Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp776888ybt; Wed, 17 Jun 2020 13:47:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyyxryBt7YlUSm0Whe2E4mKaMznM+wM/Zer8CTS9W3HpDkkXFdeNfbn5RdQ7tZfcrQricXK X-Received: by 2002:a17:906:5fcd:: with SMTP id k13mr878913ejv.459.1592426876870; Wed, 17 Jun 2020 13:47:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592426876; cv=none; d=google.com; s=arc-20160816; b=k4dq/Xi02yP7aWO9z/RvEDAZ5qaq7I8IVE0Y1GNK3Fq1c80iCKfhqVo5UF+JtLdS+4 UQi6Ta08zlk3YJNwzlTQBl9W9ibBmgtgpIboGJ4gmKUqMmG43XxwzEKrD44ZJ0XBoRrJ 2u4CarPZWg1dKqeVupwL7LtPKvOHArzv7OP3novV+8Wtq36sZUyKQQLCsQQ1B5m2fU8Y lA5sOuXzMTYz7TC5cGxzSPhru6Bn9c9WM+WXsBVKjSQWkjBSL0KrshW4Yl8ogv1YYowW vxzOaEiIj5yu5iqjUL4Pn69aUHZCJqiAYUN2GCD5GfyZt5g5ZQ6jN3L+HFdSUVnDsxhK ibhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=CC1FZuN8GKEyqP8tfmN2FxTypseeTWNCAbqO6YR2YeA=; b=bpDPaOdpoD49aQAMfCJ/kXmt5L9Do1CB3wv51mKEkFJw0LVn1O/dG8sA1/h6Lml6Yt fj/V00P9Zkq2aOoUXwkyzNAR+F74A06LrWlOcoU84iFa/jGL/vXa7LkB5sgHIDCAmEyU 3QRvZQO0RFS+R96qFFppBssa86/rxR3Qebvi9+HT/ghASZFg1nxtpJfXHJrvW0etC2mz XptA369FxpIBUcPrcv4jt5jhTZKX/KdXb8wKytwO0JDQ45CuUV1Ve/iNxaaTcu44VjWV bSruIwTx1s12XGOnIdYyeNsKX9F5+BP/A0KUQNe1ZkRkWWEMcnQOCO1UFDf+MASP7rIC EyrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@forissier-org.20150623.gappssmtp.com header.s=20150623 header.b=u99M3iIr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rn10si585233ejb.680.2020.06.17.13.47.34; Wed, 17 Jun 2020 13:47:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@forissier-org.20150623.gappssmtp.com header.s=20150623 header.b=u99M3iIr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727027AbgFQUpv (ORCPT + 99 others); Wed, 17 Jun 2020 16:45:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32902 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726496AbgFQUpu (ORCPT ); Wed, 17 Jun 2020 16:45:50 -0400 Received: from mail-wr1-x444.google.com (mail-wr1-x444.google.com [IPv6:2a00:1450:4864:20::444]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1BF15C06174E for ; Wed, 17 Jun 2020 13:45:50 -0700 (PDT) Received: by mail-wr1-x444.google.com with SMTP id b6so3786913wrs.11 for ; Wed, 17 Jun 2020 13:45:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=forissier-org.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=CC1FZuN8GKEyqP8tfmN2FxTypseeTWNCAbqO6YR2YeA=; b=u99M3iIrJU7oxmpu/qd8O9ZQeW6S1t6xlKSMXqx92AfmhkjLm6PfFGzxYUqykKJ3GP TZX/BFwqDik8RgBft4w8F+EHfgcqPpHAlmZ1ZEENit8EmbOHMtGnQcpadzbxR1sgAldL ZYQLIy5FiH+UJATDUD285gQpNYN29hZfvUe5uTCBWn9MY0x+uZSDTGiRvxNTqVnhHA2C GrjlR+6fccWTcoa/mJXQT79/56EnkWufUB1TeNPEtZzjMzTHOfjenvhoKICE1FTgNTzu 6CDXic+uAh5NfM83tArePUYC3eRmqgAgtV92KJayPzXFSJQJyNo09iiaAQQVCzyj1Wmg lQzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=CC1FZuN8GKEyqP8tfmN2FxTypseeTWNCAbqO6YR2YeA=; b=aeowTF21WBpWQFoO2v4TXyS/ssjEP93ToAk+8gnwZKSZkDdFwNa8uhbMu3ztNLtzMR tBLRPes7DglCx7eFoiM0JQQVjOiTnX/ZeyMCi0fFZt9fvxUh9/WCk6PYKDqCA8TvVVtE awqggqtvaLAQb4wVVg8fUCcTa/wX4MsWxLwyW4XPcCHdD/gM6zz2+F9X92X6AHgqPJtZ HQa8uW4e1CWC4pMmlh1n3l9Iyt9OdglPY9fCwLOGCBEmsrYd4+rGy1u2VVZLh1Z+PaK1 yQc+C42skNKbdjDDpW+2/oNpYVkB7I6Ed/5lLN2hAtVunxmVQqOfN7nnSfXT2jfLW95Q yxnQ== X-Gm-Message-State: AOAM533f7t+l9owFMfuZqVjCIx+dwlxjK3maavoqHSJwAUkYYh+KGTsR 04xphT6K1GkfVogHC9ihAGMIN+UOkl2q9ulfoqg= X-Received: by 2002:a5d:4a4f:: with SMTP id v15mr991000wrs.87.1592426748679; Wed, 17 Jun 2020 13:45:48 -0700 (PDT) Received: from ?IPv6:2a01:e0a:3cb:7bb0:85f0:4cd7:3460:1772? ([2a01:e0a:3cb:7bb0:85f0:4cd7:3460:1772]) by smtp.gmail.com with ESMTPSA id l1sm796154wrb.31.2020.06.17.13.45.47 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 17 Jun 2020 13:45:47 -0700 (PDT) Subject: Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry To: Maxim Uvarov Cc: Sumit Garg , Greg Kroah-Hartman , Linux Kernel Mailing List , Jarkko Sakkinen , Arnd Bergmann , "tee-dev @ lists . linaro . org" , Jason Gunthorpe , linux-integrity@vger.kernel.org, peterhuewe@gmx.de References: <20200604175851.758-1-maxim.uvarov@linaro.org> <20200604175851.758-2-maxim.uvarov@linaro.org> From: Jerome Forissier Message-ID: Date: Wed, 17 Jun 2020 22:45:46 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/17/20 9:52 PM, Maxim Uvarov wrote: > On Wed, 17 Jun 2020 at 18:16, Jerome Forissier wrote: >> >> On 6/17/20 3:58 PM, Sumit Garg wrote: >>> Hi Maxim, >>> >>> On Thu, 4 Jun 2020 at 23:28, Maxim Uvarov wrote: >>>> >>>> With the evolving use-cases for TEE bus, now it's required to support >>>> multi-stage enumeration process. But using a simple index doesn't >>>> suffice this requirement and instead leads to duplicate sysfs entries. >>>> So instead switch to use more informative device UUID for sysfs entry >>>> like: >>>> /sys/bus/tee/devices/optee-ta- >>>> >>>> Signed-off-by: Maxim Uvarov >>>> Reviewed-by: Sumit Garg >>>> --- >>>> Documentation/ABI/testing/sysfs-bus-optee-devices | 8 ++++++++ >>>> MAINTAINERS | 1 + >>>> drivers/tee/optee/device.c | 9 ++++++--- >>>> 3 files changed, 15 insertions(+), 3 deletions(-) >>>> create mode 100644 Documentation/ABI/testing/sysfs-bus-optee-devices >>>> >>>> diff --git a/Documentation/ABI/testing/sysfs-bus-optee-devices b/Documentation/ABI/testing/sysfs-bus-optee-devices >>>> new file mode 100644 >>>> index 000000000000..0ae04ae5374a >>>> --- /dev/null >>>> +++ b/Documentation/ABI/testing/sysfs-bus-optee-devices >>>> @@ -0,0 +1,8 @@ >>>> +What: /sys/bus/tee/devices/optee-ta-/ >>>> +Date: May 2020 >>>> +KernelVersion 5.7 >>>> +Contact: tee-dev@lists.linaro.org >>>> +Description: >>>> + OP-TEE bus provides reference to registered drivers under this directory. The >>>> + matches Trusted Application (TA) driver and corresponding TA in secure OS. Drivers >>>> + are free to create needed API under optee-ta- directory. >>>> diff --git a/MAINTAINERS b/MAINTAINERS >>>> index ecc0749810b0..6717afef2de3 100644 >>>> --- a/MAINTAINERS >>>> +++ b/MAINTAINERS >>>> @@ -12516,6 +12516,7 @@ OP-TEE DRIVER >>>> M: Jens Wiklander >>>> L: tee-dev@lists.linaro.org >>>> S: Maintained >>>> +F: Documentation/ABI/testing/sysfs-bus-optee-devices >>>> F: drivers/tee/optee/ >>>> >>>> OP-TEE RANDOM NUMBER GENERATOR (RNG) DRIVER >>>> diff --git a/drivers/tee/optee/device.c b/drivers/tee/optee/device.c >>>> index e3a148521ec1..23d264c8146e 100644 >>>> --- a/drivers/tee/optee/device.c >>>> +++ b/drivers/tee/optee/device.c >>>> @@ -65,7 +65,7 @@ static int get_devices(struct tee_context *ctx, u32 session, >>>> return 0; >>>> } >>>> >>>> -static int optee_register_device(const uuid_t *device_uuid, u32 device_id) >>>> +static int optee_register_device(const uuid_t *device_uuid) >>>> { >>>> struct tee_client_device *optee_device = NULL; >>>> int rc; >>>> @@ -75,7 +75,10 @@ static int optee_register_device(const uuid_t *device_uuid, u32 device_id) >>>> return -ENOMEM; >>>> >>>> optee_device->dev.bus = &tee_bus_type; >>>> - dev_set_name(&optee_device->dev, "optee-clnt%u", device_id); >>>> + if (dev_set_name(&optee_device->dev, "optee-ta-%pUl", device_uuid)) { >>> >>> You should be using format specifier as: "%pUb" instead of "%pUl" as >>> UUID representation for TAs is in big endian format. See below: >> >> Where does device_uuid come from? If it comes directly from OP-TEE, then >> it should be a pointer to the following struct: >> >> typedef struct >> { >> uint32_t timeLow; >> uint16_t timeMid; >> uint16_t timeHiAndVersion; >> uint8_t clockSeqAndNode[8]; >> } TEE_UUID; >> >> (GlobalPlatform TEE Internal Core API spec v1.2.1 section 3.2.4) >> >> - The spec does not mandate any particular endianness and simply warns >> about possible issues if secure and non-secure worlds differ in endianness. >> - OP-TEE uses %pUl assuming that host order is little endian (that is >> true for the Arm platforms that run OP-TEE currently). By the same logic >> %pUl should be fine in the kernel. >> - On the other hand, the UUID in a Trusted App header is always encoded >> big endian by the Python script that signs and optionally encrypts the >> TA. This should not have any visible impact on UUIDs exchanged between >> the secure and non-secure world though. >> >> So I am wondering why you had to use %pUb. There must be some >> inconsistency somewhere :-/ >> >> -- >> Jerome > > From linux side it is for example: > > static const struct tee_client_device_id optee_ftpm_id_table[] = { > {UUID_INIT(0xbc50d971, 0xd4c9, 0x42c4, > 0x82, 0xcb, 0x34, 0x3f, 0xb7, 0xf3, 0x78, 0x96)}, > {} > }; > > static struct tee_client_driver ftpm_tee_driver = { > .id_table = optee_ftpm_id_table, > .driver = { > > So sysfs name has to be the same as the driver has. And UUD is simple > 16 bytes:#define UUID_SIZE 16 > typedef struct { > __u8 b[UUID_SIZE]; > } uuid_t; > > From TA it also: > #define TA_UUID { 0xBC50D971, 0xD4C9, 0x42C4, \ > {0x82, 0xCB, 0x34, 0x3F, 0xB7, 0xF3, 0x78, 0x96}} > > Compare uuid from optee and kernel driver version is simple: > static inline bool uuid_equal(const uuid_t *u1, const uuid_t *u2) > { > return memcmp(u1, u2, sizeof(uuid_t)) == 0; > } > > So to support better code navigation. For example grep sources for > 0xBC50D971, or find in sysfs "*bc50d971-*" I would say we need to use > BE format. > optee might also need to switch to BE prints for the same reason. Sorry but this does not make much sense to me :-/ All I want to say is, if you ever need to use %pUb for things to work as expected then it is *very* suspect and you should try to understand why, because as I said and as far as I can tell OP-TEE stores all it's UUIDs in memory in little endian format (more precisely, host endian with all platforms being little endian currently), and %pUb is not even implemented in OP-TEE. -- Jerome