Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2305044imu; Thu, 10 Jan 2019 11:46:19 -0800 (PST) X-Google-Smtp-Source: ALg8bN6wnYXH5WkiJ1jWVqx2dfav8YNe2CgHBr1qZgVnZ2a/CuT2i4GcI+BnDQSHvnGtQHsEp878 X-Received: by 2002:a17:902:3283:: with SMTP id z3mr11844692plb.76.1547149579162; Thu, 10 Jan 2019 11:46:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547149579; cv=none; d=google.com; s=arc-20160816; b=fcrlcKnu20DJVfxpeMGHYeGt5HvQ6/kCCxsSGLcpiy4m6rPHXOJa18oR9/9+SzvViI UzhwNPiogJXhs+IZbAnO87uKhSmTOJFnAupd54tPBSPO4FJ/31eH6gL31HZChQK5+Fmc qC78idsINySBb7m1zdxDdXx3GESPxm+NvhrsNqjGLDujgQvGCMQcLBOZZfYSe11ugadc u269xnthBqkSKZHl3GHCuPw+rLIm6y8COZdENLVtFAWw9Lfmw1zT8UAyLUU5g2EKbnKP bYlGUG5Hy2STk0nDwsACj0n/Gvo81vLFAH7WqQzANGsg8GfRhnV/EKMe5ADBHTqYGBmy 4Aog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Gq2uz4nSuWr5/RLd4tSlzjVCglO5zz7/lm+0CqwfnGo=; b=PnERVul3cqQwNOklDwEcgTH6GccA+IiSiSLx5UjpZdaozuskpKB0X/qbRzPlvgtWgw CIuX2GUDoib1fZGtXIGTsKLfuLZBCceU4Vj6xGsaC7q4JgWKrJr6/7LuOggUG5Eb28WY g3NmNJ8d5pTKQ4Yq+bVbTC9Wk7Ok4Ng8HS8MDkOMiEgHM3bXKEb3bl4m38e/Kq3XloAB LUd2+L03HKroQErKu5XGDTAk7H+o+8G5v7qKVEmBZ++Sj8iuUZktI5HEQp/8loZjb9pb FyiqC34M5sWooL1/t/w8wsVukvXr+9vTy8ilvG55JcwTPOCFxKDXQJHzmv8Iqqlz3Enh wIag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=SRfHW5cP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u9si19570292plk.61.2019.01.10.11.46.04; Thu, 10 Jan 2019 11:46:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=SRfHW5cP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728392AbfAJOTE (ORCPT + 99 others); Thu, 10 Jan 2019 09:19:04 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:43268 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728355AbfAJOTC (ORCPT ); Thu, 10 Jan 2019 09:19:02 -0500 Received: by mail-wr1-f65.google.com with SMTP id r10so11549669wrs.10 for ; Thu, 10 Jan 2019 06:19:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=Gq2uz4nSuWr5/RLd4tSlzjVCglO5zz7/lm+0CqwfnGo=; b=SRfHW5cPrKxBm85tyS0nxp9VQ1x764gUnOOXS8HsC+mfaioejm1CaNcrk4Je2QjCFn 58guFsWTviAQfmI2IQIkxJ7vLywOlNQNyg8UCB3o/vdEhk+Zgw/RcgP+RkntxvMOODVb KVVXUJW3nBiGjXrMWOUn9oE0HK6CDvrSZ65rs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=Gq2uz4nSuWr5/RLd4tSlzjVCglO5zz7/lm+0CqwfnGo=; b=njxI/6w1ITUvTFIDnxadAABSfCF0iV/BjHyqL7Gestqv3EUOcC03OhVfS+Y/wZimGu OgijdEoZDK7944+hiw4nX+nEwg7Gb2C3JpS6TXNcoFx/cQRY/UDQlbI+GCqlCHSjvJcP gER2IqEqr01Qp4jYou8PON9dqQMmCO4Lb7hnJOhcLio0Is0D1bLzxgL1iqCUJ06gwjhX WNh730gbJFgCyCc/Rn/wtXI5HRfTGM9Qb8/oU73UX4qJfZ+Y3O76I6LEiy1P/R7DCzxW JbELgYSpiut7I46AwwbiROeVPGVxwNcLakZeZiFbqfduI3GvfLrck69UXHNLzVaiDB5i dP6w== X-Gm-Message-State: AJcUukdHxarzn0xYOW3qqFzvj/e7bwbhH+DUUSJSIBM61u9zTHHYsJzp DCbuV09blLq0/2lpmbz9goBULA== X-Received: by 2002:adf:9542:: with SMTP id 60mr9133118wrs.60.1547129939388; Thu, 10 Jan 2019 06:18:59 -0800 (PST) Received: from holly.lan (cpc141214-aztw34-2-0-cust773.18-1.cable.virginm.net. [86.9.19.6]) by smtp.gmail.com with ESMTPSA id n6sm16480045wmk.9.2019.01.10.06.18.57 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 10 Jan 2019 06:18:58 -0800 (PST) Date: Thu, 10 Jan 2019 14:18:56 +0000 From: Daniel Thompson To: Sumit Garg Cc: linux-arm-kernel@lists.infradead.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, jens.wiklander@linaro.org, mpm@selenic.com, herbert@gondor.apana.org.au, robh+dt@kernel.org, mark.rutland@arm.com, arnd@arndb.de, gregkh@linuxfoundation.org, ard.biesheuvel@linaro.org, bhsharma@redhat.com, tee-dev@lists.linaro.org Subject: Re: [PATCH v2 2/4] tee: optee: add TEE bus device enumeration support Message-ID: <20190110141856.p3evqyf34py74gkg@holly.lan> References: <1547123097-16431-1-git-send-email-sumit.garg@linaro.org> <1547123097-16431-3-git-send-email-sumit.garg@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1547123097-16431-3-git-send-email-sumit.garg@linaro.org> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 10, 2019 at 05:54:55PM +0530, Sumit Garg wrote: > OP-TEE provides a pseudo TA to enumerate TAs which can act as devices/ > services for TEE bus. So implement device enumeration using invoke > function: PTA_CMD_GET_DEVICES provided by pseudo TA to fetch array of > device UUIDs. Also register these enumerated devices with TEE bus as > "optee-clntX" device. > > Signed-off-by: Sumit Garg > --- > drivers/tee/optee/Makefile | 1 + > drivers/tee/optee/core.c | 4 + > drivers/tee/optee/device.c | 150 ++++++++++++++++++++++++++++++++++++++ > drivers/tee/optee/optee_private.h | 3 + > 4 files changed, 158 insertions(+) > create mode 100644 drivers/tee/optee/device.c > > diff --git a/drivers/tee/optee/Makefile b/drivers/tee/optee/Makefile > index 48d262a..56263ae 100644 > --- a/drivers/tee/optee/Makefile > +++ b/drivers/tee/optee/Makefile > @@ -5,3 +5,4 @@ optee-objs += call.o > optee-objs += rpc.o > optee-objs += supp.o > optee-objs += shm_pool.o > +optee-objs += device.o > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > index e5efce3..ac59c77 100644 > --- a/drivers/tee/optee/core.c > +++ b/drivers/tee/optee/core.c > @@ -634,6 +634,10 @@ static struct optee *optee_probe(struct device_node *np) > if (optee->sec_caps & OPTEE_SMC_SEC_CAP_DYNAMIC_SHM) > pr_info("dynamic shared memory is enabled\n"); > > + rc = optee_enumerate_devices(); > + if (rc) > + goto err; > + > pr_info("initialized driver\n"); > return optee; > err: > diff --git a/drivers/tee/optee/device.c b/drivers/tee/optee/device.c > new file mode 100644 > index 0000000..b38d24b > --- /dev/null > +++ b/drivers/tee/optee/device.c > @@ -0,0 +1,150 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (C) 2019 Linaro Ltd. > + */ > + > +#include > +#include > +#include > +#include > +#include "optee_private.h" > + > +/* > + * Get device UUIDs > + * > + * [out] memref[0] Array of device UUIDs > + * > + * Return codes: > + * TEE_SUCCESS - Invoke command success > + * TEE_ERROR_BAD_PARAMETERS - Incorrect input param > + * TEE_ERROR_SHORT_BUFFER - Output buffer size less than required > + */ > +#define PTA_CMD_GET_DEVICES 0x0 > + > +static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data) > +{ > + if (ver->impl_id == TEE_IMPL_ID_OPTEE) > + return 1; > + else > + return 0; > +} > + > +static int get_devices(struct tee_context *ctx, u32 session, > + struct tee_shm *device_uuid, u32 *shm_size) Missing const on device_uuid? > +{ > + u32 ret = 0; > + struct tee_ioctl_invoke_arg inv_arg = {0}; > + struct tee_param param[4] = {0}; > + > + /* Invoke PTA_CMD_GET_DEVICES function */ > + inv_arg.func = PTA_CMD_GET_DEVICES; > + inv_arg.session = session; > + inv_arg.num_params = 4; > + > + /* Fill invoke cmd params */ > + param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; > + param[0].u.memref.shm = device_uuid; > + param[0].u.memref.size = *shm_size; > + param[0].u.memref.shm_offs = 0; > + > + ret = tee_client_invoke_func(ctx, &inv_arg, param); > + if ((ret < 0) || ((inv_arg.ret != TEEC_SUCCESS) && > + (inv_arg.ret != TEEC_ERROR_SHORT_BUFFER))) { > + pr_err("PTA_CMD_GET_DEVICES invoke function err: %x\n", > + inv_arg.ret); > + return -EINVAL; > + } > + > + *shm_size = param[0].u.memref.size; > + > + return 0; > +} > + > +static int optee_register_device(uuid_t *device_uuid, u32 device_id) const? > +{ > + struct tee_client_device *optee_device = NULL; > + int rc; > + > + optee_device = kzalloc(sizeof(*optee_device), GFP_KERNEL); > + if (!optee_device) > + return -ENOMEM; > + > + optee_device->dev.bus = &tee_bus_type; > + dev_set_name(&optee_device->dev, "optee-clnt%u", device_id); > + uuid_copy(&optee_device->id.uuid, device_uuid); > + > + rc = device_register(&optee_device->dev); > + if (rc) > + pr_err("device registration failed, err: %d\n", rc); Leak optee_device? > + > + return rc; > +} > + > +int optee_enumerate_devices(void) > +{ > + uuid_t pta_uuid = > + UUID_INIT(0x7011a688, 0xddde, 0x4053, > + 0xa5, 0xa9, 0x7b, 0x3c, 0x4d, 0xdf, 0x13, 0xb8); I think this could/should be const too. > + struct tee_ioctl_open_session_arg sess_arg = {0}; > + struct tee_shm *device_shm = NULL; > + uuid_t *device_uuid = NULL; > + struct tee_context *ctx = NULL; > + u32 shm_size = 0, idx = 0; > + int rc; > + > + /* Open context with OP-TEE driver */ > + ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, NULL); > + if (IS_ERR(ctx)) > + return -ENODEV; > + > + /* Open session with device enumeration pseudo TA */ > + memcpy(sess_arg.uuid, pta_uuid.b, TEE_IOCTL_UUID_LEN); > + sess_arg.clnt_login = TEE_IOCTL_LOGIN_PUBLIC; > + sess_arg.num_params = 0; > + > + rc = tee_client_open_session(ctx, &sess_arg, NULL); > + if ((rc < 0) || (sess_arg.ret != TEEC_SUCCESS)) { > + /* Device enumeration pseudo TA not found */ > + rc = 0; > + goto out_ctx; > + } > + > + rc = get_devices(ctx, sess_arg.session, device_shm, &shm_size); Use NULL and 0 directly here instead of relying on initialized values. This makes it clear we are fetching the size of a buffer and are doing something different to the next call to get_devices(). > + if (rc < 0) > + goto out_sess; > + > + device_shm = tee_shm_alloc(ctx, shm_size, > + TEE_SHM_MAPPED | TEE_SHM_DMA_BUF); > + if (IS_ERR(device_shm)) { > + pr_err("tee_shm_alloc failed\n"); > + rc = PTR_ERR(device_shm); > + goto out_sess; > + } > + > + rc = get_devices(ctx, sess_arg.session, device_shm, &shm_size); > + if (rc < 0) > + goto out_shm; > + > + device_uuid = tee_shm_get_va(device_shm, 0); > + if (IS_ERR(device_uuid)) { > + pr_err("tee_shm_get_va failed\n"); > + rc = PTR_ERR(device_uuid); > + goto out_shm; > + } > + > + while (idx < shm_size / sizeof(uuid_t)) { This is a very uncommon way to write a for loop ;-). > + rc = optee_register_device(&device_uuid[idx], idx); > + if (rc) > + goto out_shm; > + idx++; > + } > + > +out_shm: > + tee_shm_free(device_shm); > +out_sess: > + tee_client_close_session(ctx, sess_arg.session); > +out_ctx: > + tee_client_close_context(ctx); > + > + return rc; > +} > diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h > index 35e7938..a5e84af 100644 > --- a/drivers/tee/optee/optee_private.h > +++ b/drivers/tee/optee/optee_private.h > @@ -28,6 +28,7 @@ > #define TEEC_ERROR_BAD_PARAMETERS 0xFFFF0006 > #define TEEC_ERROR_COMMUNICATION 0xFFFF000E > #define TEEC_ERROR_OUT_OF_MEMORY 0xFFFF000C > +#define TEEC_ERROR_SHORT_BUFFER 0xFFFF0010 > > #define TEEC_ORIGIN_COMMS 0x00000002 > > @@ -181,6 +182,8 @@ void optee_free_pages_list(void *array, size_t num_entries); > void optee_fill_pages_list(u64 *dst, struct page **pages, int num_pages, > size_t page_offset); > > +int optee_enumerate_devices(void); > + > /* > * Small helpers > */ > -- > 2.7.4 >