Received: by 10.192.165.156 with SMTP id m28csp953472imm; Mon, 16 Apr 2018 11:23:01 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+nM3Rzd+6yzCVrdvFgYzQk0CJ17cPXPY3CcheWjtUR5OMn1FdBJ9S6tHl+lsdRFXRTM6Ry X-Received: by 2002:a17:902:125:: with SMTP id 34-v6mr14973650plb.42.1523902981333; Mon, 16 Apr 2018 11:23:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523902981; cv=none; d=google.com; s=arc-20160816; b=0VdlSVD9JK7iObp2/VoR51AqTGF9/XCChLrLvmekjvXW4OHCt0PfJsA5apy6HkZmqc Tw9g/K/w3PZA09ixEZFxrOR4Tw4b9zU7jPrGXbH6Nh95RC0SB1e5KJsQ7vNOgB0ltMCQ b5kddnV7agzVe8NAwbJXC3NDPwhRcBB8SxUkbIsjLRk6zUDbp8VE1pM1X+GXn5JsDAnT 1btWLq3DtO/gwdej/EqzCsgYSDvRT08/6vFqisGLnojRmKOwJhZ3kqOTyvg+pb4jTEFN 3Ix88dqq58jh8JN2AO6tzOpfLNVBix9W0k4Nc97AIv1PrTZVl6TxyhSAhL/3hmeara1M fGFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature:arc-authentication-results; bh=D/sOS8BdiYe32e3S5a7ReIrkpBeM/K8GlsWlX2zY0Vg=; b=zgRT9RNnBRNstQdvFVXMtpaWWnT9tNxA9MrED/aTzzQZX9xc0p4sV8Y1mu9cEl3a6s jBZeipasmbjVj2gmyYtWSeJoTIEd/gDPuXK0nx+VdrBMAtu7Fs2EQEEHlYHjMVn5Uo9J 688CUbOEI8uFBJUumg1duXtkUP17JAJyDszaaUv3MOJ7nP2xmSLrn4tpckTqxm1443ob OZ++HO7s442jTOruVYDEUx/KHkKchFLCZmuoLwaxwHbKcqawIn8qJItZpVwY/+lBpEP+ lq2ffBqhRM1jNsusLV5rnUOCaqLPZ+JnCuSAFxD4HAbafeuQtb0Ln2lCAg9mgHDzksuI GpoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@agner.ch header.s=dkim header.b=IqYJLovL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s10si10217030pge.41.2018.04.16.11.22.47; Mon, 16 Apr 2018 11:23:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@agner.ch header.s=dkim header.b=IqYJLovL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753238AbeDPSVM (ORCPT + 99 others); Mon, 16 Apr 2018 14:21:12 -0400 Received: from mail.kmu-office.ch ([178.209.48.109]:43540 "EHLO mail.kmu-office.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752308AbeDPSVL (ORCPT ); Mon, 16 Apr 2018 14:21:11 -0400 Received: from webmail.kmu-office.ch (unknown [IPv6:2a02:418:6a02::a3]) by mail.kmu-office.ch (Postfix) with ESMTPSA id CBD7C5C067C; Mon, 16 Apr 2018 20:21:09 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=agner.ch; s=dkim; t=1523902869; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=D/sOS8BdiYe32e3S5a7ReIrkpBeM/K8GlsWlX2zY0Vg=; b=IqYJLovLvycCfOEdMU6RhqBt0yROvWQ+8yZpxj8MiNRrUtK3Uh4Evtd3g77sPvXaw5GKGG /F0Qh7JdbEqKR9cxR0brKvVmKwL1UGIpciDprei5ZIYw2T/NV6tJLYHWgwsejRCFeKo79q 0vIENksn4+PMK5AlwUMT9jWwmhfMAus= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Date: Mon, 16 Apr 2018 20:21:09 +0200 From: Stefan Agner To: Thierry Reding , Stephen Warren , linux@armlinux.org.uk Cc: Stephen Warren , Robin Murphy , ard.biesheuvel@linaro.org, arnd@arndb.de, nicolas.pitre@linaro.org, marc.zyngier@arm.com, behanw@converseincode.com, keescook@chromium.org, Bernhard.Rosenkranzer@linaro.org, mka@chromium.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Dmitry Osipenko Subject: Re: [PATCH v2 3/6] ARM: trusted_foundations: do not use naked function In-Reply-To: <498de826-6e6c-63d8-00d6-f394b2725a34@wwwdotorg.org> References: <20180325180959.28008-1-stefan@agner.ch> <20180325180959.28008-4-stefan@agner.ch> <704c863a-0b5a-6396-d7da-f0ed17b7cca2@gmail.com> <263337af-7541-be9e-3db6-6cb987fd08fb@arm.com> <498de826-6e6c-63d8-00d6-f394b2725a34@wwwdotorg.org> Message-ID: <507a66ab9ab530a6d71db7a74f11ddfb@agner.ch> X-Sender: stefan@agner.ch User-Agent: Roundcube Webmail/1.3.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16.04.2018 18:08, Stephen Warren wrote: > On 04/16/2018 09:56 AM, Stefan Agner wrote: >> On 27.03.2018 14:16, Dmitry Osipenko wrote: >>> On 27.03.2018 14:54, Robin Murphy wrote: >>>> On 26/03/18 22:20, Dmitry Osipenko wrote: >>>>> On 25.03.2018 21:09, Stefan Agner wrote: >>>>>> As documented in GCC naked functions should only use Basic asm >>>>>> syntax. The Extended asm or mixture of Basic asm and "C" code is >>>>>> not guaranteed. Currently this works because it was hard coded >>>>>> to follow and check GCC behavior for arguments and register >>>>>> placement. >>>>>> >>>>>> Furthermore with clang using parameters in Extended asm in a >>>>>> naked function is not supported: >>>>>>    arch/arm/firmware/trusted_foundations.c:47:10: error: parameter >>>>>>            references not allowed in naked functions >>>>>>                  : "r" (type), "r" (arg1), "r" (arg2) >>>>>>                         ^ >>>>>> >>>>>> Use a regular function to be more portable. This aligns also with >>>>>> the other smc call implementations e.g. in qcom_scm-32.c and >>>>>> bcm_kona_smc.c. >>>>>> >>>>>> Cc: Dmitry Osipenko >>>>>> Cc: Stephen Warren >>>>>> Cc: Thierry Reding >>>>>> Signed-off-by: Stefan Agner >>>>>> --- >>>>>> Changes in v2: >>>>>> - Keep stmfd/ldmfd to avoid potential ABI issues >>>>>> >>>>>>   arch/arm/firmware/trusted_foundations.c | 14 +++++++++----- >>>>>>   1 file changed, 9 insertions(+), 5 deletions(-) >>>>>> >>>>>> diff --git a/arch/arm/firmware/trusted_foundations.c >>>>>> b/arch/arm/firmware/trusted_foundations.c >>>>>> index 3fb1b5a1dce9..689e6565abfc 100644 >>>>>> --- a/arch/arm/firmware/trusted_foundations.c >>>>>> +++ b/arch/arm/firmware/trusted_foundations.c >>>>>> @@ -31,21 +31,25 @@ >>>>>>     static unsigned long cpu_boot_addr; >>>>>>   -static void __naked tf_generic_smc(u32 type, u32 arg1, u32 arg2) >>>>>> +static void tf_generic_smc(u32 type, u32 arg1, u32 arg2) >>>>>>   { >>>>>> +    register u32 r0 asm("r0") = type; >>>>>> +    register u32 r1 asm("r1") = arg1; >>>>>> +    register u32 r2 asm("r2") = arg2; >>>>>> + >>>>>>       asm volatile( >>>>>>           ".arch_extension    sec\n\t" >>>>>> -        "stmfd    sp!, {r4 - r11, lr}\n\t" >>>>>> +        "stmfd    sp!, {r4 - r11}\n\t" >>>>>>           __asmeq("%0", "r0") >>>>>>           __asmeq("%1", "r1") >>>>>>           __asmeq("%2", "r2") >>>>>>           "mov    r3, #0\n\t" >>>>>>           "mov    r4, #0\n\t" >>>>>>           "smc    #0\n\t" >>>>>> -        "ldmfd    sp!, {r4 - r11, pc}" >>>>>> +        "ldmfd    sp!, {r4 - r11}\n\t" >>>>>>           : >>>>>> -        : "r" (type), "r" (arg1), "r" (arg2) >>>>>> -        : "memory"); >>>>>> +        : "r" (r0), "r" (r1), "r" (r2) >>>>>> +        : "memory", "r3", "r12", "lr"); >>>>> >>>>> Although seems "lr" won't be affected by SMC invocation because it should be >>>>> banked and hence could be omitted entirely from the code. Maybe somebody could >>>>> confirm this. >>>> Strictly per the letter of the architecture, the SMC could be trapped to Hyp >>>> mode, and a hypervisor might clobber LR_usr in the process of forwarding the >>>> call to the firmware secure monitor (since Hyp doesn't have a banked LR of its >>>> own). Admittedly there are probably no real systems with the appropriate >>>> hardware/software combination to hit that, but on the other hand if this gets >>>> inlined where the compiler has already created a stack frame then an LR clobber >>>> is essentially free, so I reckon we're better off keeping it for reassurance. >>>> This isn't exactly a critical fast path anyway. >>> >>> Okay, thank you for the clarification. >> >> So it seems this change is fine? >> >> Stephen, you picked up changes for this driver before, is this patch >> going through your tree? > > You had best ask Thierry; he's taken over Tegra maintenance upstream. > But that said, don't files in arch/arm go through Russell? I think the last patches applied to that file went through your tree. Thierry, Russel, any preferences? -- Stefan