Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2462445pxj; Sun, 13 Jun 2021 22:02:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyYsMnEVK28ut1CfLg5aSMoOVhX1TnNvmmoJaijaht1dUmWGuhVlOyIX1HGv7tBU/OOJthV X-Received: by 2002:aa7:d452:: with SMTP id q18mr5685947edr.106.1623646968256; Sun, 13 Jun 2021 22:02:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623646968; cv=none; d=google.com; s=arc-20160816; b=AljJZCExne9/RKVZ9sIn4wxmb3DGie2AJ/ltKdtOJ7vzpg7ahBcgIJEwuXYWVTHX5B VOsNuTz7dLTLCFhKWkdCIRvLNbL8sI9YnWfgkPJWJzEc7nFwGTjEU+SRlU7RCM9POcks ZLnEuH4OI38j0G+V0lJUXS4TwCaYmgPWVbli5gzLqbKVaiQoY9VL35Sw7bdnWBzc/ohg MJpy57zCCmCswam1JCxjitotQHu11dUk9sCUeHwVL42RwS9BZAwz3U57DIzQAGmGN7Av VgNCxWmA/XfI2WtzFGAWhRWffmFnAfwiIQqtzqnQGZ7uW4gMCrpgtIt2yA66vAHscTvW yTeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Ae2sGmnqiafGpuWnShlikcWXJP2A5utePL11oAYx5aI=; b=Yh8SgGlvUGRMqNBc2ceUD87eZBYqPRScnxKiutm4ZO+NMhXapl7oPj8M56eWIj6eUk K90YJ8OYPMeOMUCbFseAPpLgMrR3sZmGdYZsvoZYNuBtecJSENEEcPuqfY+z6iJ/+NPn fw8VuS1PLCBBBM0owKUJ+psSC2zoWp+mWMBqNX6KvarFecZ7MT3Tw/aIGCZWId7orB/D kJfOoxH9vfkhdHid/iuJ8fgnoLFzeBKTvTP4oTd/EkbIETKCPxIfFqmvJcCF53TmiCEp XdTiJTLLzYRe+7mNJV8Tfdz/GriRIlBiKelJS3IXgilnLOm1L8dO7FUhSFMy004S/fiG VTiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=NAAP+EWN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u21si10286648edo.304.2021.06.13.22.02.09; Sun, 13 Jun 2021 22:02:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=NAAP+EWN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231845AbhFNFBj (ORCPT + 99 others); Mon, 14 Jun 2021 01:01:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44222 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229596AbhFNFBh (ORCPT ); Mon, 14 Jun 2021 01:01:37 -0400 Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2714DC061756 for ; Sun, 13 Jun 2021 21:59:20 -0700 (PDT) Received: by mail-lj1-x22e.google.com with SMTP id c11so18349591ljd.6 for ; Sun, 13 Jun 2021 21:59:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Ae2sGmnqiafGpuWnShlikcWXJP2A5utePL11oAYx5aI=; b=NAAP+EWNZ66EIB+mX5KsbpBAMu2kqperPWf9E6Pq+VdW/tf9gAc3E88xMeorgNZXy6 UzSrIXt+BFk1cWNH8wZGx1N6sfHchs1kS5OoI+5k0h/LLS2r8JTfBs/nnyPkh/CV0oC1 LNKzbum+VoFubXzWQO5cAW6/uxIJUge1sYSGwqpmgvfDgkrUVTdoaS4HbM5TCO7RmKEL HsvqlMcgzXqDPdXkOfAeB7i7jKXuXyTL7Y1rqUuuidC86JEsZCcKsr9I3sBb7JqnF/V/ jOMFafSmqsKoYHHk91gYRMkkLESXpMphDm3FJu6CPdPB/Yhw3m+RbBPzF2ccwHRvTa4Y dMZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Ae2sGmnqiafGpuWnShlikcWXJP2A5utePL11oAYx5aI=; b=S9X5muo457Voyy05sUqRyOyevyn1acwftj18JwW5oPXmdRKs40F8RpPbjq337qRlEE PN0b18zhFZrUF4nfZ8eGE43HK8ig7DWutcLqknnDLG2sSnoPItsMAmVgZ5QCbw08Gl/H ovgS1BZQcymSeDNVl8GIhwesovKWQ03+oRu8npyqUk/dn6UhHhUaT5Tg1RXGe25VNTEB PllZmMnUjOfkbAwdk0R/5lVLkz8hQG9uwu3znylCpI4FUs1cSJAmUIvQtlg1epJYtN5w O/ovVIAMtZwPhQwhTTC4uNeXEqSshD5vNhoJUsBOjTur2GA8j+5sWsLuUcU0BavUhAQd KNFg== X-Gm-Message-State: AOAM532+NmukuIXtMNl1FKnc8WHRhokTiBtteTigMM38lIep9E4Q7KPN E2fBM8SiLpf/WXE2LW31n1UHfr9wlPW1UWJALJGCzA== X-Received: by 2002:a2e:a16e:: with SMTP id u14mr11905659ljl.343.1623646758112; Sun, 13 Jun 2021 21:59:18 -0700 (PDT) MIME-Version: 1.0 References: <20210610210913.536081-1-tyhicks@linux.microsoft.com> <20210610210913.536081-7-tyhicks@linux.microsoft.com> <20210611130958.GR4910@sequoia> <20210611131619.GS4910@sequoia> <20210613081607.GT4910@sequoia> In-Reply-To: <20210613081607.GT4910@sequoia> From: Sumit Garg Date: Mon, 14 Jun 2021 10:29:05 +0530 Message-ID: Subject: Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing To: Tyler Hicks Cc: Jens Wiklander , Allen Pais , Peter Huewe , Jarkko Sakkinen , Jason Gunthorpe , Vikas Gupta , Thirupathaiah Annapureddy , Pavel Tatashin , =?UTF-8?B?UmFmYcWCIE1pxYJlY2tp?= , op-tee@lists.trustedfirmware.org, linux-integrity , bcm-kernel-feedback-list@broadcom.com, linux-mips@vger.kernel.org, Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 13 Jun 2021 at 13:46, Tyler Hicks wrote: > > On 2021-06-12 13:49:38, Sumit Garg wrote: > > On Fri, 11 Jun 2021 at 18:46, Tyler Hicks wrote: > > > > > > On 2021-06-11 08:10:01, Tyler Hicks wrote: > > > > On 2021-06-11 10:46:20, Sumit Garg wrote: > > > > > On Fri, 11 Jun 2021 at 02:39, Tyler Hicks wrote: > > > > > > > > > > > > Uncouple the registration of kernel shared memory buffers from the > > > > > > TEE_SHM_DMA_BUF flag. Drivers may wish to allocate multi-page contiguous > > > > > > shared memory regions but do not need them to be backed by a dma-buf > > > > > > when the memory region is only used by the driver. > > > > > > > > > > > > If the TEE implementation does not require shared memory to be > > > > > > registered, clear the flag prior to calling the corresponding pool alloc > > > > > > function. Update the OP-TEE driver to respect TEE_SHM_REGISTER, rather > > > > > > than TEE_SHM_DMA_BUF, when deciding whether to (un)register on > > > > > > alloc/free operations. > > > > > > > > > > > The AMD-TEE driver continues to ignore the > > > > > > TEE_SHM_REGISTER flag. > > > > > > > > > > > > > > > > That's the main point that no other TEE implementation would honour > > > > > TEE_SHM_REGISTER and I think it's just the incorrect usage of > > > > > TEE_SHM_REGISTER flag to suffice OP-TEE underlying implementation. > > > > > > > > > > > Allow callers of tee_shm_alloc_kernel_buf() to allocate and register a > > > > > > shared memory region without the backing of dma-buf. > > > > > > > > > > > > Signed-off-by: Tyler Hicks > > > > > > --- > > > > > > drivers/tee/optee/shm_pool.c | 5 ++--- > > > > > > drivers/tee/tee_shm.c | 13 +++++++++++-- > > > > > > 2 files changed, 13 insertions(+), 5 deletions(-) > > > > > > > > > > > > > > > > This patch is just mixing two separate approaches to TEE shared > > > > > memory. Have a look at alternative suggestions below. > > > > > > > > > > > diff --git a/drivers/tee/optee/shm_pool.c b/drivers/tee/optee/shm_pool.c > > > > > > index da06ce9b9313..6054343a29fb 100644 > > > > > > --- a/drivers/tee/optee/shm_pool.c > > > > > > +++ b/drivers/tee/optee/shm_pool.c > > > > > > @@ -27,7 +27,7 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm, > > > > > > shm->paddr = page_to_phys(page); > > > > > > shm->size = PAGE_SIZE << order; > > > > > > > > > > > > - if (shm->flags & TEE_SHM_DMA_BUF) { > > > > > > + if (shm->flags & TEE_SHM_REGISTER) { > > > > > > > > > > Here you can just do following check instead: > > > > > > > > > > if (!(shm->flags & TEE_SHM_PRIV)) { > > > > > > > > This is a bug fix series that's intended to fix the current and older > > > > kernels. tee_shm_alloc_anon_kernel_buf()/TEE_SHM_PRIV is not present in > > > > older kernels and isn't required to fix these kexec/kdump bugs. Your > > > > suggestion feels like something that should be done in the allocator > > > > rewrite that Jens is working on to clean all of this up going forward. > > > > > > I want to add that I do fully agree with you that TEE_SHM_REGISTER is an > > > OP-TEE thing and not a TEE thing. Ideally, it wouldn't be defined in > > > tee_drv.h and would be completely private to the OP-TEE driver. > > > Likewise, I don't think that tee_shm_register() should exist (certainly > > > not at the TEE level) because it only works with OP-TEE. > > > > I think there is some confusion going on. tee_shm_register() is a > > standard interface that is listed in TEE client API specification as > > an alternative approach to tee_shm_alloc(). As I earlier mentioned, > > please read through "3.2.4. Shared Memory" in TEE Client API > > Specification. > > Thanks for the reminder to go read this spec. I had forgotten to read it > after you previously mentioned it. > > Yes, there was confusion on my part due to reading the code but not > discovering/reading the spec prior to now. > > > In the initial times, OP-TEE only supported tee_shm_alloc() approach > > but with the addition of dynamic shared memory feature it became > > possible to support tee_shm_register() as well but we had to add new > > capability as TEE_GEN_CAP_REG_MEM in order to maintain OP-TEE > > backwards compatibility. It can very well be the same case for AMD-TEE > > which currently only supports tee_shm_alloc() approach. > > > > The reason for confusion here seems to be that OP-TEE driver is > > providing a way to leverage dynamic shared memory approach in order to > > implement tee_shm_alloc() but that doesn't mean at TEE level we should > > intermix both approaches via using TEE_SHM_REGISTER to implement > > tee_shm_alloc(). > > I think that was the reason for my confusion. I didn't understand why > AMD-TEE didn't have the same need to register memory. > > > > > > > > > That said, I think the first step is to fix the kexec/kdump bugs and the > > > second step is to clean up the code to remove the layering violation of > > > exposing shm registration from the TEE interfaces. > > > > > > > Doesn't the following patch sound suitable to be backported to a > > stable kernel? It has even less changes compared to your patch as well > > :). > > > > -Sumit > > > > ------------------------------------------- > > Subject: [PATCH] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag > > > > Currently TEE_SHM_DMA_BUF flag has been inappropriately used to not > > I think the "not" at the end of this line should be removed, right? > No, actually shared memory allocated for OP-TEE driver internal usage didn't enable this flag while in all other invocations TEE_SHM_DMA_BUF is enabled as the driver's private shared memory isn't required to be registered with OP-TEE. > > register shared memory allocated for private usage by underlying TEE > > driver: OP-TEE in this case. So rather add a new flag as TEE_SHM_PRIV > > that can be utilized by underlying TEE drivers for private allocation > > and usage of shared memory. > > > > With this corrected, allow tee_shm_alloc_kernel_buf() to allocate a > > shared memory region without the backing of dma-buf. > > I noticed a couple things wrong with this patch during testing. > Yeah you are right. Apologies for my oversight as this patch was compile tested only. > The first is obviously an oversight. tee_shm_alloc() needs to be updated > to accept the TEE_SHM_PRIV or it'll throw an "invalid shm flags ..." > error. > Agree. > The second issue is a little more unclear. I am testing these patches > along with a debugging patch that prints a bit of info when > optee_shm_register() or optee_shm_unregister() is called so that I can > track the (un)registrations. I built a kernel with my v4 series but with > this patch in place of my 'tee: Support kernel shm registration without > dma-buf backing' patch. I performed 10x kexec operations and then let > the system set idle for a while. After a while of sitting idle, I > noticed a couple calls to optee_shm_register() that I hadn't seen before > (and haven't seen again). It made me worried that your patch could > result in us registering shared memory that we previously weren't > registering so I decided to try to perform another kexec operation to > ensure that the two shms were properly unregistered. At this point, the > system became unresponsive and I wasn't able to get a stack trace or any > more useful information about what happened. > > Unfortunately, my debugging patch was only printing the shm's virtual > address and the shm's size. The shm's size was 4096 bytes. > > My current thought is that the two new/unexpected calls to > optee_shm_register() were triggered by one of the tee_shm_alloc()'s in > drivers/tee/optee/rpc.c. Neither of those shm allocations would have > been registered before your change but they both would be after your > change. I think the easy fix is to use the TEE_SHM_PRIV flag for both of > the allocations in rpc.c. Do you agree? If so, I'll make these changes > and fold this patch into my series and send out a v5. Yeah I agree, please use TEE_SHM_PRIV for private shm allocations in drivers/tee/optee/rpc.c as well. > > I still can't explain why the system became unresponsive after the two > registrations... Probably the two registrations created a cyclic loop and cores got hung in there. -Sumit > > > > > Signed-off-by: Sumit Garg > > --- > > drivers/tee/optee/call.c | 2 +- > > drivers/tee/optee/core.c | 3 ++- > > drivers/tee/optee/shm_pool.c | 8 ++++++-- > > drivers/tee/tee_shm.c | 2 +- > > include/linux/tee_drv.h | 1 + > > 5 files changed, 11 insertions(+), 5 deletions(-) > > > > diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c > > index 6132cc8d014c..faaa13c9172b 100644 > > --- a/drivers/tee/optee/call.c > > +++ b/drivers/tee/optee/call.c > > @@ -184,7 +184,7 @@ static struct tee_shm *get_msg_arg(struct > > tee_context *ctx, size_t num_params, > > struct optee_msg_arg *ma; > > > > shm = tee_shm_alloc(ctx, OPTEE_MSG_GET_ARG_SIZE(num_params), > > - TEE_SHM_MAPPED); > > + TEE_SHM_MAPPED | TEE_SHM_PRIV); > > if (IS_ERR(shm)) > > return shm; > > > > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > > index ddb8f9ecf307..eac0e91ec559 100644 > > --- a/drivers/tee/optee/core.c > > +++ b/drivers/tee/optee/core.c > > @@ -277,7 +277,8 @@ static void optee_release(struct tee_context *ctx) > > if (!ctxdata) > > return; > > > > - shm = tee_shm_alloc(ctx, sizeof(struct optee_msg_arg), TEE_SHM_MAPPED); > > + shm = tee_shm_alloc(ctx, sizeof(struct optee_msg_arg), > > + TEE_SHM_MAPPED | TEE_SHM_PRIV); > > if (!IS_ERR(shm)) { > > arg = tee_shm_get_va(shm, 0); > > /* > > diff --git a/drivers/tee/optee/shm_pool.c b/drivers/tee/optee/shm_pool.c > > index d767eebf30bd..3b4a3853a10f 100644 > > --- a/drivers/tee/optee/shm_pool.c > > +++ b/drivers/tee/optee/shm_pool.c > > @@ -27,7 +27,11 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm, > > shm->paddr = page_to_phys(page); > > shm->size = PAGE_SIZE << order; > > > > - if (shm->flags & TEE_SHM_DMA_BUF) { > > + /* > > + * Shared memory private to the OP-TEE driver doesn't need > > + * to be registered with OP-TEE. > > + */ > > + if (!(shm->flags & TEE_SHM_PRIV)) { > > unsigned int nr_pages = 1 << order, i; > > struct page **pages; > > > > @@ -52,7 +56,7 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm, > > static void pool_op_free(struct tee_shm_pool_mgr *poolm, > > struct tee_shm *shm) > > { > > - if (shm->flags & TEE_SHM_DMA_BUF) > > + if (!(shm->flags & TEE_SHM_PRIV)) > > optee_shm_unregister(shm->ctx, shm); > > > > free_pages((unsigned long)shm->kaddr, get_order(shm->size)); > > diff --git a/drivers/tee/tee_shm.c b/drivers/tee/tee_shm.c > > index c425ad80d6a6..f8b73e734094 100644 > > --- a/drivers/tee/tee_shm.c > > +++ b/drivers/tee/tee_shm.c > > @@ -207,7 +207,7 @@ EXPORT_SYMBOL_GPL(tee_shm_alloc); > > */ > > struct tee_shm *tee_shm_alloc_kernel_buf(struct tee_context *ctx, size_t size) > > { > > - return tee_shm_alloc(ctx, size, TEE_SHM_MAPPED | TEE_SHM_DMA_BUF); > > + return tee_shm_alloc(ctx, size, TEE_SHM_MAPPED); > > } > > EXPORT_SYMBOL_GPL(tee_shm_alloc_kernel_buf); > > This was a malformed patch due to this hunk. I think an empty line was > left out of the context. > > Tyler > > > diff --git a/include/linux/tee_drv.h b/include/linux/tee_drv.h > > index 8990f7628387..3ebfea0781f1 100644 > > --- a/include/linux/tee_drv.h > > +++ b/include/linux/tee_drv.h > > @@ -27,6 +27,7 @@ > > #define TEE_SHM_USER_MAPPED BIT(4) /* Memory mapped in user space */ > > #define TEE_SHM_POOL BIT(5) /* Memory allocated from pool */ > > #define TEE_SHM_KERNEL_MAPPED BIT(6) /* Memory mapped in kernel space */ > > +#define TEE_SHM_PRIV BIT(7) /* Memory private to TEE driver */ > > > > struct device; > > struct tee_device; > >