Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp747407ybt; Wed, 17 Jun 2020 12:55:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz4jBynjrr9kySIaViyxWSGv126+ZteqWAmjd85FR9HqWvbaWzm66/KQgfG6WFOEbUa/iOe X-Received: by 2002:a50:c181:: with SMTP id m1mr750502edf.27.1592423709394; Wed, 17 Jun 2020 12:55:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592423709; cv=none; d=google.com; s=arc-20160816; b=G22wlamd1oO78VdvGtpqQ4e5SPe0V+KHhU7TffzA/vVcfDZepidisOjmGQoBe0P0v4 a6QWDpK+Z4szckKewileIhx4X0TS5kSbnW85VddcC2AxVQsELT5ToOb0RvtqzatbKAqg vJsnwBrdQZ+IHjyDlK9ri17i3OnlbWl7ZzJ1QlGY0PGU6q54mdrSqA2ib3ZAo5k9bhp3 5F8FVH/COdACt9Ey2Pho0RD8TDOE48/X18fY1ujy7Row0/CzFGp5oTYTvr9+PpvQgQmC KmiLZTITyLICnr/GS2Lne722lPOoiMB3G0zClZ79FXcofnuzzrShn/L7qfNplwqIbayW 8WdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=mPskS7YpIsPAtpdB17fH8j2IFkcePv+bE+bCBlKpQgA=; b=Q1fCey5UEC4n/BPxeSa5+TCRF2Ow2SdUa1oYo/wuT/MPPxk9ZP7yoeGnE5/EQXT+pN HeUKUYBzWzxzv5Oph5yOK0nGf5u+DFXYQogq5nn5k4MEA2TUncOGOul6jNIfSf3BJxR7 2nhfEULWtBcasVkedi5zTsVJ+yl7HOq7YcfvQc5AWHNFphk1FM2TYiceim4z2BzlLBbJ jEqzh1lQw6CzeY8fAufedTq/+aws20kK1w/3T60o98hqQSDhhcN63dhxYvEbyb1NeWN7 lVPSl9WIfyqBJRetBjOeKkHKAmZfiCl2GTzuzYQ2G/wqk2rNYDaIAlpKwe4KgRA77TFn Ff9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ed78ea9R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ay24si630139edb.310.2020.06.17.12.54.46; Wed, 17 Jun 2020 12:55:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ed78ea9R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726840AbgFQTxC (ORCPT + 99 others); Wed, 17 Jun 2020 15:53:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52960 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726496AbgFQTxB (ORCPT ); Wed, 17 Jun 2020 15:53:01 -0400 Received: from mail-yb1-xb43.google.com (mail-yb1-xb43.google.com [IPv6:2607:f8b0:4864:20::b43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 74A19C06174E for ; Wed, 17 Jun 2020 12:53:01 -0700 (PDT) Received: by mail-yb1-xb43.google.com with SMTP id j202so1877671ybg.6 for ; Wed, 17 Jun 2020 12:53:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mPskS7YpIsPAtpdB17fH8j2IFkcePv+bE+bCBlKpQgA=; b=ed78ea9RokhBOXQQ/ED3VOjQZToVMPxDUom8KiKg5uE4VRuDoKvec1i6HhYrvYiZAm wZd3dYvSePB4ScyYhFUTNLjsyj7tiRh7Lun2SEyHVltevLCD+9NLBfKhgA69UWrR6kLo rcpbvcFdMYJOTv4/UwFdeNkY3iYNOAWGVZnpaxa/FGfwMIlNKBfwDLTkazu4+XjZcuHu mm5GkAb/0wxwQl7jwtZpeCLytbVzmVRdPwcfFIxlUOoXCbpc9HtscXrcE3qqnskzNjk7 lnwT2EFpbPot/QidmLPNNnZduY4XMlQ6yrXBovQg4BKKQF9PFZ7kHt0XvHuAizAeeOQc 4UWg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mPskS7YpIsPAtpdB17fH8j2IFkcePv+bE+bCBlKpQgA=; b=Lrq9pbV0DS7dUoF2FXwal8socWvwn2SNeWsSf1pHi6bNazFNHBqvS6NgibzU2JTQ0N FSoZWYgjjNKLTSz0jC+T6OsErmw3HvRYpufCLp2eL3NFMwf/gpaeLwJEsY5OFSV0jhqB g+cdwYuyIrexqV+5yGwruEK3w/aVS+ynYP+zHA4RWDusVlu1IcxAPM2Ge/twCK3RRa9D viuD77AF+INCh4u0tFpDb6yYRyktV5aoG/AYoSGdf8dV9Mw6ebpIHf49TBvnOFz1NA4N TeXzuKImZFhuKoH3saXvndorN76vSWKfZWSF/lKonAPaCyeaqYZitIhnmMVVIGs+AcKs uBmQ== X-Gm-Message-State: AOAM531EkAoWdzpyz/uwDKmK3AY8nIg8RaCPrUXG3fEn6PbslwZwaOtF G4sSgU+pcsEnvKNCWbhhJ1UVvDUJxoRmYt9jY7zAAQ== X-Received: by 2002:a25:4f08:: with SMTP id d8mr941798ybb.125.1592423580614; Wed, 17 Jun 2020 12:53:00 -0700 (PDT) MIME-Version: 1.0 References: <20200604175851.758-1-maxim.uvarov@linaro.org> <20200604175851.758-2-maxim.uvarov@linaro.org> In-Reply-To: From: Maxim Uvarov Date: Wed, 17 Jun 2020 22:52:49 +0300 Message-ID: Subject: Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry To: Jerome Forissier Cc: Sumit Garg , Greg Kroah-Hartman , Linux Kernel Mailing List , Jarkko Sakkinen , Arnd Bergmann , "tee-dev @ lists . linaro . org" , Jason Gunthorpe , linux-integrity@vger.kernel.org, peterhuewe@gmx.de Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 17 Jun 2020 at 18:16, Jerome Forissier wrote: > > > > On 6/17/20 3:58 PM, Sumit Garg wrote: > > Hi Maxim, > > > > On Thu, 4 Jun 2020 at 23:28, Maxim Uvarov wrote: > >> > >> With the evolving use-cases for TEE bus, now it's required to support > >> multi-stage enumeration process. But using a simple index doesn't > >> suffice this requirement and instead leads to duplicate sysfs entries. > >> So instead switch to use more informative device UUID for sysfs entry > >> like: > >> /sys/bus/tee/devices/optee-ta- > >> > >> Signed-off-by: Maxim Uvarov > >> Reviewed-by: Sumit Garg > >> --- > >> Documentation/ABI/testing/sysfs-bus-optee-devices | 8 ++++++++ > >> MAINTAINERS | 1 + > >> drivers/tee/optee/device.c | 9 ++++++--- > >> 3 files changed, 15 insertions(+), 3 deletions(-) > >> create mode 100644 Documentation/ABI/testing/sysfs-bus-optee-devices > >> > >> diff --git a/Documentation/ABI/testing/sysfs-bus-optee-devices b/Documentation/ABI/testing/sysfs-bus-optee-devices > >> new file mode 100644 > >> index 000000000000..0ae04ae5374a > >> --- /dev/null > >> +++ b/Documentation/ABI/testing/sysfs-bus-optee-devices > >> @@ -0,0 +1,8 @@ > >> +What: /sys/bus/tee/devices/optee-ta-/ > >> +Date: May 2020 > >> +KernelVersion 5.7 > >> +Contact: tee-dev@lists.linaro.org > >> +Description: > >> + OP-TEE bus provides reference to registered drivers under this directory. The > >> + matches Trusted Application (TA) driver and corresponding TA in secure OS. Drivers > >> + are free to create needed API under optee-ta- directory. > >> diff --git a/MAINTAINERS b/MAINTAINERS > >> index ecc0749810b0..6717afef2de3 100644 > >> --- a/MAINTAINERS > >> +++ b/MAINTAINERS > >> @@ -12516,6 +12516,7 @@ OP-TEE DRIVER > >> M: Jens Wiklander > >> L: tee-dev@lists.linaro.org > >> S: Maintained > >> +F: Documentation/ABI/testing/sysfs-bus-optee-devices > >> F: drivers/tee/optee/ > >> > >> OP-TEE RANDOM NUMBER GENERATOR (RNG) DRIVER > >> diff --git a/drivers/tee/optee/device.c b/drivers/tee/optee/device.c > >> index e3a148521ec1..23d264c8146e 100644 > >> --- a/drivers/tee/optee/device.c > >> +++ b/drivers/tee/optee/device.c > >> @@ -65,7 +65,7 @@ static int get_devices(struct tee_context *ctx, u32 session, > >> return 0; > >> } > >> > >> -static int optee_register_device(const uuid_t *device_uuid, u32 device_id) > >> +static int optee_register_device(const uuid_t *device_uuid) > >> { > >> struct tee_client_device *optee_device = NULL; > >> int rc; > >> @@ -75,7 +75,10 @@ static int optee_register_device(const uuid_t *device_uuid, u32 device_id) > >> return -ENOMEM; > >> > >> optee_device->dev.bus = &tee_bus_type; > >> - dev_set_name(&optee_device->dev, "optee-clnt%u", device_id); > >> + if (dev_set_name(&optee_device->dev, "optee-ta-%pUl", device_uuid)) { > > > > You should be using format specifier as: "%pUb" instead of "%pUl" as > > UUID representation for TAs is in big endian format. See below: > > Where does device_uuid come from? If it comes directly from OP-TEE, then > it should be a pointer to the following struct: > > typedef struct > { > uint32_t timeLow; > uint16_t timeMid; > uint16_t timeHiAndVersion; > uint8_t clockSeqAndNode[8]; > } TEE_UUID; > > (GlobalPlatform TEE Internal Core API spec v1.2.1 section 3.2.4) > > - The spec does not mandate any particular endianness and simply warns > about possible issues if secure and non-secure worlds differ in endianness. > - OP-TEE uses %pUl assuming that host order is little endian (that is > true for the Arm platforms that run OP-TEE currently). By the same logic > %pUl should be fine in the kernel. > - On the other hand, the UUID in a Trusted App header is always encoded > big endian by the Python script that signs and optionally encrypts the > TA. This should not have any visible impact on UUIDs exchanged between > the secure and non-secure world though. > > So I am wondering why you had to use %pUb. There must be some > inconsistency somewhere :-/ > > -- > Jerome From linux side it is for example: static const struct tee_client_device_id optee_ftpm_id_table[] = { {UUID_INIT(0xbc50d971, 0xd4c9, 0x42c4, 0x82, 0xcb, 0x34, 0x3f, 0xb7, 0xf3, 0x78, 0x96)}, {} }; static struct tee_client_driver ftpm_tee_driver = { .id_table = optee_ftpm_id_table, .driver = { So sysfs name has to be the same as the driver has. And UUD is simple 16 bytes:#define UUID_SIZE 16 typedef struct { __u8 b[UUID_SIZE]; } uuid_t; From TA it also: #define TA_UUID { 0xBC50D971, 0xD4C9, 0x42C4, \ {0x82, 0xCB, 0x34, 0x3F, 0xB7, 0xF3, 0x78, 0x96}} Compare uuid from optee and kernel driver version is simple: static inline bool uuid_equal(const uuid_t *u1, const uuid_t *u2) { return memcmp(u1, u2, sizeof(uuid_t)) == 0; } So to support better code navigation. For example grep sources for 0xBC50D971, or find in sysfs "*bc50d971-*" I would say we need to use BE format. optee might also need to switch to BE prints for the same reason. Maxim. > > > > > # ls /sys/bus/tee/devices/ > > optee-ta-405b6ad9-e5c3-e321-8794-1002a5d5c61b > > optee-ta-71d950bc-c9d4-c442-82cb-343fb7f37896 > > optee-ta-e70f4af0-5d1f-9b4b-abf7-619b85b4ce8c > > > > While UUID for fTPM TA is in big endian format: > > bc50d971-d4c9-42c4-82cb-343fb7f37896 > > > > Sorry that I missed it during review and noticed this while testing. > > > > With the above fix included, I tested this series using fTPM early TA > > on Qemu for aarch64 and used basic random number generation test using > > tpm2-tools. So feel free to add: > > > > Tested-by: Sumit Garg > > > > -Sumit > > > >> + kfree(optee_device); > >> + return -ENOMEM; > >> + } > >> uuid_copy(&optee_device->id.uuid, device_uuid); > >> > >> rc = device_register(&optee_device->dev); > >> @@ -144,7 +147,7 @@ int optee_enumerate_devices(void) > >> num_devices = shm_size / sizeof(uuid_t); > >> > >> for (idx = 0; idx < num_devices; idx++) { > >> - rc = optee_register_device(&device_uuid[idx], idx); > >> + rc = optee_register_device(&device_uuid[idx]); > >> if (rc) > >> goto out_shm; > >> } > >> -- > >> 2.17.1 > >> > > _______________________________________________ > > Tee-dev mailing list > > Tee-dev@lists.linaro.org > > https://lists.linaro.org/mailman/listinfo/tee-dev > >