Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp374976ybg; Mon, 1 Jun 2020 03:49:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJysIRNA/xuNgJh31rpPElyZBpqfvbNoJUvsxJ2BdjCUQKdV1YIoR7Fq5nq3TBTEm7LC5CHZ X-Received: by 2002:a50:d1d3:: with SMTP id i19mr20631243edg.35.1591008545579; Mon, 01 Jun 2020 03:49:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591008545; cv=none; d=google.com; s=arc-20160816; b=iCZw29w5xIt0TceZdhT2XWchGjLaREwACcQvWj7xZhakkDiZpykqDVwy5Q/wBBL+Yi nDu0aeh1kVAPL/CYicO07701+ROcxF5PCM9A8fyjfAyUy3/RhBsI0w8fim9/sAj4I9dl lcwUv5gMbjOY0Dfgt7Vkgo6Ck+5itfK0PgLwtWPE2gp2fVGf8MmyfIzAk68PMdBMgWho JNFeOt7S7lyevdhQlQsrr3bfURsgCTNDdsah3AfIGsrSd+rZbnsPU9ckNdQ6/wWhYPEX cryuegBq5ap5Ksd2CyCqRAUg+4piAGcVmi7UJs9Ee22Z2oXtG6w4UW0jRt2fR4OBigLQ Z3vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=JjhmAPEKNow7E1vW8s3ASEs0uGQtIO9UoGk5GAxoJ48=; b=t1Blvc4R3qXhAbJYmbYWRQn4tRe86wgLtxTak0vVDrOrccjvIXmtRX5wSqqDfE5iGs VTTYKgQpDGKrd5UYmR0NHZqWbmAUCjIrE+jHlBSDwk7uv/zdOtYj44l/Q7w4lEsTf2vM xik910mbtjBRCguUvpAtUcBvp4xSjNkc/77ZtfnZ5259sHHQqYJl6eB1/+PUrTp9WHa9 JItc6+2HgpNO2ZmyexJ3lt2dj4bvAS4wpJb0roZMlUhSdIh2kQKkPk4j/vhcJ1Xgvc1u v3UNb2jH37dzHePgt5ISWOPycelqPrft5a81/SMmbS8zAZtAhmc40C88tVvyEklEYemQ Ov7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=Mod4ncWf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id mj15si10631793ejb.404.2020.06.01.03.48.42; Mon, 01 Jun 2020 03:49:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=Mod4ncWf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726200AbgFAKqT (ORCPT + 99 others); Mon, 1 Jun 2020 06:46:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52834 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725847AbgFAKqH (ORCPT ); Mon, 1 Jun 2020 06:46:07 -0400 Received: from mail-lf1-x144.google.com (mail-lf1-x144.google.com [IPv6:2a00:1450:4864:20::144]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6BC0DC03E96F for ; Mon, 1 Jun 2020 03:46:07 -0700 (PDT) Received: by mail-lf1-x144.google.com with SMTP id x22so3646698lfd.4 for ; Mon, 01 Jun 2020 03:46:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JjhmAPEKNow7E1vW8s3ASEs0uGQtIO9UoGk5GAxoJ48=; b=Mod4ncWfP0u3c9DVUfv0x5U7NxZj4ctI1Zutm0PEe9JCAjok93XNX1N88SQ20xWLU+ 2ZJilDZ7kW/91hV4FSWulFzF2TuqLJznMbjcOYqp6GJf/Na9gcftf8IX8u5ZJgWMxJAY 2sfh1CDLU+mbGuMUW15FOy224F8LEHACUOS4wsw6O1HJN+nb0TDh2ZvshdVuB4+MnOCK dkoWnL1CSx882omRa1xxe85IalpJgZm3tuczHlG8kjtX8Zx+LsTLxxDu7ByVyrxg9ovU qHudTXnjrLU4IXgBWuf1t1Tutif0lZZxEFXQ9LmpXl81aK+yoA/MD0KoGettgDxPi1FE PANg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JjhmAPEKNow7E1vW8s3ASEs0uGQtIO9UoGk5GAxoJ48=; b=egiKtfMQFhjKCu5Vj+e6okYC05IsRxo2OV9QuDglYadr0+PcA2BjBqIdYNu8o+arXH LuhwwYgzV9SVWC3TShLpCRJ22Fnq2cy/veDlkO1aNjKxvdtdqH4J+PzXE0+nlrSPLOlH 1M1++qllcFK6ZRQfbIrRbGqJfkFhRviGdELlI6td1mIG02aRG9QY9WiUxPm1v2UOFqBg KVmNCusUT3K8AQmMecg4JCmytjuDr/nmcswbD5bvmUV5l4k+PqtYp8NfD1k/zoaqda3B wTvRAMrtb0rb1lla5O32wUp/XLc2nBXSXHP2A4DR4ItGCfVLj+CTQIkKilSOlhxG6zDE SbRA== X-Gm-Message-State: AOAM533x1UUymV2lOjt44pmf+mvoqyD0BnVx8xLzMrjYeVWc/ZNaGXxz 3bud2he589V+ieqn6r9moUKA2jhFiirAU0VikGoPnw== X-Received: by 2002:ac2:44bb:: with SMTP id c27mr11290775lfm.59.1591008365696; Mon, 01 Jun 2020 03:46:05 -0700 (PDT) MIME-Version: 1.0 References: <20200529082701.13457-1-maxim.uvarov@linaro.org> <20200529082701.13457-2-maxim.uvarov@linaro.org> In-Reply-To: <20200529082701.13457-2-maxim.uvarov@linaro.org> From: Sumit Garg Date: Mon, 1 Jun 2020 16:15:53 +0530 Message-ID: Subject: Re: [PATCHv5 1/3] optee: do drivers initialization before and after tee-supplicant run To: Maxim Uvarov Cc: Linux Kernel Mailing List , "tee-dev @ lists . linaro . org" , peterhuewe@gmx.de, Jarkko Sakkinen , Jason Gunthorpe , Greg Kroah-Hartman , Jens Wiklander , linux-integrity@vger.kernel.org, Arnd Bergmann Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 29 May 2020 at 13:57, Maxim Uvarov wrote: > > Some drivers (like ftpm) can operate only after tee-supplicant > runs because of tee-supplicant provides things like storage > services. This patch splits probe of non tee-supplicant dependable > drivers to the early stage, and after tee-supplicant run probe other > drivers. > > Signed-off-by: Maxim Uvarov > Suggested-by: Sumit Garg > Suggested-by: Arnd Bergmann > --- > drivers/tee/optee/core.c | 24 +++++++++++++++++++++--- > drivers/tee/optee/device.c | 17 +++++++++++------ > drivers/tee/optee/optee_private.h | 10 +++++++++- > 3 files changed, 41 insertions(+), 10 deletions(-) > Commit subject sounds a little vague, so how about: ==== optee: enable support for multi-stage bus enumeration ==== Then in the commit description, you can elaborate on what it actually means. > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > index 99698b8a3a74..bf0851fdf108 100644 > --- a/drivers/tee/optee/core.c > +++ b/drivers/tee/optee/core.c > @@ -17,6 +17,7 @@ > #include > #include > #include > +#include > #include "optee_private.h" > #include "optee_smc.h" > #include "shm_pool.h" > @@ -218,6 +219,11 @@ static void optee_get_version(struct tee_device *teedev, > *vers = v; > } > > +static void optee_bus_scan(struct work_struct *work) > +{ > + WARN_ON(optee_enumerate_devices(PTA_CMD_GET_DEVICES_SUPP)); > +} > + > static int optee_open(struct tee_context *ctx) > { > struct optee_context_data *ctxdata; > @@ -241,8 +247,18 @@ static int optee_open(struct tee_context *ctx) > kfree(ctxdata); > return -EBUSY; > } > - } > > + if (!optee->scan_bus_done) { > + INIT_WORK(&optee->scan_bus_work, optee_bus_scan); > + optee->scan_bus_wq = create_workqueue("optee_bus_scan"); > + if (!optee->scan_bus_wq) { > + kfree(ctxdata); > + return -ECHILD; > + } > + queue_work(optee->scan_bus_wq, &optee->scan_bus_work); > + optee->scan_bus_done = true; > + } > + } > mutex_init(&ctxdata->mutex); > INIT_LIST_HEAD(&ctxdata->sess_list); > > @@ -296,8 +312,10 @@ static void optee_release(struct tee_context *ctx) > > ctx->data = NULL; > > - if (teedev == optee->supp_teedev) > + if (teedev == optee->supp_teedev) { > + destroy_workqueue(optee->scan_bus_wq); Doesn't it deserve a prior check "if(optee->scan_bus_wq)" as we only allocate it once during multiple tee-supplicant instances? > optee_supp_release(&optee->supp); > + } > } > > static const struct tee_driver_ops optee_ops = { > @@ -675,7 +693,7 @@ static int optee_probe(struct platform_device *pdev) > > platform_set_drvdata(pdev, optee); > > - rc = optee_enumerate_devices(); > + rc = optee_enumerate_devices(PTA_CMD_GET_DEVICES); > if (rc) { > optee_remove(pdev); > return rc; > diff --git a/drivers/tee/optee/device.c b/drivers/tee/optee/device.c > index e3a148521ec1..d4931dad07aa 100644 > --- a/drivers/tee/optee/device.c > +++ b/drivers/tee/optee/device.c > @@ -21,7 +21,6 @@ > * TEE_ERROR_BAD_PARAMETERS - Incorrect input param > * TEE_ERROR_SHORT_BUFFER - Output buffer size less than required > */ This comment needs to be moved as well. > -#define PTA_CMD_GET_DEVICES 0x0 > > static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data) > { > @@ -32,7 +31,8 @@ static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data) > } > > static int get_devices(struct tee_context *ctx, u32 session, > - struct tee_shm *device_shm, u32 *shm_size) > + struct tee_shm *device_shm, u32 *shm_size, > + u32 func) > { > int ret = 0; > struct tee_ioctl_invoke_arg inv_arg; > @@ -42,7 +42,7 @@ static int get_devices(struct tee_context *ctx, u32 session, > memset(¶m, 0, sizeof(param)); > > /* Invoke PTA_CMD_GET_DEVICES function */ You can get rid of this comment. -Sumit > - inv_arg.func = PTA_CMD_GET_DEVICES; > + inv_arg.func = func; > inv_arg.session = session; > inv_arg.num_params = 4; > > @@ -87,7 +87,7 @@ static int optee_register_device(const uuid_t *device_uuid, u32 device_id) > return rc; > } > > -int optee_enumerate_devices(void) > +static int __optee_enumerate_devices(u32 func) > { > const uuid_t pta_uuid = > UUID_INIT(0x7011a688, 0xddde, 0x4053, > @@ -118,7 +118,7 @@ int optee_enumerate_devices(void) > goto out_ctx; > } > > - rc = get_devices(ctx, sess_arg.session, NULL, &shm_size); > + rc = get_devices(ctx, sess_arg.session, NULL, &shm_size, func); > if (rc < 0 || !shm_size) > goto out_sess; > > @@ -130,7 +130,7 @@ int optee_enumerate_devices(void) > goto out_sess; > } > > - rc = get_devices(ctx, sess_arg.session, device_shm, &shm_size); > + rc = get_devices(ctx, sess_arg.session, device_shm, &shm_size, func); > if (rc < 0) > goto out_shm; > > @@ -158,3 +158,8 @@ int optee_enumerate_devices(void) > > return rc; > } > + > +int optee_enumerate_devices(u32 func) > +{ > + return __optee_enumerate_devices(func); > +} > diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h > index d9c5037b4e03..8b71839a357e 100644 > --- a/drivers/tee/optee/optee_private.h > +++ b/drivers/tee/optee/optee_private.h > @@ -78,6 +78,9 @@ struct optee_supp { > * @memremaped_shm virtual address of memory in shared memory pool > * @sec_caps: secure world capabilities defined by > * OPTEE_SMC_SEC_CAP_* in optee_smc.h > + * @scan_bus_done flag if device registation was already done. > + * @scan_bus_wq workqueue to scan optee bus and register optee drivers > + * @scan_bus_work workq to scan optee bus and register optee drivers > */ > struct optee { > struct tee_device *supp_teedev; > @@ -89,6 +92,9 @@ struct optee { > struct tee_shm_pool *pool; > void *memremaped_shm; > u32 sec_caps; > + bool scan_bus_done; > + struct workqueue_struct *scan_bus_wq; > + struct work_struct scan_bus_work; > }; > > struct optee_session { > @@ -173,7 +179,9 @@ void optee_free_pages_list(void *array, size_t num_entries); > void optee_fill_pages_list(u64 *dst, struct page **pages, int num_pages, > size_t page_offset); > > -int optee_enumerate_devices(void); > +#define PTA_CMD_GET_DEVICES 0x0 > +#define PTA_CMD_GET_DEVICES_SUPP 0x1 > +int optee_enumerate_devices(u32 func); > > /* > * Small helpers > -- > 2.17.1 >