All of lore.kernel.org
 help / color / mirror / Atom feed
From: Julien Grall <julien.grall@arm.com>
To: Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
	xen-devel@lists.xenproject.org, xen-devel@lists.xen.org
Cc: tee-dev@lists.linaro.org, Stefano Stabellini <sstabellini@kernel.org>
Subject: Re: [PATCH v2 08/13] optee: add support for RPC SHM buffers
Date: Tue, 18 Sep 2018 17:11:21 +0100	[thread overview]
Message-ID: <109648b2-440d-70f0-a7c0-b9b47a74c147@arm.com> (raw)
In-Reply-To: <cccf60b0-2cac-3ac9-987c-63b79ceb0031@epam.com>



On 09/12/2018 02:51 PM, Volodymyr Babchuk wrote:
> Hi,

Hi,


> On 12.09.18 13:59, Julien Grall wrote:
>> Hi Volodymyr,
>>
>> On 09/11/2018 08:30 PM, Volodymyr Babchuk wrote:
>>> On 11.09.18 14:53, Julien Grall wrote:
>>>> On 10/09/18 18:44, Volodymyr Babchuk wrote:
>>>>> On 10.09.18 16:01, Julien Grall wrote:
>>>>>> On 03/09/18 17:54, Volodymyr Babchuk wrote:
>>>>>>> OP-TEE usually uses the same idea with command buffers (see
>>>>>>> previous commit) to issue RPC requests. Problem is that initially
>>>>>>> it has no buffer, where it can write request. So the first RPC
>>>>>>> request it makes is special: it requests NW to allocate shared
>>>>>>> buffer for other RPC requests. Usually this buffer is allocated
>>>>>>> only once for every OP-TEE thread and it remains allocated all
>>>>>>> the time until shutdown.
>>>>>>>
>>>>>>> Mediator needs to pin this buffer(s) to make sure that domain can't
>>>>>>> transfer it to someone else. Also it should be mapped into XEN
>>>>>>> address space, because mediator needs to check responses from
>>>>>>> guests.
>>>>>>
>>>>>> Can you explain why you always need to keep the shared buffer 
>>>>>> mapped in Xen? Why not using access_guest_memory_by_ipa every time 
>>>>>> you want to get information from the guest?
>>>>> Sorry, I just didn't know about this mechanism. But for performance 
>>>>> reasons,
>>>>> I'd like to keep this buffers always mapped. You see, RPC returns are
>>>>> very frequent (for every IRQ, actually). So I think, it will be costly
>>>>> to map/unmap this buffer every time.
>>>>
>>>> This is a bit misleading... This copy will *only* happen for IRQ 
>>>> during an RPC. What are the chances for that? Fairly limited. If 
>>>> this is happening too often, then the map/unmap here will be your 
>>>> least concern.
>>> Now, this copy will happen for every IRQ when CPU is in S-EL1/S-EL0 
>>> mode. Chances are quite high, I must say.
>>> Look: OP-TEE or (TA) is doing something, like encrypting some buffer, 
>>> for example. IRQ fires, OP-TEE immediately executes RPC return (right 
>>> from interrupt handler), so NW can handle interrupt. Then NW returns 
>>> control back to OP-TEE, if it wants to.
>>
>> I understand this... But the map/unmap should be negligible over the 
>> rest of the context.
> I thought that map/unmap is quite costly operation, but I can be wrong 
> there.

At the moment, map/unmap is nearly a nop on Arm64 because all the RAM is 
mapped (I would avoid to assume that thought :)). The only cost if going 
through the p2m to translate the IPA to PA.

For Arm32, each CPUs has its own page-tables and the map/unmap (and TLB 
flush) will be done locally. I would still expect the impact to be minimal.

Note that today map_domain_page on Arm32 is quite simplistic. It would 
be possible to optimize it for lowering the impact of map/unmap.

[...]

>>>
>>>>
>>>>>> It feels quite suspicious to free the memory in Xen before calling 
>>>>>> OP-TEE. I think this need to be done afterwards.
>>>>>>
>>>>> No, it is OP-TEE asked to free buffer. This function is called, 
>>>>> when NW returns from the RPC. So at this moment NW freed the buffer.
>>>>
>>>> But you forward that call to OP-TEE after. So what would OP-TEE do 
>>>> with that?
>>> Happily resume interrupted work. There is how RPC works:
>>>
>>> 1. NW client issues STD call (or yielding call in terms of SMCCC)
>>> 2. OP-TEE starts its work, but it is needed to be interrupted for some
>>>     reason: IRQ arrived, it wants to block on a mutex, it asks NW to do
>>>     some work (like allocating memory or loading TA). This is called 
>>> "RPC
>>>     return".
>>> 3. OP-TEE suspends thread and does return from SMC call with code
>>>     OPTEE_SMC_RPC_VAL(SOME_CMD) in a0, and some optional parameters in
>>>     other registers
>>> 4. NW sees that this is a RPC, and not completed STD call, so it does
>>>     SOME_CMD and  issues another SMC with code
>>>     OPTEE_SMC_CALL_RETURN_FROM_RPC in a0
>>> 5. OP-TEE wakes up suspended thread and continues execution
>>> 6. pts 2-5 are repeated until OP-TEE finishes the work
>>> 7. It returns from last SMC call with code OPTEE_SMC_RETURN_SUCCESS/
>>>     OPTEE_SMC_RETURN_some_error in a0.
>>> 8. optee driver sees that call from pt.1 is finished at least and
>>>     returns control back to client
>>
>> Thank you for the explanation. As I mentioned in another thread, it 
>> would be good to have some kind of highly level explanation in the 
>> tree and all those interaction. If it is already existing, then 
>> pointer in the code.
> High level is covered at [1], and  low level is covered in already 
> mentioned header files.

Could you add those pointers at the top of the OP-TEE file?

> But I don't know about any explanation at detail level I gave you above.

That's fine. Can you add that in the commit message?

Cheers,

-- 
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  reply	other threads:[~2018-09-18 16:11 UTC|newest]

Thread overview: 56+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-09-03 16:54 [PATCH v2 00/13] TEE mediator (and OP-TEE) support in XEN Volodymyr Babchuk
2018-09-03 16:54 ` [PATCH v2 01/13] arm: add generic TEE mediator framework Volodymyr Babchuk
2018-09-03 17:22   ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 02/13] domctl: add tee_op domctl Volodymyr Babchuk
2018-09-03 17:16   ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 03/13] arm: tee: add OP-TEE header files Volodymyr Babchuk
2018-09-03 16:54 ` [PATCH v2 04/13] optee: add OP-TEE mediator skeleton Volodymyr Babchuk
2018-09-03 17:38   ` Julien Grall
2018-09-03 17:55     ` Volodymyr Babchuk
2018-09-04 19:48       ` Julien Grall
2018-09-05 12:17         ` Volodymyr Babchuk
2018-09-05 13:16           ` Julien Grall
2018-09-05 13:38             ` Volodymyr Babchuk
2018-09-05 13:47               ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 05/13] optee: add fast calls handling Volodymyr Babchuk
2018-09-05 13:36   ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 06/13] optee: add domain contexts Volodymyr Babchuk
2018-09-05 14:10   ` Julien Grall
2018-09-05 14:18     ` Andrew Cooper
2018-09-05 14:23     ` Volodymyr Babchuk
2018-09-05 14:27       ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 07/13] optee: add std call handling Volodymyr Babchuk
2018-09-05 15:17   ` Julien Grall
2018-09-10 17:37     ` Volodymyr Babchuk
2018-09-11 11:19       ` Julien Grall
2018-09-11 11:31         ` Volodymyr Babchuk
2018-09-11 13:30           ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 08/13] optee: add support for RPC SHM buffers Volodymyr Babchuk
2018-09-10 13:01   ` Julien Grall
2018-09-10 17:44     ` Volodymyr Babchuk
2018-09-11 11:53       ` Julien Grall
2018-09-11 19:30         ` Volodymyr Babchuk
2018-09-12 10:59           ` Julien Grall
2018-09-12 13:51             ` Volodymyr Babchuk
2018-09-18 16:11               ` Julien Grall [this message]
2018-09-03 16:54 ` [PATCH v2 09/13] optee: add support for arbitrary shared memory Volodymyr Babchuk
2018-09-10 14:02   ` Julien Grall
2018-09-10 18:04     ` Volodymyr Babchuk
2018-09-11 13:37       ` Julien Grall
2018-09-11 19:33         ` Volodymyr Babchuk
2018-09-12 11:02           ` Julien Grall
2018-09-12 12:45             ` Volodymyr Babchuk
2018-09-18 16:19               ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 10/13] optee: add support for RPC commands Volodymyr Babchuk
2018-09-10 15:34   ` Julien Grall
2018-09-10 18:14     ` Volodymyr Babchuk
2018-09-11 13:56       ` Julien Grall
2018-09-11 18:58         ` Volodymyr Babchuk
2018-09-18 16:50           ` Julien Grall
2018-09-19 15:21             ` Volodymyr Babchuk
2018-09-03 16:54 ` [PATCH v2 11/13] libxc: add xc_dom_tee_enable(...) function Volodymyr Babchuk
2018-09-06 10:59   ` Wei Liu
2018-09-03 16:54 ` [PATCH v2 12/13] xl: add "tee" option for xl.cfg Volodymyr Babchuk
2018-09-11 14:23   ` Julien Grall
2018-09-03 16:54 ` [PATCH v2 13/13] lixl: arm: create optee firmware node in DT if tee=1 Volodymyr Babchuk
2018-09-11 14:48   ` Julien Grall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=109648b2-440d-70f0-a7c0-b9b47a74c147@arm.com \
    --to=julien.grall@arm.com \
    --cc=sstabellini@kernel.org \
    --cc=tee-dev@lists.linaro.org \
    --cc=volodymyr_babchuk@epam.com \
    --cc=xen-devel@lists.xen.org \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.