Received: by 2002:a05:7412:bbc7:b0:fc:a2b0:25d7 with SMTP id kh7csp233378rdb; Thu, 1 Feb 2024 07:09:03 -0800 (PST) X-Google-Smtp-Source: AGHT+IHZF2qn6m02IOkMzHn9K/fzYQPXAI3wiioMGbFoVTkdT/cKyFz4Oq0IclLSy7toe3mQfazY X-Received: by 2002:a05:6214:f29:b0:68c:67fa:8035 with SMTP id iw9-20020a0562140f2900b0068c67fa8035mr4642985qvb.51.1706800143252; Thu, 01 Feb 2024 07:09:03 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706800143; cv=pass; d=google.com; s=arc-20160816; b=CIvmWOs8rWfc6jtayicazb6l3SGxZ4gZn2PaEQYjWCS9OiQ6EKILHwjIiithhGfLbl 0xT+3f73gFpYhYoJ4OrrBeASSX8WaUUNbJjZFjRyX7oyDdCGff61jlMf1u+/jXKCuAsi 6EZle5Qfi1dolM3vecH+LrdvFyZD7baFOLTvBBOp3xzi7L756Ge95eFQ02/YbbCvDDrB qqP6x+mIWtmMV4q6poKQNnDexCgk+kRY+xKCff4RT7LhIWJ8kZ7Aycqx+qkzV1RwPknf QTPD/545ASiy7p0bkYlD52D1M2aBiOihEjeShC+uKNFUJ7dIM9yCw/JPQMPumjfyTp/q J11A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:organization:from:references :cc:to:content-language:subject:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature; bh=gDmP3nFFDT2/L769/2JvpE6LF5pAooe7LfH885KZoJM=; fh=NrHUepm3fghF8ueVLV9d+hgF/wKw5cJUt4g6RnhAG4U=; b=rZo7a7cOksI0GWqUVog+pKfm9LRZYvVgRGe/wNjYnsqMoqzCTEWWfVy6T76zxQ3Fu2 oIjT0MXgIwCkcXqaufTBME/dkIgWP5tzSQuzfk/D43goYwIP85twfU6MKpQlky3RwcGz lHSYcpcF1zsIeLfCyoXlC+C29+8ZgriC2oszDCfrqHsDofv4pPNVtGcVBOn2q2A+R5tt wzNCEcLdxcqK58AN9q2USTxZblaffxeAj5n2uhthRIgtySYkbbDGGk8oj7f+ldZ+eK3u /TozcH9MRBRHiPzxIuBIL9uoACAJOM1+fVFYgRK5Q9NqarPpOsepnKSBf6lEoimGjRce 4ONw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=EMF7vhTt; arc=pass (i=1 spf=pass spfdomain=foss.st.com dkim=pass dkdomain=foss.st.com dmarc=pass fromdomain=foss.st.com); spf=pass (google.com: domain of linux-kernel+bounces-48362-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-48362-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com X-Forwarded-Encrypted: i=1; AJvYcCXiZZnYs1TqWrsKF1jdQ+WlgR5RhYOyoPetzAGV9Jy3wwt+dSsVLBPXUgPXknmyXCF2OsMh6OQlonoR46+DbkuJ9GcV6HiUolDo69H9cw== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id im2-20020a056214246200b00681940bdb9csi14529213qvb.278.2024.02.01.07.09.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Feb 2024 07:09:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-48362-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=EMF7vhTt; arc=pass (i=1 spf=pass spfdomain=foss.st.com dkim=pass dkdomain=foss.st.com dmarc=pass fromdomain=foss.st.com); spf=pass (google.com: domain of linux-kernel+bounces-48362-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-48362-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 822D31C22743 for ; Thu, 1 Feb 2024 15:07:36 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9F1355F49A; Thu, 1 Feb 2024 15:07:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=foss.st.com header.i=@foss.st.com header.b="EMF7vhTt" Received: from mx07-00178001.pphosted.com (mx07-00178001.pphosted.com [185.132.182.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 12836626BE; Thu, 1 Feb 2024 15:06:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.132.182.106 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706800022; cv=none; b=jyDe5p0aGQqzLgmE6tCV7/hrN366mkcDcTTDEYNowu/vpOrBMXow+CLCJEpMihPRbhNVW4azuwVbzZLJ/emZ4gLy0hEUVVW9oSu93mvoL62cl85pRQFlu8TuIoVEI6/bRWhVvZsexKRQ399DxmjJqHIxXRAdy1lFF/GzEAVeyiQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706800022; c=relaxed/simple; bh=d2fN7ETfqtWqSwbrZD6sFV7qFOKT2cv6rVIVGsXbET4=; h=Message-ID:Date:MIME-Version:Subject:To:CC:References:From: In-Reply-To:Content-Type; b=qjWl9aYkmr/1c4cJI35IXF97/GGOH0CygkdviGTdGj99w/87uObZOi/ZSVxkqP5jK8l0XnaCdD86+eEhwzXvfAVjLuPT9TBUGTcPSaXNngCCbSGIp5kVllCmfd+hoq+zubicbM9I4hfAGCQx2OO8KCknGxkh76mdbUeN1OteZWE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=foss.st.com; spf=pass smtp.mailfrom=foss.st.com; dkim=pass (2048-bit key) header.d=foss.st.com header.i=@foss.st.com header.b=EMF7vhTt; arc=none smtp.client-ip=185.132.182.106 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=foss.st.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=foss.st.com Received: from pps.filterd (m0288072.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 411Ch0vN017906; Thu, 1 Feb 2024 16:06:41 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foss.st.com; h= message-id:date:mime-version:subject:to:cc:references:from :in-reply-to:content-type:content-transfer-encoding; s= selector1; bh=gDmP3nFFDT2/L769/2JvpE6LF5pAooe7LfH885KZoJM=; b=EM F7vhTtmylLnM5VdTES3vdwHz1BUZOO2ed5NCRsGEOwrz93KYwAcIxsuT7PBspONg gX2rVbx9ITGKPkyrpeWFqr8MuvjdD44LpQwgkCYkW2qPDsqi/2vuvj+CwDloPV7+ JGITEy+jIwkQtN0kgC+wUlpiGnblwQZdIZL3DwaN4mumspVoMCLV0ga90jNddv7y KDVpGC8pqJMoTzlRzcKv4uQAX1EjYyVfxqM/ZJl0qxt2+Gy0bCtV41VC4INgk0Wk tgsDpr7glIY/TilDos9k2siHLsv2M0gUheb30DS6jL0Z69UZL3W3Zj3C1YrdUshp +VeN4ja1hq7jGkVHZzxg== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com (PPS) with ESMTPS id 3vvr4m5xhn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 01 Feb 2024 16:06:40 +0100 (CET) Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 88FF6100053; Thu, 1 Feb 2024 16:06:39 +0100 (CET) Received: from Webmail-eu.st.com (eqndag1node4.st.com [10.75.129.133]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 23BF128B03F; Thu, 1 Feb 2024 16:06:39 +0100 (CET) Received: from SAFDAG1NODE1.st.com (10.75.90.17) by EQNDAG1NODE4.st.com (10.75.129.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Thu, 1 Feb 2024 16:06:38 +0100 Received: from [10.201.20.75] (10.201.20.75) by SAFDAG1NODE1.st.com (10.75.90.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Thu, 1 Feb 2024 16:06:38 +0100 Message-ID: <8ede77bb-0fbc-4de2-b51b-67674744b551@foss.st.com> Date: Thu, 1 Feb 2024 16:06:37 +0100 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 4/4] remoteproc: stm32: Add support of an OP-TEE TA to load the firmware Content-Language: en-US To: Mathieu Poirier CC: Bjorn Andersson , Jens Wiklander , Rob Herring , "Krzysztof Kozlowski" , Conor Dooley , , , , , , References: <20240118100433.3984196-1-arnaud.pouliquen@foss.st.com> <20240118100433.3984196-5-arnaud.pouliquen@foss.st.com> <7ec6c9e8-9267-4e7c-81a4-abcdb2ab4239@foss.st.com> From: Arnaud POULIQUEN Organization: STMicroelectronics In-Reply-To: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-ClientProxiedBy: EQNCAS1NODE3.st.com (10.75.129.80) To SAFDAG1NODE1.st.com (10.75.90.17) X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-02-01_03,2024-01-31_01,2023-05-22_02 hello Mathieu, On 1/31/24 19:52, Mathieu Poirier wrote: > On Tue, Jan 30, 2024 at 10:13:48AM +0100, Arnaud POULIQUEN wrote: >> >> >> On 1/26/24 18:11, Mathieu Poirier wrote: >>> On Thu, Jan 18, 2024 at 11:04:33AM +0100, Arnaud Pouliquen wrote: >>>> The new TEE remoteproc device is used to manage remote firmware in a >>>> secure, trusted context. The 'st,stm32mp1-m4-tee' compatibility is >>>> introduced to delegate the loading of the firmware to the trusted >>>> execution context. In such cases, the firmware should be signed and >>>> adhere to the image format defined by the TEE. >>>> >>>> Signed-off-by: Arnaud Pouliquen >>>> --- >>>> V1 to V2 update: >>>> - remove the select "TEE_REMOTEPROC" in STM32_RPROC config as detected by >>>> the kernel test robot: >>>> WARNING: unmet direct dependencies detected for TEE_REMOTEPROC >>>> Depends on [n]: REMOTEPROC [=y] && OPTEE [=n] >>>> Selected by [y]: >>>> - STM32_RPROC [=y] && (ARCH_STM32 || COMPILE_TEST [=y]) && REMOTEPROC [=y] >>>> - Fix initialized trproc variable in stm32_rproc_probe >>>> --- >>>> drivers/remoteproc/stm32_rproc.c | 149 +++++++++++++++++++++++++++++-- >>>> 1 file changed, 144 insertions(+), 5 deletions(-) >>>> >>>> diff --git a/drivers/remoteproc/stm32_rproc.c b/drivers/remoteproc/stm32_rproc.c >>>> index fcc0001e2657..cf6a21bac945 100644 >>>> --- a/drivers/remoteproc/stm32_rproc.c >>>> +++ b/drivers/remoteproc/stm32_rproc.c >>>> @@ -20,6 +20,7 @@ >>>> #include >>>> #include >>>> #include >>>> +#include >>>> #include >>>> >>>> #include "remoteproc_internal.h" >>>> @@ -49,6 +50,9 @@ >>>> #define M4_STATE_STANDBY 4 >>>> #define M4_STATE_CRASH 5 >>>> >>>> +/* Remote processor unique identifier aligned with the Trusted Execution Environment definitions */ >>>> +#define STM32_MP1_M4_PROC_ID 0 >>>> + >>>> struct stm32_syscon { >>>> struct regmap *map; >>>> u32 reg; >>>> @@ -90,6 +94,8 @@ struct stm32_rproc { >>>> struct stm32_mbox mb[MBOX_NB_MBX]; >>>> struct workqueue_struct *workqueue; >>>> bool hold_boot_smc; >>>> + bool fw_loaded; >>>> + struct tee_rproc *trproc; >>>> void __iomem *rsc_va; >>>> }; >>>> >>>> @@ -257,6 +263,91 @@ static int stm32_rproc_release(struct rproc *rproc) >>>> return err; >>>> } >>>> >>>> +static int stm32_rproc_tee_elf_sanity_check(struct rproc *rproc, >>>> + const struct firmware *fw) >>>> +{ >>>> + struct stm32_rproc *ddata = rproc->priv; >>>> + unsigned int ret = 0; >>>> + >>>> + if (rproc->state == RPROC_DETACHED) >>>> + return 0; >>>> + >>>> + ret = tee_rproc_load_fw(ddata->trproc, fw); >>>> + if (!ret) >>>> + ddata->fw_loaded = true; >>>> + >>>> + return ret; >>>> +} >>>> + >>>> +static int stm32_rproc_tee_elf_load(struct rproc *rproc, >>>> + const struct firmware *fw) >>>> +{ >>>> + struct stm32_rproc *ddata = rproc->priv; >>>> + unsigned int ret; >>>> + >>>> + /* >>>> + * This function can be called by remote proc for recovery >>>> + * without the sanity check. In this case we need to load the firmware >>>> + * else nothing done here as the firmware has been preloaded for the >>>> + * sanity check to be able to parse it for the resource table. >>>> + */ >>> >>> This comment is very confusing - please consider refactoring. >>> >>>> + if (ddata->fw_loaded) >>>> + return 0; >>>> + >>> >>> I'm not sure about keeping a flag to indicate the status of the loaded firmware. >>> It is not done for the non-secure method, I don't see why it would be needed for >>> the secure one. >>> >> >> The difference is on the sanity check. >> - in rproc_elf_sanity_check we parse the elf file to verify that it is >> valid. >> - in stm32_rproc_tee_elf_sanity_check we have to do the same, that means to >> authenticate it. the authentication is done during the load. >> >> So this flag is used to avoid to reload it twice time. >> refactoring the comment should help to understand this flag >> >> >> An alternative would be to bypass the sanity check. But this lead to same >> limitation. >> Before loading the firmware in remoteproc_core, we call rproc_parse_fw() that is >> used to get the resource table address. To get it from tee we need to >> authenticate the firmware so load it... >> > > I spent a long time thinking about this patchset. Looking at the code as it > is now, request_firmware() in rproc_boot() is called even when the TEE is > responsible for loading the firmware. There should be some conditional code > that calls either request_firmware() or tee_rproc_load_fw(). The latter should > also be renamed to tee_rproc_request_firmware() to avoid confusion. The request_firmware() call is needed in both cases to get the image from the filesystem. The tee_rproc_load_fw() gets, as input, the struct firmware provided by request_firmware(). If we want to integrate in remoteproc_core the solution could probably have to create the equivalent of the rproc_fw_boot() to load the firmware with an external method. Here is an example based on a new rproc_ops ( not tested) + static int rproc_fw_ext_boot(struct rproc *rproc, const struct firmware *fw) + { + struct device *dev = &rproc->dev; + const char *name = rproc->firmware; + int ret; + + + dev_info(dev, "Booting fw image %s, size %zd\n", name, fw->size); + + /* ops to load and start the remoteprocessor */ + ret = rproc->ops->boot(rproc, fw); + if (ret) + return ret; + + /* + * if enabling an IOMMU isn't relevant for this rproc, this is + * just a nop + */ + ret = rproc_enable_iommu(rproc); + if (ret) { + dev_err(dev, "can't enable iommu: %d\n", ret); + return ret; + } + + /* Prepare rproc for firmware loading if needed */ + ret = rproc_prepare_device(rproc); + if (ret) { + dev_err(dev, "can't prepare rproc %s: %d\n", rproc->name, ret); + goto disable_iommu; + } + + ret = rproc_set_rsc_table(rproc); + if (ret) { + dev_err(dev, "can't load resource table: %d\n", ret); + goto unprepare_device; + } + + + /* reset max_notifyid */ + rproc->max_notifyid = -1; + + /* reset handled vdev */ + rproc->nb_vdev = 0; + + /* handle fw resources which are required to boot rproc */ + ret = rproc_handle_resources(rproc, rproc_loading_handlers); + if (ret) { + dev_err(dev, "Failed to process resources: %d\n", ret); + goto clean_up_resources; + } + + /* Allocate carveout resources associated to rproc */ + ret = rproc_alloc_registered_carveouts(rproc); + if (ret) { + dev_err(dev, "Failed to allocate associated carveouts: %d\n", + ret); + goto clean_up_resources; + } + + return 0; + + clean_up_resources: + rproc_resource_cleanup(rproc); + unprepare_rproc: + /* release HW resources if needed */ + rproc_unprepare_device(rproc); + disable_iommu: + rproc_disable_iommu(rproc); + return ret; + } int rproc_boot(struct rproc *rproc) { [...] - ret = rproc_fw_boot(rproc, firmware_p); + if(rproc->ops->boot) + ret = rproc_fw_ext_boot(rproc, firmware_p); + else + ret = rproc_fw_boot(rproc, firmware_p); Another advantage of this solution is that it opens the framework to other formats. For instance it could be a way to support dtb format requested in [RFC] Passing device-tree to remoteproc [1]. [1] https://lore.kernel.org/linux-remoteproc/f67cd822-4e29-71f2-7c42-e11dbaa6cd8c@kalrayinc.com/T/#t Thanks, Arnaud > > I touched on that before but please rename rproc_tee_get_rsc_table() to > rproc_tee_elf_load_rsc_table(). I also suggest to introduce a new function, > rproc_tee_get_loaded_rsc_table() that would be called from > rproc_tee_elf_load_rsc_table(). That way we don't need trproc->rsc_va. > > I also think tee_rproc should be renamed to "rproc_tee_interface" and folded > under struct rproc. > > With the above most of the problems with the current implementation should > naturally go away. > > Thanks, > Mathieu > >> >>>> + ret = tee_rproc_load_fw(ddata->trproc, fw); >>>> + if (ret) >>>> + return ret; >>>> + ddata->fw_loaded = true; >>>> + >>>> + /* Update the resource table parameters. */ >>>> + if (rproc_tee_get_rsc_table(ddata->trproc)) { >>>> + /* No resource table: reset the related fields. */ >>>> + rproc->cached_table = NULL; >>>> + rproc->table_ptr = NULL; >>>> + rproc->table_sz = 0; >>>> + } >>>> + >>>> + return 0; >>>> +} >>>> + >>>> +static struct resource_table * >>>> +stm32_rproc_tee_elf_find_loaded_rsc_table(struct rproc *rproc, >>>> + const struct firmware *fw) >>>> +{ >>>> + struct stm32_rproc *ddata = rproc->priv; >>>> + >>>> + return tee_rproc_get_loaded_rsc_table(ddata->trproc); >>>> +} >>>> + >>>> +static int stm32_rproc_tee_start(struct rproc *rproc) >>>> +{ >>>> + struct stm32_rproc *ddata = rproc->priv; >>>> + >>>> + return tee_rproc_start(ddata->trproc); >>>> +} >>>> + >>>> +static int stm32_rproc_tee_attach(struct rproc *rproc) >>>> +{ >>>> + /* Nothing to do, remote proc already started by the secured context. */ >>>> + return 0; >>>> +} >>>> + >>>> +static int stm32_rproc_tee_stop(struct rproc *rproc) >>>> +{ >>>> + struct stm32_rproc *ddata = rproc->priv; >>>> + int err; >>>> + >>>> + stm32_rproc_request_shutdown(rproc); >>>> + >>>> + err = tee_rproc_stop(ddata->trproc); >>>> + if (err) >>>> + return err; >>>> + >>>> + ddata->fw_loaded = false; >>>> + >>>> + return stm32_rproc_release(rproc); >>>> +} >>>> + >>>> static int stm32_rproc_prepare(struct rproc *rproc) >>>> { >>>> struct device *dev = rproc->dev.parent; >>>> @@ -319,7 +410,14 @@ static int stm32_rproc_prepare(struct rproc *rproc) >>>> >>>> static int stm32_rproc_parse_fw(struct rproc *rproc, const struct firmware *fw) >>>> { >>>> - if (rproc_elf_load_rsc_table(rproc, fw)) >>>> + struct stm32_rproc *ddata = rproc->priv; >>>> + int ret; >>>> + >>>> + if (ddata->trproc) >>>> + ret = rproc_tee_get_rsc_table(ddata->trproc); >>>> + else >>>> + ret = rproc_elf_load_rsc_table(rproc, fw); >>>> + if (ret) >>>> dev_warn(&rproc->dev, "no resource table found for this firmware\n"); >>>> >>>> return 0; >>>> @@ -693,8 +791,22 @@ static const struct rproc_ops st_rproc_ops = { >>>> .get_boot_addr = rproc_elf_get_boot_addr, >>>> }; >>>> >>>> +static const struct rproc_ops st_rproc_tee_ops = { >>>> + .prepare = stm32_rproc_prepare, >>>> + .start = stm32_rproc_tee_start, >>>> + .stop = stm32_rproc_tee_stop, >>>> + .attach = stm32_rproc_tee_attach, >>>> + .kick = stm32_rproc_kick, >>>> + .parse_fw = stm32_rproc_parse_fw, >>>> + .find_loaded_rsc_table = stm32_rproc_tee_elf_find_loaded_rsc_table, >>>> + .get_loaded_rsc_table = stm32_rproc_get_loaded_rsc_table, >>>> + .sanity_check = stm32_rproc_tee_elf_sanity_check, >>>> + .load = stm32_rproc_tee_elf_load, >>>> +}; >>>> + >>>> static const struct of_device_id stm32_rproc_match[] = { >>>> - { .compatible = "st,stm32mp1-m4" }, >>>> + {.compatible = "st,stm32mp1-m4",}, >>>> + {.compatible = "st,stm32mp1-m4-tee",}, >>>> {}, >>>> }; >>>> MODULE_DEVICE_TABLE(of, stm32_rproc_match); >>>> @@ -853,6 +965,7 @@ static int stm32_rproc_probe(struct platform_device *pdev) >>>> struct device *dev = &pdev->dev; >>>> struct stm32_rproc *ddata; >>>> struct device_node *np = dev->of_node; >>>> + struct tee_rproc *trproc = NULL; >>>> struct rproc *rproc; >>>> unsigned int state; >>>> int ret; >>>> @@ -861,11 +974,31 @@ static int stm32_rproc_probe(struct platform_device *pdev) >>>> if (ret) >>>> return ret; >>>> >>>> - rproc = rproc_alloc(dev, np->name, &st_rproc_ops, NULL, sizeof(*ddata)); >>>> - if (!rproc) >>>> - return -ENOMEM; >>>> + if (of_device_is_compatible(np, "st,stm32mp1-m4-tee")) { >>>> + trproc = tee_rproc_register(dev, STM32_MP1_M4_PROC_ID); >>>> + if (IS_ERR(trproc)) { >>>> + dev_err_probe(dev, PTR_ERR(trproc), >>>> + "signed firmware not supported by TEE\n"); >>>> + return PTR_ERR(trproc); >>>> + } >>>> + /* >>>> + * Delegate the firmware management to the secure context. >>>> + * The firmware loaded has to be signed. >>>> + */ >>>> + dev_info(dev, "Support of signed firmware only\n"); >>> >>> Not sure what this adds. Please remove. >> >> This is used to inform the user that only a signed firmware can be loaded, not >> an ELF file. >> I have a patch in my pipe to provide the supported format in the debugfs. In a >> first step, I can suppress this message and we can revisit the issue when I push >> the debugfs proposal. >> >> Thanks, >> Arnaud >> >>> >>>> + } >>>> + rproc = rproc_alloc(dev, np->name, >>>> + trproc ? &st_rproc_tee_ops : &st_rproc_ops, >>>> + NULL, sizeof(*ddata)); >>>> + if (!rproc) { >>>> + ret = -ENOMEM; >>>> + goto free_tee; >>>> + } >>>> >>>> ddata = rproc->priv; >>>> + ddata->trproc = trproc; >>>> + if (trproc) >>>> + trproc->rproc = rproc; >>>> >>>> rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE); >>>> >>>> @@ -916,6 +1049,10 @@ static int stm32_rproc_probe(struct platform_device *pdev) >>>> device_init_wakeup(dev, false); >>>> } >>>> rproc_free(rproc); >>>> +free_tee: >>>> + if (trproc) >>>> + tee_rproc_unregister(trproc); >>>> + >>>> return ret; >>>> } >>>> >>>> @@ -937,6 +1074,8 @@ static void stm32_rproc_remove(struct platform_device *pdev) >>>> device_init_wakeup(dev, false); >>>> } >>>> rproc_free(rproc); >>>> + if (ddata->trproc) >>>> + tee_rproc_unregister(ddata->trproc); >>>> } >>>> >>>> static int stm32_rproc_suspend(struct device *dev) >>>> -- >>>> 2.25.1 >>>>