Received: by 10.213.65.68 with SMTP id h4csp591743imn; Tue, 27 Mar 2018 05:20:56 -0700 (PDT) X-Google-Smtp-Source: AG47ELuDHvTnRT50w699V4CRlIRWNmRJLVqc3Wc5DJgx3ijUYzZ+PWHsXu5fqsXIJFBiLJ8sk68b X-Received: by 10.99.95.142 with SMTP id t136mr10512666pgb.302.1522153256268; Tue, 27 Mar 2018 05:20:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522153256; cv=none; d=google.com; s=arc-20160816; b=KjsaCOrKwVHQ2HL0udg4YhCC5IoMLSdFyzyY8Hf1siyJ+ZXQcxQpSlbOYGzqYUM3ib XTRmO/IP2A/Z3zx4gI9gFjXm56OfsjKouA+VptjB4eA4FcJaHSpWjprTEkn/HIVfvslE KDVpf0kJUT6UIHnHA1F096NaiYssYb0RZZcvh49v3YM14n1Zy/4lELnjFlwyh2nfIkb3 Db9eX07kjq/wvD9FatIF6hyMn3qU1RZ2Z0ZNwBDTCmo7bx6QUTh8XlsiJvFQG/dSfU9/ Hxm7dF54UpofMBxsHYKAiNsJiLOhiA/dIC4xHgU+eNxen5FB7MeYXVWpSAVffr1s+ZfL u+qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :dkim-signature:arc-authentication-results; bh=9l1/6PgNyw25Qalmhf/Mz2SCJqn/4jNwbQvz7UgEVno=; b=KRWO1eipM57DV9NA6w/k7GmGajJcgj864oAjgP+WftYxjaDu061LJzDaeXzZWK0YIr qmaiTXepb42KtlDqBrbS9Gopohoo3U3YCaARTtZWWvxDUKANLKRij/djjHZ0zhkTMSUH wxBHkEVPjL1Td8uL2RuDDZjl13VrIeu2h0lRBFEIhADMUsAe39/FaDZPBSNPvvs/p4Ej q/GXvKQ4Pgh84SWgEP+OJpfN9eY1SpAvOk41h5nmfCT2v5FgzgMcUnT9HLufBd3qUAO8 ugDHbg+QEzKs+XHGy95ExMw2xymMoFovdiwEWwaCKcObXa9VW+3Ut20D23GwSlJSbWq4 EwbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oo2fjWE3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s3-v6si1100944plp.523.2018.03.27.05.20.11; Tue, 27 Mar 2018 05:20:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oo2fjWE3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752643AbeC0MQJ (ORCPT + 99 others); Tue, 27 Mar 2018 08:16:09 -0400 Received: from mail-lf0-f67.google.com ([209.85.215.67]:38140 "EHLO mail-lf0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752232AbeC0MQH (ORCPT ); Tue, 27 Mar 2018 08:16:07 -0400 Received: by mail-lf0-f67.google.com with SMTP id u3-v6so12055828lff.5 for ; Tue, 27 Mar 2018 05:16:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:openpgp:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=9l1/6PgNyw25Qalmhf/Mz2SCJqn/4jNwbQvz7UgEVno=; b=oo2fjWE3eVs28GRm0IBVpVNRZhySQToRcWdF4Hs/3UuAiHdtsJRf7WAwQkO8Ai7IyA Mt98ADkYUJCfoeOR/BYdxRS5BJv1H+RWjE6bMkxhR+mKCAzlEnaSzoFHxImqXSNudK8Q 1+EWUxvMetKEzQd4j0HyLJrjuFgHdCazHZ/K7VXCzjCaUNqpZnOZhULjoVbBJ7YNF19y u39y95Eqtoi7t21i5sBjdROT+oeA2L1/MuWk4BDowV/5F/6ztg3pesahDXQsEYjMB641 OLPGnc3TD5dNbuszJ/9PEQ3gjEM/gjnp7ygokFzwj2f3ki0DBpp7PxFj5gcGPUD9XlJm pj9w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=9l1/6PgNyw25Qalmhf/Mz2SCJqn/4jNwbQvz7UgEVno=; b=I239TA4ihxQE0tIfKrGPXzz6SZIXiik16yajFCZ+dYDxvckBkMUTtDXPWh+LXPqo1u g9NgPrUgGc6woE6k/V744H5anWnRDe6+VgEdlhcUclfuleGU31olwt5GiwN8UtQxvH6k cBAdUr9vP2lKVagJy5nWPiy/q1nNEGlA4pPum8VBHv1o0Ryd/OT4h9Xmbfo6avkSsvD7 dWVJKGufH907uRWBvAZg7PRwLam1Fh4BzFdm+7NeOjsEbc9IUEjwOz8r6jNRkUgeLu9C W3F2sSL5f9bPhqrvrxVg/nMurl9TTZtESIbjVGELB/f6R63nrusIpx3JSBj+8aSsAwN0 18Yg== X-Gm-Message-State: AElRT7HeKQ+wcE4THsne6BenB/8Kky33iVjY7mk9AZnfBnvdcI+gUgTO lkIW1541cCAmX0NcOofLif0= X-Received: by 2002:a19:5750:: with SMTP id l77-v6mr15378828lfb.10.1522152966355; Tue, 27 Mar 2018 05:16:06 -0700 (PDT) Received: from [192.168.1.145] (ppp109-252-55-234.pppoe.spdop.ru. [109.252.55.234]) by smtp.googlemail.com with ESMTPSA id f46-v6sm217445lfh.56.2018.03.27.05.16.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 27 Mar 2018 05:16:05 -0700 (PDT) Subject: Re: [PATCH v2 3/6] ARM: trusted_foundations: do not use naked function To: Robin Murphy , Stefan Agner , linux@armlinux.org.uk, ard.biesheuvel@linaro.org, arnd@arndb.de Cc: nicolas.pitre@linaro.org, marc.zyngier@arm.com, behanw@converseincode.com, keescook@chromium.org, Bernhard.Rosenkranzer@linaro.org, mka@chromium.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Stephen Warren , Thierry Reding References: <20180325180959.28008-1-stefan@agner.ch> <20180325180959.28008-4-stefan@agner.ch> <704c863a-0b5a-6396-d7da-f0ed17b7cca2@gmail.com> <263337af-7541-be9e-3db6-6cb987fd08fb@arm.com> From: Dmitry Osipenko Openpgp: preference=signencrypt Autocrypt: addr=digetx@gmail.com; keydata= xsBNBFpX5TwBCADQhg+lBnTunWSPbP5I+rM9q6EKPm5fu2RbqyVAh/W3fRvLyghdb58Yrmjm KpDYUhBIZvAQoFLEL1IPAgJBtmPvemO1XUGPxfYNh/3BlcDFBAgERrI3BfA/6pk7SAFn8u84 p+J1TW4rrPYcusfs44abJrn8CH0GZKt2AZIsGbGQ79O2HHXKHr9V95ZEPWH5AR0UtL6wxg6o O56UNG3rIzSL5getRDQW3yCtjcqM44mz6GPhSE2sxNgqureAbnzvr4/93ndOHtQUXPzzTrYB z/WqLGhPdx5Ouzn0Q0kSVCQiqeExlcQ7i7aKRRrELz/5/IXbCo2O+53twlX8xOps9iMfABEB AAHNIkRtaXRyeSBPc2lwZW5rbyA8ZGlnZXR4QGdtYWlsLmNvbT7CwJQEEwEIAD4WIQSczHcO 3uc4K1eb3yvTNNaPsNRzvAUCWlflPAIbAwUJA8JnAAULCQgHAgYVCgkICwIEFgIDAQIeAQIX gAAKCRDTNNaPsNRzvFjTCACqAh1M9/YPq73/ai5h2ExDquTgJnjegL8KL2yHL3G+XINwzN5E nPI7esoYm+zVWDJbv3UuRqylpookLNSRA01yyvkaMcipB/B128UnqmUiGRqezj9QE20yIauo uHRuwHPE2q+UkfUhRX9iuOaEyQtZDiCa0myMjmRkJ+Z8ZetclEPG8dYZu47w04phuMlu1QAt a0gkZOaMKvXgj21ushALS6nYnvm7HiIPQXfnEXThartatRvFdmbG4PCn0IoICkQBizwJtXrL HEjELIFap0M8krVJlUoZTFaZnaZkGpUDWikeFtAuie2KuIxmVBYPM4X7pM3eP3AVvIPGS7EE UUFuzsBNBFpX5TwBCADFNDou220thijaLLGaQsebWjzc/gPRxMixIpk856MRyRaQin+IbGD6 YskMb5ZSD3nS88LIKNfY4MMH0LwfYztI++ICG2vdFLkbBt78E+LqEa+kZ9072l4W5KO3mWQo +jMfxXbpgGlc7iuEReDgl8iyZ27r51kSW665CYvvu2YJhLqgdj6QM1lN2D1UnhEhkkU+pRAj 1rJVOxdfJaQNQS4+204p3TrURovzNGkN/brqakpNIcqGOAGQqb8F0tuwwuP7ERq/BzDNkbdr qJOrVC/wkHRq1jfabQczWKf8MwYOvivR3HY8d3CpSQxmUXDtdOWfg0XGm1dxYnVfqPjuJaZt ABEBAAHCwHwEGAEIACYWIQSczHcO3uc4K1eb3yvTNNaPsNRzvAUCWlflPAIbDAUJA8JnAAAK CRDTNNaPsNRzvJzuB/9d+sxcwHbO8ZDcgaLX9N+bXFqN9fIRVmBUyWa+qqTSREA4uVAtYcRT lfPE2OQ7aMFxaYPwo+/z5SLpu8HcEhN/FG9uIkfYwK0mdCO0vgvlfvBJm4VHe7C6vyAeEPJQ DKbBvdgeqFqO+PsLkk2sawF/9sontMJ5iFfjNDj4UeAo4VsdlduTBZv5hHFvIbv/p7jKH6OT 90FsgUSVbShh7SH5OzAcgqSy4kxuS1AHizWo6P3f9vei987LZWTyhuEuhJsOfivDsjKIq7qQ c5eR+JJtyLEA0Jt4cQGhpzHtWB0yB3XxXzHVa4QUp00BNVWyiJ/t9JHT4S5mdyLfcKm7ddc9 Message-ID: Date: Tue, 27 Mar 2018 15:16:04 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <263337af-7541-be9e-3db6-6cb987fd08fb@arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27.03.2018 14:54, Robin Murphy wrote: > On 26/03/18 22:20, Dmitry Osipenko wrote: >> On 25.03.2018 21:09, Stefan Agner wrote: >>> As documented in GCC naked functions should only use Basic asm >>> syntax. The Extended asm or mixture of Basic asm and "C" code is >>> not guaranteed. Currently this works because it was hard coded >>> to follow and check GCC behavior for arguments and register >>> placement. >>> >>> Furthermore with clang using parameters in Extended asm in a >>> naked function is not supported: >>>    arch/arm/firmware/trusted_foundations.c:47:10: error: parameter >>>            references not allowed in naked functions >>>                  : "r" (type), "r" (arg1), "r" (arg2) >>>                         ^ >>> >>> Use a regular function to be more portable. This aligns also with >>> the other smc call implementations e.g. in qcom_scm-32.c and >>> bcm_kona_smc.c. >>> >>> Cc: Dmitry Osipenko >>> Cc: Stephen Warren >>> Cc: Thierry Reding >>> Signed-off-by: Stefan Agner >>> --- >>> Changes in v2: >>> - Keep stmfd/ldmfd to avoid potential ABI issues >>> >>>   arch/arm/firmware/trusted_foundations.c | 14 +++++++++----- >>>   1 file changed, 9 insertions(+), 5 deletions(-) >>> >>> diff --git a/arch/arm/firmware/trusted_foundations.c >>> b/arch/arm/firmware/trusted_foundations.c >>> index 3fb1b5a1dce9..689e6565abfc 100644 >>> --- a/arch/arm/firmware/trusted_foundations.c >>> +++ b/arch/arm/firmware/trusted_foundations.c >>> @@ -31,21 +31,25 @@ >>>     static unsigned long cpu_boot_addr; >>>   -static void __naked tf_generic_smc(u32 type, u32 arg1, u32 arg2) >>> +static void tf_generic_smc(u32 type, u32 arg1, u32 arg2) >>>   { >>> +    register u32 r0 asm("r0") = type; >>> +    register u32 r1 asm("r1") = arg1; >>> +    register u32 r2 asm("r2") = arg2; >>> + >>>       asm volatile( >>>           ".arch_extension    sec\n\t" >>> -        "stmfd    sp!, {r4 - r11, lr}\n\t" >>> +        "stmfd    sp!, {r4 - r11}\n\t" >>>           __asmeq("%0", "r0") >>>           __asmeq("%1", "r1") >>>           __asmeq("%2", "r2") >>>           "mov    r3, #0\n\t" >>>           "mov    r4, #0\n\t" >>>           "smc    #0\n\t" >>> -        "ldmfd    sp!, {r4 - r11, pc}" >>> +        "ldmfd    sp!, {r4 - r11}\n\t" >>>           : >>> -        : "r" (type), "r" (arg1), "r" (arg2) >>> -        : "memory"); >>> +        : "r" (r0), "r" (r1), "r" (r2) >>> +        : "memory", "r3", "r12", "lr"); >> >> Although seems "lr" won't be affected by SMC invocation because it should be >> banked and hence could be omitted entirely from the code. Maybe somebody could >> confirm this. > Strictly per the letter of the architecture, the SMC could be trapped to Hyp > mode, and a hypervisor might clobber LR_usr in the process of forwarding the > call to the firmware secure monitor (since Hyp doesn't have a banked LR of its > own). Admittedly there are probably no real systems with the appropriate > hardware/software combination to hit that, but on the other hand if this gets > inlined where the compiler has already created a stack frame then an LR clobber > is essentially free, so I reckon we're better off keeping it for reassurance. > This isn't exactly a critical fast path anyway. Okay, thank you for the clarification.