All of lore.kernel.org
 help / color / mirror / Atom feed
From: Vikas Gupta <vikas.gupta@broadcom.com>
To: Jens Wiklander <jens.wiklander@linaro.org>,
	Allen Pais <apais@linux.microsoft.com>,
	Sumit Garg <sumit.garg@linaro.org>,
	Peter Huewe <peterhuewe@gmx.de>,
	Jarkko Sakkinen <jarkko@kernel.org>,
	Jason Gunthorpe <jgg@ziepe.ca>,
	Vikas Gupta <vikas.gupta@broadcom.com>,
	Tyler Hicks <tyhicks@linux.microsoft.com>
Cc: "Thirupathaiah Annapureddy" <thiruan@microsoft.com>,
	"Pavel Tatashin" <pasha.tatashin@soleen.com>,
	"Rafał Miłecki" <zajec5@gmail.com>,
	op-tee@lists.trustedfirmware.org,
	linux-integrity@vger.kernel.org,
	"BCM Kernel Feedback" <bcm-kernel-feedback-list@broadcom.com>,
	linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
Date: Fri, 16 Jul 2021 08:26:06 +0530	[thread overview]
Message-ID: <CAHLZf_tpwnE8X8BL4GnhFQMzhh+395qjAdGrxjeM-wGtZ_snCQ@mail.gmail.com> (raw)
In-Reply-To: <20210716022332.GC3232@sequoia>

[-- Attachment #1: Type: text/plain, Size: 3407 bytes --]

Hi Tyler/Allen,
 The patch looks good to me.

Thanks,
Vikas


> > From: Allen Pais <apais@linux.microsoft.com>
> >
> > Implement a .shutdown hook that will be called during a kexec operation
> > so that the TEE shared memory, session, and context that were set up
> > during .probe can be properly freed/closed.
> >
> > Additionally, don't use dma-buf backed shared memory for the
> > fw_shm_pool. dma-buf backed shared memory cannot be reliably freed and
> > unregistered during a kexec operation even when tee_shm_free() is called
> > on the shm from a .shutdown hook. The problem occurs because
> > dma_buf_put() calls fput() which then uses task_work_add(), with the
> > TWA_RESUME parameter, to queue tee_shm_release() to be called before the
> > current task returns to user mode. However, the current task never
> > returns to user mode before the kexec completes so the memory is never
> > freed nor unregistered.
> >
> > Use tee_shm_alloc_kernel_buf() to avoid dma-buf backed shared memory
> > allocation so that tee_shm_free() can directly call tee_shm_release().
> > This will ensure that the shm can be freed and unregistered during a
> > kexec operation.
> >
> > Fixes: 246880958ac9 ("firmware: broadcom: add OP-TEE based BNXT f/w manager")
> > Cc: stable@vger.kernel.org
> > Signed-off-by: Allen Pais <apais@linux.microsoft.com>
> > Co-developed-by: Tyler Hicks <tyhicks@linux.microsoft.com>
> > Signed-off-by: Tyler Hicks <tyhicks@linux.microsoft.com>
> > ---
> >  drivers/firmware/broadcom/tee_bnxt_fw.c | 14 +++++++++++---
> >  1 file changed, 11 insertions(+), 3 deletions(-)
> >
> > diff --git a/drivers/firmware/broadcom/tee_bnxt_fw.c b/drivers/firmware/broadcom/tee_bnxt_fw.c
> > index ed10da5313e8..a5bf4c3f6dc7 100644
> > --- a/drivers/firmware/broadcom/tee_bnxt_fw.c
> > +++ b/drivers/firmware/broadcom/tee_bnxt_fw.c
> > @@ -212,10 +212,9 @@ static int tee_bnxt_fw_probe(struct device *dev)
> >
> >       pvt_data.dev = dev;
> >
> > -     fw_shm_pool = tee_shm_alloc(pvt_data.ctx, MAX_SHM_MEM_SZ,
> > -                                 TEE_SHM_MAPPED | TEE_SHM_DMA_BUF);
> > +     fw_shm_pool = tee_shm_alloc_kernel_buf(pvt_data.ctx, MAX_SHM_MEM_SZ);
> >       if (IS_ERR(fw_shm_pool)) {
> > -             dev_err(pvt_data.dev, "tee_shm_alloc failed\n");
> > +             dev_err(pvt_data.dev, "tee_shm_alloc_kernel_buf failed\n");
> >               err = PTR_ERR(fw_shm_pool);
> >               goto out_sess;
> >       }
> > @@ -242,6 +241,14 @@ static int tee_bnxt_fw_remove(struct device *dev)
> >       return 0;
> >  }
> >
> > +static void tee_bnxt_fw_shutdown(struct device *dev)
> > +{
> > +     tee_shm_free(pvt_data.fw_shm_pool);
> > +     tee_client_close_session(pvt_data.ctx, pvt_data.session_id);
> > +     tee_client_close_context(pvt_data.ctx);
> > +     pvt_data.ctx = NULL;
> > +}
> > +
> >  static const struct tee_client_device_id tee_bnxt_fw_id_table[] = {
> >       {UUID_INIT(0x6272636D, 0x2019, 0x0716,
> >                   0x42, 0x43, 0x4D, 0x5F, 0x53, 0x43, 0x48, 0x49)},
> > @@ -257,6 +264,7 @@ static struct tee_client_driver tee_bnxt_fw_driver = {
> >               .bus            = &tee_bus_type,
> >               .probe          = tee_bnxt_fw_probe,
> >               .remove         = tee_bnxt_fw_remove,
> > +             .shutdown       = tee_bnxt_fw_shutdown,
> >       },
> >  };
> >
> > --
> > 2.25.1
> >
>
> ----- End forwarded message -----

[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 4206 bytes --]

       reply	other threads:[~2021-07-16  2:56 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20210716022332.GC3232@sequoia>
2021-07-16  2:56 ` Vikas Gupta [this message]
     [not found] ` <CAHLZf_t5U1bh1H8sULbJz7xrZ-r3Dcmxuw9MMmG2fehS3C72uQ@mail.gmail.com>
2021-07-19 10:49   ` [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec Jens Wiklander
2021-07-20  2:32     ` Florian Fainelli
2021-07-20 17:57       ` Florian Fainelli
2021-07-20 18:15         ` Tyler Hicks
2021-07-20 18:59           ` Florian Fainelli
2021-06-14 22:33 [PATCH v5 0/8] tee: Improve support for kexec and kdump Tyler Hicks
2021-06-14 22:33 ` [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec Tyler Hicks

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAHLZf_tpwnE8X8BL4GnhFQMzhh+395qjAdGrxjeM-wGtZ_snCQ@mail.gmail.com \
    --to=vikas.gupta@broadcom.com \
    --cc=apais@linux.microsoft.com \
    --cc=bcm-kernel-feedback-list@broadcom.com \
    --cc=jarkko@kernel.org \
    --cc=jens.wiklander@linaro.org \
    --cc=jgg@ziepe.ca \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mips@vger.kernel.org \
    --cc=op-tee@lists.trustedfirmware.org \
    --cc=pasha.tatashin@soleen.com \
    --cc=peterhuewe@gmx.de \
    --cc=sumit.garg@linaro.org \
    --cc=thiruan@microsoft.com \
    --cc=tyhicks@linux.microsoft.com \
    --cc=zajec5@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.