Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3523602pxb; Mon, 24 Jan 2022 11:21:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJzAZtoKNdlnS69y80UhmlEk/eYI2vzhxnwniD3kHFZ3DajmgbxrK1O+dgXwyjjKpeTGKOKa X-Received: by 2002:a17:902:ab09:b0:14b:2640:6432 with SMTP id ik9-20020a170902ab0900b0014b26406432mr12781125plb.45.1643052103308; Mon, 24 Jan 2022 11:21:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643052103; cv=none; d=google.com; s=arc-20160816; b=uHewk/2i+XbptEAIsx9h1GQG9muh+pq1DAvQPD8iIfAT71C4G+Is/rFDql+aEViN2R AAcLlYp+NmozCWDjdtsaJJN4cML7bZAZ7Nh3DMhPmGgRqFlOoOFhgnrtiT0xAoo78A6O 2ulP58ZoPw5Tm+DAU6jyl5NGFjOWi03uNgyM0AfUg2A6zNPtXwgPmhYEG9oePJPJn5ZJ M4kUDxISarkKpxsK5yQiRW+3L8Lyz4/FGBQdJUXRimrh+tRjCJSiP8+uQDl0akZ08hn5 yHDI0KfHIWb/wW1WnLH5Nmadd8/OcVHLdADert4v3SaFCxRGxIPediYfMGTG70KkHied BAnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=fLJPux71U09Oo681MomqQV2ZfcjH7Lw01ivpP1SDrj4=; b=yKQQvyv0MHnxtPC9He7VSACEjSoYYMj6Zmmt8620c5yzXWlNPF56FtNQRtD0llXmfT /NMJ1z7BraFMb6YjGa1LFb5Esl2m4rUnGCyba3OFZdPz5AuSxA9b6AIgm+g+Aj85gkwn IIqfR9gq6pI54aSQ1rVsdbnyDWVsHjInxiW/mlf8cTgiaJqxdjXQ3lVKLXaEGo2iZTb+ 0SYN45qGzumU514Kry5IqXZk+SViN5FHCxVlS+dtT2trrmZ2Mp08Ukk2J7ELsYvMVhmd A0tkz38d0yITcwHyphGYP26WqzsIyAo+XADpppbMPtKr8+FfZL9y67NUw2Z7ARzVoq2B R0Zg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=YEMitoXV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j62si11359057pge.93.2022.01.24.11.21.30; Mon, 24 Jan 2022 11:21:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=YEMitoXV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237556AbiAXN6z (ORCPT + 99 others); Mon, 24 Jan 2022 08:58:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57786 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237526AbiAXN6y (ORCPT ); Mon, 24 Jan 2022 08:58:54 -0500 Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D7CF8C06173B for ; Mon, 24 Jan 2022 05:58:53 -0800 (PST) Received: by mail-wr1-x435.google.com with SMTP id i2so13764162wrb.12 for ; Mon, 24 Jan 2022 05:58:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fLJPux71U09Oo681MomqQV2ZfcjH7Lw01ivpP1SDrj4=; b=YEMitoXVWihTG1+Z3MWkSRojhK8QuzAH09fSE2X+Jzz4P5VNuoO2zQXyiyZ9mmoz7+ UbU3luTuDDBX4FCWjSkbAyG9r+wwP+rs1QopPutSoO1RaBXmIv3RqEotXMWD4Ro/4aso jSVzMvwaCE1pXtpFsedITmIoGp2IV7Z29YxiKAl/1tOD9k9URhFORDbNSHbVA5Lj4779 60TymdkadqJy+NmGT0NN+MqzkeTsR+0I+LVzBSzE9I42yzhYmNbq0oeKIb8m2bXX4ZDW xU7exOKyvhFR74o1IBi9KmcDQxFriSEEjTlQ3ruxcyPiaPhY1BWwRv2Zl7Q5/uk3nVtN FlvA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fLJPux71U09Oo681MomqQV2ZfcjH7Lw01ivpP1SDrj4=; b=2kSmpEfDvOWbBHUcw3LPMtr0ZIb4iSmTFpyLfHlCxgdXX7FFi94kNI/gVrhaZwLqrM DWEzeAYSouJMjbvUnuvZTm5sZHOkyUco/bgGEB5R65uWrZsZ+ZbkMXmJdqbPWFBNOZlg nDhFQ4szMZpNzqt2pXLhItfinlRpT4d4ILFu/LdBgfgfpAQZEHSd63ZThoDvBusLDzud mlsfYgEE/0JvEuDdf26fwRarNtanDVbpT6CBi0uSbIcxESBDzy0wmiHwhX20/zFswnvg pIpXwgDibVzd8/QiyBjlKU9NqobonxvbB6qgRWa2ysg0WDlkNxoDHWSJj3QONEjFT33+ 8mMg== X-Gm-Message-State: AOAM530CJXXDCT8FQ8+1LdZ4TdgEG12T0kuaTYNnMlgwOzTuV/u6G6L0 IQMcXO8aOA6GyVDw79tFuQuJQ0BOtcCXmG2SKVd2QA== X-Received: by 2002:a5d:574c:: with SMTP id q12mr13070866wrw.64.1643032732369; Mon, 24 Jan 2022 05:58:52 -0800 (PST) MIME-Version: 1.0 References: <20220114150824.3578829-1-jens.wiklander@linaro.org> <20220114150824.3578829-7-jens.wiklander@linaro.org> In-Reply-To: From: Jens Wiklander Date: Mon, 24 Jan 2022 14:58:41 +0100 Message-ID: Subject: Re: [PATCH v2 06/12] optee: add driver private tee_context To: Sumit Garg Cc: linux-kernel@vger.kernel.org, op-tee@lists.trustedfirmware.org, Herbert Xu , Devaraj Rangasamy , Rijo Thomas , David Howells , Tyler Hicks Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 21, 2022 at 1:48 PM Sumit Garg wrote: > > On Fri, 14 Jan 2022 at 20:38, Jens Wiklander wrote: > > > > Adds a driver private tee_context by moving the tee_context in struct > > optee_notif to struct optee. This tee_context is used when doing > > internal calls to secure world to deliver notification and later also > > when sharing driver private memory with secure world. > > > > Signed-off-by: Jens Wiklander > > --- > > drivers/tee/optee/core.c | 1 + > > drivers/tee/optee/ffa_abi.c | 61 ++++++++++++++++++------------- > > drivers/tee/optee/optee_private.h | 5 ++- > > drivers/tee/optee/smc_abi.c | 40 ++++++-------------- > > 4 files changed, 51 insertions(+), 56 deletions(-) > > > > After looking at this patch, it looks like there is a need for some > more refactoring to pick out common probe functionality from both ABIs > and add optee_probe_common(). If it was there earlier, this patch > would mostly be modifying the OP-TEE core file apart from > notifications stuff. > > I would leave it upto you to have a refactoring patch before and then > changes in this patch or vice-versa. I'll do the refactoring after this patch set. Thanks, Jens > > -Sumit > > > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > > index 2a369e346b85..f4bccb5f0e93 100644 > > --- a/drivers/tee/optee/core.c > > +++ b/drivers/tee/optee/core.c > > @@ -161,6 +161,7 @@ void optee_remove_common(struct optee *optee) > > optee_unregister_devices(); > > > > optee_notif_uninit(optee); > > + teedev_close_context(optee->ctx); > > /* > > * The two devices have to be unregistered before we can free the > > * other resources. > > diff --git a/drivers/tee/optee/ffa_abi.c b/drivers/tee/optee/ffa_abi.c > > index 18963f7e4d48..88a028d4fb7b 100644 > > --- a/drivers/tee/optee/ffa_abi.c > > +++ b/drivers/tee/optee/ffa_abi.c > > @@ -766,7 +766,9 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > > { > > const struct ffa_dev_ops *ffa_ops; > > unsigned int rpc_arg_count; > > + struct tee_shm_pool *pool; > > struct tee_device *teedev; > > + struct tee_context *ctx; > > struct optee *optee; > > int rc; > > > > @@ -786,12 +788,12 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > > if (!optee) > > return -ENOMEM; > > > > - optee->pool = optee_ffa_shm_pool_alloc_pages(); > > - if (IS_ERR(optee->pool)) { > > - rc = PTR_ERR(optee->pool); > > - optee->pool = NULL; > > - goto err; > > + pool = optee_ffa_shm_pool_alloc_pages(); > > + if (IS_ERR(pool)) { > > + rc = PTR_ERR(pool); > > + goto err_free_optee; > > } > > + optee->pool = pool; > > > > optee->ops = &optee_ffa_ops; > > optee->ffa.ffa_dev = ffa_dev; > > @@ -802,7 +804,7 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > > optee); > > if (IS_ERR(teedev)) { > > rc = PTR_ERR(teedev); > > - goto err; > > + goto err_free_pool; > > } > > optee->teedev = teedev; > > > > @@ -810,50 +812,57 @@ static int optee_ffa_probe(struct ffa_device *ffa_dev) > > optee); > > if (IS_ERR(teedev)) { > > rc = PTR_ERR(teedev); > > - goto err; > > + goto err_unreg_teedev; > > } > > optee->supp_teedev = teedev; > > > > rc = tee_device_register(optee->teedev); > > if (rc) > > - goto err; > > + goto err_unreg_supp_teedev; > > > > rc = tee_device_register(optee->supp_teedev); > > if (rc) > > - goto err; > > + goto err_unreg_supp_teedev; > > > > rc = rhashtable_init(&optee->ffa.global_ids, &shm_rhash_params); > > if (rc) > > - goto err; > > + goto err_unreg_supp_teedev; > > mutex_init(&optee->ffa.mutex); > > mutex_init(&optee->call_queue.mutex); > > INIT_LIST_HEAD(&optee->call_queue.waiters); > > optee_supp_init(&optee->supp); > > ffa_dev_set_drvdata(ffa_dev, optee); > > + ctx = teedev_open(optee->teedev); > > + if (IS_ERR(ctx)) > > + goto err_rhashtable_free; > > + optee->ctx = ctx; > > rc = optee_notif_init(optee, OPTEE_DEFAULT_MAX_NOTIF_VALUE); > > - if (rc) { > > - optee_ffa_remove(ffa_dev); > > - return rc; > > - } > > + if (rc) > > + goto err_close_ctx; > > > > rc = optee_enumerate_devices(PTA_CMD_GET_DEVICES); > > - if (rc) { > > - optee_ffa_remove(ffa_dev); > > - return rc; > > - } > > + if (rc) > > + goto err_unregister_devices; > > > > pr_info("initialized driver\n"); > > return 0; > > -err: > > - /* > > - * tee_device_unregister() is safe to call even if the > > - * devices hasn't been registered with > > - * tee_device_register() yet. > > - */ > > + > > +err_unregister_devices: > > + optee_unregister_devices(); > > + optee_notif_uninit(optee); > > +err_close_ctx: > > + teedev_close_context(ctx); > > +err_rhashtable_free: > > + rhashtable_free_and_destroy(&optee->ffa.global_ids, rh_free_fn, NULL); > > + optee_supp_uninit(&optee->supp); > > + mutex_destroy(&optee->call_queue.mutex); > > +err_unreg_supp_teedev: > > tee_device_unregister(optee->supp_teedev); > > +err_unreg_teedev: > > tee_device_unregister(optee->teedev); > > - if (optee->pool) > > - tee_shm_pool_free(optee->pool); > > +err_free_pool: > > + tee_shm_pool_free(pool); > > +err_free_optee: > > kfree(optee); > > return rc; > > } > > diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h > > index df2450921464..df3a483bbf46 100644 > > --- a/drivers/tee/optee/optee_private.h > > +++ b/drivers/tee/optee/optee_private.h > > @@ -53,7 +53,6 @@ struct optee_call_queue { > > > > struct optee_notif { > > u_int max_key; > > - struct tee_context *ctx; > > /* Serializes access to the elements below in this struct */ > > spinlock_t lock; > > struct list_head db; > > @@ -134,9 +133,10 @@ struct optee_ops { > > /** > > * struct optee - main service struct > > * @supp_teedev: supplicant device > > + * @teedev: client device > > * @ops: internal callbacks for different ways to reach secure > > * world > > - * @teedev: client device > > + * @ctx: driver internal TEE context > > * @smc: specific to SMC ABI > > * @ffa: specific to FF-A ABI > > * @call_queue: queue of threads waiting to call @invoke_fn > > @@ -152,6 +152,7 @@ struct optee { > > struct tee_device *supp_teedev; > > struct tee_device *teedev; > > const struct optee_ops *ops; > > + struct tee_context *ctx; > > union { > > struct optee_smc smc; > > struct optee_ffa ffa; > > diff --git a/drivers/tee/optee/smc_abi.c b/drivers/tee/optee/smc_abi.c > > index 196cd4316d7d..1dbb13b08381 100644 > > --- a/drivers/tee/optee/smc_abi.c > > +++ b/drivers/tee/optee/smc_abi.c > > @@ -952,57 +952,34 @@ static irqreturn_t notif_irq_thread_fn(int irq, void *dev_id) > > { > > struct optee *optee = dev_id; > > > > - optee_smc_do_bottom_half(optee->notif.ctx); > > + optee_smc_do_bottom_half(optee->ctx); > > > > return IRQ_HANDLED; > > } > > > > static int optee_smc_notif_init_irq(struct optee *optee, u_int irq) > > { > > - struct tee_context *ctx; > > int rc; > > > > - ctx = teedev_open(optee->teedev); > > - if (IS_ERR(ctx)) > > - return PTR_ERR(ctx); > > - > > - optee->notif.ctx = ctx; > > rc = request_threaded_irq(irq, notif_irq_handler, > > notif_irq_thread_fn, > > 0, "optee_notification", optee); > > if (rc) > > - goto err_close_ctx; > > + return rc; > > > > optee->smc.notif_irq = irq; > > > > return 0; > > - > > -err_close_ctx: > > - teedev_close_context(optee->notif.ctx); > > - optee->notif.ctx = NULL; > > - > > - return rc; > > } > > > > static void optee_smc_notif_uninit_irq(struct optee *optee) > > { > > - if (optee->notif.ctx) { > > - optee_smc_stop_async_notif(optee->notif.ctx); > > + if (optee->smc.sec_caps & OPTEE_SMC_SEC_CAP_ASYNC_NOTIF) { > > + optee_smc_stop_async_notif(optee->ctx); > > if (optee->smc.notif_irq) { > > free_irq(optee->smc.notif_irq, optee); > > irq_dispose_mapping(optee->smc.notif_irq); > > } > > - > > - /* > > - * The thread normally working with optee->notif.ctx was > > - * stopped with free_irq() above. > > - * > > - * Note we're not using teedev_close_context() or > > - * tee_client_close_context() since we have already called > > - * tee_device_put() while initializing to avoid a circular > > - * reference counting. > > - */ > > - teedev_close_context(optee->notif.ctx); > > } > > } > > > > @@ -1307,6 +1284,7 @@ static int optee_probe(struct platform_device *pdev) > > struct optee *optee = NULL; > > void *memremaped_shm = NULL; > > struct tee_device *teedev; > > + struct tee_context *ctx; > > u32 max_notif_value; > > u32 sec_caps; > > int rc; > > @@ -1387,9 +1365,13 @@ static int optee_probe(struct platform_device *pdev) > > optee->pool = pool; > > > > platform_set_drvdata(pdev, optee); > > + ctx = teedev_open(optee->teedev); > > + if (IS_ERR(ctx)) > > + goto err_supp_uninit; > > + optee->ctx = ctx; > > rc = optee_notif_init(optee, max_notif_value); > > if (rc) > > - goto err_supp_uninit; > > + goto err_close_ctx; > > > > if (sec_caps & OPTEE_SMC_SEC_CAP_ASYNC_NOTIF) { > > unsigned int irq; > > @@ -1437,6 +1419,8 @@ static int optee_probe(struct platform_device *pdev) > > optee_unregister_devices(); > > err_notif_uninit: > > optee_notif_uninit(optee); > > +err_close_ctx: > > + teedev_close_context(ctx); > > err_supp_uninit: > > optee_supp_uninit(&optee->supp); > > mutex_destroy(&optee->call_queue.mutex); > > -- > > 2.31.1 > >