From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 787BAC04A6A for ; Wed, 2 Aug 2023 13:55:36 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 98AC786897; Wed, 2 Aug 2023 15:55:34 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=chromium.org header.i=@chromium.org header.b="APKgK/PA"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 6074886879; Wed, 2 Aug 2023 15:55:33 +0200 (CEST) Received: from mail-ed1-x529.google.com (mail-ed1-x529.google.com [IPv6:2a00:1450:4864:20::529]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 6960586802 for ; Wed, 2 Aug 2023 15:55:30 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=sjg@google.com Received: by mail-ed1-x529.google.com with SMTP id 4fb4d7f45d1cf-522b77956d2so5949912a12.3 for ; Wed, 02 Aug 2023 06:55:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1690984530; x=1691589330; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=R3AIg7NzQbjCvbffjrlzEW8s3e3nEccCUq1Y0pzrCIE=; b=APKgK/PAfOILjGjkUDo08HzExjGkr5WNX7IWR40jezZMbQ36gdPUGn0mCsu9U7A3+L /P7KtasRUP/mx5QKOg5wvA7+8HTQd+gHW8iWYf3w4a9waEp+vVRbI8gVzcgSv6kgnZzp JG3vS46+RVpgC8lUV0ASAf9gbOw2yCeLSa3Ns= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1690984530; x=1691589330; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=R3AIg7NzQbjCvbffjrlzEW8s3e3nEccCUq1Y0pzrCIE=; b=ciP5LLR1qlf1JxFZ7yi794TN/4p1W/YBLjp3FNyvcAgxeEwQn85UF5E3/brU/XW4VB UFC1jpdeGunV1vNuqeUTITukzlTwFU7ZVrv8wgl/LWYQ0AAHuNYxAzfr7v3On1D3ajWu qGWILH1Kvq3eNiCVl08eS2mEaKXLRD03Ec6ZTSekcIr0nsClQZQuRwD+r16b1T9HizIZ 49y5Y5nQuBgqYo3P0Pxaf6eY2y5x35KBllFqJfXsS+0Iw7fT+tZDJHiPMRGgCt1YQQuh R6Tfdo9GN/TGkKAKjL8sgpo8ISPVym4XxftXHf/MUATUsjTVfx11fduCek2XhAsdDtYI D5ig== X-Gm-Message-State: ABy/qLaat5OpMe55AD7Sh+DHR+lxkTWb45vUzd8jWamq/03MsDRekVFY qlHF/5P7uQ0Z5vBu94Leezkf44etxddlbSrt7xSNW/dz4i3ZaWYDj4k= X-Google-Smtp-Source: APBJJlHk7d43RUMLA8Cy+SuPSYza/Kb2MFa/i6lnBg7EYq7Z89CAmc6s6f/AQHj8QArhAL+ModE/HqOXalf1Z9jvpSo= X-Received: by 2002:aa7:d702:0:b0:51d:9ddf:f0f6 with SMTP id t2-20020aa7d702000000b0051d9ddff0f6mr5558667edq.36.1690984529657; Wed, 02 Aug 2023 06:55:29 -0700 (PDT) MIME-Version: 1.0 References: <20230727160712.81477-1-abdellatif.elkhlifi@arm.com> <20230727160712.81477-10-abdellatif.elkhlifi@arm.com> <20230727164345.GH3630934@bill-the-cat> <20230728135415.GU3630934@bill-the-cat> <20230731114628.GA112180@e130802.arm.com> <20230801150057.GO3630934@bill-the-cat> <20230801161008.GA45125@e130802.arm.com> <20230801161917.GU3630934@bill-the-cat> In-Reply-To: From: Simon Glass Date: Wed, 2 Aug 2023 07:55:18 -0600 Message-ID: Subject: Re: [PATCH v17 09/10] arm_ffa: efi: introduce FF-A MM communication To: Ilias Apalodimas Cc: Tom Rini , Abdellatif El Khlifi , achin.gupta@arm.com, nd@arm.com, u-boot@lists.denx.de, jens.wiklander@linaro.org Content-Type: text/plain; charset="UTF-8" X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Hi Ilias, On Wed, 2 Aug 2023 at 07:48, Ilias Apalodimas wrote: > > Hi Simon, > > On Wed, 2 Aug 2023 at 16:44, Simon Glass wrote: > > > > Hi Ilias, > > > > On Wed, 2 Aug 2023 at 07:43, Ilias Apalodimas > > wrote: > > > > > > On Wed, 2 Aug 2023 at 16:42, Simon Glass wrote: > > > > > > > > Hi Ilias, > > > > > > > > On Wed, 2 Aug 2023 at 07:38, Ilias Apalodimas > > > > wrote: > > > > > > > > > > Hi Simon, > > > > > > > > > > On Wed, 2 Aug 2023 at 16:34, Simon Glass wrote: > > > > > > > > > > > > Hi Ilias, > > > > > > > > > > > > On Wed, 2 Aug 2023 at 07:27, Ilias Apalodimas > > > > > > wrote: > > > > > > > > > > > > > > Hi Simon, > > > > > > > > > > > > > > > > > > > > > On Wed, 2 Aug 2023 at 16:09, Simon Glass wrote: > > > > > > > > > > > > > > > > Hi Ilias, > > > > > > > > > > > > > > > > On Wed, 2 Aug 2023 at 07:02, Ilias Apalodimas > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > Hi Simon, > > > > > > > > > > > > > > > > > > On Wed, 2 Aug 2023 at 15:52, Simon Glass wrote: > > > > > > > > > > > > > > > > > > > > Hi Ilias, > > > > > > > > > > > > > > > > > > > > On Wed, 2 Aug 2023 at 00:52, Ilias Apalodimas > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > > On Tue, 1 Aug 2023 at 19:19, Tom Rini wrote: > > > > > > > > > > > > > > > > > > > > > > > > On Tue, Aug 01, 2023 at 05:10:08PM +0100, Abdellatif El Khlifi wrote: > > > > > > > > > > > > > Hi guys, > > > > > > > > > > > > > > > > > > > > > > > > > > On Tue, Aug 01, 2023 at 11:00:57AM -0400, Tom Rini wrote: > > > > > > > > > > > > > > > > > > > > > ... > > > > > > > > > > > > > > > > > > > > > Changelog: > > > > > > > > > > > > > > > > > > > > > =============== > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > v17: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > * show a debug message rather than an error when FF-A is not detected > > > > > > > > > > > > > > > > > > > > [snip] > > > > > > > > > > > > > > > > > > > > > diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig > > > > > > > > > > > > > > > > > > > > > index c5835e6ef6..8fbadb9201 100644 > > > > > > > > > > > > > > > > > > > > > --- a/lib/efi_loader/Kconfig > > > > > > > > > > > > > > > > > > > > > +++ b/lib/efi_loader/Kconfig > > > > > > > > > > > > > > > > > > > > > @@ -55,13 +55,53 @@ config EFI_VARIABLE_FILE_STORE > > > > > > > > > > > > > > > > > > > > > stored as file /ubootefi.var on the EFI system partition. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > config EFI_MM_COMM_TEE > > > > > > > > > > > > > > > > > > > > > - bool "UEFI variables storage service via OP-TEE" > > > > > > > > > > > > > > > > > > > > > - depends on OPTEE > > > > > > > > > > > > > > > > > > > > > + bool "UEFI variables storage service via the trusted world" > > > > > > > > > > > > > > > > > > > > > + depends on OPTEE && ARM_FFA_TRANSPORT > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > You didn't get my changes in here however. If you can do EFI_MM_COMM_TEE > > > > > > > > > > > > > > > > > > > > without ARM_FFA_TRANSPORT (as lx2160ardb_tfa_stmm_defconfig does) then > > > > > > > > > > > > > > > > > > > > you don't make this option depend on . If FF-A is only > > > > > > > > > > > > > > > > > > > > for use here, you make FF-A depend on this, and the FF-A specific > > > > > > > > > > > > > > > > > > > > variable depend on ARM_FFA_TRANSPORT. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Abdellatif hinted at what's going on here. When I added this Kconfig > > > > > > > > > > > > > > > > > > > option to lx2160 FF-A wasn't implemented yet. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > The defconfig has existed since May 2020, which is when you added > > > > > > > > > > > > > > > > > > EFI_MM_COMM_TEE itself too. So I think it's that no one did the check I > > > > > > > > > > > > > > > > > > did until now and saw this series was disabling what was on the other > > > > > > > > > > > > > > > > > > platform. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Since FF-A isn't a new > > > > > > > > > > > > > > > > > > > communication mechanism but builds upon the existing SMCs to build an > > > > > > > > > > > > > > > > > > > easier API, I asked Abdellatif to hide this complexity. > > > > > > > > > > > > > > > > > > > We had two options, either make Kconfig options for either FF-A or the > > > > > > > > > > > > > > > > > > > traditional SMCs and remove the dependencies, or piggyback on FF-As > > > > > > > > > > > > > > > > > > > discovery mechanism and make the choice at runtime. The latter has a > > > > > > > > > > > > > > > > > > > small impact on code size, but imho makes developers' life a lot > > > > > > > > > > > > > > > > > > > easier. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > I'm not sure how much you can do a run-time option here since you're > > > > > > > > > > > > > > > > > > setting a bunch of default values for FF-A to 0 in Kconfig. If we're > > > > > > > > > > > > > > > > > > supposed to be able to get them at run time, we shouldn't need a Kconfig > > > > > > > > > > > > > > > > > > option at all. I'm also not sure how valid a use case it is where we > > > > > > > > > > > > > > > > > > won't know at build time what the rest of the firmware stack supports > > > > > > > > > > > > > > > > > > here. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > That's a fair point. FF-A in theory has APIs to discover memory. > > > > > > > > > > > > > > > > > Abdellatif, why do we need the Kconfigs for shared memory on FF-A? > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > The statically carved out MM shared buffer address, size and offset cannot be discovered by FF-A ABIs. > > > > > > > > > > > > > > > > The MM communication driver in U-Boot could allocate the buffer and share it with the MM SP but > > > > > > > > > > > > > > > > we do not implement that support currently in either U-Boot or UEFI. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Ok, that's a bit unfortunate, but Tom is right. Having the FF-A > > > > > > > > > > > > > > > addresses show up is as confusing as having Kconfig options for > > > > > > > > > > > > > > > discrete options. The whole point of my suggestion was to make users' > > > > > > > > > > > > > > > lives easier. Apologies for the confusion but can you bring back the > > > > > > > > > > > > > > > ifdefs? Looking at the patch this should be minimal just use > > > > > > > > > > > > > > > ifdef ARM_FFA_TRANSPORT and ifndef ARM_FFA_TRANSPORT. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Tom you prefer that as well? > > > > > > > > > > > > > > > > > > > > > > > > > > > > Pending an answer to Jens' feedback, yes, going back to #ifdef's is > > > > > > > > > > > > > > fine, especially since default values of 0 are nonsense in this case > > > > > > > > > > > > > > (and as Heinrich's patch re SYS_MALLOC_LEN shows, dangerous since 0 != > > > > > > > > > > > > > > 0x0 once we do string comparisons). > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > I'd like to give some context why it's important for Corstone-1000 platform > > > > > > > > > > > > > that the DT passed to the kernel matches the official kernel DT. > > > > > > > > > > > > > > > > > > > > > > > > Note that we've set aside the "should this be in DT or not" question. > > > > > > > > > > > > > > > > > > > > > > > > > There is a SystemReady IR 2.0 test checking the DT. It compares the DT > > > > > > > > > > > > > passed by U-Boot with a reference DT (the kernel DT) . The test fails if there > > > > > > > > > > > > > is a mismatch. So, if we add a DT node in U-Boot and the node is not upstreamed > > > > > > > > > > > > > to the kernel DT, the DT test will fail. > > > > > > > > > > > > > > > > > > > > > > > > This is overall good and progress. > > > > > > > > > > > > > > > > > > > > > > > > > To be approved by the kernel DT maintainers, the node should have a use case > > > > > > > > > > > > > in the kernel which is not the case. > > > > > > > > > > > > > > > > > > > > > > > > This is, I believe / hope wrong. It needs to be in the dt-schema > > > > > > > > > > > > repository, not strictly "the kernel". For example, bootph-all (etc) > > > > > > > > > > > > are in dt-schema and so can be in the upstream kernel but are not used > > > > > > > > > > > > in the kernel itself. > > > > > > > > > > > > > > > > > > > > > > > > > There is a solution for this which is deleting the node we don't want to pass to > > > > > > > > > > > > > the kernel using delete-node in the U-Boot DT. > > > > > > > > > > > > > > > > > > > > > > > > Something like this will likely be needed, in the end, at least for some > > > > > > > > > > > > cases. But the goal is that everything gets in to dt-schema. > > > > > > > > > > > > > > > > > > > > > > We are already working on U-Boot on that. The idea is rather simple. > > > > > > > > > > > We will have an array with nodes and node entries. Before we boot up > > > > > > > > > > > we'll scan that array, if a node entry exists we will delete that, > > > > > > > > > > > otherwise we will just get rid of the entire node. That should be > > > > > > > > > > > pretty easy to maintain and extend. U-Boot will then be able to use > > > > > > > > > > > it;s internal bidings without polluting the DT we handover to the > > > > > > > > > > > kernel. > > > > > > > > > > > > > > > > > > > > This is not pollution - we have moved past that now and Linux has > > > > > > > > > > accepted some U-Boot bindings. This is the DT and if there are things > > > > > > > > > > in it that are not related to Linux, it can ignore them. > > > > > > > > > > > > > > > > > > > > We should add whatever bindings we need to make U-Boot work > > > > > > > > > > efficiently and correctly. > > > > > > > > > > > > > > > > > > > > > > > > > > > > The cases that are already accepted make sense. Things like the > > > > > > > > > public part of the certificates used to authenticate capsule updates > > > > > > > > > or the encoding of the recent a/b update nodes are not needed in any > > > > > > > > > way in an OS. Those don't make sense to upstream and those are > > > > > > > > > polluting the DT and need stripping > > > > > > > > > > > > > > > > It doesn't matter that Linux doesn't *need* it. If it is there it will > > > > > > > > have to accommodate it. We have loads of Linux stuff in the DT that > > > > > > > > means nothing to U-Boot. Many of the bindings chosen by Linux are > > > > > > > > wildly inefficient for U-Boot to implement. > > > > > > > > > > > > > > > > We don't need to strip anything. This is not pollution. It is a > > > > > > > > binding agreement between projects. > > > > > > > > > > > > > > > > > > > > > > I am not a maintainer, but I doubt they view it that way. In any > > > > > > > > > > > > Who? > > > > > > > > > > > > > case, the DT produced by u-boot fails to pass the certification on > > > > > > > > > > > > U-Boot > > > > > > > > > > > > > every single platform that uses nonupstream nodes, so cleaning that up > > > > > > > is needed. If people care enough and upstream those bindings we can > > > > > > > preserve them > > > > > > > > > > > > Yes I agree, and the bindings that are added need to be upstream in > > > > > > dt-schema. This applies also to the work that Linaro does. > > > > > > > > > > > > I will mention this to Sugosh as well as he is adding a public key. > > > > > > > > > > He is already aware, he is working on a PoC that does exactly what I > > > > > described. Once we verify devices are starting to pass the > > > > > SystemReady2.0 certification he will send an RFC > > > > > > > > What PoC? You mean bindings? > > > > > > stripping of bindings that are not upstreamed in the dt-schema > > > > If that is what you want to do, then the binding needs to go upstream > > before we accept his patches. > > This makes no sense whatsoever. Sughosh isn't adding anything new. > Having the public portion on the DT file is something you insisted > upon years ago and even reverted patches from me that had the key as a > Kconfig option (which notably suffered from non of these problems, or > the increased complexity we are adding now). What Sughosh is adding > is autogenerating that, instead of having to manually stitch the DT. Yes and it forms part of the machine's DT and needs to have a binding, just like the Binman nodes need a binding. Isn't this the whole point? Either: - we upstream the U-Boot bindings, or - we allow U-Boot to put whatever it wants in there and accept it I much prefer the first option since we can run validation on it, as I'm sure you would prefer. But removing nodes before booting just because we haven't upstreamed things is just going to lead to no one bothering to do it. Regards, Simon