Received: by 10.223.164.221 with SMTP id h29csp2685475wrb; Tue, 3 Oct 2017 09:09:03 -0700 (PDT) X-Google-Smtp-Source: AOwi7QAuhwIfuo8gChws2++VUy7O7FweHVcqgELqbKlVnyL5S1iuepr9EBvLMxngJ0AZqS8G+zUi X-Received: by 10.99.64.66 with SMTP id n63mr16021121pga.142.1507046943093; Tue, 03 Oct 2017 09:09:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1507046943; cv=none; d=google.com; s=arc-20160816; b=qFVGzQ1JYNj0V6s/02y/Y4BE8nZglE+FpcvOTv9ee3v6VnMHcj2y/HYq91t/E29jR2 y0ukx16opQ/kY924gE6omfDgDQ5N5Xkwjtk0jjqZ1RyMWhpBRvNRIPsrAowU4DpONb+8 F/uIHiDqUAZ/64neqOe6PIVytaqDXacyIjVWO7JeaD7pFq+Esm0fkPmBxMd/XTJ0oXOA 5PSegmyUQozUpEuluALTKl6CWcaKf7A7Wz/Y0zyuZW7gjCmqadf6FY+o+Iyt4ZIjJXwK hWeCcgDBFvFmN1/kxxfRUKSMlZEiBURfVIFvZVLHxb1PgNA9isasPfm3yRaZw2w6FFp/ ZZvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=rWpFamf9ZS9PoRzLTQntnvSZTNFobn9HxZG3Ar+2fjU=; b=XPGO3RhBrFOnOauReKdc+xx8juxIcHP4TmArb3uypM5aWZxTcyKxRDhCR4/NWUvcov yurtmAPuPEDDzPeE6H3lwA+slrWRyXH1c2bjyAE171vr5HVSWKSyKEwgSlGLxrimVhug r0L5+WnBLLvi6fHQW/VtTXZNtrTsq6cVxZ3lmsNEoyk2usMl06TVyKo5MXwJpt3sgCb0 0fMUG4jITIMnO0bcjEhHEyvqAN8W4XqLbsXAVNXte8uKjuTwrHWHIS/Y6G8c9a1H/38y eF6hlqsEntc9q/vRie5oaex9QkUwL8epwpP9AoRyq7/2ISye+4+JGAKX5jxgaGfjnVDy ikPw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w13si7722320pgm.675.2017.10.03.09.08.47; Tue, 03 Oct 2017 09:09:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751759AbdJCQGk (ORCPT + 99 others); Tue, 3 Oct 2017 12:06:40 -0400 Received: from foss.arm.com ([217.140.101.70]:51062 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751200AbdJCQGj (ORCPT ); Tue, 3 Oct 2017 12:06:39 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 78B5A1596; Tue, 3 Oct 2017 09:06:39 -0700 (PDT) Received: from c02sv19cfvh4.usa.arm.com (c02sv19cfvh4.usa.arm.com [10.118.100.79]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 275293F578; Tue, 3 Oct 2017 09:06:39 -0700 (PDT) Subject: Re: [Tee-dev] [PATCH v1 12/14] tee: optee: enable dynamic SHM support To: Volodymyr Babchuk , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, tee-dev@lists.linaro.org, Jens Wiklander References: <1506621851-6929-1-git-send-email-volodymyr_babchuk@epam.com> <1506621851-6929-13-git-send-email-volodymyr_babchuk@epam.com> From: Stuart Yoder Message-ID: <31f5c449-ab0c-f033-6a7e-0ce23c7cc452@arm.com> Date: Tue, 3 Oct 2017 11:06:38 -0500 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <1506621851-6929-13-git-send-email-volodymyr_babchuk@epam.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/28/17 1:04 PM, Volodymyr Babchuk wrote: > From: Volodymyr Babchuk > > Previous patches added various features that are needed for dynamic SHM. > Dynamic SHM allows Normal World to share any buffers with OP-TEE. > While original design suggested to use pre-allocated region (usually of > 1M to 2M of size), this new approach allows to use all non-secure RAM for > command buffers, RPC allocations and TA parameters. > > This patch checks capability OPTEE_SMC_SEC_CAP_DYNAMIC_SHM. If it was set > by OP-TEE, then kernel part of OP-TEE will use kernel page allocator > to allocate command buffers. Also it will set TEE_GEN_CAP_REG_MEM > capability to tell userspace that it supports shared memory registration. > > Signed-off-by: Volodymyr Babchuk > --- > drivers/tee/optee/core.c | 69 +++++++++++++++++++++++++++++++++++------------- > 1 file changed, 51 insertions(+), 18 deletions(-) > > diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c > index 8e012ea..e8fd9af 100644 > --- a/drivers/tee/optee/core.c > +++ b/drivers/tee/optee/core.c > @@ -28,6 +28,7 @@ > #include > #include "optee_private.h" > #include "optee_smc.h" > +#include "shm_pool.h" > > #define DRIVER_NAME "optee" > > @@ -227,6 +228,10 @@ static void optee_get_version(struct tee_device *teedev, > .impl_caps = TEE_OPTEE_CAP_TZ, > .gen_caps = TEE_GEN_CAP_GP, > }; > + struct optee *optee = tee_get_drvdata(teedev); > + > + if (optee->sec_caps & OPTEE_SMC_SEC_CAP_DYNAMIC_SHM) > + v.gen_caps |= TEE_GEN_CAP_REG_MEM; > *vers = v; > } > > @@ -405,21 +410,22 @@ static bool optee_msg_exchange_capabilities(optee_invoke_fn *invoke_fn, > } > > static struct tee_shm_pool * > -optee_config_shm_memremap(optee_invoke_fn *invoke_fn, void **memremaped_shm) > +optee_config_shm_memremap(optee_invoke_fn *invoke_fn, void **memremaped_shm, > + u32 sec_caps) > { > union { > struct arm_smccc_res smccc; > struct optee_smc_get_shm_config_result result; > } res; > - struct tee_shm_pool *pool; > unsigned long vaddr; > phys_addr_t paddr; > size_t size; > phys_addr_t begin; > phys_addr_t end; > void *va; > - struct tee_shm_pool_mem_info priv_info; > - struct tee_shm_pool_mem_info dmabuf_info; > + struct tee_shm_pool_mgr *priv_mgr; > + struct tee_shm_pool_mgr *dmabuf_mgr; > + void *rc; > > invoke_fn(OPTEE_SMC_GET_SHM_CONFIG, 0, 0, 0, 0, 0, 0, 0, &res.smccc); > if (res.result.status != OPTEE_SMC_RETURN_OK) { > @@ -449,22 +455,49 @@ optee_config_shm_memremap(optee_invoke_fn *invoke_fn, void **memremaped_shm) > } > vaddr = (unsigned long)va; > > - priv_info.vaddr = vaddr; > - priv_info.paddr = paddr; > - priv_info.size = OPTEE_SHM_NUM_PRIV_PAGES * PAGE_SIZE; > - dmabuf_info.vaddr = vaddr + OPTEE_SHM_NUM_PRIV_PAGES * PAGE_SIZE; > - dmabuf_info.paddr = paddr + OPTEE_SHM_NUM_PRIV_PAGES * PAGE_SIZE; > - dmabuf_info.size = size - OPTEE_SHM_NUM_PRIV_PAGES * PAGE_SIZE; > - > - pool = tee_shm_pool_alloc_res_mem(&priv_info, &dmabuf_info); > - if (IS_ERR(pool)) { > - memunmap(va); > - goto out; Now that you removed the call to tee_shm_pool_alloc_res_mem() it is dead code and no longer used. Do we still need tee_shm_pool_alloc_res_mem at all? > + /* > + * If OP-TEE can work with unregistered SHM, we will use own pool > + * for private shm > + */ > + if (sec_caps & OPTEE_SMC_SEC_CAP_DYNAMIC_SHM) { > + rc = optee_shm_pool_alloc_pages(); > + if (IS_ERR(rc)) > + goto err_memunmap; > + priv_mgr = rc; > + } else { > + const size_t sz = OPTEE_SHM_NUM_PRIV_PAGES * PAGE_SIZE; > + > + rc = tee_shm_pool_mgr_alloc_res_mem(vaddr, paddr, sz, > + 3 /* 8 bytes aligned */); > + if (IS_ERR(rc)) > + goto err_memunmap; > + priv_mgr = rc; > + > + vaddr += sz; > + paddr += sz; > + size -= sz; > } > > + rc = tee_shm_pool_mgr_alloc_res_mem(vaddr, paddr, size, PAGE_SHIFT); > + if (IS_ERR(rc)) > + goto err_free_priv_mgr; > + dmabuf_mgr = rc; > + > + rc = tee_shm_pool_alloc(priv_mgr, dmabuf_mgr); > + if (IS_ERR(rc)) > + goto err_free_dmabuf_mgr; > + > *memremaped_shm = va; > -out: > - return pool; > + > + return rc; > + > +err_free_dmabuf_mgr: > + tee_shm_pool_mgr_destroy(dmabuf_mgr); > +err_free_priv_mgr: > + tee_shm_pool_mgr_destroy(priv_mgr); > +err_memunmap: > + memunmap(va); > + return rc; > } This function now mixes dynamic and shared memory based allocation in a way that only applies to certain cases. We're going to have the following cases: -Linux OP-TEE driver sees only static shared memory advertised (older versions of OP-TEE) -Linux OP-TEE driver sees only dynamic shared memory advertised (e.g. a guest kernel in a VM) -Linux OP-TEE driver sees both static and dynamic memory advertised We are not handling the 'only dynamic shared memory' case currently and this code is going to have to be refactored again to support that. Since we are substantially re-working it anyway here, why don't we support all the cases. It seems like we need logic along the lines of: invoke_fn(OPTEE_SMC_GET_SHM_CONFIG, 0, 0, 0, 0, 0, 0, 0, &res.smccc); if (res.result.status == OPTEE_SMC_RETURN_OK) optee_static_shm = true; else optee_static_shm = false; if (sec_caps & OPTEE_SMC_SEC_CAP_DYNAMIC_SHM) optee_dynamic_shm = true; else optee_dynamic_shm = false; /* allocate private pool */ if (optee_dynamic_shm) { rc = optee_shm_pool_alloc_pages(); priv_mgr = rc; } else { rc = tee_shm_pool_mgr_alloc_res_mem(vaddr, paddr, sz, 3); priv_mgr = rc; } /* allocate dmabuf pool */ if (optee_dynamic_shm && !optee_static_shm) { dmabuf_mgr = NULL; } else { rc = tee_shm_pool_mgr_alloc_res_mem(vaddr, paddr, size, PAGE_SHIFT); dmabuf_mgr = rc; } rc = tee_shm_pool_alloc(priv_mgr, dmabuf_mgr); > > /* Simple wrapper functions to be able to use a function pointer */ > @@ -542,7 +575,7 @@ static struct optee *optee_probe(struct device_node *np) > if (!(sec_caps & OPTEE_SMC_SEC_CAP_HAVE_RESERVED_SHM)) > return ERR_PTR(-EINVAL); We should remove the above assumption that there must be static shared memory. It shouldn't be an error. Thanks, Stuart From 1579807701882531863@xxx Thu Sep 28 18:07:10 +0000 2017 X-GM-THRID: 1579807701882531863 X-Gmail-Labels: Inbox,Category Forums