Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4334919pxv; Tue, 20 Jul 2021 00:54:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwd/ivg0vHKcWCgt06K2NaFLrbgjp1LhYaaflaMCgE/xiewxJbABLSXPQzPJxcmM8fnVwU5 X-Received: by 2002:a17:907:2717:: with SMTP id w23mr17543927ejk.377.1626767681920; Tue, 20 Jul 2021 00:54:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626767681; cv=none; d=google.com; s=arc-20160816; b=BOnr83PvuNdp5iF/5Ti8mQZDcd7lLfeyYRC4J52w1KVZHS9bRwGaL9RJiK/fUsGr8o ODkyZoG+QOJHKo2ZWSoc9SCbST5zoI7ToDR1Zs0lMlLLYj4/QeBQbmKBmrzvaJcmXTxE s191Vl2gwVUAKE/UQp2H8KHnE5dVOOsFshQgm/8u2pQYPn1U1uvNQKqI2X++4w5SgUD5 cwfv70HvnFNu0htFMtBZTH6Wj8gsW2b7DiCG42hoEs0zxzCLt9SsMt6y1o0i4ni148Cb NOUzrbGuVW8pFzfaC0IF1ZUNojBo7rHqFI0c/H8GLXIvl5T2EvVopJzLyPxSRc0SbXkL QazQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=WDeMbf9AtekxvEW2mrUMMNPORQLaW5+2eatfzEfu6kc=; b=njRl4bBfdmSAHH9GhIQUpr075X/jLEK2mC8fAnQ8bQfPjHCJ7S9/NMi4GLzQ9+j//Q cwSCSPBlhE5nOz8Qt84alxxOijiZxYPe3bWIwn1oTdo7eM9uXdIiyuOF7OnnCvCdQyOZ cQ+sXOa4nqQgrOpYGwv28Y3Qomi0HSK3APPZOSbgYqE59qMMsE2ea5ymgbysjNSHaYU/ gRPF9kfhTGrYRVnogVzIkerLW/sx56R4XN8IU5wig4i7/+JonstH7g6y++pLwjF8a5V0 +vfmzXHBTO1bk6L5QFREJzOhgtxpefeapaZs3+Va7UxGcwTFoF5WvThVd0lavZiKq05j C5bA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qa38si19558893ejc.571.2021.07.20.00.54.18; Tue, 20 Jul 2021 00:54:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229922AbhGTHMH (ORCPT + 99 others); Tue, 20 Jul 2021 03:12:07 -0400 Received: from foss.arm.com ([217.140.110.172]:52580 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230387AbhGTHLI (ORCPT ); Tue, 20 Jul 2021 03:11:08 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AEB601FB; Tue, 20 Jul 2021 00:51:39 -0700 (PDT) Received: from bogus (unknown [10.57.79.213]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 48C533F73D; Tue, 20 Jul 2021 00:51:36 -0700 (PDT) Date: Tue, 20 Jul 2021 08:50:36 +0100 From: Sudeep Holla To: Jens Wiklander Cc: Etienne CARRIERE , Sumit Garg , Marc Zyngier , Linux Kernel Mailing List , linux-arm-kernel , OP-TEE TrustedFirmware , "devicetree@vger.kernel.org" , Linux Doc Mailing List , Jerome Forissier , Vincent Guittot , Rob Herring , Jonathan Corbet , Ard Biesheuvel , Etienne Carriere Subject: Re: [PATCH v2 0/7] Asynchronous notifications from secure world Message-ID: <20210720075036.z2a5lcguu3xp3wqi@bogus> References: <20210713111143.g6ztdakegs6ck25s@bogus> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 20, 2021 at 08:45:59AM +0200, Jens Wiklander wrote: > On Tue, Jul 13, 2021 at 1:12 PM Sudeep Holla wrote: > > > > On Fri, Jul 09, 2021 at 08:05:57AM +0000, Etienne CARRIERE wrote: > > > Hello Sudeep and all, > > > > > > On Wed, 7 Jul 2021 at 19:52, Sudeep Holla wrote: > > > > > > > > Hi Sumit, > > > > > > > > I was holding off you reply as I didn't have all the background on this. > > > > Achin did mention that this is preparatory work for FFA notifications. > > > > I did mention to him that this is more than that, it is custom extension > > > > to address what FF-A notification is trying to in standard way. > > Are you suggesting that we should use a hybrid implementation with > FF-A for notifications and keep the rest as is for armv7-a? > No I was just mentioning that this patch series addresses notifications from secure world(optee in this case) which is very similar to what FF-A is trying to address too. Anyways, you brought up interesting idea of hybrid model, it would be good if that is possible and the specification allows for that. I don't think it does in the current form, may need some amendments to allow that I think. > > > > > > > > I share same opinion as Marc Z. > > From what I've read in this thread this has mainly been about using > SGI notification and not whether asynchronous notification from OP-TEE > on non-FF-A systems is good or bad. I assume Sumit was asking about > SGI to find out why that wasn't used. This patch set uses SPI. > I understand. I was trying(ineffectively) to tell why it is not so trivial to use SGI and how FF-A is enabling that. On SPI, so it is expected that platform has SPI available for this ? > > > > > > > > On Wed, Jul 07, 2021 at 11:22:23AM +0530, Sumit Garg wrote: > > > > > On Tue, 6 Jul 2021 at 18:16, Marc Zyngier wrote: > > > > > > > > [...] > > > > > > > > > > > > > > > > I don't care about OP-TEE. If you are proposing a contract between S > > > > > > and NS, it has to be TEE and OS independent. That's how the > > > > > > architecture works. > > > > > > > > > > > > > > > > Agree, here we are not proposing a common contract among the S and NS > > > > > world that every TEE (based on Arm TrustZone) will use to communicate > > > > > with REE (Linux in our case) but rather an OP-TEE specific > > > > > notifications feature that is built on top of OP-TEE specific ABIs. > > > > > > > > > > And I can see your arguments coming from an FFA perspective but there > > > > > are platforms like the ones based on Armv7 which don't support FFA > > > > > ABI. Maybe Jens can elaborate how this feature will fit in when FFA > > > > > comes into picture? > > > > > > > > > > > > > I can understand that but won't those platforms add the support both in > > > > the kernel(current series) and secure world to address notifications. > > > > While you could argue that it is small extension to what is already present > > > > but I prefer they support FF-A is they need such a support instead of adding > > > > custom mechanisms. It is hard to maintain and each vendor will deviate > > > > from this custom mechanism and soon we will have bunch of them to handle. > > Regarding deviation, are we still talking about the OP-TEE driver? So > far I haven't seen any vendor extensions at all in that driver. > Yes, I was referring to addition of notification support in both worlds. I was trying to emphasize that both OPTEE and FF-A needs changes in the secure world. OPTEE changes could be small compared to starting with FF-A but it may result in deviation in notification hadling(in both worlds). > > > > > > There exist armv7-a platforms that expect OP-TEE notification support and > > > will not move the FF-A, like the stm32mp15. This platform won't move to FF-A > > > mainly due to the memory cost of the added SPM layer and the device physical > > > constraints. > > > > Fair enough on the use-case and the analysis for not being able to use FF-A. > > As you may already know it doesn't simply this problem. This has been > > discussed for years and FF-A was assumed to be the solution when FF-A > > spec work started. > > > > > We have a usecase for OP-TEE notification. We're working on the integration > > > of an SCMI server in OP-TEE. SCMI notification is a feature needed is this > > > scope and it requires OP-TEE async notification means as those proposed > > > here. > > > > > > > I am aware of this use-case, I understand. But I can only share rants > > which I know doesn't help much. > > > > > This OP-TEE async notif also brings a lot of value in OP-TEE as it allows a > > > OP-TEE secure thread (i.e. executing a trusted application service) to > > > gently wait on a secure interrupt (as a slow bus transaction completion or > > > many other usecase) with the CPU relaxed. This support is provided by the > > > proposed series. I believe existing device should be able to leverage this > > > OP-TEE feature without needing their OP-TEE to move to the new FF-A > > > interface. > > > > > > > While I agree these are nice to have in OPTEE, the timing is just odd. > > > > We are trying hard to push FF-A as standard solution to address all such > > issues that couldn't be solved with OPTEE + DT, now we are back to address > > the same in parallel to FF-A. > > It's not exactly the same since the primary target here is armv7-a > where introducing FF-A isn't an obvious choice in all cases. For > OP-TEE armv7-a is special in the way that all secure world processing > is handled by OP-TEE. The internal secure monitor already takes care > of what's implemented in TF-A at EL3 for armv8-a. > Fair enough. > This isn't meant to compete with FF-A, it's to make sure that the > OP-TEE armv7-a user base isn't left behind. This doesn't rule out FF-A > support for armv7-a for those prepared to take that step. > Sure, as long as that is conveyed to the adopters of this, it should be fine. Do you have plans to disable this feature for armv8-a ? I see that as safe approach to avoid any kind of conflicts. I just don't want similar arguments used as excuse on armv8-a. -- Regards, Sudeep