public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Ilias Apalodimas" <ilias.apalodimas@linaro.org>
To: Sami Mujawar <Sami.Mujawar@arm.com>
Cc: Sughosh Ganu <sughosh.ganu@linaro.org>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>,
	Ard Biesheuvel <Ard.Biesheuvel@arm.com>,
	Leif Lindholm <leif@nuviainc.com>,
	Sahil Malhotra <sahil.malhotra@linaro.org>, nd <nd@arm.com>
Subject: Re: [PATCH edk2-platforms v3 1/2] Drivers/OpTeeRpmb: Add an OP-TEE backed RPMB driver
Date: Tue, 2 Feb 2021 14:33:04 +0200	[thread overview]
Message-ID: <YBlGgKD4SY7kWgAu@apalos.home> (raw)
In-Reply-To: <DB7PR08MB30975CF63A76A18E0932559F84B59@DB7PR08MB3097.eurprd08.prod.outlook.com>

Hi Sami,

On Tue, Feb 02, 2021 at 10:40:32AM +0000, Sami Mujawar wrote:
> Hi Ilias,
> 
> Please see my response inline marked [SAMI].
> 
> Regards,
> 
> Sami Mujawar
> 
> -----Original Message-----
> From: Ilias Apalodimas <ilias.apalodimas@linaro.org> 
> Sent: 01 February 2021 02:01 PM
> To: Sami Mujawar <Sami.Mujawar@arm.com>
> Cc: Sughosh Ganu <sughosh.ganu@linaro.org>; devel@edk2.groups.io; Ard Biesheuvel <Ard.Biesheuvel@arm.com>; Leif Lindholm <leif@nuviainc.com>; Sahil Malhotra <sahil.malhotra@linaro.org>
> Subject: Re: [PATCH edk2-platforms v3 1/2] Drivers/OpTeeRpmb: Add an OP-TEE backed RPMB driver
> 
> Hi Sami,
> 
> 
> [...]
> > > +STATIC
> > > +EFI_STATUS
> > > +ReadWriteRpmb (
> > > +  UINTN  SvcAct,
> > > +  UINTN  Addr,
> > > +  UINTN  NumBytes,
> > > +  UINTN  Offset
> > > +  )
> > > +{
> > > +  ARM_SVC_ARGS  SvcArgs;
> > > +  EFI_STATUS    Status;
> > > +
> > > +  ZeroMem (&SvcArgs, sizeof (SvcArgs));
> > > +
> > > +  SvcArgs.Arg0 = ARM_SVC_ID_FFA_MSG_SEND_DIRECT_REQ_AARCH64;
> > > +  SvcArgs.Arg1 = storage_id;
> > > +  SvcArgs.Arg2 = 0;
> > > +  SvcArgs.Arg3 = SvcAct;
> > > +  SvcArgs.Arg4 = Addr;
> > > +  SvcArgs.Arg5 = NumBytes;
> > > +  SvcArgs.Arg6 = Offset;
> > > +
> > > +  ArmCallSvc (&SvcArgs);
> > > +  if (SvcArgs.Arg3) {
> > > +    DEBUG ((DEBUG_ERROR, "%a: Svc Call 0x%08x Addr: 0x%08x len: 0x%x Offset: 0x%x failed with 0x%x\n",
> > > +     __func__, SvcAct, Addr, NumBytes, Offset, SvcArgs.Arg3));
> > > +  }
> > > +
> > > +  switch (SvcArgs.Arg3) {
> > > +  case ARM_SVC_SPM_RET_SUCCESS:
> > > +    Status = EFI_SUCCESS;
> > > +    break;
> > > +
> > > +  case ARM_SVC_SPM_RET_NOT_SUPPORTED:
> > > +    Status = EFI_UNSUPPORTED;
> > > +    break;
> > > +
> > > +  case ARM_SVC_SPM_RET_INVALID_PARAMS:
> > > +    Status = EFI_INVALID_PARAMETER;
> > > +    break;
> > > +
> > > +  case ARM_SVC_SPM_RET_DENIED:
> > > +    Status = EFI_ACCESS_DENIED;
> > > +    break;
> > > +
> > > +  case ARM_SVC_SPM_RET_NO_MEMORY:
> > > +    Status = EFI_BAD_BUFFER_SIZE;
> > > +    break;
> > > +
> > > +  default:
> > > +    Status = EFI_ACCESS_DENIED;
> > > +  }
> > > [SAMI] Should the error handling here be updated similar to the FF-A StandaloneMmPkg patches?
> > > [/SAMI]
> >
> > I actually picked up the error handling from the previous non-FFA code.
> > I'll check what's on Sughosh latest patches and fix it if there are
> > any differences.
> > Looking at it again EFI_BAD_BUFFER_SIZE can change to indicate out of
> > memory properly anyway.
> >
> 
> Had another look at this. This seems fine if I just change
> EFI_BAD_BUFFER_SIZE -> EFI OUT_OF_RESOURCES because OP-TEE is only
> using these errors from FFA. Eventually the OP-TEE code that launches
> StMM today, will move to FFA and become a separate SP, so that will
> naturally be handled once that's done. I don't see a point of adding
> unused error cases.
> 
> [SAMI] Referring to the FFA specification, DEN0077A, v1.0, section 10.2 FFA_MSG_SEND_DIRECT_REQ and Table 10.8: FFA_ERROR encoding, I think the 
> error codes being handled above would be returned in SvcArgs.Arg2. 

Hmm why ?

> The message flow would be as follows:
>     - Caller sends FFA_MSG_SEND_DIRECT_REQ to the target endpoint.
>     - if the message does not reach the target endpoint, an error code from Table 10.8 may be returned in w2 (i.e. SvcArgs.Arg2)

That would be in the case you have a working TF-A implementation and the
message is never dispatched to the endpoint right?

The current driver is not implementing the whole range of that spec. The
communication between secure/non secure world is still based on the OP-TEE
messaging mechanism. 
The only part that complies to the FFA spec is the communication between the
driver itself and OP-TEE.
>     - If the message reaches the target endpoint, then callee shall invoke one of the following interfaces:
> 	* FFA_MSG_SEND_DIRECT_RESP

So what's happening here, is that we send an SVC with ARM_SVC_ID_FFA_MSG_SEND_DIRECT_REQ_AARCH64.
The op-tee relevant code is located at ./core/arch/arm/kernel/stmm_sp.c
There's 2 things we handle right now on OP-TEE:
1. set the page permissions, after relocating the executable.
2. Read/Write data on our RPMB.

In both cases service_compose_direct_resp() is used to construct the response
and that set the return value on x3.


Regards
/Ilias

> 	* FFA_INTERRUPT
> 	* FFA_SUCCESS
>     This would mean that if the callee responds with FFA_MSG_SEND_DIRECT_RESP, the callee returned error/status code shall be in w/x3-w/x7 (which I think in this case may be in SvcArgs.Arg3).
> [/SAMI]
> 
> Regards
> /Ilias

  reply	other threads:[~2021-02-02 12:33 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-12-16 11:09 [PATCH edk2-platforms v3 0/2] Add support for running StandaloneMm as OP-TEE TA Sughosh Ganu
2020-12-16 11:09 ` [PATCH edk2-platforms v3 1/2] Drivers/OpTeeRpmb: Add an OP-TEE backed RPMB driver Sughosh Ganu
2021-01-27 17:10   ` Sami Mujawar
2021-01-29  8:02     ` Ilias Apalodimas
2021-01-29 11:45       ` Sami Mujawar
2021-02-01 14:00       ` Ilias Apalodimas
2021-02-02 10:40         ` Sami Mujawar
2021-02-02 12:33           ` Ilias Apalodimas [this message]
2021-02-02 14:49             ` Ilias Apalodimas
2021-02-02 15:13               ` Sami Mujawar
2021-02-02 16:27                 ` Ilias Apalodimas
2020-12-16 11:09 ` [PATCH edk2-platforms v3 2/2] StMMRpmb: Add support for building StandaloneMm image for OP-TEE Sughosh Ganu
2021-01-29 10:29   ` Sami Mujawar
2021-01-29 11:47     ` Ilias Apalodimas

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YBlGgKD4SY7kWgAu@apalos.home \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox