Received: by 2002:ab2:69cc:0:b0:1fd:c486:4f03 with SMTP id n12csp181379lqp; Tue, 11 Jun 2024 00:41:16 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVqjOTcKpkLv+XDQNfPxLObdNioC4ySquh8QBma6XgD//7ZUY3DXoWY2tn14aRP/iMMHdoBISLaS/ogzsayFQRbGwF75b/svuRId39wFQ== X-Google-Smtp-Source: AGHT+IG5G5oCLqNJ0subHPfAXY7iR4XoCdLVqu1HpDOkPTLw2zpxzQetSt7/IWc2hIyHfd+Q6/Qr X-Received: by 2002:a17:906:a16:b0:a6e:ab8b:aff4 with SMTP id a640c23a62f3a-a6f34c9a403mr124230766b.13.1718091676307; Tue, 11 Jun 2024 00:41:16 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718091676; cv=pass; d=google.com; s=arc-20160816; b=psfV2SUZLPReVlMSME7RPMPZyjr7xrq/L/rjIwJuZC1/YZ1k2eBdxuSRxjT0mN4e2G yLAXtnHx0KxGRoLFCr/uht/Hiw3OJQXLuDZuqixTLP8uZXeDoLOkF6JOlksJkmXk1Muy bAS9zndmToXiNXW2H8J9g9+WGioz9thZNTf8JB4aU+6IXfxIZbrFnmR2kF3tEDoPLkkp iuaPdrHiZtik+tUgj61/U/+x94vz5Ycsgn4YPRfp24E0ZG0fdql0eIM8w1AdusNDuR3q dJNbS8RY/pChnirrhdQ5XpJEog1tn8jYmfsLYXRErv8gcKd11BjuXcSJyYs7g9YokjiO ez7Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=EyuQN2GhdTtBokTusmMg0L4ie6cxQ4QtcN24al+W9Wg=; fh=hTJigRCoV4/ES7XxqKE71DbJJyraFtTSDFtlGOKfKPo=; b=v6GiWW95H9CtihMmg/iAiJSm83Pcb1vKOhA3PbhBmNoBJHgXHwqcazHLfZP19qbcmj nK0tYiVEBefrnLQC21oDPWGFnuRwgfRlNcMrQoS2FTYCYK5PLkdeWVLRRHi6UJifDSiU njUlZx7UT94+J7wOP3E+10X15Nps3V0vjF/X2F8mKIjfQ8fsa5Tl5q+OBK/sKga+zL7e suVLWpA97Rd7OfKIVd1JjguBXfaWZiEdASj8lmOrywmRtatNEMyWHpiUvLO6LQkP8YMe fEfmNkF9Ce1Bs+S4fPVMHURPVge8F2ly56sHBQiJD/D1I48Nczgjxk2IJjXch0+sVvZi OB7Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=atsoTnnH; arc=pass (i=1 spf=pass spfdomain=foss.st.com dkim=pass dkdomain=foss.st.com dmarc=pass fromdomain=foss.st.com); spf=pass (google.com: domain of linux-kernel+bounces-209391-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-209391-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id 4fb4d7f45d1cf-57c6f64e880si3285144a12.453.2024.06.11.00.41.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jun 2024 00:41:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-209391-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=atsoTnnH; arc=pass (i=1 spf=pass spfdomain=foss.st.com dkim=pass dkdomain=foss.st.com dmarc=pass fromdomain=foss.st.com); spf=pass (google.com: domain of linux-kernel+bounces-209391-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-209391-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id B1BA21F26096 for ; Tue, 11 Jun 2024 07:41:15 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8FDCB173357; Tue, 11 Jun 2024 07:40:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=foss.st.com header.i=@foss.st.com header.b="atsoTnnH" Received: from mx07-00178001.pphosted.com (mx08-00178001.pphosted.com [91.207.212.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 89790172791; Tue, 11 Jun 2024 07:40:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.207.212.93 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718091628; cv=none; b=GwXDjQ7kInh8raYdmC0kdGwxRgBeXXb88Q9/DWA0NBhsFGyh06gvNB01/d4xDInw0zDNItUxZC8V2KV1uopgJnJKDl8ZqZvGRUiSv4eTcpBHMfgobo8tADuk2iplmidieBepriBXHGGgVaivNBI/vulzaDrA9vuq0x8wQe+rt2Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718091628; c=relaxed/simple; bh=HlfZJ9v/mqyCLSzwWiNdGntRYJrbKHRF7/AKWkRHpag=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=u1hjV5Z8h5F3duD5bzIQdZJdoG0csRoKhttCiYM+QUrnMO4zuih8DsQJgIPwnCG8zKaKX1zGK/b+yXUffGBRe5pPdRJcNB97ck0+0SPkmnMvH9sWBd40cXksmj1/WNwtbSLRE7YWOaFVupHwvPuhQ5GKicHouRAlPfrAgLhTuHE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=foss.st.com; spf=pass smtp.mailfrom=foss.st.com; dkim=pass (2048-bit key) header.d=foss.st.com header.i=@foss.st.com header.b=atsoTnnH; arc=none smtp.client-ip=91.207.212.93 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=foss.st.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=foss.st.com Received: from pps.filterd (m0046660.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 45B01Z9Q011633; Tue, 11 Jun 2024 09:40:06 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foss.st.com; h= cc:content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=selector1; bh= EyuQN2GhdTtBokTusmMg0L4ie6cxQ4QtcN24al+W9Wg=; b=atsoTnnHbJSfQ0OO EdbWNgS2DEtTs8pNpKegXFE3ZU0MR3Qq0oFOfCBXkru9ZxtktlAwHS2DlbYDgJRt nGDsX9f25D7cv8D4SgutLWvhCgbFu+mxCA3heXcsqrRlRsK7W/U1k+3GIpvvegvA kEL0wYr2lSlyL+jhv0Ra8e578ThKNcs+HWMA4GQMNV/KegMOynhen8PI+c5HNGgU pNavgNlXYJJf9dapMunp2A0QqGas4uBqQJPiwmaL9JJ6cXL9V/rJbE3m4YEzozq0 JQLQ75zPnk/D3BT+APRA208XzDPJTc8LI15EQNuFl6kfVSpo7PKRXQxE60qo3uoj +c+AgQ== Received: from beta.dmz-ap.st.com (beta.dmz-ap.st.com [138.198.100.35]) by mx07-00178001.pphosted.com (PPS) with ESMTPS id 3ypbp3sfdu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 11 Jun 2024 09:40:05 +0200 (MEST) Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-ap.st.com (STMicroelectronics) with ESMTP id 8BA6040047; Tue, 11 Jun 2024 09:40:01 +0200 (CEST) Received: from Webmail-eu.st.com (eqndag1node6.st.com [10.75.129.135]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id BDEA220F579; Tue, 11 Jun 2024 09:39:12 +0200 (CEST) Received: from SAFDAG1NODE1.st.com (10.75.90.17) by EQNDAG1NODE6.st.com (10.75.129.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 11 Jun 2024 09:39:12 +0200 Received: from localhost (10.48.86.121) by SAFDAG1NODE1.st.com (10.75.90.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 11 Jun 2024 09:39:12 +0200 From: Arnaud Pouliquen To: Bjorn Andersson , Mathieu Poirier , Jens Wiklander , "Rob Herring" , Krzysztof Kozlowski , Conor Dooley CC: , , , , , , Arnaud Pouliquen Subject: [PATCH v7 5/5] remoteproc: stm32: Add support of an OP-TEE TA to load the firmware Date: Tue, 11 Jun 2024 09:39:04 +0200 Message-ID: <20240611073904.475019-6-arnaud.pouliquen@foss.st.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240611073904.475019-1-arnaud.pouliquen@foss.st.com> References: <20240611073904.475019-1-arnaud.pouliquen@foss.st.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: SAFCAS1NODE1.st.com (10.75.90.11) To SAFDAG1NODE1.st.com (10.75.90.17) X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-06-11_03,2024-06-11_01,2024-05-17_01 The new TEE remoteproc device is used to manage remote firmware in a secure, trusted context. The 'st,stm32mp1-m4-tee' compatibility is introduced to delegate the loading of the firmware to the trusted execution context. In such cases, the firmware should be signed and adhere to the image format defined by the TEE. Signed-off-by: Arnaud Pouliquen --- Update from V5 - replace find_loaded_rsc_table by find_loaded_rsc_table ops. --- --- drivers/remoteproc/stm32_rproc.c | 63 ++++++++++++++++++++++++++++++-- 1 file changed, 60 insertions(+), 3 deletions(-) diff --git a/drivers/remoteproc/stm32_rproc.c b/drivers/remoteproc/stm32_rproc.c index 8cd838df4e92..c1262e1ccc96 100644 --- a/drivers/remoteproc/stm32_rproc.c +++ b/drivers/remoteproc/stm32_rproc.c @@ -20,6 +20,7 @@ #include #include #include +#include #include #include "remoteproc_internal.h" @@ -257,6 +258,19 @@ static int stm32_rproc_release(struct rproc *rproc) return 0; } +static int stm32_rproc_tee_stop(struct rproc *rproc) +{ + int err; + + stm32_rproc_request_shutdown(rproc); + + err = tee_rproc_stop(rproc); + if (err) + return err; + + return stm32_rproc_release(rproc); +} + static int stm32_rproc_prepare(struct rproc *rproc) { struct device *dev = rproc->dev.parent; @@ -693,8 +707,20 @@ static const struct rproc_ops st_rproc_ops = { .get_boot_addr = rproc_elf_get_boot_addr, }; +static const struct rproc_ops st_rproc_tee_ops = { + .prepare = stm32_rproc_prepare, + .start = tee_rproc_start, + .stop = stm32_rproc_tee_stop, + .kick = stm32_rproc_kick, + .load = tee_rproc_load_fw, + .parse_fw = tee_rproc_parse_fw, + .find_loaded_rsc_table = tee_rproc_find_loaded_rsc_table, + +}; + static const struct of_device_id stm32_rproc_match[] = { { .compatible = "st,stm32mp1-m4" }, + { .compatible = "st,stm32mp1-m4-tee" }, {}, }; MODULE_DEVICE_TABLE(of, stm32_rproc_match); @@ -853,17 +879,42 @@ static int stm32_rproc_probe(struct platform_device *pdev) struct device *dev = &pdev->dev; struct stm32_rproc *ddata; struct device_node *np = dev->of_node; + struct tee_rproc *trproc = NULL; struct rproc *rproc; unsigned int state; + u32 proc_id; int ret; ret = dma_coerce_mask_and_coherent(dev, DMA_BIT_MASK(32)); if (ret) return ret; - rproc = devm_rproc_alloc(dev, np->name, &st_rproc_ops, NULL, sizeof(*ddata)); - if (!rproc) - return -ENOMEM; + if (of_device_is_compatible(np, "st,stm32mp1-m4-tee")) { + /* + * Delegate the firmware management to the secure context. + * The firmware loaded has to be signed. + */ + ret = of_property_read_u32(np, "st,proc-id", &proc_id); + if (ret) { + dev_err(dev, "failed to read st,rproc-id property\n"); + return ret; + } + + rproc = devm_rproc_alloc(dev, np->name, &st_rproc_tee_ops, NULL, sizeof(*ddata)); + if (!rproc) + return -ENOMEM; + + trproc = tee_rproc_register(dev, rproc, proc_id); + if (IS_ERR(trproc)) { + dev_err_probe(dev, PTR_ERR(trproc), + "signed firmware not supported by TEE\n"); + return PTR_ERR(trproc); + } + } else { + rproc = devm_rproc_alloc(dev, np->name, &st_rproc_ops, NULL, sizeof(*ddata)); + if (!rproc) + return -ENOMEM; + } ddata = rproc->priv; @@ -915,6 +966,9 @@ static int stm32_rproc_probe(struct platform_device *pdev) dev_pm_clear_wake_irq(dev); device_init_wakeup(dev, false); } + if (trproc) + tee_rproc_unregister(trproc); + return ret; } @@ -935,6 +989,9 @@ static void stm32_rproc_remove(struct platform_device *pdev) dev_pm_clear_wake_irq(dev); device_init_wakeup(dev, false); } + if (rproc->tee_interface) + tee_rproc_unregister(rproc->tee_interface); + } static int stm32_rproc_suspend(struct device *dev) -- 2.25.1