Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp849743ybs; Mon, 25 May 2020 00:15:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxDhMZmxJ6mwpVXQRleKERK1uoIrEkjNTn+FC4byjkDcfrL7Z1BDsrGowf0RezBdFjaeoqw X-Received: by 2002:a17:906:3041:: with SMTP id d1mr18162136ejd.7.1590390910339; Mon, 25 May 2020 00:15:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590390910; cv=none; d=google.com; s=arc-20160816; b=sI7bDtjvHw5ZnET98NLibkUGH+f80Yo5emWyLfIGxKmMJdzRlYLP/Zu8r79tbQsOTN qOutHfxoz5RLmf3DQ9E/cnoUY5OCUcYT5pnYBd+Z6LhReTsiZ0Wh5ZAq38S8RzuTrRd4 K8v/n2K4XOW4jFoycU3YekFNMHb8yMWtQtXfZA0Yhw5tb8X2L5SrsxHhgKCOwZ0qEAMi H3h9c2nrgAPoIEZhW9IxD15EY8LIYkyWoQNsi4TZ47fhpZIL5eupj/DWzWuk34ECvWtu jwW7Dhgtp8f/2VrBNnLK+TAcyj0L9dRbYikwyrVyNcJomUFDM/6oPJoNHZ+pJPb2IbjJ Ja5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=292tWDL47tGEqgK2JctPEJkS/zY0hjJfayYxskKKbQs=; b=w5IRJAHFAWGtZGus1LOHJk6yVwVboSVuSRCs5TiJl23gkIZdyU/3RxOME629hmjLHV rv3n60cx49Atl5tOl7VDQUkizZyWB8fBOVeOzbQ1CKJAYJxIAtDWfoxeJi8foKrAnGx3 1rRpX5y1XosM0LJXUadQIAsMjgQpJA1DqQzKA3beXWjGgGIHDGY9WQttFHjFf9JDs03b 1NCE8YC3p9nDSfqZZwjMTLwFc/NREtTczqieRXjAH2xehT6B+2wkv4HAhDdqn1DDQBYI EypeyyLA+Yrueae13ezOKErCFTegam25o/gh1R10UYNHpvis475YKM1ZPP4T59zx9m3Q D1ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=UT+WyGrJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g31si8597541edd.232.2020.05.25.00.14.47; Mon, 25 May 2020 00:15:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=UT+WyGrJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389020AbgEYHMv (ORCPT + 99 others); Mon, 25 May 2020 03:12:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34360 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388947AbgEYHMu (ORCPT ); Mon, 25 May 2020 03:12:50 -0400 Received: from mail-yb1-xb43.google.com (mail-yb1-xb43.google.com [IPv6:2607:f8b0:4864:20::b43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 51980C061A0E for ; Mon, 25 May 2020 00:12:50 -0700 (PDT) Received: by mail-yb1-xb43.google.com with SMTP id j8so3614709ybj.12 for ; Mon, 25 May 2020 00:12:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=292tWDL47tGEqgK2JctPEJkS/zY0hjJfayYxskKKbQs=; b=UT+WyGrJr9gNCmGkG4RpI6lIzTgFOgWWzHOe8L+3VGY4M5XR9ierZ09vHle/HdTPem pl8ksQeCmwxCIfw+43mxVaVz1s67zN/EN7cgcpj/7uHjltG5isSSMESInnoAm3CI25C4 5e1kTQqe4mG7o+DnfvQqvDeCulFoIFDvakkJBCsT0AvhTig5slDNgan6ySQawKtRKavz Fs2GU3b5es2ThJ/v+KnJp9S2EW79VnqCbPD6AHT68LGXuczWmP7omjXAMISOh4UpmE9n H87z0hcaufOXMX31PXS4X1EE94WGYDIJn+qvyo1G4bh5qDROQxzrEyc1OVELwZ8bi5tS Q+cQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=292tWDL47tGEqgK2JctPEJkS/zY0hjJfayYxskKKbQs=; b=lGqIXKMdgdV3pdUPVKWd/mNvVs/fjJQyn0zElUXZh/pqjOjQge6MtgLDo0tgeiCKK9 Op0Zr6pesRHFd5Al5WAAnysnBu1+KF51LKxL1J/nJC8gHLAWjHrGTavPHC1rgiuaMCiI VwiiccqwPKbI5tbwZ2GBLHrDLqZdG1mq8FII587zakFe+5SFF3ZwFCXSeRmil4u1SVGq Asx3xeuHDfLxucBxj0O+0q9tTCGaOh/pfCLsZnL/2Qy+UJNYuiJkT81KnRiOQI3+6ZkE ThgEOXDp9FTU7KzNBox1TaMEd/HO2QfXJATmA1RG5VR1rK8D4R76QuBd/AL4GmCIFdGE 48dQ== X-Gm-Message-State: AOAM53141Qn00VkYJNCKeme+D1rtpdpWovVkVeXAqlOe5VYLxDFint+j zhRTg9lMOQfLd7cuD51gy3YXlIb8YLJ3rOA4buuLNQ== X-Received: by 2002:a25:209:: with SMTP id 9mr29992243ybc.153.1590390768506; Mon, 25 May 2020 00:12:48 -0700 (PDT) MIME-Version: 1.0 References: <20200521064743.4769-1-maxim.uvarov@linaro.org> <20200521064743.4769-2-maxim.uvarov@linaro.org> In-Reply-To: From: Maxim Uvarov Date: Mon, 25 May 2020 10:12:36 +0300 Message-ID: Subject: Re: [PATCHv2 1/2] optee: do drivers initialization before and after tee-supplicant run To: Jens Wiklander Cc: Linux Kernel Mailing List , "tee-dev @ lists . linaro . org" , peterhuewe@gmx.de, Jarkko Sakkinen , Jason Gunthorpe , Greg Kroah-Hartman , linux-integrity@vger.kernel.org, Arnd Bergmann , Sumit Garg Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 24 May 2020 at 09:22, Jens Wiklander wrote: > > Hi Maxim, > > On Thu, May 21, 2020 at 8:47 AM Maxim Uvarov wrote: > > > > Some drivers (like ftpm) can operate only after tee-supplicant > > runs becase of tee-supplicant provides things like storage > > services. This patch splits probe of non tee-supplicant dependable > > drivers to early stage, and after tee-supplicant run probe other > > drivers. > > > > Signed-off-by: Maxim Uvarov > > Suggested-by: Sumit Garg > > Suggested-by: Arnd Bergmann > > --- > > drivers/tee/optee/core.c | 25 ++++++++++++++++++++++--- > > drivers/tee/optee/device.c | 17 +++++++++++------ > > drivers/tee/optee/optee_private.h | 8 +++++++- > > 3 files changed, 40 insertions(+), 10 deletions(-) > > > > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > > index 99698b8a3a74..dd2265c44907 100644 > > --- a/drivers/tee/optee/core.c > > +++ b/drivers/tee/optee/core.c > > @@ -17,6 +17,7 @@ > > #include > > #include > > #include > > +#include > > #include "optee_private.h" > > #include "optee_smc.h" > > #include "shm_pool.h" > > @@ -218,6 +219,15 @@ static void optee_get_version(struct tee_device *teedev, > > *vers = v; > > } > > > > +static void optee_bus_scan(struct work_struct *work) > > +{ > > + int rc; > > + > > + rc = optee_enumerate_devices(PTA_CMD_GET_DEVICES_SUPP); > > + if (rc) > > + pr_err("optee_enumerate_devices failed %d\n", rc); > > +} > > + > > static int optee_open(struct tee_context *ctx) > > { > > struct optee_context_data *ctxdata; > > @@ -241,8 +251,15 @@ static int optee_open(struct tee_context *ctx) > > kfree(ctxdata); > > return -EBUSY; > > } > > - } > > > > + INIT_WORK(&optee->scan_bus_work, optee_bus_scan); > > + optee->scan_bus_wq = create_workqueue("optee_bus_scan"); > > + if (!optee->scan_bus_wq) { > > + pr_err("optee: couldn't create workqueue\n"); > > + return -ECHILD; > > + } > > + queue_work(optee->scan_bus_wq, &optee->scan_bus_work); > > Shouldn't this be done only the first time tee-supplicant opens the > device? Normally tee-supplicant only does this once, but it might get > restarted for some reason. > Yes, thanks. I will add this to the next version. Maxim. > > + } > > mutex_init(&ctxdata->mutex); > > INIT_LIST_HEAD(&ctxdata->sess_list); > > > > @@ -296,8 +313,10 @@ static void optee_release(struct tee_context *ctx) > > > > ctx->data = NULL; > > > > - if (teedev == optee->supp_teedev) > > + if (teedev == optee->supp_teedev) { > > + destroy_workqueue(optee->scan_bus_wq); > > optee_supp_release(&optee->supp); > > + } > > } > > > > static const struct tee_driver_ops optee_ops = { > > @@ -675,7 +694,7 @@ static int optee_probe(struct platform_device *pdev) > > > > platform_set_drvdata(pdev, optee); > > > > - rc = optee_enumerate_devices(); > > + rc = optee_enumerate_devices(PTA_CMD_GET_DEVICES); > > if (rc) { > > optee_remove(pdev); > > return rc; > > diff --git a/drivers/tee/optee/device.c b/drivers/tee/optee/device.c > > index e3a148521ec1..d4931dad07aa 100644 > > --- a/drivers/tee/optee/device.c > > +++ b/drivers/tee/optee/device.c > > @@ -21,7 +21,6 @@ > > * TEE_ERROR_BAD_PARAMETERS - Incorrect input param > > * TEE_ERROR_SHORT_BUFFER - Output buffer size less than required > > */ > > -#define PTA_CMD_GET_DEVICES 0x0 > > > > static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data) > > { > > @@ -32,7 +31,8 @@ static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data) > > } > > > > static int get_devices(struct tee_context *ctx, u32 session, > > - struct tee_shm *device_shm, u32 *shm_size) > > + struct tee_shm *device_shm, u32 *shm_size, > > + u32 func) > > { > > int ret = 0; > > struct tee_ioctl_invoke_arg inv_arg; > > @@ -42,7 +42,7 @@ static int get_devices(struct tee_context *ctx, u32 session, > > memset(¶m, 0, sizeof(param)); > > > > /* Invoke PTA_CMD_GET_DEVICES function */ > > - inv_arg.func = PTA_CMD_GET_DEVICES; > > + inv_arg.func = func; > > inv_arg.session = session; > > inv_arg.num_params = 4; > > > > @@ -87,7 +87,7 @@ static int optee_register_device(const uuid_t *device_uuid, u32 device_id) > > return rc; > > } > > > > -int optee_enumerate_devices(void) > > +static int __optee_enumerate_devices(u32 func) > > { > > const uuid_t pta_uuid = > > UUID_INIT(0x7011a688, 0xddde, 0x4053, > > @@ -118,7 +118,7 @@ int optee_enumerate_devices(void) > > goto out_ctx; > > } > > > > - rc = get_devices(ctx, sess_arg.session, NULL, &shm_size); > > + rc = get_devices(ctx, sess_arg.session, NULL, &shm_size, func); > > if (rc < 0 || !shm_size) > > goto out_sess; > > > > @@ -130,7 +130,7 @@ int optee_enumerate_devices(void) > > goto out_sess; > > } > > > > - rc = get_devices(ctx, sess_arg.session, device_shm, &shm_size); > > + rc = get_devices(ctx, sess_arg.session, device_shm, &shm_size, func); > > if (rc < 0) > > goto out_shm; > > > > @@ -158,3 +158,8 @@ int optee_enumerate_devices(void) > > > > return rc; > > } > > + > > +int optee_enumerate_devices(u32 func) > > +{ > > + return __optee_enumerate_devices(func); > > +} > > diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h > > index d9c5037b4e03..6cdac4bb7253 100644 > > --- a/drivers/tee/optee/optee_private.h > > +++ b/drivers/tee/optee/optee_private.h > > @@ -78,6 +78,8 @@ struct optee_supp { > > * @memremaped_shm virtual address of memory in shared memory pool > > * @sec_caps: secure world capabilities defined by > > * OPTEE_SMC_SEC_CAP_* in optee_smc.h > > + * @scan_bus_wq workqueue to scan optee bus and register optee drivers > > + * @scan_bus_work workq to scan optee bus and register optee drivers > > */ > > struct optee { > > struct tee_device *supp_teedev; > > @@ -89,6 +91,8 @@ struct optee { > > struct tee_shm_pool *pool; > > void *memremaped_shm; > > u32 sec_caps; > > + struct workqueue_struct *scan_bus_wq; > > + struct work_struct scan_bus_work; > > }; > > > > struct optee_session { > > @@ -173,7 +177,9 @@ void optee_free_pages_list(void *array, size_t num_entries); > > void optee_fill_pages_list(u64 *dst, struct page **pages, int num_pages, > > size_t page_offset); > > > > -int optee_enumerate_devices(void); > > +#define PTA_CMD_GET_DEVICES 0x0 > > +#define PTA_CMD_GET_DEVICES_SUPP 0x1 > > +int optee_enumerate_devices(u32 func); > > > > /* > > * Small helpers > > -- > > 2.17.1 > >