From patchwork Thu May 6 08:27:37 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alex Coplan X-Patchwork-Id: 1474863 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=sourceware.org; envelope-from=gcc-patches-bounces@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.a=rsa-sha256 header.s=default header.b=F07QxV57; dkim-atps=neutral Received: from sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FbRY75TTRz9sRf for ; Thu, 6 May 2021 18:28:11 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 3EF513A6400F; Thu, 6 May 2021 08:28:09 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 3EF513A6400F DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1620289689; bh=tOPIbvU9cxI7klXU2CLx9ixZB/5gjUEGO5dBWIO+XN0=; h=Date:To:Subject:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:Cc:From; b=F07QxV57Ia5xzveb/bG9/469iguJzuPCu/TI6y8AU6HKb3ZYcpxZWV1x5dVRL/WmP J5JzMq3h5VRT2YD7CkUrkFFJAAnGEfT4gqM1xgvcQrjU1kTRJ3fZ1hvkfHX9zcZCbt xftsatp2DojpdWZXpteQVq3Myg+FGZUYJx1v/Hyo= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10072.outbound.protection.outlook.com [40.107.1.72]) by sourceware.org (Postfix) with ESMTPS id DC67D3839C4D for ; Thu, 6 May 2021 08:28:05 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org DC67D3839C4D Received: from AS8PR04CA0002.eurprd04.prod.outlook.com (2603:10a6:20b:310::7) by AS8PR08MB6504.eurprd08.prod.outlook.com (2603:10a6:20b:336::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.25; Thu, 6 May 2021 08:28:03 +0000 Received: from AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:310:cafe::4e) by AS8PR04CA0002.outlook.office365.com (2603:10a6:20b:310::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.25 via Frontend Transport; Thu, 6 May 2021 08:28:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; gcc.gnu.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;gcc.gnu.org; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT056.mail.protection.outlook.com (10.152.17.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.25 via Frontend Transport; Thu, 6 May 2021 08:28:03 +0000 Received: ("Tessian outbound 13cdc29c30b8:v91"); Thu, 06 May 2021 08:28:03 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 24a9d02e70998f56 X-CR-MTA-TID: 64aa7808 Received: from e82b0a3fb4f6.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id F182DC0B-902F-4FF5-80DD-49DBAF89CEAC.1; Thu, 06 May 2021 08:27:49 +0000 Received: from EUR04-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e82b0a3fb4f6.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 06 May 2021 08:27:49 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iPyjXOATQk8Ui100nBKfXUhuIe69Csbvoz7nLaFxOeE0DaK0lZNorXZ7z0lCiP+Y0U9DUTSpd4ng5evq26imNp04aR1mA7q5RXp1LEIg50ipSii8o9rB2lIJqEjhuYvgLMxxglF6gqsFg1Z3zSFPRJD8+qHOA19lOnvFZzGGQBLuqKkhyAwRyq7w/gqOneCckF2enAEatOD8YG1Wl5SVmRLQyxWQWdjxkfK84C7Ybcq68BMRbo9bwo3fqWkOweeNcdIUjxuq6JuEQkReTgg/u3fh4SKnL6iNCao33beREh5zRvuDIqB8sfjo9ymFN4xNkhSlLoA2/00OfcWF8bbSHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tOPIbvU9cxI7klXU2CLx9ixZB/5gjUEGO5dBWIO+XN0=; b=UgSiZyuLDJCXtfxgkuYLWR9psL++1CggeUNFV5LoYm57NC+jygBjB59C6Ay2ADZLoDKRkX6qKzJvxLMoCNNd1oum9F6pVKoMDO3556Yhkf/fcunO5oamgv6/zYimxhkVQfPsHH5wT+xZUTJktjrpZxK9J8N1zgjCsXja9ttnjoupfJBHXw4Vxjt/w9oZwoA61AI9+f4nnsbswyRXV2ZGri9V/i/85EquCv8I+B0LRNRG4lck/G9qmWs2PqjbDokcYLBAfvjTim1o8/F0irFzmMSde+t48EM+FHnU0GT0mNYzmWNM2A1uhSdgopmNkzmpmMNxlyZqE+YuyBw1Nj7PDg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none Authentication-Results-Original: gcc.gnu.org; dkim=none (message not signed) header.d=none;gcc.gnu.org; dmarc=none action=none header.from=arm.com; Received: from PAXPR08MB6943.eurprd08.prod.outlook.com (2603:10a6:102:135::10) by PR3PR08MB5721.eurprd08.prod.outlook.com (2603:10a6:102:84::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.25; Thu, 6 May 2021 08:27:39 +0000 Received: from PAXPR08MB6943.eurprd08.prod.outlook.com ([fe80::ec33:bc81:5918:2d09]) by PAXPR08MB6943.eurprd08.prod.outlook.com ([fe80::ec33:bc81:5918:2d09%7]) with mapi id 15.20.4108.027; Thu, 6 May 2021 08:27:39 +0000 Date: Thu, 6 May 2021 09:27:37 +0100 To: gcc-patches@gcc.gnu.org Subject: [PATCH] arm: Avoid emitting bogus CFA adjusts for CMSE nonsecure calls [PR99725] Message-ID: <20210506082736.nnewvzj35lzgeqbc@arm.com> Content-Disposition: inline User-Agent: NeoMutt/20171215 X-Originating-IP: [217.140.106.55] X-ClientProxiedBy: LO4P123CA0256.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:194::9) To PAXPR08MB6943.eurprd08.prod.outlook.com (2603:10a6:102:135::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from arm.com (217.140.106.55) by LO4P123CA0256.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:194::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.24 via Frontend Transport; Thu, 6 May 2021 08:27:38 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ec3cd9ac-f8f5-4bda-f28c-08d91068ddc4 X-MS-TrafficTypeDiagnostic: PR3PR08MB5721:|AS8PR08MB6504: X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:9508;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: XczIz+D3GGp4Yu78dtZLtsSSNUSiat3bPMaR+5RGUyTlrfXG6sfKLZccbszW9TxfhmPGmnL15rWiTLwNQW9wnJR4oJWy2E2S7IDSw5xUeaIzpq0x0499uVrtFr2OW8KznmTxwj05jOfoXlIlbOwfC5DU4z+IAUv/3Fz1A6863Bp+s0TkpxpeuIghXSVuuLDP1JrTHVKi1IIq4MiHUi0li4OtLmJCGzMD4VJOBA00dy2cO5j3QE4LaDDC2fl+n7t6YqmKn6PgQhXCIGQw7O5DBMWTXYP9jX12v1MNAjvj/rbJmzn2XDgb10yM98We8WNQlV5o2bQH7RouNrg8XGWonLxKCDNIH0PJD/w23usflDbAsKrieSOyZspF6EbiDoQ+t0TLZvp8J7O/rVjm+WnGNG92WOltB+L1liPj2fNg4ugB4pzejMAMk66ah2sDPC1bgDx6S/T+9V3o05JrYmH/UmKf04wAy7J0dDo8YJUn8676ZiIv924kwyqVVaxlTwtRmIF4d+D5r9s39ogkL5DXaG72rNsN+rRCPqbOxRKXVt2FZRL/BxpSdvy2mRR9Pyt7UIGw2y1iqHmWzWZ3ifbRd9Rmdp5amHmkK82PC+ASUgsjN0578A/zfoYvXYFdBouV48gkWV/n8fwgXXEOvn/ljwb2dwqfkC9kDL0Km9FS4kfQOiX7FWxa60mEFl3T6+ys X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXPR08MB6943.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(39860400002)(136003)(346002)(366004)(396003)(7696005)(21480400003)(52116002)(8676002)(36756003)(55016002)(44144004)(33964004)(1076003)(38100700002)(26005)(38350700002)(4326008)(6916009)(8936002)(316002)(478600001)(235185007)(5660300002)(16526019)(2616005)(186003)(54906003)(66476007)(66616009)(66556008)(44832011)(8886007)(2906002)(86362001)(956004)(66946007)(2700100001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?q?zO3lnxlQ7/2wktLXg2hBXYNJz/kxdl?= =?utf-8?q?8zvKKWaptfxt6TnvKotY8hPZzJycy9188afergCKJ6mDTgJzCuxWXWqyalSO2IFY0?= =?utf-8?q?cckYXKzC99LbbmbVdUOYUC2bM+1imsVUxC9Q2ic+ZHZk92sSK89VvLwXNv95/WvYP?= =?utf-8?q?2j+I8S2QMDuikT11da287j/ItyBLWGh8a0dIYm5bFKj2pI6A+hszhwsyCJsVD+wOp?= =?utf-8?q?CRZr6XBjC1lewIOxiwEH1fS6nSuPDkb8IKKzkPZTyePjf8R7gt6eTHWfgNOcRnJSG?= =?utf-8?q?yu6OShH8MCpIbrGIwzFr4vFxB1SLISS09SYif1h6fuhGPOtvQClU/TqYrUJtj14gz?= =?utf-8?q?5sJSGIRQa9d0GjkJS247WMRGJWzIEj88iLY4m/WqALyLxmq4mxf51gosE9Q7UWMaS?= =?utf-8?q?4eTZ//JYJCgSCdzTMCE30VxDePrumaqmsrhifGZbxGnxn0+sc/4CGAR/n9OZnXZAy?= =?utf-8?q?JHdgqzSZyV1ddKW0j4YcZ/rVcetUHA8XS9b/F279L6szFoYbj2rRLW3NrLNunlnFd?= =?utf-8?q?nJVXlakOq5Bqml8CfdOKDEOHvWhEwNA2UUMvIhh6ZD9QQmBMifL5klMytzE9R3Z6Q?= =?utf-8?q?3PxnF53BBL/iMj4PfAP/+2s7jv4IZlzUYdwS8gpz38BTTIv/cLq2tH6zLDghpSwlS?= =?utf-8?q?JkjiMHSSSUQXbZEL17B4us1u7zqi+2BnZ6c7V+XL8aDQdHTlN2OqBrjk+OAppGxX5?= =?utf-8?q?+RBR/CR/dSVrzIqZ0V9tv83z6HeQtkVpEOC0dC9TRfn2+m+ka07qBxeF++zAqrD6Y?= =?utf-8?q?flMQuq6UWrCIl747eSCIFZ+ffpCTN31qhxRPRZdKnxESxVULPsXXS8eGN8iNZOQtI?= =?utf-8?q?t6K0FMDZMnwi13BFh34IgBa/AXMMYCDYiB5uXh/63QYUPZqG20m9AqmTmyYePUR59?= =?utf-8?q?Im31wRNMBcsDXGCejyF6lMeKDG9vQ8NNFjlo98xhjOZxwzvQhsES6iGS8BDh3gVzT?= =?utf-8?q?emtVxS4RrmLapvdSVsdBnq8x+gu9bbGFrACkN/Xpcet4uVPwLdNRHS7koJOWVI0sP?= =?utf-8?q?aM6mU68zygRuAlxBePj0Q9i1sdBdhgag0Z+0++NqyTcINJTxNcnenNSrPSuuE63tO?= =?utf-8?q?UkAcQWeO6uJgR6cVkL+MTvCBbXMrsBAQRCGvJjU2hKhpTB8CNUoUfHfxYQPpwuv7d?= =?utf-8?q?hJ8+RbW5/7EgpJzYTO++BJ+Tz81Z39vTrD49JmiIqZNDwiIE/4V9WGx4/SOqVHLK0?= =?utf-8?q?KUr+PY+ujiqnDh4r5ZV0Qq2mLXCTZSB2eS+Dv7lNvHYFRnASAN9Tcmpxpc3kDsRVJ?= =?utf-8?q?yRTUxjWzIJxWKx?= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3PR08MB5721 Original-Authentication-Results: gcc.gnu.org; dkim=none (message not signed) header.d=none;gcc.gnu.org; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 4535b6f5-3bb5-4376-ef03-08d91068cf15 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(136003)(376002)(39860400002)(396003)(346002)(36840700001)(46966006)(7696005)(44144004)(33964004)(8886007)(55016002)(6916009)(5660300002)(82740400003)(36860700001)(956004)(2616005)(70586007)(70206006)(26005)(54906003)(66616009)(316002)(336012)(82310400003)(4326008)(81166007)(8676002)(21480400003)(44832011)(478600001)(2906002)(16526019)(36756003)(8936002)(47076005)(186003)(1076003)(356005)(86362001)(235185007)(2700100001); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 May 2021 08:28:03.2391 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ec3cd9ac-f8f5-4bda-f28c-08d91068ddc4 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6504 X-Spam-Status: No, score=-14.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, GIT_PATCH_0, MSGID_FROM_MTA_HEADER, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Alex Coplan via Gcc-patches From: Alex Coplan Reply-To: Alex Coplan Cc: Richard Earnshaw , Ramana Radhakrishnan Errors-To: gcc-patches-bounces@gcc.gnu.org Sender: "Gcc-patches" Hi all, The PR shows us attaching REG_CFA_ADJUST_CFA notes to stack pointer adjustments emitted in cmse_nonsecure_call_inline_register_clear (when -march=armv8.1-m.main). However, the stack pointer is not guaranteed to be the CFA reg. If we're at -O0 or we have -fno-omit-frame-pointer, then the frame pointer will be used as the CFA reg, and these notes on the sp adjustments will lead to ICEs in dwarf2out_frame_debug_adjust_cfa. This patch avoids emitting these notes if the current function has a frame pointer. Testing: * Bootstrapped and regtested on arm-linux-gnueabihf, no regressions. * Regtested an arm-eabi cross configured with --with-arch=armv8.1-m.main, no regressions. OK for trunk and backports as appropriate? Thanks, Alex gcc/ChangeLog: PR target/99725 * config/arm/arm.c (cmse_nonsecure_call_inline_register_clear): Avoid emitting CFA adjusts on the sp if we have the fp. gcc/testsuite/ChangeLog: PR target/99725 * gcc.target/arm/cmse/pr99725.c: New test. diff --git a/gcc/config/arm/arm.c b/gcc/config/arm/arm.c index 0371d9818fd..2962071adfd 100644 --- a/gcc/config/arm/arm.c +++ b/gcc/config/arm/arm.c @@ -18774,10 +18774,14 @@ cmse_nonsecure_call_inline_register_clear (void) imm = gen_int_mode (- lazy_store_stack_frame_size, SImode); add_insn = emit_insn (gen_addsi3 (stack_pointer_rtx, stack_pointer_rtx, imm)); - arm_add_cfa_adjust_cfa_note (add_insn, - - lazy_store_stack_frame_size, - stack_pointer_rtx, - stack_pointer_rtx); + /* If we have the frame pointer, then it will be the + CFA reg. Otherwise, the stack pointer is the CFA + reg, so we need to emit a CFA adjust. */ + if (!frame_pointer_needed) + arm_add_cfa_adjust_cfa_note (add_insn, + - lazy_store_stack_frame_size, + stack_pointer_rtx, + stack_pointer_rtx); emit_insn (gen_lazy_store_multiple_insn (stack_pointer_rtx)); } /* Save VFP callee-saved registers. */ @@ -18815,10 +18819,11 @@ cmse_nonsecure_call_inline_register_clear (void) rtx_insn *add_insn = emit_insn (gen_addsi3 (stack_pointer_rtx, stack_pointer_rtx, imm)); - arm_add_cfa_adjust_cfa_note (add_insn, - lazy_store_stack_frame_size, - stack_pointer_rtx, - stack_pointer_rtx); + if (!frame_pointer_needed) + arm_add_cfa_adjust_cfa_note (add_insn, + lazy_store_stack_frame_size, + stack_pointer_rtx, + stack_pointer_rtx); } /* Restore VFP callee-saved registers. */ else diff --git a/gcc/testsuite/gcc.target/arm/cmse/pr99725.c b/gcc/testsuite/gcc.target/arm/cmse/pr99725.c new file mode 100644 index 00000000000..284da184f96 --- /dev/null +++ b/gcc/testsuite/gcc.target/arm/cmse/pr99725.c @@ -0,0 +1,5 @@ +/* { dg-do compile } */ +/* { dg-additional-options "-mcmse -g" } */ +typedef int __attribute__((cmse_nonsecure_call)) (*t)(); +t f; +void g() { f(); }