Received: by 10.192.165.156 with SMTP id m28csp804126imm; Mon, 16 Apr 2018 08:59:32 -0700 (PDT) X-Google-Smtp-Source: AIpwx49jwowPpi5ImoiXYDcHysoWxP9KaFNG23+mCgDcrhYULHOiJpnogKUN7xwpdxc8+WnSNByo X-Received: by 2002:a17:902:205:: with SMTP id 5-v6mr7340541plc.301.1523894372558; Mon, 16 Apr 2018 08:59:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523894372; cv=none; d=google.com; s=arc-20160816; b=OsBPyU4HXyIHMVGrGf7brndQoXiqnj/dePBs0hXdC35pdL++k86TZdrn+ZbHGaMtZ6 CaEEZZjADBq1SToK9Ag/ZU6lfbLkflGJBnWh+JINFXJ9/NPVfaEZy2dnSn2QdUQuHwTm 54l/7m23gMLeMvBg5v5tftMermiSb8FkfngqzP31oUxIZ++PvwqI2et62vR0wosWDwNd oA59KhE4lSC5hvrhvMW45LGbDxUPLb5NOFAg6di4WMLoX2RySs1GZMLpqDvBiAiv8GK7 En4sO2iWKDCgSsNGagTuk0PNXuR7Q4N+fqzkHG/GxQVTsOTIfMNbX3KonV2/+Z/M31LO dVmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature:arc-authentication-results; bh=iiqOTAYpTf8TQz2LDYnCNrcfoWEJi8dvy5v+ObVTGrI=; b=iDZqgLHi19dEToGDpxTZpRX0LYs1NKXSRA35WRlvEXA7m+QWPidy2Eqrwux3TuhyIl iZXhVeJvumb3r2EiJW5Flao7ZKjNWWtvfOjVvCAMdNy8IvFH5o8GfFCl5plRUwlWhTN5 o0/NPnltrwmc2I+++BwW7/qk6TgVihwEJUvJ7Xsqufh3zkI+9dElHgswtiIo31VKX/T7 zx/M11lfFqIQbo0sIYld5D1vIzE6M6WutJRn3SKmRpCcg7Xw87WnmLiw3G871swCPTEF VxG8Gm7h/fGUKdcC+GNxTRL/esXLazr3RnMJkV/uiQlh3rUVt0aV8IVs9aLaC4RlM4vd 6nCg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@agner.ch header.s=dkim header.b=sOkDuGGI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2si9976665pgs.351.2018.04.16.08.59.18; Mon, 16 Apr 2018 08:59:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@agner.ch header.s=dkim header.b=sOkDuGGI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752067AbeDPP4k (ORCPT + 99 others); Mon, 16 Apr 2018 11:56:40 -0400 Received: from mail.kmu-office.ch ([178.209.48.109]:42010 "EHLO mail.kmu-office.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751169AbeDPP4i (ORCPT ); Mon, 16 Apr 2018 11:56:38 -0400 Received: from webmail.kmu-office.ch (unknown [IPv6:2a02:418:6a02::a3]) by mail.kmu-office.ch (Postfix) with ESMTPSA id E21F65C04D7; Mon, 16 Apr 2018 17:56:36 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=agner.ch; s=dkim; t=1523894196; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iiqOTAYpTf8TQz2LDYnCNrcfoWEJi8dvy5v+ObVTGrI=; b=sOkDuGGIpQ2/VtyPOofcesZCYS7hNJ7IXM27pnBOyH3Y5/mzm+zcjlNLvW/YIHRDK3UFYM LCYq0vYZpa1m0+lgAuh4qBSpE1zBvFxMHG6qof1yrpnoBh3VYLPceItNeNxDImg6eOBz5N gejFg1vTiCxTpWNJLCrw7D58e9mm4C4= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Date: Mon, 16 Apr 2018 17:56:34 +0200 From: Stefan Agner To: Stephen Warren Cc: Robin Murphy , linux@armlinux.org.uk, ard.biesheuvel@linaro.org, arnd@arndb.de, nicolas.pitre@linaro.org, marc.zyngier@arm.com, behanw@converseincode.com, keescook@chromium.org, Bernhard.Rosenkranzer@linaro.org, mka@chromium.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Thierry Reding , Dmitry Osipenko Subject: Re: [PATCH v2 3/6] ARM: trusted_foundations: do not use naked function In-Reply-To: References: <20180325180959.28008-1-stefan@agner.ch> <20180325180959.28008-4-stefan@agner.ch> <704c863a-0b5a-6396-d7da-f0ed17b7cca2@gmail.com> <263337af-7541-be9e-3db6-6cb987fd08fb@arm.com> Message-ID: X-Sender: stefan@agner.ch User-Agent: Roundcube Webmail/1.3.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27.03.2018 14:16, Dmitry Osipenko wrote: > On 27.03.2018 14:54, Robin Murphy wrote: >> On 26/03/18 22:20, Dmitry Osipenko wrote: >>> On 25.03.2018 21:09, Stefan Agner wrote: >>>> As documented in GCC naked functions should only use Basic asm >>>> syntax. The Extended asm or mixture of Basic asm and "C" code is >>>> not guaranteed. Currently this works because it was hard coded >>>> to follow and check GCC behavior for arguments and register >>>> placement. >>>> >>>> Furthermore with clang using parameters in Extended asm in a >>>> naked function is not supported: >>>>    arch/arm/firmware/trusted_foundations.c:47:10: error: parameter >>>>            references not allowed in naked functions >>>>                  : "r" (type), "r" (arg1), "r" (arg2) >>>>                         ^ >>>> >>>> Use a regular function to be more portable. This aligns also with >>>> the other smc call implementations e.g. in qcom_scm-32.c and >>>> bcm_kona_smc.c. >>>> >>>> Cc: Dmitry Osipenko >>>> Cc: Stephen Warren >>>> Cc: Thierry Reding >>>> Signed-off-by: Stefan Agner >>>> --- >>>> Changes in v2: >>>> - Keep stmfd/ldmfd to avoid potential ABI issues >>>> >>>>   arch/arm/firmware/trusted_foundations.c | 14 +++++++++----- >>>>   1 file changed, 9 insertions(+), 5 deletions(-) >>>> >>>> diff --git a/arch/arm/firmware/trusted_foundations.c >>>> b/arch/arm/firmware/trusted_foundations.c >>>> index 3fb1b5a1dce9..689e6565abfc 100644 >>>> --- a/arch/arm/firmware/trusted_foundations.c >>>> +++ b/arch/arm/firmware/trusted_foundations.c >>>> @@ -31,21 +31,25 @@ >>>>     static unsigned long cpu_boot_addr; >>>>   -static void __naked tf_generic_smc(u32 type, u32 arg1, u32 arg2) >>>> +static void tf_generic_smc(u32 type, u32 arg1, u32 arg2) >>>>   { >>>> +    register u32 r0 asm("r0") = type; >>>> +    register u32 r1 asm("r1") = arg1; >>>> +    register u32 r2 asm("r2") = arg2; >>>> + >>>>       asm volatile( >>>>           ".arch_extension    sec\n\t" >>>> -        "stmfd    sp!, {r4 - r11, lr}\n\t" >>>> +        "stmfd    sp!, {r4 - r11}\n\t" >>>>           __asmeq("%0", "r0") >>>>           __asmeq("%1", "r1") >>>>           __asmeq("%2", "r2") >>>>           "mov    r3, #0\n\t" >>>>           "mov    r4, #0\n\t" >>>>           "smc    #0\n\t" >>>> -        "ldmfd    sp!, {r4 - r11, pc}" >>>> +        "ldmfd    sp!, {r4 - r11}\n\t" >>>>           : >>>> -        : "r" (type), "r" (arg1), "r" (arg2) >>>> -        : "memory"); >>>> +        : "r" (r0), "r" (r1), "r" (r2) >>>> +        : "memory", "r3", "r12", "lr"); >>> >>> Although seems "lr" won't be affected by SMC invocation because it should be >>> banked and hence could be omitted entirely from the code. Maybe somebody could >>> confirm this. >> Strictly per the letter of the architecture, the SMC could be trapped to Hyp >> mode, and a hypervisor might clobber LR_usr in the process of forwarding the >> call to the firmware secure monitor (since Hyp doesn't have a banked LR of its >> own). Admittedly there are probably no real systems with the appropriate >> hardware/software combination to hit that, but on the other hand if this gets >> inlined where the compiler has already created a stack frame then an LR clobber >> is essentially free, so I reckon we're better off keeping it for reassurance. >> This isn't exactly a critical fast path anyway. > > Okay, thank you for the clarification. So it seems this change is fine? Stephen, you picked up changes for this driver before, is this patch going through your tree? -- Stefan