Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1386081pxb; Fri, 21 Jan 2022 17:15:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJwHC+VapsoG2tV7dwC9rxJb2EqhQSPLvnnpDEmyFdYy/EnOnAOItiI2wCkHQbtKUJOm4CGD X-Received: by 2002:a17:902:aa8f:b0:149:7898:af96 with SMTP id d15-20020a170902aa8f00b001497898af96mr5887140plr.161.1642814104514; Fri, 21 Jan 2022 17:15:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642814104; cv=none; d=google.com; s=arc-20160816; b=cRwrs1kzxhvPyq0ZdsWGs2sRHcWMT41UtCZZ3La/118ejOsQyP4NPferUZAgEca8uW Hdf+U3CAZOFGdCEqq5l2nP9csmF0toVBp29BQqdttwgaBs3h+InmCsq7aW9/kydAKPYs 7FQyP1Un2qc3x9BAoCGLbvbxvfOE7vBoS8Ct37GmVMnVwPcWFFXuR9NwItyn1dyJQhib BV30bwekLj6hM8CkF7urgrrGuySiiKs0cxoaSekBd+hSmxKZGiSSq326TYJpWx7Xs+1m 8V3LLcR1QLpaxCb///zYq7HQq/eh8u9bxiLrVGJQU8K05539CiIt0Nnvzw9DzjEx2M7P /hYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=gMI6tFAhrWQ/QTXAF2pjU0s+5/Wmir25gNKAr0dT2Lw=; b=fAAY8MDFZ5WbV/18ZfwJVZGvOYRynrcwXWEermEHqeCNDhAM3BioFCWkaSClc/65Yg cBGVGwelrt/lKGZX52sXDnE1/40WbfS3MOe2T0Bd/cWD1rySb+QeggCI/k7euzdw8YlB 71ttgOdlY/83rZDfUXN3bie7mxRv0EHLXH3YNE5P08825Qo+ZaGw4Z+g8Uyd7lT3TpWv 3MUL2UXRSZCb6gmWsXYtpM6V7I5ialnRS2HkYKxfZitK7HzrKlrV1AsNOtCK5jXctOAa FwaawnFRuHoYr4wUT03lrPUiDD31fC8ZKM6fWKQ9vu06FcK7QTjitC0ik3GkMwXhM3db RfRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=rkcrAoru; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j18si7822885pfu.12.2022.01.21.17.14.52; Fri, 21 Jan 2022 17:15:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=rkcrAoru; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1380472AbiAUMs2 (ORCPT + 99 others); Fri, 21 Jan 2022 07:48:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49398 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1380466AbiAUMs0 (ORCPT ); Fri, 21 Jan 2022 07:48:26 -0500 Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DEC2BC061574 for ; Fri, 21 Jan 2022 04:48:25 -0800 (PST) Received: by mail-lj1-x231.google.com with SMTP id z14so4022ljc.13 for ; Fri, 21 Jan 2022 04:48:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=gMI6tFAhrWQ/QTXAF2pjU0s+5/Wmir25gNKAr0dT2Lw=; b=rkcrAoruNuj1tGX1u0hXxm+wZvxFunNCOgSTZ12PmRt2Rfic9aB4RWcxgz96YzMytu 8WZuq1NYMfpLLfZSKlJH6oF3NCdqzRXaVHu4l846jZp/eSKSF0dKiuLYaUVk6HFEnCiM lRqsDtJae5TJT93YqXdLFApkOtgRPWNXju0xeKs/8YizX34AZfGTQP2UaBv54QCi3TfZ +YL+/dV1UpPk5pj5FNBlF+ZI2ZL0sT/V6Cgcg4/9xksDx13H+modB1Q4l7N5a2ZPgZ3x LT2fTsljhOzJKJslweXvQ2OQcYPacpFSrBtxuJXXTsZeQQEs3CwAfROAr6e9TZaCM3JQ mAJw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=gMI6tFAhrWQ/QTXAF2pjU0s+5/Wmir25gNKAr0dT2Lw=; b=GPWf5Uiq7L/FvbrjFqSS2G5J8VztPpaiJzxgJsPl88OJdW4Vdl8BtO32mfaT2xfvBj tjbH42svu6FbUXIcGtbyPrXruUBDEi/BRhVi2PEuIKsmcZjanfAacKn4sCXCIPL7VLpr 6Ajt/OcDbC7Ka7301U6Jf4upzgkPzoX7ZCyb7mjGQa7b/2mufeEXpJir8KX8XRGddVCi 725YhovD1foF60QPwT1ucE8V7mkx3goNfzmfGQ2kwA38wqZXt0DABQv7Y/Smvq7KJgPt hoG8TyUZT0tQ6g2yYklILzoXPyr8P9Q0/5QxKN4gL7OZ0Ga/4OJRYOrJUG3BCOQpM0Wa sk2g== X-Gm-Message-State: AOAM5334QEyG45fydjvHvJMMo9eSvfc2v81zZ+fKru7OSpuJl0WcNHbn Wdh1pgj4ZrSEibkgMqiTpjrBBrMXUhdsHNO0fvlvUQ== X-Received: by 2002:a2e:8797:: with SMTP id n23mr3259107lji.133.1642769304128; Fri, 21 Jan 2022 04:48:24 -0800 (PST) MIME-Version: 1.0 References: <20220114150824.3578829-1-jens.wiklander@linaro.org> <20220114150824.3578829-7-jens.wiklander@linaro.org> In-Reply-To: <20220114150824.3578829-7-jens.wiklander@linaro.org> From: Sumit Garg Date: Fri, 21 Jan 2022 18:18:12 +0530 Message-ID: Subject: Re: [PATCH v2 06/12] optee: add driver private tee_context To: Jens Wiklander Cc: linux-kernel@vger.kernel.org, op-tee@lists.trustedfirmware.org, Herbert Xu , Devaraj Rangasamy , Rijo Thomas , David Howells , Tyler Hicks Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 14 Jan 2022 at 20:38, Jens Wiklander wrote: > > Adds a driver private tee_context by moving the tee_context in struct > optee_notif to struct optee. This tee_context is used when doing > internal calls to secure world to deliver notification and later also > when sharing driver private memory with secure world. > > Signed-off-by: Jens Wiklander > --- > drivers/tee/optee/core.c | 1 + > drivers/tee/optee/ffa_abi.c | 61 ++++++++++++++++++------------- > drivers/tee/optee/optee_private.h | 5 ++- > drivers/tee/optee/smc_abi.c | 40 ++++++-------------- > 4 files changed, 51 insertions(+), 56 deletions(-) > After looking at this patch, it looks like there is a need for some more refactoring to pick out common probe functionality from both ABIs and add optee_probe_common(). If it was there earlier, this patch would mostly be modifying the OP-TEE core file apart from notifications stuff. I would leave it upto you to have a refactoring patch before and then changes in this patch or vice-versa. -Sumit > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > index 2a369e346b85..f4bccb5f0e93 100644 > --- a/drivers/tee/optee/core.c > +++ b/drivers/tee/optee/core.c > @@ -161,6 +161,7 @@ void optee_remove_common(struct optee *optee) > optee_unregister_devices(); > > optee_notif_uninit(optee); > + teedev_close_context(optee->ctx); > /* > * The two devices have to be unregistered before we can free the > * other resources. > diff --git a/drivers/tee/optee/ffa_abi.c b/drivers/tee/optee/ffa_abi.c > index 18963f7e4d48..88a028d4fb7b 100644 > --- a/drivers/tee/optee/ffa_abi.c > +++ b/drivers/tee/optee/ffa_abi.c > @@ -766,7 +766,9 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > { > const struct ffa_dev_ops *ffa_ops; > unsigned int rpc_arg_count; > + struct tee_shm_pool *pool; > struct tee_device *teedev; > + struct tee_context *ctx; > struct optee *optee; > int rc; > > @@ -786,12 +788,12 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > if (!optee) > return -ENOMEM; > > - optee->pool = optee_ffa_shm_pool_alloc_pages(); > - if (IS_ERR(optee->pool)) { > - rc = PTR_ERR(optee->pool); > - optee->pool = NULL; > - goto err; > + pool = optee_ffa_shm_pool_alloc_pages(); > + if (IS_ERR(pool)) { > + rc = PTR_ERR(pool); > + goto err_free_optee; > } > + optee->pool = pool; > > optee->ops = &optee_ffa_ops; > optee->ffa.ffa_dev = ffa_dev; > @@ -802,7 +804,7 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > optee); > if (IS_ERR(teedev)) { > rc = PTR_ERR(teedev); > - goto err; > + goto err_free_pool; > } > optee->teedev = teedev; > > @@ -810,50 +812,57 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > optee); > if (IS_ERR(teedev)) { > rc = PTR_ERR(teedev); > - goto err; > + goto err_unreg_teedev; > } > optee->supp_teedev = teedev; > > rc = tee_device_register(optee->teedev); > if (rc) > - goto err; > + goto err_unreg_supp_teedev; > > rc = tee_device_register(optee->supp_teedev); > if (rc) > - goto err; > + goto err_unreg_supp_teedev; > > rc = rhashtable_init(&optee->ffa.global_ids, &shm_rhash_params); > if (rc) > - goto err; > + goto err_unreg_supp_teedev; > mutex_init(&optee->ffa.mutex); > mutex_init(&optee->call_queue.mutex); > INIT_LIST_HEAD(&optee->call_queue.waiters); > optee_supp_init(&optee->supp); > ffa_dev_set_drvdata(ffa_dev, optee); > + ctx = teedev_open(optee->teedev); > + if (IS_ERR(ctx)) > + goto err_rhashtable_free; > + optee->ctx = ctx; > rc = optee_notif_init(optee, OPTEE_DEFAULT_MAX_NOTIF_VALUE); > - if (rc) { > - optee_ffa_remove(ffa_dev); > - return rc; > - } > + if (rc) > + goto err_close_ctx; > > rc = optee_enumerate_devices(PTA_CMD_GET_DEVICES); > - if (rc) { > - optee_ffa_remove(ffa_dev); > - return rc; > - } > + if (rc) > + goto err_unregister_devices; > > pr_info("initialized driver\n"); > return 0; > -err: > - /* > - * tee_device_unregister() is safe to call even if the > - * devices hasn't been registered with > - * tee_device_register() yet. > - */ > + > +err_unregister_devices: > + optee_unregister_devices(); > + optee_notif_uninit(optee); > +err_close_ctx: > + teedev_close_context(ctx); > +err_rhashtable_free: > + rhashtable_free_and_destroy(&optee->ffa.global_ids, rh_free_fn, NULL); > + optee_supp_uninit(&optee->supp); > + mutex_destroy(&optee->call_queue.mutex); > +err_unreg_supp_teedev: > tee_device_unregister(optee->supp_teedev); > +err_unreg_teedev: > tee_device_unregister(optee->teedev); > - if (optee->pool) > - tee_shm_pool_free(optee->pool); > +err_free_pool: > + tee_shm_pool_free(pool); > +err_free_optee: > kfree(optee); > return rc; > } > diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h > index df2450921464..df3a483bbf46 100644 > --- a/drivers/tee/optee/optee_private.h > +++ b/drivers/tee/optee/optee_private.h > @@ -53,7 +53,6 @@ struct optee_call_queue { > > struct optee_notif { > u_int max_key; > - struct tee_context *ctx; > /* Serializes access to the elements below in this struct */ > spinlock_t lock; > struct list_head db; > @@ -134,9 +133,10 @@ struct optee_ops { > /** > * struct optee - main service struct > * @supp_teedev: supplicant device > + * @teedev: client device > * @ops: internal callbacks for different ways to reach secure > * world > - * @teedev: client device > + * @ctx: driver internal TEE context > * @smc: specific to SMC ABI > * @ffa: specific to FF-A ABI > * @call_queue: queue of threads waiting to call @invoke_fn > @@ -152,6 +152,7 @@ struct optee { > struct tee_device *supp_teedev; > struct tee_device *teedev; > const struct optee_ops *ops; > + struct tee_context *ctx; > union { > struct optee_smc smc; > struct optee_ffa ffa; > diff --git a/drivers/tee/optee/smc_abi.c b/drivers/tee/optee/smc_abi.c > index 196cd4316d7d..1dbb13b08381 100644 > --- a/drivers/tee/optee/smc_abi.c > +++ b/drivers/tee/optee/smc_abi.c > @@ -952,57 +952,34 @@ static irqreturn_t notif_irq_thread_fn(int irq, void *dev_id) > { > struct optee *optee = dev_id; > > - optee_smc_do_bottom_half(optee->notif.ctx); > + optee_smc_do_bottom_half(optee->ctx); > > return IRQ_HANDLED; > } > > static int optee_smc_notif_init_irq(struct optee *optee, u_int irq) > { > - struct tee_context *ctx; > int rc; > > - ctx = teedev_open(optee->teedev); > - if (IS_ERR(ctx)) > - return PTR_ERR(ctx); > - > - optee->notif.ctx = ctx; > rc = request_threaded_irq(irq, notif_irq_handler, > notif_irq_thread_fn, > 0, "optee_notification", optee); > if (rc) > - goto err_close_ctx; > + return rc; > > optee->smc.notif_irq = irq; > > return 0; > - > -err_close_ctx: > - teedev_close_context(optee->notif.ctx); > - optee->notif.ctx = NULL; > - > - return rc; > } > > static void optee_smc_notif_uninit_irq(struct optee *optee) > { > - if (optee->notif.ctx) { > - optee_smc_stop_async_notif(optee->notif.ctx); > + if (optee->smc.sec_caps & OPTEE_SMC_SEC_CAP_ASYNC_NOTIF) { > + optee_smc_stop_async_notif(optee->ctx); > if (optee->smc.notif_irq) { > free_irq(optee->smc.notif_irq, optee); > irq_dispose_mapping(optee->smc.notif_irq); > } > - > - /* > - * The thread normally working with optee->notif.ctx was > - * stopped with free_irq() above. > - * > - * Note we're not using teedev_close_context() or > - * tee_client_close_context() since we have already called > - * tee_device_put() while initializing to avoid a circular > - * reference counting. > - */ > - teedev_close_context(optee->notif.ctx); > } > } > > @@ -1307,6 +1284,7 @@ static int optee_probe(struct platform_device *pdev) > struct optee *optee = NULL; > void *memremaped_shm = NULL; > struct tee_device *teedev; > + struct tee_context *ctx; > u32 max_notif_value; > u32 sec_caps; > int rc; > @@ -1387,9 +1365,13 @@ static int optee_probe(struct platform_device *pdev) > optee->pool = pool; > > platform_set_drvdata(pdev, optee); > + ctx = teedev_open(optee->teedev); > + if (IS_ERR(ctx)) > + goto err_supp_uninit; > + optee->ctx = ctx; > rc = optee_notif_init(optee, max_notif_value); > if (rc) > - goto err_supp_uninit; > + goto err_close_ctx; > > if (sec_caps & OPTEE_SMC_SEC_CAP_ASYNC_NOTIF) { > unsigned int irq; > @@ -1437,6 +1419,8 @@ static int optee_probe(struct platform_device *pdev) > optee_unregister_devices(); > err_notif_uninit: > optee_notif_uninit(optee); > +err_close_ctx: > + teedev_close_context(ctx); > err_supp_uninit: > optee_supp_uninit(&optee->supp); > mutex_destroy(&optee->call_queue.mutex); > -- > 2.31.1 >