From patchwork Fri Apr 30 08:30:18 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alex Coplan X-Patchwork-Id: 1472070 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=sourceware.org; envelope-from=gcc-patches-bounces@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.a=rsa-sha256 header.s=default header.b=uqlau+L7; dkim-atps=neutral Received: from sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FWltv4BdFz9sj1 for ; Fri, 30 Apr 2021 18:30:46 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 985E038515E5; Fri, 30 Apr 2021 08:30:43 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 985E038515E5 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1619771443; bh=AB+cYBTRF6HGuLL05xyBHQFnNZ2ag0ngHxSGntMpmZU=; h=Date:To:Subject:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:Cc:From; b=uqlau+L7Tcm0pMjKbpJe+qCtdwRlJQjk2jcWw0zoToFqbWtQ//Y59Oz7gWEHvZQ8U CGlZClGjNENhoeKUbW0x5qC360dFhcEoJn667L/1bDy3mWUxFIDCuIRcl20gD0DiPU uCmaiKKv5zsmwJ8Cshm0eYHjB8IYm4Cs68k16N2o= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60055.outbound.protection.outlook.com [40.107.6.55]) by sourceware.org (Postfix) with ESMTPS id 2EEC7385803D for ; Fri, 30 Apr 2021 08:30:32 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 2EEC7385803D Received: from AM6PR10CA0026.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:89::39) by HE1PR0801MB1705.eurprd08.prod.outlook.com (2603:10a6:3:87::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.22; Fri, 30 Apr 2021 08:30:29 +0000 Received: from VE1EUR03FT028.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:89:cafe::fb) by AM6PR10CA0026.outlook.office365.com (2603:10a6:209:89::39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.27 via Frontend Transport; Fri, 30 Apr 2021 08:30:29 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; gcc.gnu.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;gcc.gnu.org; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT028.mail.protection.outlook.com (10.152.18.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.27 via Frontend Transport; Fri, 30 Apr 2021 08:30:29 +0000 Received: ("Tessian outbound 9a5bb9d11315:v91"); Fri, 30 Apr 2021 08:30:29 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 89dcd19d9225715a X-CR-MTA-TID: 64aa7808 Received: from 66bf5006dd27.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 49103E59-223B-4AF9-9A53-F80568CA77CD.1; Fri, 30 Apr 2021 08:30:22 +0000 Received: from EUR03-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 66bf5006dd27.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 30 Apr 2021 08:30:22 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=I2evvmc7vF61BMhyvUXtKowloYY6WE8yUDzJwFI2Lk31QCl/2OCixt23nDNcWK7Rr+YzNfyyy7nQu2HXjJv9D12LCX3KCtkQCjqQXc7ShJGp8rxqdBkpZHCGOwR8hxHQGLScdBJ8tYxLpwgAvTg6Y6PNFma5B8MAh8yP0Uc10OZb8E2QkBlYmC9ZARJOyhPzFZIHzwIftuxNstsaxtY3f8dZKwy9UhY3fDLT+5wsQX6EERYDZhT8eJ97RWi6DjucbIrsnmxBj9TsutKsbYfC8rVXIIVkGs4ZtE8ujNGBQKp745eSrjcKvo1CKt9cLjptb2aroCSJ1tIHqDCI8DdgDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AB+cYBTRF6HGuLL05xyBHQFnNZ2ag0ngHxSGntMpmZU=; b=gG1tdQIyj70/0bUG9Nxkk256+EOdwPHL6jPPbE15CWvdbFTOsBCvQODmj23g+g08rteOWpegiXO2Xeo7x4Dr8HlHOnVlguPm0jk5jFNTKYY/ZOgKRk33V/mS9+UZCqCBuXQzj7t8utXD8Y96wu0FQonstPfi3sElel0njzvG3kg1gOtyTjBgcfrQVnmAkN2T4oAfJ2cxyD7ocmTF5e/w5j9NbHB4fseMlxtjqzRwwkNhLwRTFH0Gupz2ZWYlRS8WTSr+iOHfI05V5+jWfU4UnqMvjStWxOwOELosM+c6lmrBYQveiSjlzHnRgcoK46DoYRlytVo0HYCpXl1QGxW7/A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none Authentication-Results-Original: gcc.gnu.org; dkim=none (message not signed) header.d=none;gcc.gnu.org; dmarc=none action=none header.from=arm.com; Received: from PAXPR08MB6943.eurprd08.prod.outlook.com (2603:10a6:102:135::10) by PAXPR08MB6445.eurprd08.prod.outlook.com (2603:10a6:102:159::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.21; Fri, 30 Apr 2021 08:30:20 +0000 Received: from PAXPR08MB6943.eurprd08.prod.outlook.com ([fe80::ec33:bc81:5918:2d09]) by PAXPR08MB6943.eurprd08.prod.outlook.com ([fe80::ec33:bc81:5918:2d09%7]) with mapi id 15.20.4065.034; Fri, 30 Apr 2021 08:30:20 +0000 Date: Fri, 30 Apr 2021 09:30:18 +0100 To: gcc-patches@gcc.gnu.org Subject: [PATCH] arm: Fix ICE with CMSE nonsecure call on Armv8.1-M [PR100333] Message-ID: <20210430083016.exw25bd45jkktq7p@arm.com> Content-Disposition: inline User-Agent: NeoMutt/20171215 X-Originating-IP: [217.140.106.51] X-ClientProxiedBy: LO2P123CA0040.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600::28) To PAXPR08MB6943.eurprd08.prod.outlook.com (2603:10a6:102:135::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from arm.com (217.140.106.51) by LO2P123CA0040.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.27 via Frontend Transport; Fri, 30 Apr 2021 08:30:19 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a49067b1-9e00-4f37-1fdb-08d90bb23657 X-MS-TrafficTypeDiagnostic: PAXPR08MB6445:|HE1PR0801MB1705: X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:9508;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXPR08MB6943.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39850400004)(376002)(136003)(346002)(396003)(366004)(26005)(66946007)(38350700002)(16526019)(33964004)(52116002)(44832011)(235185007)(44144004)(66556008)(38100700002)(1076003)(8886007)(4326008)(6916009)(2616005)(5660300002)(478600001)(316002)(2906002)(55016002)(86362001)(54906003)(66476007)(8676002)(21480400003)(36756003)(66616009)(186003)(7696005)(956004)(8936002)(2700100001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?q?OyxwXOFw1rN3kWMyzVaNwEeCoT24RU?= =?utf-8?q?QB1P9J6MGnoCI6ZE3P2pmwWjggiNhAwD5oYCQxzOTxZ8GTl/Peeudu/uluJG7BA79?= =?utf-8?q?saKJKTe1yeFW6DlCe48yaXMXbINJ/W56Dh4e7R78m32deMG/OOsdEvjGNWYISGjad?= =?utf-8?q?VAwrApLqD0nSmaQRHrS17RZcm8+vuru315IehU2negDUsmhIRSAl85vPfM/iQGXl7?= =?utf-8?q?9O5H0am/7upaQn7qJOP7G5IDMeKKIGrtoqDvRo8OwK4anGfcnLYjg6lLQeRXuYDLt?= =?utf-8?q?5LumZb24d7s54mnu9THFgVEPh+BVzLVWdAgC/daZeas4Ij8J0kkrLQSk0WRZCG4Up?= =?utf-8?q?PHvDOiX0qb8I6Abh3ArmrbQY/c187Ff9p6/g1ZsANqQf3YbFPBjSZeIya9Lo4myiB?= =?utf-8?q?FIGm1EziVmaXQpet1YsW1q6XBrU4qKWMbW3ALKA7m6L2VYxs02hLOPnLfQmDVk7Vc?= =?utf-8?q?9GFJe52nsrvzZf5l5+hGxyvm9ivT5u17A64xy5VSjfWWTWVwFjT3KlaJ/iss/FRYW?= =?utf-8?q?cOe1tPklmWfj371BPyziBlny8Ug544fCmgktivqHwWfPNB7NVqD+izyaiY5thjkSB?= =?utf-8?q?y+dx2O9lVOOJ2a39i9ihqll4WYp2dL8jWXSqr+zMDKFR20nDpQfrWZ+Dx/oSiyInN?= =?utf-8?q?RQm+B3IVeeyznSQ3LvFX9bAHXk5muI+q1b1oyfyoUH6qX+qu35U/dsFpB5pCe3mvy?= =?utf-8?q?7ECCydaNjchdPluqCW7XApfpylSL7vLWxC0fP69agwM0sEvcUSxYb+oqjCdHWzU/8?= =?utf-8?q?asYxN8SGuZ7vwJYc08ejkK/9OrqEGzi7TqxZVC0RPKD7VgyxtR+dNpOWhpqzFqb/U?= =?utf-8?q?mR7EpXsO4xXUImAufJUZdWvWsyMt+XUjYGkzN2KikXFHKH5naGQXmqHniI2lIR7LK?= =?utf-8?q?+3jEEjIUmfTAM4Fd/RG7kERDmVVgqAmDG7zoNPiKXFDPBgdXeNy3kAalE+MhW2aF4?= =?utf-8?q?JI27jbBY1VBEJIrK2HS+OX0cPcxV4oQ2vIBVIn11rjmHl5HjupCSd6itC4rOtT+MU?= =?utf-8?q?hbTo23R49Z91OSDh2UO5FdF12Rml0aew5tgmgBUAZ3075eZniY/UgHiQ7b/Z5AOWz?= =?utf-8?q?x9/AbS01yhPGtL/XFtrLte7N3ut9gfWxaAEwkjeqpVgmPlDXnORD4F1xH8Q3BFs1j?= =?utf-8?q?Jc5XlSNaKnUv7k9xnTIr3RdKiP+84ACZAn1UGB/ALbzitKsWAhKukqF8piHNmrdYv?= =?utf-8?q?NzKgAcOpY5bFWBuLbHLxWwa0BbcVwsjtKjum0IFYQA7UkGun7iN8UzMBntplM3KEV?= =?utf-8?q?UZWIagvi5PjvC4?= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6445 Original-Authentication-Results: gcc.gnu.org; dkim=none (message not signed) header.d=none;gcc.gnu.org; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT028.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: ffc94b7e-85ae-4898-d04f-08d90bb230ae X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(376002)(39850400004)(346002)(396003)(136003)(36840700001)(46966006)(478600001)(336012)(16526019)(186003)(235185007)(4326008)(956004)(356005)(7696005)(82740400003)(44144004)(47076005)(26005)(2616005)(36756003)(66616009)(33964004)(36860700001)(1076003)(5660300002)(81166007)(8676002)(8886007)(6916009)(70206006)(8936002)(21480400003)(34020700004)(55016002)(70586007)(82310400003)(2906002)(54906003)(316002)(86362001)(44832011)(2700100001); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Apr 2021 08:30:29.2140 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a49067b1-9e00-4f37-1fdb-08d90bb23657 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT028.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1705 X-Spam-Status: No, score=-14.1 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, GIT_PATCH_0, MSGID_FROM_MTA_HEADER, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Alex Coplan via Gcc-patches From: Alex Coplan Reply-To: Alex Coplan Cc: Richard Earnshaw , Ramana Radhakrishnan Errors-To: gcc-patches-bounces@gcc.gnu.org Sender: "Gcc-patches" Hi, As the PR shows, we ICE shortly after expanding nonsecure calls for Armv8.1-M. For Armv8.1-M, we have TARGET_HAVE_FPCXT_CMSE. As it stands, the expander (arm.md:nonsecure_call_internal) moves the callee's address to a register (with copy_to_suggested_reg) only if !TARGET_HAVE_FPCXT_CMSE. However, looking at the pattern which the insn appears to be intended to match (thumb2.md:*nonsecure_call_reg_thumb2_fpcxt), it requires the callee's address to be in a register. This patch therefore just forces the callee's address into a register in the expander. Testing: * Regtested an arm-eabi cross configured with --with-arch=armv8.1-m.main+mve.fp+fp.dp --with-float=hard. No regressions. * Bootstrap and regtest on arm-linux-gnueabihf in progress. OK for trunk and backports as appropriate if bootstrap looks good? Thanks, Alex gcc/ChangeLog: PR target/100333 * config/arm/arm.md (nonsecure_call_internal): Always ensure callee's address is in a register. gcc/testsuite/ChangeLog: PR target/100333 * gcc.target/arm/cmse/pr100333.c: New test. diff --git a/gcc/config/arm/arm.md b/gcc/config/arm/arm.md index 45a471a887a..e2ad1a962e3 100644 --- a/gcc/config/arm/arm.md +++ b/gcc/config/arm/arm.md @@ -8580,18 +8580,21 @@ (define_expand "nonsecure_call_internal" (use (match_operand 2 "" "")) (clobber (reg:SI LR_REGNUM))])] "use_cmse" - " { - if (!TARGET_HAVE_FPCXT_CMSE) - { - rtx tmp = - copy_to_suggested_reg (XEXP (operands[0], 0), - gen_rtx_REG (SImode, R4_REGNUM), - SImode); + rtx tmp = NULL_RTX; + rtx addr = XEXP (operands[0], 0); - operands[0] = replace_equiv_address (operands[0], tmp); - } - }") + if (TARGET_HAVE_FPCXT_CMSE && !REG_P (addr)) + tmp = force_reg (SImode, addr); + else if (!TARGET_HAVE_FPCXT_CMSE) + tmp = copy_to_suggested_reg (XEXP (operands[0], 0), + gen_rtx_REG (SImode, R4_REGNUM), + SImode); + + if (tmp) + operands[0] = replace_equiv_address (operands[0], tmp); + } +) (define_insn "*call_reg_armv5" [(call (mem:SI (match_operand:SI 0 "s_register_operand" "r")) diff --git a/gcc/testsuite/gcc.target/arm/cmse/pr100333.c b/gcc/testsuite/gcc.target/arm/cmse/pr100333.c new file mode 100644 index 00000000000..d8e3d809f73 --- /dev/null +++ b/gcc/testsuite/gcc.target/arm/cmse/pr100333.c @@ -0,0 +1,7 @@ +/* { dg-do compile } */ +/* { dg-additional-options "-mcmse" } */ +typedef void __attribute__((cmse_nonsecure_call)) t(void); +t g; +void f() { + g(); +}