1.1|| > -MC3R1.R1.3|| > -MC3R1.R1.4|| > -MC3R1.R2.6|| > -MC3R1.R3.1|| > -MC3R1.R3.2|| > -MC3R1.R4.1|| > -MC3R1.R4.2|| > -MC3R1.R5.1|| > -MC3R1.R5.2|| > -MC3R1.R5.3|| > -MC3R1.R5.4|| > -MC3R1.R5.6|| > -MC3R1.R6.1|| > -MC3R1.R6.2|| > -MC3R1.R7.1|| > -MC3R1.R7.2|| > -MC3R1.R7.3|| > -MC3R1.R7.4|| > -MC3R1.R8.1|| > -MC3R1.R8.2|| > -MC3R1.R8.3|| > -MC3R1.R8.4|| > -MC3R1.R8.5|| > -MC3R1.R8.6|| > -MC3R1.R8.8|| > -MC3R1.R8.10|| > -MC3R1.R8.12|| > -MC3R1.R8.14|| > -MC3R1.R9.2|| > -MC3R1.R9.3|| > -MC3R1.R9.4|| > -MC3R1.R10.2|| > -MC3R1.R11.6|| > -MC3R1.R11.7|| > -MC3R1.R11.9|| > -MC3R1.R12.5|| > -MC3R1.R13.6|| > -MC3R1.R14.1|| > -MC3R1.R14.3|| > -MC3R1.R14.4|| > -MC3R1.R16.2|| > -MC3R1.R16.3|| > -MC3R1.R16.7|| > -MC3R1.R17.1|| > -MC3R1.R17.3|| > -MC3R1.R17.4|| > -MC3R1.R17.5|| > -MC3R1.R17.6|| > -MC3R1.R18.6|| > -MC3R1.R18.8|| > -MC3R1.R20.2|| > -MC3R1.R20.3|| > -MC3R1.R20.4|| > -MC3R1.R20.6|| > -MC3R1.R20.9|| > -MC3R1.R20.11|| > -MC3R1.R20.12|| > -MC3R1.R20.13|| > -MC3R1.R20.14|| > -MC3R1.R21.3|| > -MC3R1.R21.4|| > -MC3R1.R21.5|| > -MC3R1.R21.7|| > -MC3R1.R21.8|| > -MC3R1.R21.9|| > -MC3R1.R21.10|| > -MC3R1.R21.11|| > -MC3R1.R21.12|| > -MC3R1.R21.13|| > -MC3R1.R21.19|| > -MC3R1.R21.21|| > -MC3R1.R22.1|| > -MC3R1.R22.2|| > -MC3R1.R22.3|| > -MC3R1.R22.4|| > -MC3R1.R22.5|| > -MC3R1.R22.6|| > -MC3R1.R22.7|| > -MC3R1.R22.8|| > -MC3R1.R22.9|| > -MC3R1.R22.10" > +"MC3A2.D1.1|| > +MC3A2.D2.1|| > +MC3A2.D4.1|| > +MC3A2.D4.11|| > +MC3A2.D4.14|| > +MC3A2.R1.1|| > +MC3A2.R1.3|| > +MC3A2.R1.4|| > +MC3A2.R2.6|| > +MC3A2.R3.1|| > +MC3A2.R3.2|| > +MC3A2.R4.1|| > +MC3A2.R4.2|| > +MC3A2.R5.1|| > +MC3A2.R5.2|| > +MC3A2.R5.3|| > +MC3A2.R5.4|| > +MC3A2.R5.6|| > +MC3A2.R6.1|| > +MC3A2.R6.2|| > +MC3A2.R7.1|| > +MC3A2.R7.2|| > +MC3A2.R7.3|| > +MC3A2.R7.4|| > +MC3A2.R8.1|| > +MC3A2.R8.2|| > +MC3A2.R8.3|| > +MC3A2.R8.4|| > +MC3A2.R8.5|| > +MC3A2.R8.6|| > +MC3A2.R8.8|| > +MC3A2.R8.10|| > +MC3A2.R8.12|| > +MC3A2.R8.14|| > +MC3A2.R9.2|| > +MC3A2.R9.3|| > +MC3A2.R9.4|| > +MC3A2.R10.2|| > +MC3A2.R11.6|| > +MC3A2.R11.7|| > +MC3A2.R11.9|| > +MC3A2.R12.5|| > +MC3A2.R13.6|| > +MC3A2.R14.1|| > +MC3A2.R14.3|| > +MC3A2.R14.4|| > +MC3A2.R16.2|| > +MC3A2.R16.3|| > +MC3A2.R16.7|| > +MC3A2.R17.1|| > +MC3A2.R17.3|| > +MC3A2.R17.4|| > +MC3A2.R17.5|| > +MC3A2.R17.6|| > +MC3A2.R18.6|| > +MC3A2.R18.8|| > +MC3A2.R20.2|| > +MC3A2.R20.3|| > +MC3A2.R20.4|| > +MC3A2.R20.6|| > +MC3A2.R20.9|| > +MC3A2.R20.11|| > +MC3A2.R20.12|| > +MC3A2.R20.13|| > +MC3A2.R20.14|| > +MC3A2.R21.3|| > +MC3A2.R21.4|| > +MC3A2.R21.5|| > +MC3A2.R21.7|| > +MC3A2.R21.8|| > +MC3A2.R21.9|| > +MC3A2.R21.10|| > +MC3A2.R21.11|| > +MC3A2.R21.12|| > +MC3A2.R21.13|| > +MC3A2.R21.19|| > +MC3A2.R21.21|| > +MC3A2.R22.1|| > +MC3A2.R22.2|| > +MC3A2.R22.3|| > +MC3A2.R22.4|| > +MC3A2.R22.5|| > +MC3A2.R22.6|| > +MC3A2.R22.7|| > +MC3A2.R22.8|| > +MC3A2.R22.9|| > +MC3A2.R22.10" > } > > -setq=target,getenv("XEN_TARGET_ARCH") > @@ -116,7 +116,7 @@ if(string_equal(target,"x86_64"), > ) > > if(string_equal(target,"arm64"), > - > service_selector({"additional_clean_guidelines","MC3R1.R2.1||MC3R1.R5.3||MC3.R11.2||MC3R1.R16.6||MC3R1.R20.7"}) > + > service_selector({"additional_clean_guidelines","MC3A2.R2.1||MC3A2.R5.3||MC3.R11.2||MC3A2.R16.6||MC3A2.R20.7"}) > ) > > > -reports+={clean:added,"service(clean_guidelines_common||additional_clean_guidelines)"} > diff --git a/docs/misra/documenting-violations.rst > b/docs/misra/documenting-violations.rst > index 8f1cbd83b8..d26377d5aa 100644 > --- a/docs/misra/documenting-violations.rst > +++ b/docs/misra/documenting-violations.rst > @@ -53,7 +53,7 @@ Here is an example to add a new justification in safe.json:: > | "analyser": { > | "cppcheck": "misra-c2012-20.7", > | "coverity": "misra_c_2012_rule_20_7_violation", > -| "eclair": "MC3R1.R20.7" > +| "eclair": "MC3A2.R20.7" > | }, > | "name": "R20.7 C macro parameters not used as expression", > | "text": "The macro parameters used in this [...]" > @@ -138,7 +138,7 @@ for the Rule 8.6: > > Eclair reports it in its web report, file xen/include/xen/kernel.h, line 68: > > -| MC3R1.R8.6 for program 'xen/xen-syms', variable '_start' has no definition > +| MC3A2.R8.6 for program 'xen/xen-syms', variable '_start' has no definition > > Also coverity reports it, here is an extract of the finding: > > @@ -165,7 +165,7 @@ We will prepare our entry in the safe.json database:: > | { > | "id": "SAF-1-safe", > | "analyser": { > -| "eclair": "MC3R1.R8.6", > +| "eclair": "MC3A2.R8.6", > | "coverity": "misra_c_2012_rule_8_6_violation" > | }, > | "name": "Rule 8.6: linker script defined symbols", > diff --git a/docs/misra/safe.json b/docs/misra/safe.json > index 684346386e..b8a4f878ea 100644 > --- a/docs/misra/safe.json > +++ b/docs/misra/safe.json > @@ -4,7 +4,7 @@ > { > "id": "SAF-0-safe", > "analyser": { > - "eclair": "MC3R1.R8.6", > + "eclair": "MC3A2.R8.6", > "coverity": "misra_c_2012_rule_8_6_violation" > }, > "name": "Rule 8.6: linker script defined symbols", > @@ -13,7 +13,7 @@ > { > "id": "SAF-1-safe", > "analyser": { > - "eclair": "MC3R1.R8.4" > + "eclair": "MC3A2.R8.4" > }, > "name": "Rule 8.4: asm-only definition", > "text": "Functions and variables used only by asm modules do not > need to have a visible declaration prior to their definition." > @@ -21,23 +21,23 @@ > { > "id": "SAF-2-safe", > "analyser": { > - "eclair": "MC3R1.R10.1" > + "eclair": "MC3A2.R10.1" > }, > - "name": "MC3R1.R10.1: use of an enumeration constant in an > arithmetic operation", > + "name": "MC3A2.R10.1: use of an enumeration constant in an > arithmetic operation", > "text": "This violation can be fixed with a cast to (int) of the > enumeration constant, but a deviation was chosen due to code readability (see > also the comment in BITS_TO_LONGS)." > }, > { > "id": "SAF-3-safe", > "analyser": { > - "eclair": "MC3R1.R20.4" > + "eclair": "MC3A2.R20.4" > }, > - "name": "MC3R1.R20.4: allow the definition of a macro with the > same name as a keyword in some special cases", > + "name": "MC3A2.R20.4: allow the definition of a macro with the > same name as a keyword in some special cases", > "text": "The definition of a macro with the same name as a > keyword can be useful in certain configurations to improve the guarantees > that can be provided by Xen. See docs/misra/deviations.rst for a precise > rationale for all such cases." > }, > { > "id": "SAF-4-safe", > "analyser": { > - "eclair": "MC3R1.R17.1" > + "eclair": "MC3A2.R17.1" > }, > "name": "Rule 17.1: internal helper functions made to break long > running hypercalls into multiple calls.", > "text": "They need to take a variable number of arguments > depending on the original hypercall they are trying to continue." > @@ -45,31 +45,31 @@ > { > "id": "SAF-5-safe", > "analyser": { > - "eclair": "MC3R1.R16.2" > + "eclair": "MC3A2.R16.2" > }, > - "name": "MC3R1.R16.2: using a case label when the most > closely-enclosing compound statement is not a switch statement", > + "name": "MC3A2.R16.2: using a case label when the most > closely-enclosing compound statement is not a switch statement", > "text": "A switch label enclosed by some compound statement that > is not the body of a switch is permitted within local helper macros that are > unlikely to be misused or misunderstood." > }, > { > "id": "SAF-6-safe", > "analyser": { > - "eclair": "MC3R1.R20.12" > + "eclair": "MC3A2.R20.12" > }, > - "name": "MC3R1.R20.12: use of a macro argument that deliberately > violates the Rule", > + "name": "MC3A2.R20.12: use of a macro argument that deliberately > violates the Rule", > "text": "A macro parameter that is itself a macro is > intentionally used within the macro both as a regular parameter and for text > replacement." > }, > { > "id": "SAF-7-safe", > "analyser": { > - "eclair": "MC3R1.R20.7" > + "eclair": "MC3A2.R20.7" > }, > - "name": "MC3R1.R20.7: deliberately non-parenthesized macro > argument", > + "name": "MC3A2.R20.7: deliberately non-parenthesized macro > argument", > "text": "A macro parameter expands to an expression that is > non-parenthesized, as doing so would break the functionality." > }, > { > "id": "SAF-8-safe", > "analyser": { > - "eclair": "MC3R1.D4.10" > + "eclair": "MC3A2.D4.10" > }, > "name": "Dir 4.10: headers that leave it up to the caller to > include them correctly", > "text": "Headers that deliberatively leave the responsability of > their correct inclusion to the caller are allowed." > @@ -77,7 +77,7 @@ > { > "id": "SAF-9-safe", > "analyser": { > - "eclair": "MC3R1.D4.10" > + "eclair": "MC3A2.D4.10" > }, > "name": "Dir 4.10: empty headers", > "text": "Empty headers pose no risk if included more than once." > @@ -85,7 +85,7 @@ > { > "id": "SAF-10-safe", > "analyser": { > - "eclair": "MC3R1.D4.10" > + "eclair": "MC3A2.D4.10" > }, > "name": "Dir 4.10: direct inclusion guard before", > "text": "Headers with just the direct inclusion guard before the > inclusion guard are safe." > -- > 2.43.0 >
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |