From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2607:f8b0:400c:c05::242; helo=mail-vk0-x242.google.com; envelope-from=sumit.garg@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-vk0-x242.google.com (mail-vk0-x242.google.com [IPv6:2607:f8b0:400c:c05::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 1B66D210F4BBC for ; Fri, 24 Aug 2018 05:22:08 -0700 (PDT) Received: by mail-vk0-x242.google.com with SMTP id s17-v6so4164942vke.10 for ; Fri, 24 Aug 2018 05:22:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8ZGtyWXeh49CxeFc4o/r2i09tQUkXEbfMM2FhBtiR6A=; b=in4RgIkI8FW7uQb2bG9I3cRrNfRgotPXURcQMImtKhE50pRcDC1Y2hzYkcUrA4yUYv d18jMZBsvOs5jp2VqovvzN6D0ew+CvTae0uT/oJVo9ZyKBanBrgsDMPF6S3QzOo7H0r4 hyan2rumg2XdJwZHHaIEmtWe9WNtOZwRc9r5Y= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8ZGtyWXeh49CxeFc4o/r2i09tQUkXEbfMM2FhBtiR6A=; b=cDQuTwcFBvmLJHCCvTgKmCWdzIlcblcVlbIiwcpeFQYdP1PyfucJjulSUvEFa7Jtau 0PVew/9wIlCKOU+fnGssX8olxYkVQ5Y7jHqzPyKEVip5TwO2VR4LRcnZ6A1uoOE0r52x n22xg7iM2wNktZlLXZRZkGhPfwS1IrupaXBUrgi3QRMDKW4oYuBnz/7WozA5zuZmaXLV hSg01IwStvJ8WhMuOzDl+dcEQb1n7oWrF0x0v9WjaAi92wY5rfBR+mXCtuTJN1s2J+LO vrseoPUyRJuOs9uri7jiwx1buZDahphsvrRQhysoMVMi8zk55nM7uYXRxbZUPG3CIROd 9E6A== X-Gm-Message-State: APzg51BHqTQkjwfodSPH3S2EB1zrCJiRea065ZRP6GQ9sKnvkxAeLKiZ dr/yGB6iemicmUBu9IsUUrIP9iz7vSl1HKV0Y64+Wg== X-Google-Smtp-Source: ANB0VdbyCIdmvLvn+i5Eu3Dgys3wf2RT5SxpBwcj0CPLu0I4E9EvBBbnwQhw/Y11RMouMTtVzgbkFRZmnVyD6b4EnC8= X-Received: by 2002:a1f:d507:: with SMTP id m7-v6mr782883vkg.40.1535113328016; Fri, 24 Aug 2018 05:22:08 -0700 (PDT) MIME-Version: 1.0 References: <1535102474-24383-1-git-send-email-sumit.garg@linaro.org> In-Reply-To: From: Sumit Garg Date: Fri, 24 Aug 2018 17:51:56 +0530 Message-ID: To: Jerome Forissier Cc: edk2-devel@lists.01.org, Daniel Thompson , Ard Biesheuvel , Leif Lindholm , tee-dev@lists.linaro.org Subject: Re: [Tee-dev] [PATCH 1/1] ArmPkg/OpteeLib: Add APIs to communicate with OP-TEE X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Aug 2018 12:22:09 -0000 Content-Type: text/plain; charset="UTF-8" On Fri, 24 Aug 2018 at 17:48, Jerome Forissier wrote: > > > > On 08/24/2018 02:09 PM, Sumit Garg wrote: > > On Fri, 24 Aug 2018 at 15:57, Jerome Forissier > > wrote: > >> > >> > >> > >> On 08/24/2018 11:21 AM, Sumit Garg wrote: > >>> Add following APIs to communicate with OP-TEE static TA: > >> > >> "static TAs" are now preferably called "pseudo TAs" [1], > > > > Sure will use "pseudo TAs" instead. > > > >> but it seems this API could be used to invoke "early TAs" as well.> > > Agree this API could work with "early TAs" as well. > > SO the exact, precise description is "pseudo/early TAs" ;-) > Ok I will use this in v2. > > > >> Or any kind of > >> Trusted Application as long as the non-secure infrastructure is > >> available (OP-TEE kernel driver and tee-supplicant daemon). > >> > > > > Current patch for UEFI doesn't provide non-secure infrastructure like > > support for RPC load TA command. I am not sure about usefulness of > > such infrastructure during boot. > > OK that's the info I was missing, if it's for boot time only then > "regular" TAs are out-of-scope clearly. > > > Anyhow this driver could be extended > > to provide non-secure infrastructure as well. > > > > -Sumit > > > >> [1] > >> https://github.com/OP-TEE/optee_os/blob/3.2.0/documentation/optee_design.md#12-trusted-applications > >> > >>> 1. OpteeInit > >>> 2. OpteeOpenSession > >>> 3. OpteeCloseSession > >>> 4. OpteeInvokeFunc > >>> > >>> Cc: Ard Biesheuvel > >>> Cc: Leif Lindholm > >>> Contributed-under: TianoCore Contribution Agreement 1.1 > >>> Signed-off-by: Sumit Garg > >>> --- > >>> ArmPkg/Include/Library/OpteeLib.h | 102 ++++++ > >>> ArmPkg/Library/OpteeLib/Optee.c | 358 +++++++++++++++++++++ > >>> ArmPkg/Library/OpteeLib/OpteeLib.inf | 2 + > >>> ArmPkg/Library/OpteeLib/OpteeSmc.h | 43 +++ > >>> .../Include/IndustryStandard/GlobalPlatform.h | 60 ++-- > >>> 5 files changed, 531 insertions(+), 34 deletions(-) > >>> create mode 100644 ArmPkg/Library/OpteeLib/OpteeSmc.h > >>> copy ArmPkg/Include/Library/OpteeLib.h => MdePkg/Include/IndustryStandard/GlobalPlatform.h (53%) > >> [...] > >>