diff mbox series

[v3,2/2] firmware: arm_scmi: Add optee transport

Message ID 20211018114046.25571-2-etienne.carriere@linaro.org (mailing list archive)
State New, archived
Headers show
Series [v3,1/2] dt-bindings: arm: Add OP-TEE transport for SCMI | expand

Commit Message

Etienne Carriere Oct. 18, 2021, 11:40 a.m. UTC
Add a new transport channel to the SCMI firmware interface driver for
SCMI message exchange based on optee transport channel. The optee
transport is realized by connecting and invoking OP-TEE SCMI service
interface PTA.

Optee transport support (CONFIG_ARM_SCMI_TRANSPORT_OPTEE) is default
enabled when optee driver (CFG_OPTEE) is enabled. Effective optee
transport is setup upon OP-TEE SCMI service discovery at optee
device initialization. For this SCMI UUID is registered to the optee
bus for probing. This is done at device_init initcall level, after
optee bus initialization that is done at subsys_init level, as the scmi
driver initialization.

The optee transport can use a statically defined shared memory in
which case SCMI device tree node defines it using an "arm,scmi-shmem"
compatible phandle through property shmem. Alternatively, optee transport
allocates the shared memory buffer from the optee driver when no shmem
property is defined.

The protocol used to exchange SCMI message over that shared memory is
negotiated between optee transport driver and the OP-TEE service through
capabilities exchange.

OP-TEE SCMI service is integrated in OP-TEE since its release tag 3.13.0.
The service interface is published in [1].

Link: [1] https://github.com/OP-TEE/optee_os/blob/3.13.0/lib/libutee/include/pta_scmi_client.h
Cc: Cristian Marussi <cristian.marussi@arm.com>
Cc: Sudeep Holla <sudeep.holla@arm.com>
Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
---
Changes since v2:
- Rebase on for-next/scmi, based on Linux v5.15-rc1.
- Implement support for dynamic and static shared memory.
- Factorize some functions and simplify transport exit sequence.
- Rename driver source file from optee_service.c to optee.c.

No change since v1
---
 drivers/firmware/arm_scmi/Kconfig  |  12 +
 drivers/firmware/arm_scmi/Makefile |   1 +
 drivers/firmware/arm_scmi/common.h |   3 +
 drivers/firmware/arm_scmi/driver.c |   3 +
 drivers/firmware/arm_scmi/optee.c  | 559 +++++++++++++++++++++++++++++
 5 files changed, 578 insertions(+)
 create mode 100644 drivers/firmware/arm_scmi/optee.c

Comments

Cristian Marussi Oct. 18, 2021, 7:43 p.m. UTC | #1
On Mon, Oct 18, 2021 at 01:40:46PM +0200, Etienne Carriere wrote:
> Add a new transport channel to the SCMI firmware interface driver for
> SCMI message exchange based on optee transport channel. The optee
> transport is realized by connecting and invoking OP-TEE SCMI service
> interface PTA.
> 
> Optee transport support (CONFIG_ARM_SCMI_TRANSPORT_OPTEE) is default
> enabled when optee driver (CFG_OPTEE) is enabled. Effective optee
> transport is setup upon OP-TEE SCMI service discovery at optee
> device initialization. For this SCMI UUID is registered to the optee
> bus for probing. This is done at device_init initcall level, after
> optee bus initialization that is done at subsys_init level, as the scmi
> driver initialization.
> 
> The optee transport can use a statically defined shared memory in
> which case SCMI device tree node defines it using an "arm,scmi-shmem"
> compatible phandle through property shmem. Alternatively, optee transport
> allocates the shared memory buffer from the optee driver when no shmem
> property is defined.
> 
> The protocol used to exchange SCMI message over that shared memory is
> negotiated between optee transport driver and the OP-TEE service through
> capabilities exchange.
> 
> OP-TEE SCMI service is integrated in OP-TEE since its release tag 3.13.0.
> The service interface is published in [1].
> 
> Link: [1] https://github.com/OP-TEE/optee_os/blob/3.13.0/lib/libutee/include/pta_scmi_client.h
> Cc: Cristian Marussi <cristian.marussi@arm.com>
> Cc: Sudeep Holla <sudeep.holla@arm.com>
> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
> ---
> Changes since v2:
> - Rebase on for-next/scmi, based on Linux v5.15-rc1.
> - Implement support for dynamic and static shared memory.
> - Factorize some functions and simplify transport exit sequence.
> - Rename driver source file from optee_service.c to optee.c.
> 
> No change since v1
> ---

Hi Etienne,

a few remarks below.

>  drivers/firmware/arm_scmi/Kconfig  |  12 +
>  drivers/firmware/arm_scmi/Makefile |   1 +
>  drivers/firmware/arm_scmi/common.h |   3 +
>  drivers/firmware/arm_scmi/driver.c |   3 +
>  drivers/firmware/arm_scmi/optee.c  | 559 +++++++++++++++++++++++++++++
>  5 files changed, 578 insertions(+)
>  create mode 100644 drivers/firmware/arm_scmi/optee.c
> 
> diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> index 3d7081e84853..9107e249023c 100644
> --- a/drivers/firmware/arm_scmi/Kconfig
> +++ b/drivers/firmware/arm_scmi/Kconfig
> @@ -77,6 +77,18 @@ config ARM_SCMI_TRANSPORT_VIRTIO
>  	  If you want the ARM SCMI PROTOCOL stack to include support for a
>  	  transport based on VirtIO, answer Y.
>  
> +config ARM_SCMI_TRANSPORT_OPTEE
> +	bool "SCMI transport based on OP-TEE service"
> +	depends on OPTEE
> +	select ARM_SCMI_HAVE_TRANSPORT
> +	select ARM_SCMI_HAVE_SHMEM
> +	default y
> +	help
> +	  This enables the OP-TEE service based transport for SCMI.
> +
> +	  If you want the ARM SCMI PROTOCOL stack to include support for a
> +	  transport based on OP-TEE SCMI service, answer Y.
> +
>  endif #ARM_SCMI_PROTOCOL
>  

So this 'depends on OPTEE' reminded me of a similar issue on VIRTIO
transport spotted by a bot (see the fix for Virtio at: c90521a0e94f firmware:
arm_scmi: Fix virtio transport Kconfig dependency), that consiste in a broken
build when SCMI was compiled built-in with VIRTIO transport support with
ARM_SCMI_PROTOCOL=y while the core was CONFIG_VIRTIO=m.

So I tried similarly to set CONFIG_OPTEE=m while keeping ARM_SCMI_PROTOCOL=y
expecting to see a similar issue as in VirtIO (i.e. not being able to access
optee module symbols from the builtin SCMI), instead I spotted a different bug :D

  AR      drivers/base/built-in.a                         
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘invoke_process_smt_channel’:
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
   const size_t msg_size = scmi_optee_desc.max_msg_size;                       
                           ^~~~~~~~~~~~~~~                                  
                           scmi_smc_desc                       
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: note: each undeclared identifier is reported only once for each function it appears in
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘setup_dynamic_shmem’:
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:266:26: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
  const size_t msg_size = scmi_optee_desc.max_msg_size;               
                          ^~~~~~~~~~~~~~~                      
                          scmi_smc_desc                          
/home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:277: recipe for target 'drivers/firmware/arm_scmi/optee.o' failed                          
make[4]: *** [drivers/firmware/arm_scmi/optee.o] Error 1                                                                                                                                                                                               
make[4]: *** Waiting for unfinished jobs....                                                                                                            

In fact those scmi_optee_desc are reference to a global only declared
down below. Fixed with a few defines to carry on:

---8<------------------

diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
index 64aaba4a8bf2..93a84c91457b 100644
--- a/drivers/firmware/arm_scmi/optee.c
+++ b/drivers/firmware/arm_scmi/optee.c
@@ -18,6 +18,8 @@
 
 #define DRIVER_NAME "optee-scmi"
 
+#define SCMI_OPTEE_MAX_MSG_SIZE                128
+
 enum optee_smci_pta_cmd {
        /*
         * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
@@ -230,7 +232,7 @@ static int invoke_process_smt_channel(struct optee_channel *channel)
        param[0].u.value.a = channel->channel_id;
 
        if (channel->tee_shm) {
-               const size_t msg_size = scmi_optee_desc.max_msg_size;
+               const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
 
                param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
                param[1].u.memref.shm = channel->tee_shm;
@@ -263,7 +265,7 @@ static bool optee_chan_available(struct device *dev, int idx)
 
 static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
 {
-       const size_t msg_size = scmi_optee_desc.max_msg_size;
+       const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
 
        channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
        if (IS_ERR(channel->tee_shm)) {

-----------------------------

After the above change it compiled fine, so I went a step further and configured also
CONFIG_TEE=m (just trying to reproduce what bot saw on similar VirtIO eeh.... not that
I am so evil and sadic :D)

And indeed now (with ARM_SCMI_PROTOCOL=y and CONFIG_TEE=m) I get:


  GEN     modules.builtin
  LD      .tmp_vmlinux.kallsyms1
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected GOT/PLT entries detected!
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected run-time procedure linkages detected!
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `invoke_process_smt_channel':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_chan_free':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:397: undefined reference to `tee_shm_free'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `open_session':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:137: undefined reference to `tee_client_open_session'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_remove':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:516: undefined reference to `tee_client_close_context'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_probe':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:481: undefined reference to `tee_client_open_context'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:501: undefined reference to `tee_client_close_context'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_capabilities':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:172: undefined reference to `tee_client_invoke_func'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_channel':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:209: undefined reference to `tee_client_invoke_func'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `setup_dynamic_shmem':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:270: undefined reference to `tee_shm_alloc_kernel_buf'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:276: undefined reference to `tee_shm_get_va'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o:(.data+0x10): undefined reference to `tee_bus_type'
/home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target 'vmlinux' failed
make[1]: *** [vmlinux] Error 1
make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
Makefile:219: recipe for target '__sub-make' failed

Taking a similar approach to Virtio, this fixed for me

diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
index 9107e249023c..30746350349c 100644
--- a/drivers/firmware/arm_scmi/Kconfig
+++ b/drivers/firmware/arm_scmi/Kconfig
@@ -79,7 +79,7 @@ config ARM_SCMI_TRANSPORT_VIRTIO
 
 config ARM_SCMI_TRANSPORT_OPTEE
        bool "SCMI transport based on OP-TEE service"
-       depends on OPTEE
+       depends on OPTEE=y || OPTEE=ARM_SCMI_PROTOCOL
        select ARM_SCMI_HAVE_TRANSPORT
        select ARM_SCMI_HAVE_SHMEM
        default y

which basically disables ARM_SCMI_TRANSPORT_OPTEE when CONFIG_OPTEE=m AND
ARM_SCMI_TRANSPORT_OPTEE=y: in this scenario if TEE is =m you have to build
ARM_SCMI_PROTOCOL=m too to be able to include ARM_SCMI_TRANSPORT_OPTEE.


>  config ARM_SCMI_POWER_DOMAIN
> diff --git a/drivers/firmware/arm_scmi/Makefile b/drivers/firmware/arm_scmi/Makefile
> index 1dcf123d64ab..ef66ec8ca917 100644
> --- a/drivers/firmware/arm_scmi/Makefile
> +++ b/drivers/firmware/arm_scmi/Makefile
> @@ -6,6 +6,7 @@ scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_MAILBOX) += mailbox.o
>  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_SMC) += smc.o
>  scmi-transport-$(CONFIG_ARM_SCMI_HAVE_MSG) += msg.o
>  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_VIRTIO) += virtio.o
> +scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_OPTEE) += optee.o
>  scmi-protocols-y = base.o clock.o perf.o power.o reset.o sensors.o system.o voltage.o
>  scmi-module-objs := $(scmi-bus-y) $(scmi-driver-y) $(scmi-protocols-y) \
>  		    $(scmi-transport-y)
> diff --git a/drivers/firmware/arm_scmi/common.h b/drivers/firmware/arm_scmi/common.h
> index dea1bfbe1052..82ff3c3a6d2d 100644
> --- a/drivers/firmware/arm_scmi/common.h
> +++ b/drivers/firmware/arm_scmi/common.h
> @@ -421,6 +421,9 @@ extern const struct scmi_desc scmi_smc_desc;
>  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
>  extern const struct scmi_desc scmi_virtio_desc;
>  #endif
> +#ifdef CONFIG_OPTEE

This should be: 

#ifdef CONFIG_ARM_SCMI_TRANSPORT_OPTEE 

if not disabling OPTEE transport in Kconfig breaks the build.

 LD      .tmp_vmlinux.kallsyms1
 /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld:
 drivers/firmware/arm_scmi/driver.o:(.rodata+0x280): undefined reference
 to `scmi_optee_desc'
 /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target
 'vmlinux' failed
 make[1]: *** [vmlinux] Error 1
 make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'


> +extern const struct scmi_desc scmi_optee_desc;
> +#endif
>  
>  void scmi_rx_callback(struct scmi_chan_info *cinfo, u32 msg_hdr, void *priv);
>  void scmi_free_channel(struct scmi_chan_info *cinfo, struct idr *idr, int id);
> diff --git a/drivers/firmware/arm_scmi/driver.c b/drivers/firmware/arm_scmi/driver.c
> index b406b3f78f46..06f0a9846c7e 100644
> --- a/drivers/firmware/arm_scmi/driver.c
> +++ b/drivers/firmware/arm_scmi/driver.c
> @@ -1999,6 +1999,9 @@ static const struct of_device_id scmi_of_match[] = {
>  #endif
>  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
>  	{ .compatible = "arm,scmi-virtio", .data = &scmi_virtio_desc},
> +#endif
> +#ifdef CONFIG_OPTEE

Same as above should be #if CONFIG_ARM_SCMI_TRANSPORT_OPTEE

> +	{ .compatible = "linaro,scmi-optee", .data = &scmi_optee_desc },
>  #endif
>  	{ /* Sentinel */ },
>  };
> diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> new file mode 100644
> index 000000000000..e294cff37bea
> --- /dev/null
> +++ b/drivers/firmware/arm_scmi/optee.c
> @@ -0,0 +1,559 @@
> +// SPDX-License-Identifier: GPL-2.0
> +/*
> + * Copyright (C) 2019-2021 Linaro Ltd.
> + */
> +
> +#include <linux/io.h>
> +#include <linux/of.h>
> +#include <linux/of_address.h>
> +#include <linux/kernel.h>
> +#include <linux/module.h>
> +#include <linux/mutex.h>
> +#include <linux/slab.h>
> +#include <linux/tee_drv.h>
> +#include <linux/uuid.h>
> +#include <uapi/linux/tee.h>
> +
> +#include "common.h"
> +
> +#define DRIVER_NAME "optee-scmi"
> +
> +enum optee_smci_pta_cmd {
              ^
	      scmi ? or is it another fancy 4letters acronym :D
> +	/*
> +	 * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> +	 *
> +	 * [out]    value[0].a: Capability bit mask (enum pta_scmi_caps)
> +	 * [out]    value[0].b: Extended capabilities or 0
> +	 */
> +	PTA_SCMI_CMD_CAPABILITIES = 0,
> +
> +	/*
> +	 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer
> +	 *
> +	 * [in]     value[0].a: Channel handle
> +	 *
> +	 * Shared memory used for SCMI message/response exhange is expected
> +	 * already identified and bound to channel handle in both SCMI agent
> +	 * and SCMI server (OP-TEE) parts.
> +	 * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> +	 * protocol message ID).
> +	 */
> +	PTA_SCMI_CMD_PROCESS_SMT_CHANNEL = 1,
> +
> +	/*
> +	 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SMT/SCMI message
> +	 *
> +	 * [in]     value[0].a: Channel handle
> +	 * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload)
> +	 *
> +	 * Shared memory used for SCMI message/response is a SMT buffer
> +	 * referenced by param[1]. It shall be 128 bytes large to fit response
> +	 * payload whatever message playload size.
> +	 * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> +	 * protocol message ID).
> +	 */
> +	PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE = 2,
> +
> +	/*
> +	 * PTA_SCMI_CMD_GET_CHANNEL - Get channel handle
> +	 *
> +	 * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM
> +	 *
> +	 * [in]     value[0].a: Channel identifier
> +	 * [out]    value[0].a: Returned channel handle
> +	 * [in]     value[0].b: Requested capabilities mask (enum pta_scmi_caps)
> +	 */
> +	PTA_SCMI_CMD_GET_CHANNEL = 3,
> +};
> +
> +/*
> + * Capabilities
> + */
> +enum pta_scmi_caps {
> +	PTA_SCMI_CAPS_NONE = 0,
> +	/*
> +	 * Supports command using SMT header protocol (SCMI shmem) in shared
> +	 * memory buffers to carry SCMI protocol synchronisation information.
> +	 */
> +	PTA_SCMI_CAPS_SMT_HEADER = BIT(0),
> +};
> +
> +/**
> + * struct optee_channel - Description of an OP-TEE SCMI channel
> + *
> + * @channel_id: OP-TEE channel ID used for this transport
> + * @mu: Mutex protection on channel access
> + * @tee_session: TEE session identifier
> + * @cinfo: SCMI channel information
> + * @shmem: Virtual base address of the shared memory
> + * @tee_shm: Reference to TEE shared memory or NULL if using static shmem
> + * @caps: OP-TEE SCMI channel capabilities
> + * @link: Reference in agent's channel list
> + */
> +struct optee_channel {
> +	u32 channel_id;
> +	struct mutex mu;
> +	u32 tee_session;
> +	struct scmi_chan_info *cinfo;
> +	struct scmi_shared_mem __iomem *shmem;
> +	struct tee_shm *tee_shm;
> +	enum pta_scmi_caps caps;
> +	struct list_head link;
> +};
> +
> +/**
> + * struct optee_agent - OP-TEE transport private data
> + *
> + * @dev: Device used for communication with TEE
> + * @tee_ctx: TEE context used for communication
> + * @caps: Supported channel capabilities
> + * @mu: Mutex for protection of @channel_list
> + * @channel_list: List of all created channels for the agent
> + */
> +struct optee_agent {
> +	struct device *dev;
> +	struct tee_context *tee_ctx;
> +	enum pta_scmi_caps caps;
> +	struct mutex mu;
> +	struct list_head channel_list;
> +};
> +
> +/* There can be only 1 SCMI service in OP-TEE we connect to */
> +static struct optee_agent *optee_private;
> +

Maybe naming these locally defined optee_ structs as scmi_optee_ ?

When I see those optee_ refs around down below I tend to think they
are OPTEE core structs not locally defined containers.
(I uderstand that depends on my poor familiarity with OPTEE APIs
though...)

> +/* Open a session toward SCMI OP-TEE service with REE_KERNEL identity */
> +static int open_session(u32 *tee_session)
> +{
> +	struct device *dev = optee_private->dev;
> +	struct tee_client_device *scmi_pta = to_tee_client_device(dev);
> +	struct tee_ioctl_open_session_arg arg = { };
> +	int ret;
> +
> +	memcpy(arg.uuid, scmi_pta->id.uuid.b, TEE_IOCTL_UUID_LEN);
> +	arg.clnt_login = TEE_IOCTL_LOGIN_REE_KERNEL;
> +
> +	ret = tee_client_open_session(optee_private->tee_ctx, &arg, NULL);
> +	if (ret < 0 || arg.ret) {
> +		dev_err(dev, "Can't open tee session: %d / %#x\n", ret, arg.ret);
> +
> +		return -EOPNOTSUPP;
> +	}
> +
> +	*tee_session = arg.session;
> +
> +	return 0;
> +}
> +
> +static void close_session(u32 tee_session)
> +{
> +	tee_client_close_session(optee_private->tee_ctx, tee_session);
> +}
> +
> +static int get_capabilities(void)
> +{
> +	struct optee_agent *agent = optee_private;
> +	struct tee_ioctl_invoke_arg arg = { };
> +	struct tee_param param[1] = { };
> +	u32 tee_session;
> +	int ret;
> +
> +	ret = open_session(&tee_session);
> +	if (ret)
> +		return ret;
> +
> +	arg.func = PTA_SCMI_CMD_CAPABILITIES;
> +	arg.session = tee_session;
> +	arg.num_params = 1;
> +
> +	param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT;
> +
> +	ret = tee_client_invoke_func(agent->tee_ctx, &arg, param);
> +
> +	close_session(tee_session);
> +
> +	if (ret < 0 || arg.ret) {
> +		dev_err(agent->dev, "Can't get capabilities: %d / %#x\n", ret, arg.ret);
> +
> +		return -EOPNOTSUPP;
> +	}
> +
> +	agent->caps = param[0].u.value.a;
> +
> +	if (!(agent->caps & PTA_SCMI_CAPS_SMT_HEADER)) {
> +		dev_err(agent->dev, "OP-TEE SCMI PTA doesn't support SMT\n");
> +
> +		return -EOPNOTSUPP;
> +	}
> +
> +	return 0;
> +}
> +
> +static int get_channel(struct optee_channel *channel)
> +{
> +	struct device *dev = optee_private->dev;
> +	struct tee_ioctl_invoke_arg arg = { };
> +	struct tee_param param[1] = { };
> +	unsigned int caps = PTA_SCMI_CAPS_SMT_HEADER;
> +	int ret;
> +
> +	arg.func = PTA_SCMI_CMD_GET_CHANNEL;
> +	arg.session = channel->tee_session;
> +	arg.num_params = 1;
> +
> +	param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
> +	param[0].u.value.a = channel->channel_id;
> +	param[0].u.value.b = caps;
> +
> +	ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> +
> +	if (ret || arg.ret) {
> +		dev_err(dev, "Can't get channel with caps %#x: %d / %#x\n", caps, ret, arg.ret);
> +
> +		return -EOPNOTSUPP;
> +	}
> +
> +	/* From now on use channel identifer provided by OP-TEE SCMI service */
> +	channel->channel_id = param[0].u.value.a;
> +	channel->caps = caps;
> +
> +	return 0;
> +}
> +
> +static int invoke_process_smt_channel(struct optee_channel *channel)
> +{
> +	struct tee_ioctl_invoke_arg arg = { };
> +	struct tee_param param[2] = { };
> +	int ret;
> +
> +	arg.session = channel->tee_session;
> +	param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
> +	param[0].u.value.a = channel->channel_id;
> +
> +	if (channel->tee_shm) {
> +		const size_t msg_size = scmi_optee_desc.max_msg_size;
> +
> +		param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
> +		param[1].u.memref.shm = channel->tee_shm;
> +		param[1].u.memref.size = msg_size;
> +		arg.num_params = 2;
> +		arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE;
> +	} else {
> +		arg.num_params = 1;
> +		arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL;
> +	}
> +
> +	ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> +	if (ret < 0 || arg.ret) {
> +		dev_err(optee_private->dev, "Failed on channel %u: %d / %#x\n",
> +			channel->channel_id, ret, arg.ret);
> +
> +		return -EIO;
> +	}
> +
> +	return 0;
> +}
> +
> +static bool optee_chan_available(struct device *dev, int idx)
> +{
> +	u32 channel_id;
> +
> +	return !of_property_read_u32_index(dev->of_node, "linaro,optee-channel-id",
> +					   idx, &channel_id);
> +}
> +
> +static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
> +{
> +	const size_t msg_size = scmi_optee_desc.max_msg_size;
> +
> +	channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
> +	if (IS_ERR(channel->tee_shm)) {
> +		dev_err(channel->cinfo->dev, "shmem allocation failed\n");
> +		return -ENOMEM;
> +	}
> +
> +	channel->shmem = (void *)tee_shm_get_va(channel->tee_shm, 0);
> +	memset(channel->shmem, 0, msg_size);
> +	shmem_clear_channel(channel->shmem);
> +
> +	return 0;
> +}
> +
> +static int setup_static_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> +			      struct optee_channel *channel)
> +{
> +	struct device_node *np;
> +	resource_size_t size;
> +	struct resource res;
> +	int ret;
> +
> +	np = of_parse_phandle(cinfo->dev->of_node, "shmem", 0);
> +	if (!of_device_is_compatible(np, "arm,scmi-shmem")) {
> +		ret = -ENXIO;
> +		goto out;
> +	}
> +
> +	ret = of_address_to_resource(np, 0, &res);
> +	if (ret) {
> +		dev_err(dev, "Failed to get SCMI Tx shared memory\n");
> +		goto out;
> +	}
> +
> +	size = resource_size(&res);
> +
> +	channel->shmem = devm_ioremap(dev, res.start, size);
> +	if (!channel->shmem) {
> +		dev_err(dev, "Failed to ioremap SCMI Tx shared memory\n");
> +		ret = -EADDRNOTAVAIL;
> +		goto out;
> +	}
> +
> +	ret = 0;
> +
> +out:
> +	of_node_put(np);
> +
> +	return ret;
> +}
> +
> +static int optee_chan_setup_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> +				  bool tx, struct optee_channel *channel)
> +{
> +	struct device *cdev = cinfo->dev;
> +
> +	if (of_find_property(cdev->of_node, "shmem", NULL))
> +		return setup_static_shmem(dev, cinfo, channel);
> +	else
> +		return setup_dynamic_shmem(dev, channel);
> +}
> +
> +static void optee_clear_channel(struct scmi_chan_info *cinfo)
> +{
> +	struct optee_channel *channel = cinfo->transport_info;
> +
> +	shmem_clear_channel(channel->shmem);
> +}
> +
> +static int optee_chan_setup(struct scmi_chan_info *cinfo, struct device *dev, bool tx)
> +{
> +	struct optee_channel *channel;
> +	uint32_t channel_id;
> +	int ret;
> +
> +	if (!tx)
> +		return -ENODEV;
> +
> +	/* Shall wait for OP-TEE driver to be up and ready */
> +	if (!optee_private || !optee_private->tee_ctx)
> +		return -EPROBE_DEFER;
> +
> +	channel = devm_kzalloc(dev, sizeof(*channel), GFP_KERNEL);
> +	if (!channel)
> +		return -ENOMEM;
> +
> +	ret = of_property_read_u32_index(cinfo->dev->of_node, "linaro,optee-channel-id",
> +					 0, &channel_id);
> +	if (ret)
> +		return ret;
> +
> +	cinfo->transport_info = channel;
> +	channel->cinfo = cinfo;
> +	channel->channel_id = channel_id;
> +	mutex_init(&channel->mu);
> +
> +	ret = optee_chan_setup_shmem(dev, cinfo, tx, channel);
> +	if (ret)
> +		return ret;
> +
> +	ret = open_session(&channel->tee_session);
> +	if (ret)
> +		return ret;
> +
> +	ret = get_channel(channel);
> +	if (ret) {
> +		close_session(channel->tee_session);
> +
> +		return ret;
> +	}
> +
> +	mutex_lock(&optee_private->mu);
> +	list_add(&channel->link, &optee_private->channel_list);
> +	mutex_unlock(&optee_private->mu);
> +
> +	return 0;
> +}
> +
> +static int optee_chan_free(int id, void *p, void *data)
> +{
> +	struct scmi_chan_info *cinfo = p;
> +	struct optee_channel *channel = cinfo->transport_info;
> +
> +	mutex_lock(&optee_private->mu);
> +	list_del(&channel->link);
> +	mutex_unlock(&optee_private->mu);
> +
> +	if (channel->tee_shm) {
> +		tee_shm_free(channel->tee_shm);
> +		channel->tee_shm = NULL;
> +	}
> +
> +	cinfo->transport_info = NULL;
> +	channel->cinfo = NULL;
> +
> +	scmi_free_channel(cinfo, data, id);
> +
> +	return 0;
> +}
> +
> +static struct scmi_shared_mem *get_channel_shm(struct optee_channel *chan, struct scmi_xfer *xfer)
> +{
> +	if (!chan)
> +		return NULL;
> +
> +	return chan->shmem;
> +}
> +
> +
> +static int optee_send_message(struct scmi_chan_info *cinfo,
> +			      struct scmi_xfer *xfer)
> +{
> +	struct optee_channel *channel = cinfo->transport_info;
> +	struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> +	int ret;
> +
> +	mutex_lock(&channel->mu);
> +	shmem_tx_prepare(shmem, xfer);
> +
> +	ret = invoke_process_smt_channel(channel);

Here all the associated processing in the TrustedOS is fully completed
right ? i.e. all the possible reply values have been put into shmem by
the TrustedOS process before the underlying SMC call returns.
(just to understand better how OPTEE transport is supposed to behave)

> +
> +	scmi_rx_callback(cinfo, shmem_read_header(shmem), NULL);
> +	mutex_unlock(&channel->mu);
> +
> +	return ret;
> +}
> +
> +static void optee_fetch_response(struct scmi_chan_info *cinfo,
> +				 struct scmi_xfer *xfer)
> +{
> +	struct optee_channel *channel = cinfo->transport_info;
> +	struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> +
> +	shmem_fetch_response(shmem, xfer);
> +}
> +
> +static bool optee_poll_done(struct scmi_chan_info *cinfo,
> +			    struct scmi_xfer *xfer)
> +{
> +	struct optee_channel *channel = cinfo->transport_info;
> +	struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> +
> +	return shmem_poll_done(shmem, xfer);
> +}
> +
> +static struct scmi_transport_ops scmi_optee_ops = {
> +	.chan_available = optee_chan_available,
> +	.chan_setup = optee_chan_setup,
> +	.chan_free = optee_chan_free,
> +	.send_message = optee_send_message,
> +	.fetch_response = optee_fetch_response,
> +	.clear_channel = optee_clear_channel,
> +	.poll_done = optee_poll_done,
> +};
> +
> +const struct scmi_desc scmi_optee_desc = {
> +	.ops = &scmi_optee_ops,
> +	.max_rx_timeout_ms = 30,
> +	.max_msg = 20,
> +	.max_msg_size = 128,
> +};
> +
> +static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
> +{
> +	return ver->impl_id == TEE_IMPL_ID_OPTEE;
> +}
> +
> +static int optee_service_probe(struct device *dev)
> +{
> +	struct optee_agent *agent;
> +	struct tee_context *tee_ctx;
> +	int ret;
> +
> +	/* Only one SCMI OP-TEE device allowed */
> +	if (optee_private) {
> +		dev_err(dev, "An SCMI OP-TEE device was already initialized: only one allowed\n");
> +		return -EBUSY;
> +	}
> +
> +	tee_ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, NULL);
> +	if (IS_ERR(tee_ctx))
> +		return -ENODEV;
> +
> +	agent = devm_kzalloc(dev, sizeof(*agent), GFP_KERNEL);
> +	if (!agent) {
> +		ret = -ENOMEM;
> +		goto out;
> +	}
> +
> +	agent->dev = dev;
> +	agent->tee_ctx = tee_ctx;
> +	INIT_LIST_HEAD(&agent->channel_list);
> +
> +	optee_private = agent;

Barrier here to be sure this global is visible and not reordered ?

Not sure if it is plausible that without a barrier the subsequent
optee_chan_setup could run on another core and simply miss this update
and bail out. (cannot see any locking of any kind either in the
chan_available/chan_setup TX path that could trigger a implicit memory
barrier....bah maybe I'm paranoid)

> +
> +	ret = get_capabilities();
> +
> +out:
> +	if (ret) {
> +		tee_client_close_context(tee_ctx);
> +		optee_private = NULL;

Barrier ? (not sure as above...)

> +	}
> +
> +	return ret;
> +}
> +
> +static int optee_service_remove(struct device *dev)
> +{
> +	if (optee_private)
> +		return -EINVAL;

Is it  instead: if (!optee_private) ?
> +
> +	if (!list_empty(&optee_private->channel_list))
> +		return -EBUSY;
> +
> +	tee_client_close_context(optee_private->tee_ctx);
> +
> +	optee_private = NULL;
> +

Barrier ? (not sure as above...)

> +	return 0;
> +}
> +
> +static const struct tee_client_device_id scmi_optee_service_id[] = {
> +	{
> +		UUID_INIT(0xa8cfe406, 0xd4f5, 0x4a2e,
> +			  0x9f, 0x8d, 0xa2, 0x5d, 0xc7, 0x54, 0xc0, 0x99)
> +	},
> +	{ }
> +};
> +
> +MODULE_DEVICE_TABLE(tee, scmi_optee_service_id);
> +
> +static struct tee_client_driver scmi_optee_driver = {
> +	.id_table	= scmi_optee_service_id,
> +	.driver		= {
> +		.name = "scmi-optee",
> +		.bus = &tee_bus_type,
> +		.probe = optee_service_probe,
> +		.remove = optee_service_remove,
> +	},
> +};
> +
> +static int __init scmi_optee_init(void)
> +{
> +	return driver_register(&scmi_optee_driver.driver);
> +}
> +
> +static void __exit scmi_optee_exit(void)
> +{
> +	driver_unregister(&scmi_optee_driver.driver);
> +}
> +
> +device_initcall(scmi_optee_init)
> +module_exit(scmi_optee_exit);

This breaks the build when ARM_SCMI_PROTOCOL=m and SCMI OPTEE transport is enabled,
since the SCMI transports are not full fledged drivers but they are built into
the SCMI stack core module, so if you endup trying to define multiple inits.

 LD [M]  drivers/firmware/arm_scmi/scmi-module.o
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_init':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:549: multiple definition of `init_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2070: first defined here
/opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_exit':
/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:554: multiple definition of `cleanup_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2099: first defined here
/home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:474: recipe for target 'drivers/firmware/arm_scmi/scmi-module.o' failed
make[4]: *** [drivers/firmware/arm_scmi/scmi-module.o] Error 1
/home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware/arm_scmi' failed
make[3]: *** [drivers/firmware/arm_scmi] Error 2
/home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware' failed
make[2]: *** [drivers/firmware] Error 2
make[2]: *** Waiting for unfinished jobs....
/home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1874: recipe for target 'drivers' failed
make[1]: *** [drivers] Error 2
make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
Makefile:219: recipe for target '__sub-make' failed

In order to address this issue (same happended with VirtIO) I added
transport_init/transport_exit optional hooks into scmi_desc, so that
you can ask the core SCMI stack to perform whatever your transport
needs at SCMI core init-time, before the SCMI core stack is probed.

In other words the fix here down below fixes for me the build as a
module of the SCMI stack.

Note that also __exit on scmi_optee_exit( )ha sbeen removed to avoid
some complains spotted by Arnd on SCMI VirtIO (1cd73200dad2 firmware:
arm_scmi: Remove __exit annotation)

Thanks,
Cristian

---8<-----------------------

diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
index e294cff37bea..af6d52438b04 100644
--- a/drivers/firmware/arm_scmi/optee.c
+++ b/drivers/firmware/arm_scmi/optee.c
@@ -459,13 +459,6 @@ static struct scmi_transport_ops scmi_optee_ops = {
        .poll_done = optee_poll_done,
 };
 
-const struct scmi_desc scmi_optee_desc = {
-       .ops = &scmi_optee_ops,
-       .max_rx_timeout_ms = 30,
-       .max_msg = 20,
-       .max_msg_size = 128,
-};
-
 static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
 {
        return ver->impl_id == TEE_IMPL_ID_OPTEE;
@@ -550,10 +543,16 @@ static int __init scmi_optee_init(void)
        return driver_register(&scmi_optee_driver.driver);
 }
 
-static void __exit scmi_optee_exit(void)
+static void scmi_optee_exit(void)
 {
        driver_unregister(&scmi_optee_driver.driver);
 }
 
-device_initcall(scmi_optee_init)
-module_exit(scmi_optee_exit);
+const struct scmi_desc scmi_optee_desc = {
+       .transport_init = scmi_optee_init,
+       .transport_exit = scmi_optee_exit,
+       .ops = &scmi_optee_ops,
+       .max_rx_timeout_ms = 30,
+       .max_msg = 20,
+       .max_msg_size = 128,
+};

> -- 
> 2.17.1
>
Etienne Carriere Oct. 19, 2021, 9:10 a.m. UTC | #2
Hello Cristian,

Thanks a lot for the review.
I see I didn't understand and use correctly the config switch for the transport.
Thanks for all the fixes you sent, i'll integrate them in the patch v4.

I don't know yet how to address your last comment. See my feedback on
the optee bus dependency issue.



On Mon, 18 Oct 2021 at 21:43, Cristian Marussi <cristian.marussi@arm.com> wrote:
>
> On Mon, Oct 18, 2021 at 01:40:46PM +0200, Etienne Carriere wrote:
> > Add a new transport channel to the SCMI firmware interface driver for
> > SCMI message exchange based on optee transport channel. The optee
> > transport is realized by connecting and invoking OP-TEE SCMI service
> > interface PTA.
> >
> > Optee transport support (CONFIG_ARM_SCMI_TRANSPORT_OPTEE) is default
> > enabled when optee driver (CFG_OPTEE) is enabled. Effective optee
> > transport is setup upon OP-TEE SCMI service discovery at optee
> > device initialization. For this SCMI UUID is registered to the optee
> > bus for probing. This is done at device_init initcall level, after
> > optee bus initialization that is done at subsys_init level, as the scmi
> > driver initialization.
> >
> > The optee transport can use a statically defined shared memory in
> > which case SCMI device tree node defines it using an "arm,scmi-shmem"
> > compatible phandle through property shmem. Alternatively, optee transport
> > allocates the shared memory buffer from the optee driver when no shmem
> > property is defined.
> >
> > The protocol used to exchange SCMI message over that shared memory is
> > negotiated between optee transport driver and the OP-TEE service through
> > capabilities exchange.
> >
> > OP-TEE SCMI service is integrated in OP-TEE since its release tag 3.13.0.
> > The service interface is published in [1].
> >
> > Link: [1] https://github.com/OP-TEE/optee_os/blob/3.13.0/lib/libutee/include/pta_scmi_client.h
> > Cc: Cristian Marussi <cristian.marussi@arm.com>
> > Cc: Sudeep Holla <sudeep.holla@arm.com>
> > Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
> > ---
> > Changes since v2:
> > - Rebase on for-next/scmi, based on Linux v5.15-rc1.
> > - Implement support for dynamic and static shared memory.
> > - Factorize some functions and simplify transport exit sequence.
> > - Rename driver source file from optee_service.c to optee.c.
> >
> > No change since v1
> > ---
>
> Hi Etienne,
>
> a few remarks below.
>
> >  drivers/firmware/arm_scmi/Kconfig  |  12 +
> >  drivers/firmware/arm_scmi/Makefile |   1 +
> >  drivers/firmware/arm_scmi/common.h |   3 +
> >  drivers/firmware/arm_scmi/driver.c |   3 +
> >  drivers/firmware/arm_scmi/optee.c  | 559 +++++++++++++++++++++++++++++
> >  5 files changed, 578 insertions(+)
> >  create mode 100644 drivers/firmware/arm_scmi/optee.c
> >
> > diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> > index 3d7081e84853..9107e249023c 100644
> > --- a/drivers/firmware/arm_scmi/Kconfig
> > +++ b/drivers/firmware/arm_scmi/Kconfig
> > @@ -77,6 +77,18 @@ config ARM_SCMI_TRANSPORT_VIRTIO
> >         If you want the ARM SCMI PROTOCOL stack to include support for a
> >         transport based on VirtIO, answer Y.
> >
> > +config ARM_SCMI_TRANSPORT_OPTEE
> > +     bool "SCMI transport based on OP-TEE service"
> > +     depends on OPTEE
> > +     select ARM_SCMI_HAVE_TRANSPORT
> > +     select ARM_SCMI_HAVE_SHMEM
> > +     default y
> > +     help
> > +       This enables the OP-TEE service based transport for SCMI.
> > +
> > +       If you want the ARM SCMI PROTOCOL stack to include support for a
> > +       transport based on OP-TEE SCMI service, answer Y.
> > +
> >  endif #ARM_SCMI_PROTOCOL
> >
>
> So this 'depends on OPTEE' reminded me of a similar issue on VIRTIO
> transport spotted by a bot (see the fix for Virtio at: c90521a0e94f firmware:
> arm_scmi: Fix virtio transport Kconfig dependency), that consiste in a broken
> build when SCMI was compiled built-in with VIRTIO transport support with
> ARM_SCMI_PROTOCOL=y while the core was CONFIG_VIRTIO=m.
>
> So I tried similarly to set CONFIG_OPTEE=m while keeping ARM_SCMI_PROTOCOL=y
> expecting to see a similar issue as in VirtIO (i.e. not being able to access
> optee module symbols from the builtin SCMI), instead I spotted a different bug :D

Sorry, I didn't try this config (optee=m / scmi=y). I though expecting
scmi over optee and scmi=y would mandate optee=y.
For the fixup you propose below, i understand how you address the
configuration dependencies.

>
>   AR      drivers/base/built-in.a
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘invoke_process_smt_channel’:
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
>    const size_t msg_size = scmi_optee_desc.max_msg_size;
>                            ^~~~~~~~~~~~~~~
>                            scmi_smc_desc
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: note: each undeclared identifier is reported only once for each function it appears in
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘setup_dynamic_shmem’:
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:266:26: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
>   const size_t msg_size = scmi_optee_desc.max_msg_size;
>                           ^~~~~~~~~~~~~~~
>                           scmi_smc_desc
> /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:277: recipe for target 'drivers/firmware/arm_scmi/optee.o' failed
> make[4]: *** [drivers/firmware/arm_scmi/optee.o] Error 1
> make[4]: *** Waiting for unfinished jobs....
>
> In fact those scmi_optee_desc are reference to a global only declared
> down below. Fixed with a few defines to carry on:
>
> ---8<------------------
>
> diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> index 64aaba4a8bf2..93a84c91457b 100644
> --- a/drivers/firmware/arm_scmi/optee.c
> +++ b/drivers/firmware/arm_scmi/optee.c
> @@ -18,6 +18,8 @@
>
>  #define DRIVER_NAME "optee-scmi"
>
> +#define SCMI_OPTEE_MAX_MSG_SIZE                128
> +
>  enum optee_smci_pta_cmd {
>         /*
>          * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> @@ -230,7 +232,7 @@ static int invoke_process_smt_channel(struct optee_channel *channel)
>         param[0].u.value.a = channel->channel_id;
>
>         if (channel->tee_shm) {
> -               const size_t msg_size = scmi_optee_desc.max_msg_size;
> +               const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
>
>                 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
>                 param[1].u.memref.shm = channel->tee_shm;
> @@ -263,7 +265,7 @@ static bool optee_chan_available(struct device *dev, int idx)
>
>  static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
>  {
> -       const size_t msg_size = scmi_optee_desc.max_msg_size;
> +       const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
>
>         channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
>         if (IS_ERR(channel->tee_shm)) {
>
> -----------------------------
>
> After the above change it compiled fine, so I went a step further and configured also
> CONFIG_TEE=m (just trying to reproduce what bot saw on similar VirtIO eeh.... not that
> I am so evil and sadic :D)
>
> And indeed now (with ARM_SCMI_PROTOCOL=y and CONFIG_TEE=m) I get:
>
>
>   GEN     modules.builtin
>   LD      .tmp_vmlinux.kallsyms1
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected GOT/PLT entries detected!
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected run-time procedure linkages detected!
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `invoke_process_smt_channel':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_chan_free':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:397: undefined reference to `tee_shm_free'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `open_session':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:137: undefined reference to `tee_client_open_session'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_remove':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:516: undefined reference to `tee_client_close_context'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_probe':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:481: undefined reference to `tee_client_open_context'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:501: undefined reference to `tee_client_close_context'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_capabilities':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:172: undefined reference to `tee_client_invoke_func'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_channel':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:209: undefined reference to `tee_client_invoke_func'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `setup_dynamic_shmem':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:270: undefined reference to `tee_shm_alloc_kernel_buf'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:276: undefined reference to `tee_shm_get_va'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o:(.data+0x10): undefined reference to `tee_bus_type'
> /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target 'vmlinux' failed
> make[1]: *** [vmlinux] Error 1
> make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> Makefile:219: recipe for target '__sub-make' failed
>
> Taking a similar approach to Virtio, this fixed for me
>
> diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> index 9107e249023c..30746350349c 100644
> --- a/drivers/firmware/arm_scmi/Kconfig
> +++ b/drivers/firmware/arm_scmi/Kconfig
> @@ -79,7 +79,7 @@ config ARM_SCMI_TRANSPORT_VIRTIO
>
>  config ARM_SCMI_TRANSPORT_OPTEE
>         bool "SCMI transport based on OP-TEE service"
> -       depends on OPTEE
> +       depends on OPTEE=y || OPTEE=ARM_SCMI_PROTOCOL
>         select ARM_SCMI_HAVE_TRANSPORT
>         select ARM_SCMI_HAVE_SHMEM
>         default y
>
> which basically disables ARM_SCMI_TRANSPORT_OPTEE when CONFIG_OPTEE=m AND
> ARM_SCMI_TRANSPORT_OPTEE=y: in this scenario if TEE is =m you have to build
> ARM_SCMI_PROTOCOL=m too to be able to include ARM_SCMI_TRANSPORT_OPTEE.

Fully makes sense to me. Thanks. I understand.

>
>
> >  config ARM_SCMI_POWER_DOMAIN
> > diff --git a/drivers/firmware/arm_scmi/Makefile b/drivers/firmware/arm_scmi/Makefile
> > index 1dcf123d64ab..ef66ec8ca917 100644
> > --- a/drivers/firmware/arm_scmi/Makefile
> > +++ b/drivers/firmware/arm_scmi/Makefile
> > @@ -6,6 +6,7 @@ scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_MAILBOX) += mailbox.o
> >  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_SMC) += smc.o
> >  scmi-transport-$(CONFIG_ARM_SCMI_HAVE_MSG) += msg.o
> >  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_VIRTIO) += virtio.o
> > +scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_OPTEE) += optee.o
> >  scmi-protocols-y = base.o clock.o perf.o power.o reset.o sensors.o system.o voltage.o
> >  scmi-module-objs := $(scmi-bus-y) $(scmi-driver-y) $(scmi-protocols-y) \
> >                   $(scmi-transport-y)
> > diff --git a/drivers/firmware/arm_scmi/common.h b/drivers/firmware/arm_scmi/common.h
> > index dea1bfbe1052..82ff3c3a6d2d 100644
> > --- a/drivers/firmware/arm_scmi/common.h
> > +++ b/drivers/firmware/arm_scmi/common.h
> > @@ -421,6 +421,9 @@ extern const struct scmi_desc scmi_smc_desc;
> >  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
> >  extern const struct scmi_desc scmi_virtio_desc;
> >  #endif
> > +#ifdef CONFIG_OPTEE
>
> This should be:
>
> #ifdef CONFIG_ARM_SCMI_TRANSPORT_OPTEE
>
> if not disabling OPTEE transport in Kconfig breaks the build.
>
>  LD      .tmp_vmlinux.kallsyms1
>  /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld:
>  drivers/firmware/arm_scmi/driver.o:(.rodata+0x280): undefined reference
>  to `scmi_optee_desc'
>  /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target
>  'vmlinux' failed
>  make[1]: *** [vmlinux] Error 1
>  make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
>
>
> > +extern const struct scmi_desc scmi_optee_desc;
> > +#endif
> >
> >  void scmi_rx_callback(struct scmi_chan_info *cinfo, u32 msg_hdr, void *priv);
> >  void scmi_free_channel(struct scmi_chan_info *cinfo, struct idr *idr, int id);
> > diff --git a/drivers/firmware/arm_scmi/driver.c b/drivers/firmware/arm_scmi/driver.c
> > index b406b3f78f46..06f0a9846c7e 100644
> > --- a/drivers/firmware/arm_scmi/driver.c
> > +++ b/drivers/firmware/arm_scmi/driver.c
> > @@ -1999,6 +1999,9 @@ static const struct of_device_id scmi_of_match[] = {
> >  #endif
> >  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
> >       { .compatible = "arm,scmi-virtio", .data = &scmi_virtio_desc},
> > +#endif
> > +#ifdef CONFIG_OPTEE
>
> Same as above should be #if CONFIG_ARM_SCMI_TRANSPORT_OPTEE
>
> > +     { .compatible = "linaro,scmi-optee", .data = &scmi_optee_desc },
> >  #endif
> >       { /* Sentinel */ },
> >  };
> > diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> > new file mode 100644
> > index 000000000000..e294cff37bea
> > --- /dev/null
> > +++ b/drivers/firmware/arm_scmi/optee.c
> > @@ -0,0 +1,559 @@
> > +// SPDX-License-Identifier: GPL-2.0
> > +/*
> > + * Copyright (C) 2019-2021 Linaro Ltd.
> > + */
> > +
> > +#include <linux/io.h>
> > +#include <linux/of.h>
> > +#include <linux/of_address.h>
> > +#include <linux/kernel.h>
> > +#include <linux/module.h>
> > +#include <linux/mutex.h>
> > +#include <linux/slab.h>
> > +#include <linux/tee_drv.h>
> > +#include <linux/uuid.h>
> > +#include <uapi/linux/tee.h>
> > +
> > +#include "common.h"
> > +
> > +#define DRIVER_NAME "optee-scmi"
> > +
> > +enum optee_smci_pta_cmd {
>               ^
>               scmi ? or is it another fancy 4letters acronym :D

:) nice catch!

> > +     /*
> > +      * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> > +      *
> > +      * [out]    value[0].a: Capability bit mask (enum pta_scmi_caps)
> > +      * [out]    value[0].b: Extended capabilities or 0
> > +      */
> > +     PTA_SCMI_CMD_CAPABILITIES = 0,
> > +
> > +     /*
> > +      * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer
> > +      *
> > +      * [in]     value[0].a: Channel handle
> > +      *
> > +      * Shared memory used for SCMI message/response exhange is expected
> > +      * already identified and bound to channel handle in both SCMI agent
> > +      * and SCMI server (OP-TEE) parts.
> > +      * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> > +      * protocol message ID).
> > +      */
> > +     PTA_SCMI_CMD_PROCESS_SMT_CHANNEL = 1,
> > +
> > +     /*
> > +      * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SMT/SCMI message
> > +      *
> > +      * [in]     value[0].a: Channel handle
> > +      * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload)
> > +      *
> > +      * Shared memory used for SCMI message/response is a SMT buffer
> > +      * referenced by param[1]. It shall be 128 bytes large to fit response
> > +      * payload whatever message playload size.
> > +      * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> > +      * protocol message ID).
> > +      */
> > +     PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE = 2,
> > +
> > +     /*
> > +      * PTA_SCMI_CMD_GET_CHANNEL - Get channel handle
> > +      *
> > +      * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM
> > +      *
> > +      * [in]     value[0].a: Channel identifier
> > +      * [out]    value[0].a: Returned channel handle
> > +      * [in]     value[0].b: Requested capabilities mask (enum pta_scmi_caps)
> > +      */
> > +     PTA_SCMI_CMD_GET_CHANNEL = 3,
> > +};
> > +
> > +/*
> > + * Capabilities
> > + */
> > +enum pta_scmi_caps {
> > +     PTA_SCMI_CAPS_NONE = 0,
> > +     /*
> > +      * Supports command using SMT header protocol (SCMI shmem) in shared
> > +      * memory buffers to carry SCMI protocol synchronisation information.
> > +      */
> > +     PTA_SCMI_CAPS_SMT_HEADER = BIT(0),
> > +};
> > +
> > +/**
> > + * struct optee_channel - Description of an OP-TEE SCMI channel
> > + *
> > + * @channel_id: OP-TEE channel ID used for this transport
> > + * @mu: Mutex protection on channel access
> > + * @tee_session: TEE session identifier
> > + * @cinfo: SCMI channel information
> > + * @shmem: Virtual base address of the shared memory
> > + * @tee_shm: Reference to TEE shared memory or NULL if using static shmem
> > + * @caps: OP-TEE SCMI channel capabilities
> > + * @link: Reference in agent's channel list
> > + */
> > +struct optee_channel {
> > +     u32 channel_id;
> > +     struct mutex mu;
> > +     u32 tee_session;
> > +     struct scmi_chan_info *cinfo;
> > +     struct scmi_shared_mem __iomem *shmem;
> > +     struct tee_shm *tee_shm;
> > +     enum pta_scmi_caps caps;
> > +     struct list_head link;
> > +};
> > +
> > +/**
> > + * struct optee_agent - OP-TEE transport private data
> > + *
> > + * @dev: Device used for communication with TEE
> > + * @tee_ctx: TEE context used for communication
> > + * @caps: Supported channel capabilities
> > + * @mu: Mutex for protection of @channel_list
> > + * @channel_list: List of all created channels for the agent
> > + */
> > +struct optee_agent {
> > +     struct device *dev;
> > +     struct tee_context *tee_ctx;
> > +     enum pta_scmi_caps caps;
> > +     struct mutex mu;
> > +     struct list_head channel_list;
> > +};
> > +
> > +/* There can be only 1 SCMI service in OP-TEE we connect to */
> > +static struct optee_agent *optee_private;
> > +
>
> Maybe naming these locally defined optee_ structs as scmi_optee_ ?
>
> When I see those optee_ refs around down below I tend to think they
> are OPTEE core structs not locally defined containers.
> (I uderstand that depends on my poor familiarity with OPTEE APIs
> though...)

Ok. If that help maintenance, I'm fine. I'll use scmi_optee_ where appiicable.


>
> > +/* Open a session toward SCMI OP-TEE service with REE_KERNEL identity */
> > +static int open_session(u32 *tee_session)
> > +{
> > +     struct device *dev = optee_private->dev;
> > +     struct tee_client_device *scmi_pta = to_tee_client_device(dev);
> > +     struct tee_ioctl_open_session_arg arg = { };
> > +     int ret;
> > +
> > +     memcpy(arg.uuid, scmi_pta->id.uuid.b, TEE_IOCTL_UUID_LEN);
> > +     arg.clnt_login = TEE_IOCTL_LOGIN_REE_KERNEL;
> > +
> > +     ret = tee_client_open_session(optee_private->tee_ctx, &arg, NULL);
> > +     if (ret < 0 || arg.ret) {
> > +             dev_err(dev, "Can't open tee session: %d / %#x\n", ret, arg.ret);
> > +
> > +             return -EOPNOTSUPP;
> > +     }
> > +
> > +     *tee_session = arg.session;
> > +
> > +     return 0;
> > +}
> > +
> > +static void close_session(u32 tee_session)
> > +{
> > +     tee_client_close_session(optee_private->tee_ctx, tee_session);
> > +}
> > +
> > +static int get_capabilities(void)
> > +{
> > +     struct optee_agent *agent = optee_private;
> > +     struct tee_ioctl_invoke_arg arg = { };
> > +     struct tee_param param[1] = { };
> > +     u32 tee_session;
> > +     int ret;
> > +
> > +     ret = open_session(&tee_session);
> > +     if (ret)
> > +             return ret;
> > +
> > +     arg.func = PTA_SCMI_CMD_CAPABILITIES;
> > +     arg.session = tee_session;
> > +     arg.num_params = 1;
> > +
> > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT;
> > +
> > +     ret = tee_client_invoke_func(agent->tee_ctx, &arg, param);
> > +
> > +     close_session(tee_session);
> > +
> > +     if (ret < 0 || arg.ret) {
> > +             dev_err(agent->dev, "Can't get capabilities: %d / %#x\n", ret, arg.ret);
> > +
> > +             return -EOPNOTSUPP;
> > +     }
> > +
> > +     agent->caps = param[0].u.value.a;
> > +
> > +     if (!(agent->caps & PTA_SCMI_CAPS_SMT_HEADER)) {
> > +             dev_err(agent->dev, "OP-TEE SCMI PTA doesn't support SMT\n");
> > +
> > +             return -EOPNOTSUPP;
> > +     }
> > +
> > +     return 0;
> > +}
> > +
> > +static int get_channel(struct optee_channel *channel)
> > +{
> > +     struct device *dev = optee_private->dev;
> > +     struct tee_ioctl_invoke_arg arg = { };
> > +     struct tee_param param[1] = { };
> > +     unsigned int caps = PTA_SCMI_CAPS_SMT_HEADER;
> > +     int ret;
> > +
> > +     arg.func = PTA_SCMI_CMD_GET_CHANNEL;
> > +     arg.session = channel->tee_session;
> > +     arg.num_params = 1;
> > +
> > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
> > +     param[0].u.value.a = channel->channel_id;
> > +     param[0].u.value.b = caps;
> > +
> > +     ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> > +
> > +     if (ret || arg.ret) {
> > +             dev_err(dev, "Can't get channel with caps %#x: %d / %#x\n", caps, ret, arg.ret);
> > +
> > +             return -EOPNOTSUPP;
> > +     }
> > +
> > +     /* From now on use channel identifer provided by OP-TEE SCMI service */
> > +     channel->channel_id = param[0].u.value.a;
> > +     channel->caps = caps;
> > +
> > +     return 0;
> > +}
> > +
> > +static int invoke_process_smt_channel(struct optee_channel *channel)
> > +{
> > +     struct tee_ioctl_invoke_arg arg = { };
> > +     struct tee_param param[2] = { };
> > +     int ret;
> > +
> > +     arg.session = channel->tee_session;
> > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
> > +     param[0].u.value.a = channel->channel_id;
> > +
> > +     if (channel->tee_shm) {
> > +             const size_t msg_size = scmi_optee_desc.max_msg_size;
> > +
> > +             param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
> > +             param[1].u.memref.shm = channel->tee_shm;
> > +             param[1].u.memref.size = msg_size;
> > +             arg.num_params = 2;
> > +             arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE;
> > +     } else {
> > +             arg.num_params = 1;
> > +             arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL;
> > +     }
> > +
> > +     ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> > +     if (ret < 0 || arg.ret) {
> > +             dev_err(optee_private->dev, "Failed on channel %u: %d / %#x\n",
> > +                     channel->channel_id, ret, arg.ret);
> > +
> > +             return -EIO;
> > +     }
> > +
> > +     return 0;
> > +}
> > +
> > +static bool optee_chan_available(struct device *dev, int idx)
> > +{
> > +     u32 channel_id;
> > +
> > +     return !of_property_read_u32_index(dev->of_node, "linaro,optee-channel-id",
> > +                                        idx, &channel_id);
> > +}
> > +
> > +static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
> > +{
> > +     const size_t msg_size = scmi_optee_desc.max_msg_size;
> > +
> > +     channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
> > +     if (IS_ERR(channel->tee_shm)) {
> > +             dev_err(channel->cinfo->dev, "shmem allocation failed\n");
> > +             return -ENOMEM;
> > +     }
> > +
> > +     channel->shmem = (void *)tee_shm_get_va(channel->tee_shm, 0);
> > +     memset(channel->shmem, 0, msg_size);
> > +     shmem_clear_channel(channel->shmem);
> > +
> > +     return 0;
> > +}
> > +
> > +static int setup_static_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> > +                           struct optee_channel *channel)
> > +{
> > +     struct device_node *np;
> > +     resource_size_t size;
> > +     struct resource res;
> > +     int ret;
> > +
> > +     np = of_parse_phandle(cinfo->dev->of_node, "shmem", 0);
> > +     if (!of_device_is_compatible(np, "arm,scmi-shmem")) {
> > +             ret = -ENXIO;
> > +             goto out;
> > +     }
> > +
> > +     ret = of_address_to_resource(np, 0, &res);
> > +     if (ret) {
> > +             dev_err(dev, "Failed to get SCMI Tx shared memory\n");
> > +             goto out;
> > +     }
> > +
> > +     size = resource_size(&res);
> > +
> > +     channel->shmem = devm_ioremap(dev, res.start, size);
> > +     if (!channel->shmem) {
> > +             dev_err(dev, "Failed to ioremap SCMI Tx shared memory\n");
> > +             ret = -EADDRNOTAVAIL;
> > +             goto out;
> > +     }
> > +
> > +     ret = 0;
> > +
> > +out:
> > +     of_node_put(np);
> > +
> > +     return ret;
> > +}
> > +
> > +static int optee_chan_setup_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> > +                               bool tx, struct optee_channel *channel)
> > +{
> > +     struct device *cdev = cinfo->dev;
> > +
> > +     if (of_find_property(cdev->of_node, "shmem", NULL))
> > +             return setup_static_shmem(dev, cinfo, channel);
> > +     else
> > +             return setup_dynamic_shmem(dev, channel);
> > +}
> > +
> > +static void optee_clear_channel(struct scmi_chan_info *cinfo)
> > +{
> > +     struct optee_channel *channel = cinfo->transport_info;
> > +
> > +     shmem_clear_channel(channel->shmem);
> > +}
> > +
> > +static int optee_chan_setup(struct scmi_chan_info *cinfo, struct device *dev, bool tx)
> > +{
> > +     struct optee_channel *channel;
> > +     uint32_t channel_id;
> > +     int ret;
> > +
> > +     if (!tx)
> > +             return -ENODEV;
> > +
> > +     /* Shall wait for OP-TEE driver to be up and ready */
> > +     if (!optee_private || !optee_private->tee_ctx)
> > +             return -EPROBE_DEFER;
> > +
> > +     channel = devm_kzalloc(dev, sizeof(*channel), GFP_KERNEL);
> > +     if (!channel)
> > +             return -ENOMEM;
> > +
> > +     ret = of_property_read_u32_index(cinfo->dev->of_node, "linaro,optee-channel-id",
> > +                                      0, &channel_id);
> > +     if (ret)
> > +             return ret;
> > +
> > +     cinfo->transport_info = channel;
> > +     channel->cinfo = cinfo;
> > +     channel->channel_id = channel_id;
> > +     mutex_init(&channel->mu);
> > +
> > +     ret = optee_chan_setup_shmem(dev, cinfo, tx, channel);
> > +     if (ret)
> > +             return ret;
> > +
> > +     ret = open_session(&channel->tee_session);
> > +     if (ret)
> > +             return ret;
> > +
> > +     ret = get_channel(channel);
> > +     if (ret) {
> > +             close_session(channel->tee_session);
> > +
> > +             return ret;
> > +     }
> > +
> > +     mutex_lock(&optee_private->mu);
> > +     list_add(&channel->link, &optee_private->channel_list);
> > +     mutex_unlock(&optee_private->mu);
> > +
> > +     return 0;
> > +}
> > +
> > +static int optee_chan_free(int id, void *p, void *data)
> > +{
> > +     struct scmi_chan_info *cinfo = p;
> > +     struct optee_channel *channel = cinfo->transport_info;
> > +
> > +     mutex_lock(&optee_private->mu);
> > +     list_del(&channel->link);
> > +     mutex_unlock(&optee_private->mu);
> > +
> > +     if (channel->tee_shm) {
> > +             tee_shm_free(channel->tee_shm);
> > +             channel->tee_shm = NULL;
> > +     }
> > +
> > +     cinfo->transport_info = NULL;
> > +     channel->cinfo = NULL;
> > +
> > +     scmi_free_channel(cinfo, data, id);
> > +
> > +     return 0;
> > +}
> > +
> > +static struct scmi_shared_mem *get_channel_shm(struct optee_channel *chan, struct scmi_xfer *xfer)
> > +{
> > +     if (!chan)
> > +             return NULL;
> > +
> > +     return chan->shmem;
> > +}
> > +
> > +
> > +static int optee_send_message(struct scmi_chan_info *cinfo,
> > +                           struct scmi_xfer *xfer)
> > +{
> > +     struct optee_channel *channel = cinfo->transport_info;
> > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > +     int ret;
> > +
> > +     mutex_lock(&channel->mu);
> > +     shmem_tx_prepare(shmem, xfer);
> > +
> > +     ret = invoke_process_smt_channel(channel);
>
> Here all the associated processing in the TrustedOS is fully completed
> right ? i.e. all the possible reply values have been put into shmem by
> the TrustedOS process before the underlying SMC call returns.
> (just to understand better how OPTEE transport is supposed to behave)

Yes, once we're back from invoke_process_smt_channel() the SCMI
message has been processed and the response can be read.
If no response is found, it will be reported as a communication error.

>
> > +
> > +     scmi_rx_callback(cinfo, shmem_read_header(shmem), NULL);
> > +     mutex_unlock(&channel->mu);
> > +
> > +     return ret;
> > +}
> > +
> > +static void optee_fetch_response(struct scmi_chan_info *cinfo,
> > +                              struct scmi_xfer *xfer)
> > +{
> > +     struct optee_channel *channel = cinfo->transport_info;
> > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > +
> > +     shmem_fetch_response(shmem, xfer);
> > +}
> > +
> > +static bool optee_poll_done(struct scmi_chan_info *cinfo,
> > +                         struct scmi_xfer *xfer)
> > +{
> > +     struct optee_channel *channel = cinfo->transport_info;
> > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > +
> > +     return shmem_poll_done(shmem, xfer);
> > +}
> > +
> > +static struct scmi_transport_ops scmi_optee_ops = {
> > +     .chan_available = optee_chan_available,
> > +     .chan_setup = optee_chan_setup,
> > +     .chan_free = optee_chan_free,
> > +     .send_message = optee_send_message,
> > +     .fetch_response = optee_fetch_response,
> > +     .clear_channel = optee_clear_channel,
> > +     .poll_done = optee_poll_done,
> > +};
> > +
> > +const struct scmi_desc scmi_optee_desc = {
> > +     .ops = &scmi_optee_ops,
> > +     .max_rx_timeout_ms = 30,
> > +     .max_msg = 20,
> > +     .max_msg_size = 128,
> > +};
> > +
> > +static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
> > +{
> > +     return ver->impl_id == TEE_IMPL_ID_OPTEE;
> > +}
> > +
> > +static int optee_service_probe(struct device *dev)
> > +{
> > +     struct optee_agent *agent;
> > +     struct tee_context *tee_ctx;
> > +     int ret;
> > +
> > +     /* Only one SCMI OP-TEE device allowed */
> > +     if (optee_private) {
> > +             dev_err(dev, "An SCMI OP-TEE device was already initialized: only one allowed\n");
> > +             return -EBUSY;
> > +     }
> > +
> > +     tee_ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, NULL);
> > +     if (IS_ERR(tee_ctx))
> > +             return -ENODEV;
> > +
> > +     agent = devm_kzalloc(dev, sizeof(*agent), GFP_KERNEL);
> > +     if (!agent) {
> > +             ret = -ENOMEM;
> > +             goto out;
> > +     }
> > +
> > +     agent->dev = dev;
> > +     agent->tee_ctx = tee_ctx;
> > +     INIT_LIST_HEAD(&agent->channel_list);
> > +
> > +     optee_private = agent;
>
> Barrier here to be sure this global is visible and not reordered ?
>
> Not sure if it is plausible that without a barrier the subsequent
> optee_chan_setup could run on another core and simply miss this update
> and bail out. (cannot see any locking of any kind either in the
> chan_available/chan_setup TX path that could trigger a implicit memory
> barrier....bah maybe I'm paranoid)

No barrier needed IMO. optee_private is standard cached memory visible
to all participant cores
and chan_setup cannot be called before this function completes.
Do I miss something?

>
> > +
> > +     ret = get_capabilities();
> > +
> > +out:
> > +     if (ret) {
> > +             tee_client_close_context(tee_ctx);
> > +             optee_private = NULL;
>
> Barrier ? (not sure as above...)
>
> > +     }
> > +
> > +     return ret;
> > +}
> > +
> > +static int optee_service_remove(struct device *dev)
> > +{
> > +     if (optee_private)
> > +             return -EINVAL;
>
> Is it  instead: if (!optee_private) ?

Oups! indeed :(

> > +
> > +     if (!list_empty(&optee_private->channel_list))
> > +             return -EBUSY;
> > +
> > +     tee_client_close_context(optee_private->tee_ctx);
> > +
> > +     optee_private = NULL;
> > +
>
> Barrier ? (not sure as above...)
>
> > +     return 0;
> > +}
> > +
> > +static const struct tee_client_device_id scmi_optee_service_id[] = {
> > +     {
> > +             UUID_INIT(0xa8cfe406, 0xd4f5, 0x4a2e,
> > +                       0x9f, 0x8d, 0xa2, 0x5d, 0xc7, 0x54, 0xc0, 0x99)
> > +     },
> > +     { }
> > +};
> > +
> > +MODULE_DEVICE_TABLE(tee, scmi_optee_service_id);
> > +
> > +static struct tee_client_driver scmi_optee_driver = {
> > +     .id_table       = scmi_optee_service_id,
> > +     .driver         = {
> > +             .name = "scmi-optee",
> > +             .bus = &tee_bus_type,
> > +             .probe = optee_service_probe,
> > +             .remove = optee_service_remove,
> > +     },
> > +};
> > +
> > +static int __init scmi_optee_init(void)
> > +{
> > +     return driver_register(&scmi_optee_driver.driver);
> > +}
> > +
> > +static void __exit scmi_optee_exit(void)
> > +{
> > +     driver_unregister(&scmi_optee_driver.driver);
> > +}
> > +
> > +device_initcall(scmi_optee_init)
> > +module_exit(scmi_optee_exit);
>
> This breaks the build when ARM_SCMI_PROTOCOL=m and SCMI OPTEE transport is enabled,
> since the SCMI transports are not full fledged drivers but they are built into
> the SCMI stack core module, so if you endup trying to define multiple inits.
>
>  LD [M]  drivers/firmware/arm_scmi/scmi-module.o
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_init':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:549: multiple definition of `init_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2070: first defined here
> /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_exit':
> /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:554: multiple definition of `cleanup_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2099: first defined he> /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:474: recipe for target 'drivers/firmware/arm_scmi/scmi-module.o' failed
> make[4]: *** [drivers/firmware/arm_scmi/scmi-module.o] Error 1
> /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware/arm_scmi' failed
> make[3]: *** [drivers/firmware/arm_scmi] Error 2
> /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware' failed
> make[2]: *** [drivers/firmware] Error 2
> make[2]: *** Waiting for unfinished jobs....
> /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1874: recipe for target 'drivers' failed
> make[1]: *** [drivers] Error 2
> make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> Makefile:219: recipe for target '__sub-make' failed
>
> In order to address this issue (same happended with VirtIO) I added
> transport_init/transport_exit optional hooks into scmi_desc, so that
> you can ask the core SCMI stack to perform whatever your transport
> needs at SCMI core init-time, before the SCMI core stack is probed.
>
> In other words the fix here down below fixes for me the build as a
> module of the SCMI stack.

To ensure scmi/optee transport can register to the tee bus, it must
wait tee bus is initialized.
The issue is optee driver initializes its tee bus at subsys_initcall
level, same level as the scmi driver.
So I had to call scmi_optee_init() at an earlier init level: device_initcall().

Virtio bus is registered at core_initcall level hence scmi/virtio init
a subsys_initcall has the dependency resolved.


>
> Note that also __exit on scmi_optee_exit( )ha sbeen removed to avoid
> some complains spotted by Arnd on SCMI VirtIO (1cd73200dad2 firmware:
> arm_scmi: Remove __exit annotation)

Ok, thanks.

Regards,
Etienne

>
> Thanks,
> Cristian
>
> ---8<-----------------------
>
> diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> index e294cff37bea..af6d52438b04 100644
> --- a/drivers/firmware/arm_scmi/optee.c
> +++ b/drivers/firmware/arm_scmi/optee.c
> @@ -459,13 +459,6 @@ static struct scmi_transport_ops scmi_optee_ops = {
>         .poll_done = optee_poll_done,
>  };
>
> -const struct scmi_desc scmi_optee_desc = {
> -       .ops = &scmi_optee_ops,
> -       .max_rx_timeout_ms = 30,
> -       .max_msg = 20,
> -       .max_msg_size = 128,
> -};
> -
>  static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
>  {
>         return ver->impl_id == TEE_IMPL_ID_OPTEE;
> @@ -550,10 +543,16 @@ static int __init scmi_optee_init(void)
>         return driver_register(&scmi_optee_driver.driver);
>  }
>
> -static void __exit scmi_optee_exit(void)
> +static void scmi_optee_exit(void)
>  {
>         driver_unregister(&scmi_optee_driver.driver);
>  }
>
> -device_initcall(scmi_optee_init)
> -module_exit(scmi_optee_exit);
> +const struct scmi_desc scmi_optee_desc = {
> +       .transport_init = scmi_optee_init,
> +       .transport_exit = scmi_optee_exit,
> +       .ops = &scmi_optee_ops,
> +       .max_rx_timeout_ms = 30,
> +       .max_msg = 20,
> +       .max_msg_size = 128,
> +};
>
> > --
> > 2.17.1
> >
kernel test robot Oct. 19, 2021, 12:50 p.m. UTC | #3
Hi Etienne,

Thank you for the patch! Yet something to improve:

[auto build test ERROR on robh/for-next]
[also build test ERROR on linux/master soc/for-next rockchip/for-next arm64/for-next/core shawnguo/for-next linus/master v5.15-rc6 next-20211018]
[cannot apply to arm/for-next keystone/next xilinx-xlnx/master]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]

url:    https://github.com/0day-ci/linux/commits/Etienne-Carriere/dt-bindings-arm-Add-OP-TEE-transport-for-SCMI/20211018-194259
base:   https://git.kernel.org/pub/scm/linux/kernel/git/robh/linux.git for-next
config: arm64-randconfig-r026-20211018 (attached as .config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project d245f2e8597bfb52c34810a328d42b990e4af1a4)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install arm64 cross compiling tool for clang build
        # apt-get install binutils-aarch64-linux-gnu
        # https://github.com/0day-ci/linux/commit/7dff6aa629cdf70e8001dcc7b565d134c61e6dab
        git remote add linux-review https://github.com/0day-ci/linux
        git fetch --no-tags linux-review Etienne-Carriere/dt-bindings-arm-Add-OP-TEE-transport-for-SCMI/20211018-194259
        git checkout 7dff6aa629cdf70e8001dcc7b565d134c61e6dab
        # save the attached .config to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=arm64 SHELL=/bin/bash

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All errors (new ones prefixed by >>):

>> drivers/firmware/arm_scmi/optee.c:233:27: error: use of undeclared identifier 'scmi_optee_desc'; did you mean 'scmi_virtio_desc'?
                   const size_t msg_size = scmi_optee_desc.max_msg_size;
                                           ^~~~~~~~~~~~~~~
                                           scmi_virtio_desc
   drivers/firmware/arm_scmi/common.h:422:31: note: 'scmi_virtio_desc' declared here
   extern const struct scmi_desc scmi_virtio_desc;
                                 ^
   drivers/firmware/arm_scmi/optee.c:266:26: error: use of undeclared identifier 'scmi_optee_desc'; did you mean 'scmi_virtio_desc'?
           const size_t msg_size = scmi_optee_desc.max_msg_size;
                                   ^~~~~~~~~~~~~~~
                                   scmi_virtio_desc
   drivers/firmware/arm_scmi/common.h:422:31: note: 'scmi_virtio_desc' declared here
   extern const struct scmi_desc scmi_virtio_desc;
                                 ^
   2 errors generated.


vim +233 drivers/firmware/arm_scmi/optee.c

   221	
   222	static int invoke_process_smt_channel(struct optee_channel *channel)
   223	{
   224		struct tee_ioctl_invoke_arg arg = { };
   225		struct tee_param param[2] = { };
   226		int ret;
   227	
   228		arg.session = channel->tee_session;
   229		param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
   230		param[0].u.value.a = channel->channel_id;
   231	
   232		if (channel->tee_shm) {
 > 233			const size_t msg_size = scmi_optee_desc.max_msg_size;
   234	
   235			param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
   236			param[1].u.memref.shm = channel->tee_shm;
   237			param[1].u.memref.size = msg_size;
   238			arg.num_params = 2;
   239			arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE;
   240		} else {
   241			arg.num_params = 1;
   242			arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL;
   243		}
   244	
   245		ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
   246		if (ret < 0 || arg.ret) {
   247			dev_err(optee_private->dev, "Failed on channel %u: %d / %#x\n",
   248				channel->channel_id, ret, arg.ret);
   249	
   250			return -EIO;
   251		}
   252	
   253		return 0;
   254	}
   255	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
Etienne Carriere Oct. 19, 2021, 2:24 p.m. UTC | #4
Hi,

On Tue, 19 Oct 2021 at 11:10, Etienne Carriere
<etienne.carriere@linaro.org> wrote:
>
>  Hello Cristian,
>
> Thanks a lot for the review.
> I see I didn't understand and use correctly the config switch for the transport.
> Thanks for all the fixes you sent, i'll integrate them in the patch v4.
>
> I don't know yet how to address your last comment. See my feedback on
> the optee bus dependency issue.
>
>
>
> On Mon, 18 Oct 2021 at 21:43, Cristian Marussi <cristian.marussi@arm.com> wrote:
> >
> > On Mon, Oct 18, 2021 at 01:40:46PM +0200, Etienne Carriere wrote:
> > > Add a new transport channel to the SCMI firmware interface driver for
> > > SCMI message exchange based on optee transport channel. The optee
> > > transport is realized by connecting and invoking OP-TEE SCMI service
> > > interface PTA.
> > >
> > > Optee transport support (CONFIG_ARM_SCMI_TRANSPORT_OPTEE) is default
> > > enabled when optee driver (CFG_OPTEE) is enabled. Effective optee
> > > transport is setup upon OP-TEE SCMI service discovery at optee
> > > device initialization. For this SCMI UUID is registered to the optee
> > > bus for probing. This is done at device_init initcall level, after
> > > optee bus initialization that is done at subsys_init level, as the scmi
> > > driver initialization.
> > >
> > > The optee transport can use a statically defined shared memory in
> > > which case SCMI device tree node defines it using an "arm,scmi-shmem"
> > > compatible phandle through property shmem. Alternatively, optee transport
> > > allocates the shared memory buffer from the optee driver when no shmem
> > > property is defined.
> > >
> > > The protocol used to exchange SCMI message over that shared memory is
> > > negotiated between optee transport driver and the OP-TEE service through
> > > capabilities exchange.
> > >
> > > OP-TEE SCMI service is integrated in OP-TEE since its release tag 3.13.0.
> > > The service interface is published in [1].
> > >
> > > Link: [1] https://github.com/OP-TEE/optee_os/blob/3.13.0/lib/libutee/include/pta_scmi_client.h
> > > Cc: Cristian Marussi <cristian.marussi@arm.com>
> > > Cc: Sudeep Holla <sudeep.holla@arm.com>
> > > Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
> > > ---
> > > Changes since v2:
> > > - Rebase on for-next/scmi, based on Linux v5.15-rc1.
> > > - Implement support for dynamic and static shared memory.
> > > - Factorize some functions and simplify transport exit sequence.
> > > - Rename driver source file from optee_service.c to optee.c.
> > >
> > > No change since v1
> > > ---
> >
> > Hi Etienne,
> >
> > a few remarks below.
> >
> > >  drivers/firmware/arm_scmi/Kconfig  |  12 +
> > >  drivers/firmware/arm_scmi/Makefile |   1 +
> > >  drivers/firmware/arm_scmi/common.h |   3 +
> > >  drivers/firmware/arm_scmi/driver.c |   3 +
> > >  drivers/firmware/arm_scmi/optee.c  | 559 +++++++++++++++++++++++++++++
> > >  5 files changed, 578 insertions(+)
> > >  create mode 100644 drivers/firmware/arm_scmi/optee.c
> > >
> > > diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> > > index 3d7081e84853..9107e249023c 100644
> > > --- a/drivers/firmware/arm_scmi/Kconfig
> > > +++ b/drivers/firmware/arm_scmi/Kconfig
> > > @@ -77,6 +77,18 @@ config ARM_SCMI_TRANSPORT_VIRTIO
> > >         If you want the ARM SCMI PROTOCOL stack to include support for a
> > >         transport based on VirtIO, answer Y.
> > >
> > > +config ARM_SCMI_TRANSPORT_OPTEE
> > > +     bool "SCMI transport based on OP-TEE service"
> > > +     depends on OPTEE
> > > +     select ARM_SCMI_HAVE_TRANSPORT
> > > +     select ARM_SCMI_HAVE_SHMEM
> > > +     default y
> > > +     help
> > > +       This enables the OP-TEE service based transport for SCMI.
> > > +
> > > +       If you want the ARM SCMI PROTOCOL stack to include support for a
> > > +       transport based on OP-TEE SCMI service, answer Y.
> > > +
> > >  endif #ARM_SCMI_PROTOCOL
> > >
> >
> > So this 'depends on OPTEE' reminded me of a similar issue on VIRTIO
> > transport spotted by a bot (see the fix for Virtio at: c90521a0e94f firmware:
> > arm_scmi: Fix virtio transport Kconfig dependency), that consiste in a broken
> > build when SCMI was compiled built-in with VIRTIO transport support with
> > ARM_SCMI_PROTOCOL=y while the core was CONFIG_VIRTIO=m.
> >
> > So I tried similarly to set CONFIG_OPTEE=m while keeping ARM_SCMI_PROTOCOL=y
> > expecting to see a similar issue as in VirtIO (i.e. not being able to access
> > optee module symbols from the builtin SCMI), instead I spotted a different bug :D
>
> Sorry, I didn't try this config (optee=m / scmi=y). I though expecting
> scmi over optee and scmi=y would mandate optee=y.
> For the fixup you propose below, i understand how you address the
> configuration dependencies.
>
> >
> >   AR      drivers/base/built-in.a
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘invoke_process_smt_channel’:
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
> >    const size_t msg_size = scmi_optee_desc.max_msg_size;
> >                            ^~~~~~~~~~~~~~~
> >                            scmi_smc_desc
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: note: each undeclared identifier is reported only once for each function it appears in
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘setup_dynamic_shmem’:
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:266:26: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
> >   const size_t msg_size = scmi_optee_desc.max_msg_size;
> >                           ^~~~~~~~~~~~~~~
> >                           scmi_smc_desc
> > /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:277: recipe for target 'drivers/firmware/arm_scmi/optee.o' failed
> > make[4]: *** [drivers/firmware/arm_scmi/optee.o] Error 1
> > make[4]: *** Waiting for unfinished jobs....
> >
> > In fact those scmi_optee_desc are reference to a global only declared
> > down below. Fixed with a few defines to carry on:
> >
> > ---8<------------------
> >
> > diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> > index 64aaba4a8bf2..93a84c91457b 100644
> > --- a/drivers/firmware/arm_scmi/optee.c
> > +++ b/drivers/firmware/arm_scmi/optee.c
> > @@ -18,6 +18,8 @@
> >
> >  #define DRIVER_NAME "optee-scmi"
> >
> > +#define SCMI_OPTEE_MAX_MSG_SIZE                128
> > +
> >  enum optee_smci_pta_cmd {
> >         /*
> >          * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> > @@ -230,7 +232,7 @@ static int invoke_process_smt_channel(struct optee_channel *channel)
> >         param[0].u.value.a = channel->channel_id;
> >
> >         if (channel->tee_shm) {
> > -               const size_t msg_size = scmi_optee_desc.max_msg_size;
> > +               const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
> >
> >                 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
> >                 param[1].u.memref.shm = channel->tee_shm;
> > @@ -263,7 +265,7 @@ static bool optee_chan_available(struct device *dev, int idx)
> >
> >  static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
> >  {
> > -       const size_t msg_size = scmi_optee_desc.max_msg_size;
> > +       const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
> >
> >         channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
> >         if (IS_ERR(channel->tee_shm)) {
> >
> > -----------------------------
> >
> > After the above change it compiled fine, so I went a step further and configured also
> > CONFIG_TEE=m (just trying to reproduce what bot saw on similar VirtIO eeh.... not that
> > I am so evil and sadic :D)
> >
> > And indeed now (with ARM_SCMI_PROTOCOL=y and CONFIG_TEE=m) I get:
> >
> >
> >   GEN     modules.builtin
> >   LD      .tmp_vmlinux.kallsyms1
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected GOT/PLT entries detected!
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected run-time procedure linkages detected!
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `invoke_process_smt_channel':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_chan_free':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:397: undefined reference to `tee_shm_free'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `open_session':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:137: undefined reference to `tee_client_open_session'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_remove':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:516: undefined reference to `tee_client_close_context'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_probe':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:481: undefined reference to `tee_client_open_context'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:501: undefined reference to `tee_client_close_context'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_capabilities':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:172: undefined reference to `tee_client_invoke_func'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_channel':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:209: undefined reference to `tee_client_invoke_func'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `setup_dynamic_shmem':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:270: undefined reference to `tee_shm_alloc_kernel_buf'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:276: undefined reference to `tee_shm_get_va'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o:(.data+0x10): undefined reference to `tee_bus_type'
> > /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target 'vmlinux' failed
> > make[1]: *** [vmlinux] Error 1
> > make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> > Makefile:219: recipe for target '__sub-make' failed
> >
> > Taking a similar approach to Virtio, this fixed for me
> >
> > diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> > index 9107e249023c..30746350349c 100644
> > --- a/drivers/firmware/arm_scmi/Kconfig
> > +++ b/drivers/firmware/arm_scmi/Kconfig
> > @@ -79,7 +79,7 @@ config ARM_SCMI_TRANSPORT_VIRTIO
> >
> >  config ARM_SCMI_TRANSPORT_OPTEE
> >         bool "SCMI transport based on OP-TEE service"
> > -       depends on OPTEE
> > +       depends on OPTEE=y || OPTEE=ARM_SCMI_PROTOCOL
> >         select ARM_SCMI_HAVE_TRANSPORT
> >         select ARM_SCMI_HAVE_SHMEM
> >         default y
> >
> > which basically disables ARM_SCMI_TRANSPORT_OPTEE when CONFIG_OPTEE=m AND
> > ARM_SCMI_TRANSPORT_OPTEE=y: in this scenario if TEE is =m you have to build
> > ARM_SCMI_PROTOCOL=m too to be able to include ARM_SCMI_TRANSPORT_OPTEE.
>
> Fully makes sense to me. Thanks. I understand.
>
> >
> >
> > >  config ARM_SCMI_POWER_DOMAIN
> > > diff --git a/drivers/firmware/arm_scmi/Makefile b/drivers/firmware/arm_scmi/Makefile
> > > index 1dcf123d64ab..ef66ec8ca917 100644
> > > --- a/drivers/firmware/arm_scmi/Makefile
> > > +++ b/drivers/firmware/arm_scmi/Makefile
> > > @@ -6,6 +6,7 @@ scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_MAILBOX) += mailbox.o
> > >  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_SMC) += smc.o
> > >  scmi-transport-$(CONFIG_ARM_SCMI_HAVE_MSG) += msg.o
> > >  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_VIRTIO) += virtio.o
> > > +scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_OPTEE) += optee.o
> > >  scmi-protocols-y = base.o clock.o perf.o power.o reset.o sensors.o system.o voltage.o
> > >  scmi-module-objs := $(scmi-bus-y) $(scmi-driver-y) $(scmi-protocols-y) \
> > >                   $(scmi-transport-y)
> > > diff --git a/drivers/firmware/arm_scmi/common.h b/drivers/firmware/arm_scmi/common.h
> > > index dea1bfbe1052..82ff3c3a6d2d 100644
> > > --- a/drivers/firmware/arm_scmi/common.h
> > > +++ b/drivers/firmware/arm_scmi/common.h
> > > @@ -421,6 +421,9 @@ extern const struct scmi_desc scmi_smc_desc;
> > >  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
> > >  extern const struct scmi_desc scmi_virtio_desc;
> > >  #endif
> > > +#ifdef CONFIG_OPTEE
> >
> > This should be:
> >
> > #ifdef CONFIG_ARM_SCMI_TRANSPORT_OPTEE
> >
> > if not disabling OPTEE transport in Kconfig breaks the build.
> >
> >  LD      .tmp_vmlinux.kallsyms1
> >  /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld:
> >  drivers/firmware/arm_scmi/driver.o:(.rodata+0x280): undefined reference
> >  to `scmi_optee_desc'
> >  /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target
> >  'vmlinux' failed
> >  make[1]: *** [vmlinux] Error 1
> >  make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> >
> >
> > > +extern const struct scmi_desc scmi_optee_desc;
> > > +#endif
> > >
> > >  void scmi_rx_callback(struct scmi_chan_info *cinfo, u32 msg_hdr, void *priv);
> > >  void scmi_free_channel(struct scmi_chan_info *cinfo, struct idr *idr, int id);
> > > diff --git a/drivers/firmware/arm_scmi/driver.c b/drivers/firmware/arm_scmi/driver.c
> > > index b406b3f78f46..06f0a9846c7e 100644
> > > --- a/drivers/firmware/arm_scmi/driver.c
> > > +++ b/drivers/firmware/arm_scmi/driver.c
> > > @@ -1999,6 +1999,9 @@ static const struct of_device_id scmi_of_match[] = {
> > >  #endif
> > >  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
> > >       { .compatible = "arm,scmi-virtio", .data = &scmi_virtio_desc},
> > > +#endif
> > > +#ifdef CONFIG_OPTEE
> >
> > Same as above should be #if CONFIG_ARM_SCMI_TRANSPORT_OPTEE
> >
> > > +     { .compatible = "linaro,scmi-optee", .data = &scmi_optee_desc },
> > >  #endif
> > >       { /* Sentinel */ },
> > >  };
> > > diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> > > new file mode 100644
> > > index 000000000000..e294cff37bea
> > > --- /dev/null
> > > +++ b/drivers/firmware/arm_scmi/optee.c
> > > @@ -0,0 +1,559 @@
> > > +// SPDX-License-Identifier: GPL-2.0
> > > +/*
> > > + * Copyright (C) 2019-2021 Linaro Ltd.
> > > + */
> > > +
> > > +#include <linux/io.h>
> > > +#include <linux/of.h>
> > > +#include <linux/of_address.h>
> > > +#include <linux/kernel.h>
> > > +#include <linux/module.h>
> > > +#include <linux/mutex.h>
> > > +#include <linux/slab.h>
> > > +#include <linux/tee_drv.h>
> > > +#include <linux/uuid.h>
> > > +#include <uapi/linux/tee.h>
> > > +
> > > +#include "common.h"
> > > +
> > > +#define DRIVER_NAME "optee-scmi"
> > > +
> > > +enum optee_smci_pta_cmd {
> >               ^
> >               scmi ? or is it another fancy 4letters acronym :D
>
> :) nice catch!
>
> > > +     /*
> > > +      * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> > > +      *
> > > +      * [out]    value[0].a: Capability bit mask (enum pta_scmi_caps)
> > > +      * [out]    value[0].b: Extended capabilities or 0
> > > +      */
> > > +     PTA_SCMI_CMD_CAPABILITIES = 0,
> > > +
> > > +     /*
> > > +      * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer
> > > +      *
> > > +      * [in]     value[0].a: Channel handle
> > > +      *
> > > +      * Shared memory used for SCMI message/response exhange is expected
> > > +      * already identified and bound to channel handle in both SCMI agent
> > > +      * and SCMI server (OP-TEE) parts.
> > > +      * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> > > +      * protocol message ID).
> > > +      */
> > > +     PTA_SCMI_CMD_PROCESS_SMT_CHANNEL = 1,
> > > +
> > > +     /*
> > > +      * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SMT/SCMI message
> > > +      *
> > > +      * [in]     value[0].a: Channel handle
> > > +      * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload)
> > > +      *
> > > +      * Shared memory used for SCMI message/response is a SMT buffer
> > > +      * referenced by param[1]. It shall be 128 bytes large to fit response
> > > +      * payload whatever message playload size.
> > > +      * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> > > +      * protocol message ID).
> > > +      */
> > > +     PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE = 2,
> > > +
> > > +     /*
> > > +      * PTA_SCMI_CMD_GET_CHANNEL - Get channel handle
> > > +      *
> > > +      * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM
> > > +      *
> > > +      * [in]     value[0].a: Channel identifier
> > > +      * [out]    value[0].a: Returned channel handle
> > > +      * [in]     value[0].b: Requested capabilities mask (enum pta_scmi_caps)
> > > +      */
> > > +     PTA_SCMI_CMD_GET_CHANNEL = 3,
> > > +};
> > > +
> > > +/*
> > > + * Capabilities
> > > + */
> > > +enum pta_scmi_caps {
> > > +     PTA_SCMI_CAPS_NONE = 0,
> > > +     /*
> > > +      * Supports command using SMT header protocol (SCMI shmem) in shared
> > > +      * memory buffers to carry SCMI protocol synchronisation information.
> > > +      */
> > > +     PTA_SCMI_CAPS_SMT_HEADER = BIT(0),
> > > +};
> > > +
> > > +/**
> > > + * struct optee_channel - Description of an OP-TEE SCMI channel
> > > + *
> > > + * @channel_id: OP-TEE channel ID used for this transport
> > > + * @mu: Mutex protection on channel access
> > > + * @tee_session: TEE session identifier
> > > + * @cinfo: SCMI channel information
> > > + * @shmem: Virtual base address of the shared memory
> > > + * @tee_shm: Reference to TEE shared memory or NULL if using static shmem
> > > + * @caps: OP-TEE SCMI channel capabilities
> > > + * @link: Reference in agent's channel list
> > > + */
> > > +struct optee_channel {
> > > +     u32 channel_id;
> > > +     struct mutex mu;
> > > +     u32 tee_session;
> > > +     struct scmi_chan_info *cinfo;
> > > +     struct scmi_shared_mem __iomem *shmem;
> > > +     struct tee_shm *tee_shm;
> > > +     enum pta_scmi_caps caps;
> > > +     struct list_head link;
> > > +};
> > > +
> > > +/**
> > > + * struct optee_agent - OP-TEE transport private data
> > > + *
> > > + * @dev: Device used for communication with TEE
> > > + * @tee_ctx: TEE context used for communication
> > > + * @caps: Supported channel capabilities
> > > + * @mu: Mutex for protection of @channel_list
> > > + * @channel_list: List of all created channels for the agent
> > > + */
> > > +struct optee_agent {
> > > +     struct device *dev;
> > > +     struct tee_context *tee_ctx;
> > > +     enum pta_scmi_caps caps;
> > > +     struct mutex mu;
> > > +     struct list_head channel_list;
> > > +};
> > > +
> > > +/* There can be only 1 SCMI service in OP-TEE we connect to */
> > > +static struct optee_agent *optee_private;
> > > +
> >
> > Maybe naming these locally defined optee_ structs as scmi_optee_ ?
> >
> > When I see those optee_ refs around down below I tend to think they
> > are OPTEE core structs not locally defined containers.
> > (I uderstand that depends on my poor familiarity with OPTEE APIs
> > though...)
>
> Ok. If that help maintenance, I'm fine. I'll use scmi_optee_ where appiicable.
>
>
> >
> > > +/* Open a session toward SCMI OP-TEE service with REE_KERNEL identity */
> > > +static int open_session(u32 *tee_session)
> > > +{
> > > +     struct device *dev = optee_private->dev;
> > > +     struct tee_client_device *scmi_pta = to_tee_client_device(dev);
> > > +     struct tee_ioctl_open_session_arg arg = { };
> > > +     int ret;
> > > +
> > > +     memcpy(arg.uuid, scmi_pta->id.uuid.b, TEE_IOCTL_UUID_LEN);
> > > +     arg.clnt_login = TEE_IOCTL_LOGIN_REE_KERNEL;
> > > +
> > > +     ret = tee_client_open_session(optee_private->tee_ctx, &arg, NULL);
> > > +     if (ret < 0 || arg.ret) {
> > > +             dev_err(dev, "Can't open tee session: %d / %#x\n", ret, arg.ret);
> > > +
> > > +             return -EOPNOTSUPP;
> > > +     }
> > > +
> > > +     *tee_session = arg.session;
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static void close_session(u32 tee_session)
> > > +{
> > > +     tee_client_close_session(optee_private->tee_ctx, tee_session);
> > > +}
> > > +
> > > +static int get_capabilities(void)
> > > +{
> > > +     struct optee_agent *agent = optee_private;
> > > +     struct tee_ioctl_invoke_arg arg = { };
> > > +     struct tee_param param[1] = { };
> > > +     u32 tee_session;
> > > +     int ret;
> > > +
> > > +     ret = open_session(&tee_session);
> > > +     if (ret)
> > > +             return ret;
> > > +
> > > +     arg.func = PTA_SCMI_CMD_CAPABILITIES;
> > > +     arg.session = tee_session;
> > > +     arg.num_params = 1;
> > > +
> > > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT;
> > > +
> > > +     ret = tee_client_invoke_func(agent->tee_ctx, &arg, param);
> > > +
> > > +     close_session(tee_session);
> > > +
> > > +     if (ret < 0 || arg.ret) {
> > > +             dev_err(agent->dev, "Can't get capabilities: %d / %#x\n", ret, arg.ret);
> > > +
> > > +             return -EOPNOTSUPP;
> > > +     }
> > > +
> > > +     agent->caps = param[0].u.value.a;
> > > +
> > > +     if (!(agent->caps & PTA_SCMI_CAPS_SMT_HEADER)) {
> > > +             dev_err(agent->dev, "OP-TEE SCMI PTA doesn't support SMT\n");
> > > +
> > > +             return -EOPNOTSUPP;
> > > +     }
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static int get_channel(struct optee_channel *channel)
> > > +{
> > > +     struct device *dev = optee_private->dev;
> > > +     struct tee_ioctl_invoke_arg arg = { };
> > > +     struct tee_param param[1] = { };
> > > +     unsigned int caps = PTA_SCMI_CAPS_SMT_HEADER;
> > > +     int ret;
> > > +
> > > +     arg.func = PTA_SCMI_CMD_GET_CHANNEL;
> > > +     arg.session = channel->tee_session;
> > > +     arg.num_params = 1;
> > > +
> > > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
> > > +     param[0].u.value.a = channel->channel_id;
> > > +     param[0].u.value.b = caps;
> > > +
> > > +     ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> > > +
> > > +     if (ret || arg.ret) {
> > > +             dev_err(dev, "Can't get channel with caps %#x: %d / %#x\n", caps, ret, arg.ret);
> > > +
> > > +             return -EOPNOTSUPP;
> > > +     }
> > > +
> > > +     /* From now on use channel identifer provided by OP-TEE SCMI service */
> > > +     channel->channel_id = param[0].u.value.a;
> > > +     channel->caps = caps;
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static int invoke_process_smt_channel(struct optee_channel *channel)
> > > +{
> > > +     struct tee_ioctl_invoke_arg arg = { };
> > > +     struct tee_param param[2] = { };
> > > +     int ret;
> > > +
> > > +     arg.session = channel->tee_session;
> > > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
> > > +     param[0].u.value.a = channel->channel_id;
> > > +
> > > +     if (channel->tee_shm) {
> > > +             const size_t msg_size = scmi_optee_desc.max_msg_size;
> > > +
> > > +             param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
> > > +             param[1].u.memref.shm = channel->tee_shm;
> > > +             param[1].u.memref.size = msg_size;
> > > +             arg.num_params = 2;
> > > +             arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE;
> > > +     } else {
> > > +             arg.num_params = 1;
> > > +             arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL;
> > > +     }
> > > +
> > > +     ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> > > +     if (ret < 0 || arg.ret) {
> > > +             dev_err(optee_private->dev, "Failed on channel %u: %d / %#x\n",
> > > +                     channel->channel_id, ret, arg.ret);
> > > +
> > > +             return -EIO;
> > > +     }
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static bool optee_chan_available(struct device *dev, int idx)
> > > +{
> > > +     u32 channel_id;
> > > +
> > > +     return !of_property_read_u32_index(dev->of_node, "linaro,optee-channel-id",
> > > +                                        idx, &channel_id);
> > > +}
> > > +
> > > +static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
> > > +{
> > > +     const size_t msg_size = scmi_optee_desc.max_msg_size;
> > > +
> > > +     channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
> > > +     if (IS_ERR(channel->tee_shm)) {
> > > +             dev_err(channel->cinfo->dev, "shmem allocation failed\n");
> > > +             return -ENOMEM;
> > > +     }
> > > +
> > > +     channel->shmem = (void *)tee_shm_get_va(channel->tee_shm, 0);
> > > +     memset(channel->shmem, 0, msg_size);
> > > +     shmem_clear_channel(channel->shmem);
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static int setup_static_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> > > +                           struct optee_channel *channel)
> > > +{
> > > +     struct device_node *np;
> > > +     resource_size_t size;
> > > +     struct resource res;
> > > +     int ret;
> > > +
> > > +     np = of_parse_phandle(cinfo->dev->of_node, "shmem", 0);
> > > +     if (!of_device_is_compatible(np, "arm,scmi-shmem")) {
> > > +             ret = -ENXIO;
> > > +             goto out;
> > > +     }
> > > +
> > > +     ret = of_address_to_resource(np, 0, &res);
> > > +     if (ret) {
> > > +             dev_err(dev, "Failed to get SCMI Tx shared memory\n");
> > > +             goto out;
> > > +     }
> > > +
> > > +     size = resource_size(&res);
> > > +
> > > +     channel->shmem = devm_ioremap(dev, res.start, size);
> > > +     if (!channel->shmem) {
> > > +             dev_err(dev, "Failed to ioremap SCMI Tx shared memory\n");
> > > +             ret = -EADDRNOTAVAIL;
> > > +             goto out;
> > > +     }
> > > +
> > > +     ret = 0;
> > > +
> > > +out:
> > > +     of_node_put(np);
> > > +
> > > +     return ret;
> > > +}
> > > +
> > > +static int optee_chan_setup_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> > > +                               bool tx, struct optee_channel *channel)
> > > +{
> > > +     struct device *cdev = cinfo->dev;
> > > +
> > > +     if (of_find_property(cdev->of_node, "shmem", NULL))
> > > +             return setup_static_shmem(dev, cinfo, channel);
> > > +     else
> > > +             return setup_dynamic_shmem(dev, channel);
> > > +}
> > > +
> > > +static void optee_clear_channel(struct scmi_chan_info *cinfo)
> > > +{
> > > +     struct optee_channel *channel = cinfo->transport_info;
> > > +
> > > +     shmem_clear_channel(channel->shmem);
> > > +}
> > > +
> > > +static int optee_chan_setup(struct scmi_chan_info *cinfo, struct device *dev, bool tx)
> > > +{
> > > +     struct optee_channel *channel;
> > > +     uint32_t channel_id;
> > > +     int ret;
> > > +
> > > +     if (!tx)
> > > +             return -ENODEV;
> > > +
> > > +     /* Shall wait for OP-TEE driver to be up and ready */
> > > +     if (!optee_private || !optee_private->tee_ctx)
> > > +             return -EPROBE_DEFER;
> > > +
> > > +     channel = devm_kzalloc(dev, sizeof(*channel), GFP_KERNEL);
> > > +     if (!channel)
> > > +             return -ENOMEM;
> > > +
> > > +     ret = of_property_read_u32_index(cinfo->dev->of_node, "linaro,optee-channel-id",
> > > +                                      0, &channel_id);
> > > +     if (ret)
> > > +             return ret;
> > > +
> > > +     cinfo->transport_info = channel;
> > > +     channel->cinfo = cinfo;
> > > +     channel->channel_id = channel_id;
> > > +     mutex_init(&channel->mu);
> > > +
> > > +     ret = optee_chan_setup_shmem(dev, cinfo, tx, channel);
> > > +     if (ret)
> > > +             return ret;
> > > +
> > > +     ret = open_session(&channel->tee_session);
> > > +     if (ret)
> > > +             return ret;
> > > +
> > > +     ret = get_channel(channel);
> > > +     if (ret) {
> > > +             close_session(channel->tee_session);
> > > +
> > > +             return ret;
> > > +     }
> > > +
> > > +     mutex_lock(&optee_private->mu);
> > > +     list_add(&channel->link, &optee_private->channel_list);
> > > +     mutex_unlock(&optee_private->mu);
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static int optee_chan_free(int id, void *p, void *data)
> > > +{
> > > +     struct scmi_chan_info *cinfo = p;
> > > +     struct optee_channel *channel = cinfo->transport_info;
> > > +
> > > +     mutex_lock(&optee_private->mu);
> > > +     list_del(&channel->link);
> > > +     mutex_unlock(&optee_private->mu);
> > > +
> > > +     if (channel->tee_shm) {
> > > +             tee_shm_free(channel->tee_shm);
> > > +             channel->tee_shm = NULL;
> > > +     }
> > > +
> > > +     cinfo->transport_info = NULL;
> > > +     channel->cinfo = NULL;
> > > +
> > > +     scmi_free_channel(cinfo, data, id);
> > > +
> > > +     return 0;
> > > +}
> > > +
> > > +static struct scmi_shared_mem *get_channel_shm(struct optee_channel *chan, struct scmi_xfer *xfer)
> > > +{
> > > +     if (!chan)
> > > +             return NULL;
> > > +
> > > +     return chan->shmem;
> > > +}
> > > +
> > > +
> > > +static int optee_send_message(struct scmi_chan_info *cinfo,
> > > +                           struct scmi_xfer *xfer)
> > > +{
> > > +     struct optee_channel *channel = cinfo->transport_info;
> > > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > > +     int ret;
> > > +
> > > +     mutex_lock(&channel->mu);
> > > +     shmem_tx_prepare(shmem, xfer);
> > > +
> > > +     ret = invoke_process_smt_channel(channel);
> >
> > Here all the associated processing in the TrustedOS is fully completed
> > right ? i.e. all the possible reply values have been put into shmem by
> > the TrustedOS process before the underlying SMC call returns.
> > (just to understand better how OPTEE transport is supposed to behave)
>
> Yes, once we're back from invoke_process_smt_channel() the SCMI
> message has been processed and the response can be read.
> If no response is found, it will be reported as a communication error.
>
> >
> > > +
> > > +     scmi_rx_callback(cinfo, shmem_read_header(shmem), NULL);
> > > +     mutex_unlock(&channel->mu);
> > > +
> > > +     return ret;
> > > +}
> > > +
> > > +static void optee_fetch_response(struct scmi_chan_info *cinfo,
> > > +                              struct scmi_xfer *xfer)
> > > +{
> > > +     struct optee_channel *channel = cinfo->transport_info;
> > > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > > +
> > > +     shmem_fetch_response(shmem, xfer);
> > > +}
> > > +
> > > +static bool optee_poll_done(struct scmi_chan_info *cinfo,
> > > +                         struct scmi_xfer *xfer)
> > > +{
> > > +     struct optee_channel *channel = cinfo->transport_info;
> > > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > > +
> > > +     return shmem_poll_done(shmem, xfer);
> > > +}
> > > +
> > > +static struct scmi_transport_ops scmi_optee_ops = {
> > > +     .chan_available = optee_chan_available,
> > > +     .chan_setup = optee_chan_setup,
> > > +     .chan_free = optee_chan_free,
> > > +     .send_message = optee_send_message,
> > > +     .fetch_response = optee_fetch_response,
> > > +     .clear_channel = optee_clear_channel,
> > > +     .poll_done = optee_poll_done,
> > > +};
> > > +
> > > +const struct scmi_desc scmi_optee_desc = {
> > > +     .ops = &scmi_optee_ops,
> > > +     .max_rx_timeout_ms = 30,
> > > +     .max_msg = 20,
> > > +     .max_msg_size = 128,
> > > +};
> > > +
> > > +static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
> > > +{
> > > +     return ver->impl_id == TEE_IMPL_ID_OPTEE;
> > > +}
> > > +
> > > +static int optee_service_probe(struct device *dev)
> > > +{
> > > +     struct optee_agent *agent;
> > > +     struct tee_context *tee_ctx;
> > > +     int ret;
> > > +
> > > +     /* Only one SCMI OP-TEE device allowed */
> > > +     if (optee_private) {
> > > +             dev_err(dev, "An SCMI OP-TEE device was already initialized: only one allowed\n");
> > > +             return -EBUSY;
> > > +     }
> > > +
> > > +     tee_ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, NULL);
> > > +     if (IS_ERR(tee_ctx))
> > > +             return -ENODEV;
> > > +
> > > +     agent = devm_kzalloc(dev, sizeof(*agent), GFP_KERNEL);
> > > +     if (!agent) {
> > > +             ret = -ENOMEM;
> > > +             goto out;
> > > +     }
> > > +
> > > +     agent->dev = dev;
> > > +     agent->tee_ctx = tee_ctx;
> > > +     INIT_LIST_HEAD(&agent->channel_list);
> > > +
> > > +     optee_private = agent;
> >
> > Barrier here to be sure this global is visible and not reordered ?
> >
> > Not sure if it is plausible that without a barrier the subsequent
> > optee_chan_setup could run on another core and simply miss this update
> > and bail out. (cannot see any locking of any kind either in the
> > chan_available/chan_setup TX path that could trigger a implicit memory
> > barrier....bah maybe I'm paranoid)
>
> No barrier needed IMO. optee_private is standard cached memory visible
> to all participant cores
> and chan_setup cannot be called before this function completes.
> Do I miss something?
>

I see why you ask for a barrier. Indeed, at module insertion we can
face consistency issues.

I agree barriers are needed. Looking at the scmi_virtio
implementation, i think the barriers are misplaced in the sequences.
The barrier should be placed before the global reference is loaded at
device probe, so that its content is visible before the device
reference itself.
On the other hand in the remove sequence, the barrier should be placed
after device ref is cleared but before device resources are released.
Note that, in smp_store_mb() implementation, the memory barrier is
places after the data is loaded, not before.
See the patch-like snippet below:

 static int scmi_vio_probe(struct virtio_device *vdev)
 {
     (...)

-    vdev->priv = channels;
-    /* Ensure initialized scmi_vdev is visible */
-    smp_store_mb(scmi_vdev, vdev);
+    /* Ensure initialized scmi_vdev is visible before scmi_vdev is */
+    smp_store_mb(vdev->priv, channels);
+    scmi_vdev = vdev;

    return 0;
 }

 static void scmi_vio_remove(struct virtio_device *vdev)
 {
+    /* Ensure scmi_vdev is visible as NULL before resources are released */
+    smp_store_mb(scmi_vdev, NULL);
+
     /*
      * Once we get here, virtio_chan_free() will have already been called by
      * the SCMI core for any existing channel and, as a consequence, all the
      * virtio channels will have been already marked NOT ready, causing any
      * outstanding message on any vqueue to be ignored by complete_cb: now
      * we can just stop processing buffers and destroy the vqueues.
      */
     vdev->config->reset(vdev);
     vdev->config->del_vqs(vdev);
-    /* Ensure scmi_vdev is visible as NULL */
-    smp_store_mb(scmi_vdev, NULL);
 }

Does that make sense to you?

> >
> > > +
> > > +     ret = get_capabilities();
> > > +
> > > +out:
> > > +     if (ret) {
> > > +             tee_client_close_context(tee_ctx);
> > > +             optee_private = NULL;
> >
> > Barrier ? (not sure as above...)
> >
> > > +     }
> > > +
> > > +     return ret;
> > > +}
> > > +
> > > +static int optee_service_remove(struct device *dev)
> > > +{
> > > +     if (optee_private)
> > > +             return -EINVAL;
> >
> > Is it  instead: if (!optee_private) ?
>
> Oups! indeed :(
>
> > > +
> > > +     if (!list_empty(&optee_private->channel_list))
> > > +             return -EBUSY;
> > > +
> > > +     tee_client_close_context(optee_private->tee_ctx);
> > > +
> > > +     optee_private = NULL;
> > > +
> >
> > Barrier ? (not sure as above...)
> >
> > > +     return 0;
> > > +}
> > > +
> > > +static const struct tee_client_device_id scmi_optee_service_id[] = {
> > > +     {
> > > +             UUID_INIT(0xa8cfe406, 0xd4f5, 0x4a2e,
> > > +                       0x9f, 0x8d, 0xa2, 0x5d, 0xc7, 0x54, 0xc0, 0x99)
> > > +     },
> > > +     { }
> > > +};
> > > +
> > > +MODULE_DEVICE_TABLE(tee, scmi_optee_service_id);
> > > +
> > > +static struct tee_client_driver scmi_optee_driver = {
> > > +     .id_table       = scmi_optee_service_id,
> > > +     .driver         = {
> > > +             .name = "scmi-optee",
> > > +             .bus = &tee_bus_type,
> > > +             .probe = optee_service_probe,
> > > +             .remove = optee_service_remove,
> > > +     },
> > > +};
> > > +
> > > +static int __init scmi_optee_init(void)
> > > +{
> > > +     return driver_register(&scmi_optee_driver.driver);
> > > +}
> > > +
> > > +static void __exit scmi_optee_exit(void)
> > > +{
> > > +     driver_unregister(&scmi_optee_driver.driver);
> > > +}
> > > +
> > > +device_initcall(scmi_optee_init)
> > > +module_exit(scmi_optee_exit);
> >
> > This breaks the build when ARM_SCMI_PROTOCOL=m and SCMI OPTEE transport is enabled,
> > since the SCMI transports are not full fledged drivers but they are built into
> > the SCMI stack core module, so if you endup trying to define multiple inits.
> >
> >  LD [M]  drivers/firmware/arm_scmi/scmi-module.o
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_init':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:549: multiple definition of `init_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2070: first defined here
> > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_exit':
> > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:554: multiple definition of `cleanup_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2099: first defined he> /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:474: recipe for target 'drivers/firmware/arm_scmi/scmi-module.o' failed
> > make[4]: *** [drivers/firmware/arm_scmi/scmi-module.o] Error 1
> > /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware/arm_scmi' failed
> > make[3]: *** [drivers/firmware/arm_scmi] Error 2
> > /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware' failed
> > make[2]: *** [drivers/firmware] Error 2
> > make[2]: *** Waiting for unfinished jobs....
> > /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1874: recipe for target 'drivers' failed
> > make[1]: *** [drivers] Error 2
> > make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> > Makefile:219: recipe for target '__sub-make' failed
> >
> > In order to address this issue (same happended with VirtIO) I added
> > transport_init/transport_exit optional hooks into scmi_desc, so that
> > you can ask the core SCMI stack to perform whatever your transport
> > needs at SCMI core init-time, before the SCMI core stack is probed.
> >
> > In other words the fix here down below fixes for me the build as a
> > module of the SCMI stack.
>
> To ensure scmi/optee transport can register to the tee bus, it must
> wait tee bus is initialized.
> The issue is optee driver initializes its tee bus at subsys_initcall
> level, same level as the scmi driver.
> So I had to call scmi_optee_init() at an earlier init level: device_initcall().
>
> Virtio bus is registered at core_initcall level hence scmi/virtio init
> a subsys_initcall has the dependency resolved.

I have a proposal to address this.

You suggested to use ::transport_init operator from struct scmi_desc
for this registration to the optee bus.
For the reason above, it does not apply to OP-TEE.
My idea is to not ue ::transport_init hook but to register from
::link_supplier hook from struct scmi_transport_ops.
The first time a scmi_optee channel to requested, it will be deferred
and scmi_optee registering to optee bus done.
Something like the below:

  static int scmi_optee_link_supplier(struct device *dev)
  {
      if (!scmi_optee_private) {
          static int register_to_optee = -ENODEV;

          // register to optee bus enumeration if not already successfully done
          if (register_to_optee)
              register_to_optee = driver_register(&scmi_optee_driver.driver);

          // defer channel setup until
          return -EPROBE_DEFER;
      }

      if (!device_link_add(dev, scmi_optee_private->dev,
DL_FLAG_AUTOREMOVE_CONSUMER)) {
          dev_err(dev, "Adding link to supplier optee device failed\n");
          return -ECANCELED;
      }

      return 0;
  }

Note the exit sequence can still use struct scmi_desc::transport_ext hook:

  static void scmi_optee_exit(void)
  {
      driver_unregister(&scmi_optee_driver.driver);
  }
  module_exit(scmi_optee_exit);

May I get your opinion?

Regards,
Etienne

>
>
> >
> > Note that also __exit on scmi_optee_exit( )ha sbeen removed to avoid
> > some complains spotted by Arnd on SCMI VirtIO (1cd73200dad2 firmware:
> > arm_scmi: Remove __exit annotation)
>
> Ok, thanks.
>
> Regards,
> Etienne
>
> >
> > Thanks,
> > Cristian
> >
> > ---8<-----------------------
> >
> > diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> > index e294cff37bea..af6d52438b04 100644
> > --- a/drivers/firmware/arm_scmi/optee.c
> > +++ b/drivers/firmware/arm_scmi/optee.c
> > @@ -459,13 +459,6 @@ static struct scmi_transport_ops scmi_optee_ops = {
> >         .poll_done = optee_poll_done,
> >  };
> >
> > -const struct scmi_desc scmi_optee_desc = {
> > -       .ops = &scmi_optee_ops,
> > -       .max_rx_timeout_ms = 30,
> > -       .max_msg = 20,
> > -       .max_msg_size = 128,
> > -};
> > -
> >  static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
> >  {
> >         return ver->impl_id == TEE_IMPL_ID_OPTEE;
> > @@ -550,10 +543,16 @@ static int __init scmi_optee_init(void)
> >         return driver_register(&scmi_optee_driver.driver);
> >  }
> >
> > -static void __exit scmi_optee_exit(void)
> > +static void scmi_optee_exit(void)
> >  {
> >         driver_unregister(&scmi_optee_driver.driver);
> >  }
> >
> > -device_initcall(scmi_optee_init)
> > -module_exit(scmi_optee_exit);
> > +const struct scmi_desc scmi_optee_desc = {
> > +       .transport_init = scmi_optee_init,
> > +       .transport_exit = scmi_optee_exit,
> > +       .ops = &scmi_optee_ops,
> > +       .max_rx_timeout_ms = 30,
> > +       .max_msg = 20,
> > +       .max_msg_size = 128,
> > +};
> >
> > > --
> > > 2.17.1
> > >
Cristian Marussi Oct. 19, 2021, 4:19 p.m. UTC | #5
On Tue, Oct 19, 2021 at 04:24:30PM +0200, Etienne Carriere wrote:
> Hi,
> 

Hi Etienne,

I was replying to the previous one, so I'll stick all my answers togetehr
in this last email instead :D

> On Tue, 19 Oct 2021 at 11:10, Etienne Carriere
> <etienne.carriere@linaro.org> wrote:
> >
> >  Hello Cristian,
> >
> > Thanks a lot for the review.
> > I see I didn't understand and use correctly the config switch for the transport.
> > Thanks for all the fixes you sent, i'll integrate them in the patch v4.
> >

As a side thing on this 'depends on', I'm also a bit puzzled by the fact the
depends is on CONFIG_OPTEE but some errors of the above appear really on
CONFIG_TEE=m since the scmi_optee is really using the generic tee_ API
which in turn needs/uses CONFIG_OPTEE in this case (if I got it right
AFAIU...not really an OPTEE expert here :>)...but maybe CONFIG_OPTEE is
just the easier and most correct thing we can do.

> > I don't know yet how to address your last comment. See my feedback on
> > the optee bus dependency issue.
> >

See below.

> >
> >
> > On Mon, 18 Oct 2021 at 21:43, Cristian Marussi <cristian.marussi@arm.com> wrote:
> > >
> > > On Mon, Oct 18, 2021 at 01:40:46PM +0200, Etienne Carriere wrote:
> > > > Add a new transport channel to the SCMI firmware interface driver for
> > > > SCMI message exchange based on optee transport channel. The optee
> > > > transport is realized by connecting and invoking OP-TEE SCMI service
> > > > interface PTA.
> > > >
> > > > Optee transport support (CONFIG_ARM_SCMI_TRANSPORT_OPTEE) is default
> > > > enabled when optee driver (CFG_OPTEE) is enabled. Effective optee
> > > > transport is setup upon OP-TEE SCMI service discovery at optee
> > > > device initialization. For this SCMI UUID is registered to the optee
> > > > bus for probing. This is done at device_init initcall level, after
> > > > optee bus initialization that is done at subsys_init level, as the scmi
> > > > driver initialization.
> > > >
> > > > The optee transport can use a statically defined shared memory in
> > > > which case SCMI device tree node defines it using an "arm,scmi-shmem"
> > > > compatible phandle through property shmem. Alternatively, optee transport
> > > > allocates the shared memory buffer from the optee driver when no shmem
> > > > property is defined.
> > > >
> > > > The protocol used to exchange SCMI message over that shared memory is
> > > > negotiated between optee transport driver and the OP-TEE service through
> > > > capabilities exchange.
> > > >
> > > > OP-TEE SCMI service is integrated in OP-TEE since its release tag 3.13.0.
> > > > The service interface is published in [1].
> > > >
> > > > Link: [1] https://github.com/OP-TEE/optee_os/blob/3.13.0/lib/libutee/include/pta_scmi_client.h
> > > > Cc: Cristian Marussi <cristian.marussi@arm.com>
> > > > Cc: Sudeep Holla <sudeep.holla@arm.com>
> > > > Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
> > > > ---
> > > > Changes since v2:
> > > > - Rebase on for-next/scmi, based on Linux v5.15-rc1.
> > > > - Implement support for dynamic and static shared memory.
> > > > - Factorize some functions and simplify transport exit sequence.
> > > > - Rename driver source file from optee_service.c to optee.c.
> > > >
> > > > No change since v1
> > > > ---
> > >
> > > Hi Etienne,
> > >
> > > a few remarks below.
> > >
> > > >  drivers/firmware/arm_scmi/Kconfig  |  12 +
> > > >  drivers/firmware/arm_scmi/Makefile |   1 +
> > > >  drivers/firmware/arm_scmi/common.h |   3 +
> > > >  drivers/firmware/arm_scmi/driver.c |   3 +
> > > >  drivers/firmware/arm_scmi/optee.c  | 559 +++++++++++++++++++++++++++++
> > > >  5 files changed, 578 insertions(+)
> > > >  create mode 100644 drivers/firmware/arm_scmi/optee.c
> > > >
> > > > diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> > > > index 3d7081e84853..9107e249023c 100644
> > > > --- a/drivers/firmware/arm_scmi/Kconfig
> > > > +++ b/drivers/firmware/arm_scmi/Kconfig
> > > > @@ -77,6 +77,18 @@ config ARM_SCMI_TRANSPORT_VIRTIO
> > > >         If you want the ARM SCMI PROTOCOL stack to include support for a
> > > >         transport based on VirtIO, answer Y.
> > > >
> > > > +config ARM_SCMI_TRANSPORT_OPTEE
> > > > +     bool "SCMI transport based on OP-TEE service"
> > > > +     depends on OPTEE
> > > > +     select ARM_SCMI_HAVE_TRANSPORT
> > > > +     select ARM_SCMI_HAVE_SHMEM
> > > > +     default y
> > > > +     help
> > > > +       This enables the OP-TEE service based transport for SCMI.
> > > > +
> > > > +       If you want the ARM SCMI PROTOCOL stack to include support for a
> > > > +       transport based on OP-TEE SCMI service, answer Y.
> > > > +
> > > >  endif #ARM_SCMI_PROTOCOL
> > > >
> > >
> > > So this 'depends on OPTEE' reminded me of a similar issue on VIRTIO
> > > transport spotted by a bot (see the fix for Virtio at: c90521a0e94f firmware:
> > > arm_scmi: Fix virtio transport Kconfig dependency), that consiste in a broken
> > > build when SCMI was compiled built-in with VIRTIO transport support with
> > > ARM_SCMI_PROTOCOL=y while the core was CONFIG_VIRTIO=m.
> > >
> > > So I tried similarly to set CONFIG_OPTEE=m while keeping ARM_SCMI_PROTOCOL=y
> > > expecting to see a similar issue as in VirtIO (i.e. not being able to access
> > > optee module symbols from the builtin SCMI), instead I spotted a different bug :D
> >
> > Sorry, I didn't try this config (optee=m / scmi=y). I though expecting
> > scmi over optee and scmi=y would mandate optee=y.

Well, yes, but due to a dance of circular-deps in Kconfig which I could
not find a way to avoid, this awkard ORed depends is what we ended up
doing to avoid such scenario. (Arnd advised me on this solution
really...I did not have any better idea on my own)

> > For the fixup you propose below, i understand how you address the
> > configuration dependencies.
> >
> > >
> > >   AR      drivers/base/built-in.a
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘invoke_process_smt_channel’:
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
> > >    const size_t msg_size = scmi_optee_desc.max_msg_size;
> > >                            ^~~~~~~~~~~~~~~
> > >                            scmi_smc_desc
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:233:27: note: each undeclared identifier is reported only once for each function it appears in
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c: In function ‘setup_dynamic_shmem’:
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:266:26: error: ‘scmi_optee_desc’ undeclared (first use in this function); did you mean ‘scmi_smc_desc’?
> > >   const size_t msg_size = scmi_optee_desc.max_msg_size;
> > >                           ^~~~~~~~~~~~~~~
> > >                           scmi_smc_desc
> > > /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:277: recipe for target 'drivers/firmware/arm_scmi/optee.o' failed
> > > make[4]: *** [drivers/firmware/arm_scmi/optee.o] Error 1
> > > make[4]: *** Waiting for unfinished jobs....
> > >
> > > In fact those scmi_optee_desc are reference to a global only declared
> > > down below. Fixed with a few defines to carry on:
> > >
> > > ---8<------------------
> > >

Saw the -next bot today on this...still I don't get why it is exposed
only when compiling as a module OPTEE ? should not this be catched
anyway being this C and this being a reference to a global declared
well later ? (just to understand...)

> > > diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> > > index 64aaba4a8bf2..93a84c91457b 100644
> > > --- a/drivers/firmware/arm_scmi/optee.c
> > > +++ b/drivers/firmware/arm_scmi/optee.c
> > > @@ -18,6 +18,8 @@
> > >
> > >  #define DRIVER_NAME "optee-scmi"
> > >
> > > +#define SCMI_OPTEE_MAX_MSG_SIZE                128
> > > +
> > >  enum optee_smci_pta_cmd {
> > >         /*
> > >          * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> > > @@ -230,7 +232,7 @@ static int invoke_process_smt_channel(struct optee_channel *channel)
> > >         param[0].u.value.a = channel->channel_id;
> > >
> > >         if (channel->tee_shm) {
> > > -               const size_t msg_size = scmi_optee_desc.max_msg_size;
> > > +               const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
> > >
> > >                 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
> > >                 param[1].u.memref.shm = channel->tee_shm;
> > > @@ -263,7 +265,7 @@ static bool optee_chan_available(struct device *dev, int idx)
> > >
> > >  static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
> > >  {
> > > -       const size_t msg_size = scmi_optee_desc.max_msg_size;
> > > +       const size_t msg_size = SCMI_OPTEE_MAX_MSG_SIZE;
> > >
> > >         channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
> > >         if (IS_ERR(channel->tee_shm)) {
> > >
> > > -----------------------------
> > >
> > > After the above change it compiled fine, so I went a step further and configured also
> > > CONFIG_TEE=m (just trying to reproduce what bot saw on similar VirtIO eeh.... not that
> > > I am so evil and sadic :D)
> > >
> > > And indeed now (with ARM_SCMI_PROTOCOL=y and CONFIG_TEE=m) I get:
> > >
> > >
> > >   GEN     modules.builtin
> > >   LD      .tmp_vmlinux.kallsyms1
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected GOT/PLT entries detected!
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: Unexpected run-time procedure linkages detected!
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `invoke_process_smt_channel':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:247: undefined reference to `tee_client_invoke_func'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_chan_free':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:397: undefined reference to `tee_shm_free'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `open_session':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:137: undefined reference to `tee_client_open_session'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_remove':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:516: undefined reference to `tee_client_close_context'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `optee_service_probe':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:481: undefined reference to `tee_client_open_context'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:501: undefined reference to `tee_client_close_context'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_capabilities':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:172: undefined reference to `tee_client_invoke_func'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `get_channel':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:209: undefined reference to `tee_client_invoke_func'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `setup_dynamic_shmem':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:270: undefined reference to `tee_shm_alloc_kernel_buf'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:276: undefined reference to `tee_shm_get_va'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `close_session':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:151: undefined reference to `tee_client_close_session'
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o:(.data+0x10): undefined reference to `tee_bus_type'
> > > /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target 'vmlinux' failed
> > > make[1]: *** [vmlinux] Error 1
> > > make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> > > Makefile:219: recipe for target '__sub-make' failed
> > >
> > > Taking a similar approach to Virtio, this fixed for me
> > >
> > > diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
> > > index 9107e249023c..30746350349c 100644
> > > --- a/drivers/firmware/arm_scmi/Kconfig
> > > +++ b/drivers/firmware/arm_scmi/Kconfig
> > > @@ -79,7 +79,7 @@ config ARM_SCMI_TRANSPORT_VIRTIO
> > >
> > >  config ARM_SCMI_TRANSPORT_OPTEE
> > >         bool "SCMI transport based on OP-TEE service"
> > > -       depends on OPTEE
> > > +       depends on OPTEE=y || OPTEE=ARM_SCMI_PROTOCOL
> > >         select ARM_SCMI_HAVE_TRANSPORT
> > >         select ARM_SCMI_HAVE_SHMEM
> > >         default y
> > >
> > > which basically disables ARM_SCMI_TRANSPORT_OPTEE when CONFIG_OPTEE=m AND
> > > ARM_SCMI_TRANSPORT_OPTEE=y: in this scenario if TEE is =m you have to build
> > > ARM_SCMI_PROTOCOL=m too to be able to include ARM_SCMI_TRANSPORT_OPTEE.
> >
> > Fully makes sense to me. Thanks. I understand.
> >

As said, not elegant, but some fancy circular-deps in the Kconfig between
SCMI core and transports led to this.

> > >
> > >
> > > >  config ARM_SCMI_POWER_DOMAIN
> > > > diff --git a/drivers/firmware/arm_scmi/Makefile b/drivers/firmware/arm_scmi/Makefile
> > > > index 1dcf123d64ab..ef66ec8ca917 100644
> > > > --- a/drivers/firmware/arm_scmi/Makefile
> > > > +++ b/drivers/firmware/arm_scmi/Makefile
> > > > @@ -6,6 +6,7 @@ scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_MAILBOX) += mailbox.o
> > > >  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_SMC) += smc.o
> > > >  scmi-transport-$(CONFIG_ARM_SCMI_HAVE_MSG) += msg.o
> > > >  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_VIRTIO) += virtio.o
> > > > +scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_OPTEE) += optee.o
> > > >  scmi-protocols-y = base.o clock.o perf.o power.o reset.o sensors.o system.o voltage.o
> > > >  scmi-module-objs := $(scmi-bus-y) $(scmi-driver-y) $(scmi-protocols-y) \
> > > >                   $(scmi-transport-y)
> > > > diff --git a/drivers/firmware/arm_scmi/common.h b/drivers/firmware/arm_scmi/common.h
> > > > index dea1bfbe1052..82ff3c3a6d2d 100644
> > > > --- a/drivers/firmware/arm_scmi/common.h
> > > > +++ b/drivers/firmware/arm_scmi/common.h
> > > > @@ -421,6 +421,9 @@ extern const struct scmi_desc scmi_smc_desc;
> > > >  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
> > > >  extern const struct scmi_desc scmi_virtio_desc;
> > > >  #endif
> > > > +#ifdef CONFIG_OPTEE
> > >
> > > This should be:
> > >
> > > #ifdef CONFIG_ARM_SCMI_TRANSPORT_OPTEE
> > >
> > > if not disabling OPTEE transport in Kconfig breaks the build.
> > >
> > >  LD      .tmp_vmlinux.kallsyms1
> > >  /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld:
> > >  drivers/firmware/arm_scmi/driver.o:(.rodata+0x280): undefined reference
> > >  to `scmi_optee_desc'
> > >  /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1189: recipe for target
> > >  'vmlinux' failed
> > >  make[1]: *** [vmlinux] Error 1
> > >  make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> > >
> > >
> > > > +extern const struct scmi_desc scmi_optee_desc;
> > > > +#endif
> > > >
> > > >  void scmi_rx_callback(struct scmi_chan_info *cinfo, u32 msg_hdr, void *priv);
> > > >  void scmi_free_channel(struct scmi_chan_info *cinfo, struct idr *idr, int id);
> > > > diff --git a/drivers/firmware/arm_scmi/driver.c b/drivers/firmware/arm_scmi/driver.c
> > > > index b406b3f78f46..06f0a9846c7e 100644
> > > > --- a/drivers/firmware/arm_scmi/driver.c
> > > > +++ b/drivers/firmware/arm_scmi/driver.c
> > > > @@ -1999,6 +1999,9 @@ static const struct of_device_id scmi_of_match[] = {
> > > >  #endif
> > > >  #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
> > > >       { .compatible = "arm,scmi-virtio", .data = &scmi_virtio_desc},
> > > > +#endif
> > > > +#ifdef CONFIG_OPTEE
> > >
> > > Same as above should be #if CONFIG_ARM_SCMI_TRANSPORT_OPTEE
> > >
> > > > +     { .compatible = "linaro,scmi-optee", .data = &scmi_optee_desc },
> > > >  #endif
> > > >       { /* Sentinel */ },
> > > >  };
> > > > diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
> > > > new file mode 100644
> > > > index 000000000000..e294cff37bea
> > > > --- /dev/null
> > > > +++ b/drivers/firmware/arm_scmi/optee.c
> > > > @@ -0,0 +1,559 @@
> > > > +// SPDX-License-Identifier: GPL-2.0
> > > > +/*
> > > > + * Copyright (C) 2019-2021 Linaro Ltd.
> > > > + */
> > > > +
> > > > +#include <linux/io.h>
> > > > +#include <linux/of.h>
> > > > +#include <linux/of_address.h>
> > > > +#include <linux/kernel.h>
> > > > +#include <linux/module.h>
> > > > +#include <linux/mutex.h>
> > > > +#include <linux/slab.h>
> > > > +#include <linux/tee_drv.h>
> > > > +#include <linux/uuid.h>
> > > > +#include <uapi/linux/tee.h>
> > > > +
> > > > +#include "common.h"
> > > > +
> > > > +#define DRIVER_NAME "optee-scmi"
> > > > +
> > > > +enum optee_smci_pta_cmd {
> > >               ^
> > >               scmi ? or is it another fancy 4letters acronym :D
> >
> > :) nice catch!
> >
> > > > +     /*
> > > > +      * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
> > > > +      *
> > > > +      * [out]    value[0].a: Capability bit mask (enum pta_scmi_caps)
> > > > +      * [out]    value[0].b: Extended capabilities or 0
> > > > +      */
> > > > +     PTA_SCMI_CMD_CAPABILITIES = 0,
> > > > +
> > > > +     /*
> > > > +      * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer
> > > > +      *
> > > > +      * [in]     value[0].a: Channel handle
> > > > +      *
> > > > +      * Shared memory used for SCMI message/response exhange is expected
> > > > +      * already identified and bound to channel handle in both SCMI agent
> > > > +      * and SCMI server (OP-TEE) parts.
> > > > +      * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> > > > +      * protocol message ID).
> > > > +      */
> > > > +     PTA_SCMI_CMD_PROCESS_SMT_CHANNEL = 1,
> > > > +
> > > > +     /*
> > > > +      * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SMT/SCMI message
> > > > +      *
> > > > +      * [in]     value[0].a: Channel handle
> > > > +      * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload)
> > > > +      *
> > > > +      * Shared memory used for SCMI message/response is a SMT buffer
> > > > +      * referenced by param[1]. It shall be 128 bytes large to fit response
> > > > +      * payload whatever message playload size.
> > > > +      * The memory uses SMT header to carry SCMI meta-data (protocol ID and
> > > > +      * protocol message ID).
> > > > +      */
> > > > +     PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE = 2,
> > > > +
> > > > +     /*
> > > > +      * PTA_SCMI_CMD_GET_CHANNEL - Get channel handle
> > > > +      *
> > > > +      * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM
> > > > +      *
> > > > +      * [in]     value[0].a: Channel identifier
> > > > +      * [out]    value[0].a: Returned channel handle
> > > > +      * [in]     value[0].b: Requested capabilities mask (enum pta_scmi_caps)
> > > > +      */
> > > > +     PTA_SCMI_CMD_GET_CHANNEL = 3,
> > > > +};
> > > > +
> > > > +/*
> > > > + * Capabilities
> > > > + */
> > > > +enum pta_scmi_caps {
> > > > +     PTA_SCMI_CAPS_NONE = 0,
> > > > +     /*
> > > > +      * Supports command using SMT header protocol (SCMI shmem) in shared
> > > > +      * memory buffers to carry SCMI protocol synchronisation information.
> > > > +      */
> > > > +     PTA_SCMI_CAPS_SMT_HEADER = BIT(0),
> > > > +};
> > > > +
> > > > +/**
> > > > + * struct optee_channel - Description of an OP-TEE SCMI channel
> > > > + *
> > > > + * @channel_id: OP-TEE channel ID used for this transport
> > > > + * @mu: Mutex protection on channel access
> > > > + * @tee_session: TEE session identifier
> > > > + * @cinfo: SCMI channel information
> > > > + * @shmem: Virtual base address of the shared memory
> > > > + * @tee_shm: Reference to TEE shared memory or NULL if using static shmem
> > > > + * @caps: OP-TEE SCMI channel capabilities
> > > > + * @link: Reference in agent's channel list
> > > > + */
> > > > +struct optee_channel {
> > > > +     u32 channel_id;
> > > > +     struct mutex mu;
> > > > +     u32 tee_session;
> > > > +     struct scmi_chan_info *cinfo;
> > > > +     struct scmi_shared_mem __iomem *shmem;
> > > > +     struct tee_shm *tee_shm;
> > > > +     enum pta_scmi_caps caps;
> > > > +     struct list_head link;
> > > > +};
> > > > +
> > > > +/**
> > > > + * struct optee_agent - OP-TEE transport private data
> > > > + *
> > > > + * @dev: Device used for communication with TEE
> > > > + * @tee_ctx: TEE context used for communication
> > > > + * @caps: Supported channel capabilities
> > > > + * @mu: Mutex for protection of @channel_list
> > > > + * @channel_list: List of all created channels for the agent
> > > > + */
> > > > +struct optee_agent {
> > > > +     struct device *dev;
> > > > +     struct tee_context *tee_ctx;
> > > > +     enum pta_scmi_caps caps;
> > > > +     struct mutex mu;
> > > > +     struct list_head channel_list;
> > > > +};
> > > > +
> > > > +/* There can be only 1 SCMI service in OP-TEE we connect to */
> > > > +static struct optee_agent *optee_private;
> > > > +
> > >
> > > Maybe naming these locally defined optee_ structs as scmi_optee_ ?
> > >
> > > When I see those optee_ refs around down below I tend to think they
> > > are OPTEE core structs not locally defined containers.
> > > (I uderstand that depends on my poor familiarity with OPTEE APIs
> > > though...)
> >
> > Ok. If that help maintenance, I'm fine. I'll use scmi_optee_ where appiicable.
> >

Thanks, I have not a strong opinion on this, but as an optee-newbie (or ignorant
if you want :D) I found it easier to reason about it.
> >
> > >
> > > > +/* Open a session toward SCMI OP-TEE service with REE_KERNEL identity */
> > > > +static int open_session(u32 *tee_session)
> > > > +{
> > > > +     struct device *dev = optee_private->dev;
> > > > +     struct tee_client_device *scmi_pta = to_tee_client_device(dev);
> > > > +     struct tee_ioctl_open_session_arg arg = { };
> > > > +     int ret;
> > > > +
> > > > +     memcpy(arg.uuid, scmi_pta->id.uuid.b, TEE_IOCTL_UUID_LEN);
> > > > +     arg.clnt_login = TEE_IOCTL_LOGIN_REE_KERNEL;
> > > > +
> > > > +     ret = tee_client_open_session(optee_private->tee_ctx, &arg, NULL);
> > > > +     if (ret < 0 || arg.ret) {
> > > > +             dev_err(dev, "Can't open tee session: %d / %#x\n", ret, arg.ret);
> > > > +
> > > > +             return -EOPNOTSUPP;
> > > > +     }
> > > > +
> > > > +     *tee_session = arg.session;
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static void close_session(u32 tee_session)
> > > > +{
> > > > +     tee_client_close_session(optee_private->tee_ctx, tee_session);
> > > > +}
> > > > +
> > > > +static int get_capabilities(void)
> > > > +{
> > > > +     struct optee_agent *agent = optee_private;
> > > > +     struct tee_ioctl_invoke_arg arg = { };
> > > > +     struct tee_param param[1] = { };
> > > > +     u32 tee_session;
> > > > +     int ret;
> > > > +
> > > > +     ret = open_session(&tee_session);
> > > > +     if (ret)
> > > > +             return ret;
> > > > +
> > > > +     arg.func = PTA_SCMI_CMD_CAPABILITIES;
> > > > +     arg.session = tee_session;
> > > > +     arg.num_params = 1;
> > > > +
> > > > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT;
> > > > +
> > > > +     ret = tee_client_invoke_func(agent->tee_ctx, &arg, param);
> > > > +
> > > > +     close_session(tee_session);
> > > > +
> > > > +     if (ret < 0 || arg.ret) {
> > > > +             dev_err(agent->dev, "Can't get capabilities: %d / %#x\n", ret, arg.ret);
> > > > +
> > > > +             return -EOPNOTSUPP;
> > > > +     }
> > > > +
> > > > +     agent->caps = param[0].u.value.a;
> > > > +
> > > > +     if (!(agent->caps & PTA_SCMI_CAPS_SMT_HEADER)) {
> > > > +             dev_err(agent->dev, "OP-TEE SCMI PTA doesn't support SMT\n");
> > > > +
> > > > +             return -EOPNOTSUPP;
> > > > +     }
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static int get_channel(struct optee_channel *channel)
> > > > +{
> > > > +     struct device *dev = optee_private->dev;
> > > > +     struct tee_ioctl_invoke_arg arg = { };
> > > > +     struct tee_param param[1] = { };
> > > > +     unsigned int caps = PTA_SCMI_CAPS_SMT_HEADER;
> > > > +     int ret;
> > > > +
> > > > +     arg.func = PTA_SCMI_CMD_GET_CHANNEL;
> > > > +     arg.session = channel->tee_session;
> > > > +     arg.num_params = 1;
> > > > +
> > > > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
> > > > +     param[0].u.value.a = channel->channel_id;
> > > > +     param[0].u.value.b = caps;
> > > > +
> > > > +     ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> > > > +
> > > > +     if (ret || arg.ret) {
> > > > +             dev_err(dev, "Can't get channel with caps %#x: %d / %#x\n", caps, ret, arg.ret);
> > > > +
> > > > +             return -EOPNOTSUPP;
> > > > +     }
> > > > +
> > > > +     /* From now on use channel identifer provided by OP-TEE SCMI service */
> > > > +     channel->channel_id = param[0].u.value.a;
> > > > +     channel->caps = caps;
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static int invoke_process_smt_channel(struct optee_channel *channel)
> > > > +{
> > > > +     struct tee_ioctl_invoke_arg arg = { };
> > > > +     struct tee_param param[2] = { };
> > > > +     int ret;
> > > > +
> > > > +     arg.session = channel->tee_session;
> > > > +     param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
> > > > +     param[0].u.value.a = channel->channel_id;
> > > > +
> > > > +     if (channel->tee_shm) {
> > > > +             const size_t msg_size = scmi_optee_desc.max_msg_size;
> > > > +
> > > > +             param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
> > > > +             param[1].u.memref.shm = channel->tee_shm;
> > > > +             param[1].u.memref.size = msg_size;
> > > > +             arg.num_params = 2;
> > > > +             arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE;
> > > > +     } else {
> > > > +             arg.num_params = 1;
> > > > +             arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL;
> > > > +     }
> > > > +
> > > > +     ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
> > > > +     if (ret < 0 || arg.ret) {
> > > > +             dev_err(optee_private->dev, "Failed on channel %u: %d / %#x\n",
> > > > +                     channel->channel_id, ret, arg.ret);
> > > > +
> > > > +             return -EIO;
> > > > +     }
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static bool optee_chan_available(struct device *dev, int idx)
> > > > +{
> > > > +     u32 channel_id;
> > > > +
> > > > +     return !of_property_read_u32_index(dev->of_node, "linaro,optee-channel-id",
> > > > +                                        idx, &channel_id);
> > > > +}
> > > > +
> > > > +static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
> > > > +{
> > > > +     const size_t msg_size = scmi_optee_desc.max_msg_size;
> > > > +
> > > > +     channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
> > > > +     if (IS_ERR(channel->tee_shm)) {
> > > > +             dev_err(channel->cinfo->dev, "shmem allocation failed\n");
> > > > +             return -ENOMEM;
> > > > +     }
> > > > +
> > > > +     channel->shmem = (void *)tee_shm_get_va(channel->tee_shm, 0);
> > > > +     memset(channel->shmem, 0, msg_size);
> > > > +     shmem_clear_channel(channel->shmem);
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static int setup_static_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> > > > +                           struct optee_channel *channel)
> > > > +{
> > > > +     struct device_node *np;
> > > > +     resource_size_t size;
> > > > +     struct resource res;
> > > > +     int ret;
> > > > +
> > > > +     np = of_parse_phandle(cinfo->dev->of_node, "shmem", 0);
> > > > +     if (!of_device_is_compatible(np, "arm,scmi-shmem")) {
> > > > +             ret = -ENXIO;
> > > > +             goto out;
> > > > +     }
> > > > +
> > > > +     ret = of_address_to_resource(np, 0, &res);
> > > > +     if (ret) {
> > > > +             dev_err(dev, "Failed to get SCMI Tx shared memory\n");
> > > > +             goto out;
> > > > +     }
> > > > +
> > > > +     size = resource_size(&res);
> > > > +
> > > > +     channel->shmem = devm_ioremap(dev, res.start, size);
> > > > +     if (!channel->shmem) {
> > > > +             dev_err(dev, "Failed to ioremap SCMI Tx shared memory\n");
> > > > +             ret = -EADDRNOTAVAIL;
> > > > +             goto out;
> > > > +     }
> > > > +
> > > > +     ret = 0;
> > > > +
> > > > +out:
> > > > +     of_node_put(np);
> > > > +
> > > > +     return ret;
> > > > +}
> > > > +
> > > > +static int optee_chan_setup_shmem(struct device *dev, struct scmi_chan_info *cinfo,
> > > > +                               bool tx, struct optee_channel *channel)
> > > > +{
> > > > +     struct device *cdev = cinfo->dev;
> > > > +
> > > > +     if (of_find_property(cdev->of_node, "shmem", NULL))
> > > > +             return setup_static_shmem(dev, cinfo, channel);
> > > > +     else
> > > > +             return setup_dynamic_shmem(dev, channel);
> > > > +}
> > > > +
> > > > +static void optee_clear_channel(struct scmi_chan_info *cinfo)
> > > > +{
> > > > +     struct optee_channel *channel = cinfo->transport_info;
> > > > +
> > > > +     shmem_clear_channel(channel->shmem);
> > > > +}
> > > > +
> > > > +static int optee_chan_setup(struct scmi_chan_info *cinfo, struct device *dev, bool tx)
> > > > +{
> > > > +     struct optee_channel *channel;
> > > > +     uint32_t channel_id;
> > > > +     int ret;
> > > > +
> > > > +     if (!tx)
> > > > +             return -ENODEV;
> > > > +
> > > > +     /* Shall wait for OP-TEE driver to be up and ready */
> > > > +     if (!optee_private || !optee_private->tee_ctx)
> > > > +             return -EPROBE_DEFER;
> > > > +
> > > > +     channel = devm_kzalloc(dev, sizeof(*channel), GFP_KERNEL);
> > > > +     if (!channel)
> > > > +             return -ENOMEM;
> > > > +
> > > > +     ret = of_property_read_u32_index(cinfo->dev->of_node, "linaro,optee-channel-id",
> > > > +                                      0, &channel_id);
> > > > +     if (ret)
> > > > +             return ret;
> > > > +
> > > > +     cinfo->transport_info = channel;
> > > > +     channel->cinfo = cinfo;
> > > > +     channel->channel_id = channel_id;
> > > > +     mutex_init(&channel->mu);
> > > > +
> > > > +     ret = optee_chan_setup_shmem(dev, cinfo, tx, channel);
> > > > +     if (ret)
> > > > +             return ret;
> > > > +
> > > > +     ret = open_session(&channel->tee_session);
> > > > +     if (ret)
> > > > +             return ret;
> > > > +
> > > > +     ret = get_channel(channel);
> > > > +     if (ret) {
> > > > +             close_session(channel->tee_session);
> > > > +
> > > > +             return ret;
> > > > +     }
> > > > +
> > > > +     mutex_lock(&optee_private->mu);
> > > > +     list_add(&channel->link, &optee_private->channel_list);
> > > > +     mutex_unlock(&optee_private->mu);
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static int optee_chan_free(int id, void *p, void *data)
> > > > +{
> > > > +     struct scmi_chan_info *cinfo = p;
> > > > +     struct optee_channel *channel = cinfo->transport_info;
> > > > +
> > > > +     mutex_lock(&optee_private->mu);
> > > > +     list_del(&channel->link);
> > > > +     mutex_unlock(&optee_private->mu);
> > > > +
> > > > +     if (channel->tee_shm) {
> > > > +             tee_shm_free(channel->tee_shm);
> > > > +             channel->tee_shm = NULL;
> > > > +     }
> > > > +
> > > > +     cinfo->transport_info = NULL;
> > > > +     channel->cinfo = NULL;
> > > > +
> > > > +     scmi_free_channel(cinfo, data, id);
> > > > +
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static struct scmi_shared_mem *get_channel_shm(struct optee_channel *chan, struct scmi_xfer *xfer)
> > > > +{
> > > > +     if (!chan)
> > > > +             return NULL;
> > > > +
> > > > +     return chan->shmem;
> > > > +}
> > > > +
> > > > +
> > > > +static int optee_send_message(struct scmi_chan_info *cinfo,
> > > > +                           struct scmi_xfer *xfer)
> > > > +{
> > > > +     struct optee_channel *channel = cinfo->transport_info;
> > > > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > > > +     int ret;
> > > > +
> > > > +     mutex_lock(&channel->mu);
> > > > +     shmem_tx_prepare(shmem, xfer);
> > > > +
> > > > +     ret = invoke_process_smt_channel(channel);
> > >
> > > Here all the associated processing in the TrustedOS is fully completed
> > > right ? i.e. all the possible reply values have been put into shmem by
> > > the TrustedOS process before the underlying SMC call returns.
> > > (just to understand better how OPTEE transport is supposed to behave)
> >
> > Yes, once we're back from invoke_process_smt_channel() the SCMI
> > message has been processed and the response can be read.
> > If no response is found, it will be reported as a communication error.
> >

Ok. Maybe in the future this could benefit from some new general mechanism
I'm adding in the core (with SCMI atomic series) to address this scenario in
which you really do not have to wait neither poll for anything after the
send and you could/should avoid calling scmi_rx_callback() and just let
the SCMI core execute a fetch_response immediately after the send.
(with scmi_rx_callback supposed to be called when a completion interrupt
is received)

So, just a heads up here, that I could revisit this (and bother you) once (if)
the above mentioned SCMI atomic seris is in, BUT definitely nothing to be
addressed now in this series.

> > >
> > > > +
> > > > +     scmi_rx_callback(cinfo, shmem_read_header(shmem), NULL);
> > > > +     mutex_unlock(&channel->mu);
> > > > +
> > > > +     return ret;
> > > > +}
> > > > +
> > > > +static void optee_fetch_response(struct scmi_chan_info *cinfo,
> > > > +                              struct scmi_xfer *xfer)
> > > > +{
> > > > +     struct optee_channel *channel = cinfo->transport_info;
> > > > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > > > +
> > > > +     shmem_fetch_response(shmem, xfer);
> > > > +}
> > > > +
> > > > +static bool optee_poll_done(struct scmi_chan_info *cinfo,
> > > > +                         struct scmi_xfer *xfer)
> > > > +{
> > > > +     struct optee_channel *channel = cinfo->transport_info;
> > > > +     struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
> > > > +
> > > > +     return shmem_poll_done(shmem, xfer);
> > > > +}
> > > > +
> > > > +static struct scmi_transport_ops scmi_optee_ops = {
> > > > +     .chan_available = optee_chan_available,
> > > > +     .chan_setup = optee_chan_setup,
> > > > +     .chan_free = optee_chan_free,
> > > > +     .send_message = optee_send_message,
> > > > +     .fetch_response = optee_fetch_response,
> > > > +     .clear_channel = optee_clear_channel,
> > > > +     .poll_done = optee_poll_done,
> > > > +};
> > > > +
> > > > +const struct scmi_desc scmi_optee_desc = {
> > > > +     .ops = &scmi_optee_ops,
> > > > +     .max_rx_timeout_ms = 30,
> > > > +     .max_msg = 20,
> > > > +     .max_msg_size = 128,
> > > > +};
> > > > +
> > > > +static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
> > > > +{
> > > > +     return ver->impl_id == TEE_IMPL_ID_OPTEE;
> > > > +}
> > > > +
> > > > +static int optee_service_probe(struct device *dev)
> > > > +{
> > > > +     struct optee_agent *agent;
> > > > +     struct tee_context *tee_ctx;
> > > > +     int ret;
> > > > +
> > > > +     /* Only one SCMI OP-TEE device allowed */
> > > > +     if (optee_private) {
> > > > +             dev_err(dev, "An SCMI OP-TEE device was already initialized: only one allowed\n");
> > > > +             return -EBUSY;
> > > > +     }
> > > > +
> > > > +     tee_ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, NULL);
> > > > +     if (IS_ERR(tee_ctx))
> > > > +             return -ENODEV;
> > > > +
> > > > +     agent = devm_kzalloc(dev, sizeof(*agent), GFP_KERNEL);
> > > > +     if (!agent) {
> > > > +             ret = -ENOMEM;
> > > > +             goto out;
> > > > +     }
> > > > +
> > > > +     agent->dev = dev;
> > > > +     agent->tee_ctx = tee_ctx;
> > > > +     INIT_LIST_HEAD(&agent->channel_list);
> > > > +
> > > > +     optee_private = agent;
> > >
> > > Barrier here to be sure this global is visible and not reordered ?
> > >
> > > Not sure if it is plausible that without a barrier the subsequent
> > > optee_chan_setup could run on another core and simply miss this update
> > > and bail out. (cannot see any locking of any kind either in the
> > > chan_available/chan_setup TX path that could trigger a implicit memory
> > > barrier....bah maybe I'm paranoid)
> >
> > No barrier needed IMO. optee_private is standard cached memory visible
> > to all participant cores
> > and chan_setup cannot be called before this function completes.
> > Do I miss something?
> >
> 
> I see why you ask for a barrier. Indeed, at module insertion we can
> face consistency issues.
> 

Yes my concern was also about multiple concurrent probing especially,
even though we really do not support multiple SCMI server nodes the
fact that you could define multiple channels (on optee) could lead to
multiple probes, while in virtio you could wrongly try to describe
multiple mmios devs (with virtio not supporting multiple devices for
now...hence the check)

> I agree barriers are needed. Looking at the scmi_virtio
> implementation, i think the barriers are misplaced in the sequences.
> The barrier should be placed before the global reference is loaded at
> device probe, so that its content is visible before the device
> reference itself.
> On the other hand in the remove sequence, the barrier should be placed
> after device ref is cleared but before device resources are released.
> Note that, in smp_store_mb() implementation, the memory barrier is
> places after the data is loaded, not before.
> See the patch-like snippet below:
> 
>  static int scmi_vio_probe(struct virtio_device *vdev)
>  {
>      (...)
> 
> -    vdev->priv = channels;
> -    /* Ensure initialized scmi_vdev is visible */
> -    smp_store_mb(scmi_vdev, vdev);
> +    /* Ensure initialized scmi_vdev is visible before scmi_vdev is */
> +    smp_store_mb(vdev->priv, channels);
> +    scmi_vdev = vdev;
> 
>     return 0;
>  }
> 
>  static void scmi_vio_remove(struct virtio_device *vdev)
>  {
> +    /* Ensure scmi_vdev is visible as NULL before resources are released */
> +    smp_store_mb(scmi_vdev, NULL);
> +
>      /*
>       * Once we get here, virtio_chan_free() will have already been called by
>       * the SCMI core for any existing channel and, as a consequence, all the
>       * virtio channels will have been already marked NOT ready, causing any
>       * outstanding message on any vqueue to be ignored by complete_cb: now
>       * we can just stop processing buffers and destroy the vqueues.
>       */
>      vdev->config->reset(vdev);
>      vdev->config->del_vqs(vdev);
> -    /* Ensure scmi_vdev is visible as NULL */
> -    smp_store_mb(scmi_vdev, NULL);
>  }
> 
> Does that make sense to you?
> 

So my reasoning was:
1. I want to have ->priv = channels populated before scmi_dev was visible for
other PEs as a global.

	BUT

2. want also to be sure that scmi_dev itself was visible to other PEs: what
if another core is concurrently probing for another (wrongly defined in DT)
scmi-virtio MMIO device ?
Will scmi_dev still be viewed as NULL from another probing core for a while
despite scmi_dev = vdev had been executed on the first core probe ?

My hope (:D), since smp_store_mb() it's a WRITE_ONCE + __smb_mb() which in turn
is a dmb(ish) on arm64, was to draw a line after which I could have been sure
that scmi_dev store and all previous mem-accesses (on this core) would have at
least been initiated (hit the cache) so that after that point any access from
another PE would have been served properly by the magic of cache coeherency
protocol on the ish domain.

I could be a bit concerned indeed of an additional missing early WRITE_ONCE()
on vdev->priv = channels so as to have (to avoid compiler tricks instead
on vdev->priv):

	WRITE_ONCE(vdev->priv, channels);
	smp_store_mb(scmi_vdev, vdev);

..but really not sure how much this has a chance to happen.

Same it goes for the remove path...once in scmi_vio_remove() I want to
be at first stop/flush all pending stuff on the vqueues knowing that:

 1. virtio_chan_free has been already previously called and it marked all
    vqueues as NOT ready, so nobody will queue anything on vdev anyway

 2. any other possible probe would STILL find scmi_dev != NULL and
    it 'd bail out till I'm done with the remove

ONLY afterwards I would made scmi_dev visible as NULL for everybody.

Does this counter-reasoning makes sense ?

...OR, tbh, I have to just re-read another n-times memory-barriers.txt
(...and remain a bit puzzled anyway :D)

> > >
> > > > +
> > > > +     ret = get_capabilities();
> > > > +
> > > > +out:
> > > > +     if (ret) {
> > > > +             tee_client_close_context(tee_ctx);
> > > > +             optee_private = NULL;
> > >
> > > Barrier ? (not sure as above...)
> > >
> > > > +     }
> > > > +
> > > > +     return ret;
> > > > +}
> > > > +
> > > > +static int optee_service_remove(struct device *dev)
> > > > +{
> > > > +     if (optee_private)
> > > > +             return -EINVAL;
> > >
> > > Is it  instead: if (!optee_private) ?
> >
> > Oups! indeed :(
> >
> > > > +
> > > > +     if (!list_empty(&optee_private->channel_list))
> > > > +             return -EBUSY;
> > > > +
> > > > +     tee_client_close_context(optee_private->tee_ctx);
> > > > +
> > > > +     optee_private = NULL;
> > > > +
> > >
> > > Barrier ? (not sure as above...)
> > >
> > > > +     return 0;
> > > > +}
> > > > +
> > > > +static const struct tee_client_device_id scmi_optee_service_id[] = {
> > > > +     {
> > > > +             UUID_INIT(0xa8cfe406, 0xd4f5, 0x4a2e,
> > > > +                       0x9f, 0x8d, 0xa2, 0x5d, 0xc7, 0x54, 0xc0, 0x99)
> > > > +     },
> > > > +     { }
> > > > +};
> > > > +
> > > > +MODULE_DEVICE_TABLE(tee, scmi_optee_service_id);
> > > > +
> > > > +static struct tee_client_driver scmi_optee_driver = {
> > > > +     .id_table       = scmi_optee_service_id,
> > > > +     .driver         = {
> > > > +             .name = "scmi-optee",
> > > > +             .bus = &tee_bus_type,
> > > > +             .probe = optee_service_probe,
> > > > +             .remove = optee_service_remove,
> > > > +     },
> > > > +};
> > > > +
> > > > +static int __init scmi_optee_init(void)
> > > > +{
> > > > +     return driver_register(&scmi_optee_driver.driver);
> > > > +}
> > > > +
> > > > +static void __exit scmi_optee_exit(void)
> > > > +{
> > > > +     driver_unregister(&scmi_optee_driver.driver);
> > > > +}
> > > > +
> > > > +device_initcall(scmi_optee_init)
> > > > +module_exit(scmi_optee_exit);
> > >
> > > This breaks the build when ARM_SCMI_PROTOCOL=m and SCMI OPTEE transport is enabled,
> > > since the SCMI transports are not full fledged drivers but they are built into
> > > the SCMI stack core module, so if you endup trying to define multiple inits.
> > >
> > >  LD [M]  drivers/firmware/arm_scmi/scmi-module.o
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_init':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:549: multiple definition of `init_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2070: first defined here
> > > /opt/toolchains/gcc-arm-8.3-2019.03-x86_64-aarch64-linux-gnu/bin/aarch64-linux-gnu-ld: drivers/firmware/arm_scmi/optee.o: in function `scmi_optee_exit':
> > > /home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/optee.c:554: multiple definition of `cleanup_module'; drivers/firmware/arm_scmi/driver.o:/home/crimar01/ARM/dev/src/pdsw/linux/drivers/firmware/arm_scmi/driver.c:2099: first defined he> /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:474: recipe for target 'drivers/firmware/arm_scmi/scmi-module.o' failed
> > > make[4]: *** [drivers/firmware/arm_scmi/scmi-module.o] Error 1
> > > /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware/arm_scmi' failed
> > > make[3]: *** [drivers/firmware/arm_scmi] Error 2
> > > /home/crimar01/ARM/dev/src/pdsw/linux/scripts/Makefile.build:540: recipe for target 'drivers/firmware' failed
> > > make[2]: *** [drivers/firmware] Error 2
> > > make[2]: *** Waiting for unfinished jobs....
> > > /home/crimar01/ARM/dev/src/pdsw/linux/Makefile:1874: recipe for target 'drivers' failed
> > > make[1]: *** [drivers] Error 2
> > > make[1]: Leaving directory '/home/crimar01/ARM/dev/src/pdsw/out_linux'
> > > Makefile:219: recipe for target '__sub-make' failed
> > >
> > > In order to address this issue (same happended with VirtIO) I added
> > > transport_init/transport_exit optional hooks into scmi_desc, so that
> > > you can ask the core SCMI stack to perform whatever your transport
> > > needs at SCMI core init-time, before the SCMI core stack is probed.
> > >
> > > In other words the fix here down below fixes for me the build as a
> > > module of the SCMI stack.
> >
> > To ensure scmi/optee transport can register to the tee bus, it must
> > wait tee bus is initialized.
> > The issue is optee driver initializes its tee bus at subsys_initcall
> > level, same level as the scmi driver.
> > So I had to call scmi_optee_init() at an earlier init level: device_initcall().
> >
> > Virtio bus is registered at core_initcall level hence scmi/virtio init
> > a subsys_initcall has the dependency resolved.
> 
> I have a proposal to address this.
> 
> You suggested to use ::transport_init operator from struct scmi_desc
> for this registration to the optee bus.
> For the reason above, it does not apply to OP-TEE.
> My idea is to not ue ::transport_init hook but to register from
> ::link_supplier hook from struct scmi_transport_ops.
> The first time a scmi_optee channel to requested, it will be deferred
> and scmi_optee registering to optee bus done.
> Something like the below:
> 
>   static int scmi_optee_link_supplier(struct device *dev)
>   {
>       if (!scmi_optee_private) {
>           static int register_to_optee = -ENODEV;
> 
>           // register to optee bus enumeration if not already successfully done
>           if (register_to_optee)
>               register_to_optee = driver_register(&scmi_optee_driver.driver);
> 
>           // defer channel setup until
>           return -EPROBE_DEFER;
>       }
> 
>       if (!device_link_add(dev, scmi_optee_private->dev,
> DL_FLAG_AUTOREMOVE_CONSUMER)) {
>           dev_err(dev, "Adding link to supplier optee device failed\n");
>           return -ECANCELED;
>       }
> 
>       return 0;
>   }

So when you raised this point in the previous mail my initial thought was
that, unless we had found a good workaround, I should have started
working on something I have in my backlog for long, which is supposed to
handle these scenarios better: i.e. making all/or-some SCMI transport as
full fledged drivers instead of keeping them embedded into the core.
(not done till now since not needed and really did not want to change
also that while integrating virtio)

I have not started really working on this nor thought it through
properly, but having a way to define a full fledged SCMI transport driver
that registers with some external subsys (optee/virtio...) and then
registers itself with the SCMI core itself as an available transport (with
the core DEFERing till the transport layer has appeared), seemed to me the
way to go to solve this kind of issues more generally.

Having said that, your proposal seems the kind of workaround that could
solve fine your issue now simply using what is already in the SCMI core.

So I have nothing against it as an immediate solution (I'll double
check with Sudeep anyway :D), but I wonder if in the long term the
full-fledged transport driver approach would still make sense.

> 
> Note the exit sequence can still use struct scmi_desc::transport_ext hook:
> 
>   static void scmi_optee_exit(void)
>   {
>       driver_unregister(&scmi_optee_driver.driver);
>   }
>   module_exit(scmi_optee_exit);
> 

Here you mean without the module_exit right ?

So the init would be in charge of .link_supplier and its deferral
mechanism but the unregister woudld go via
.transport_exit = scmi_optee_exit() by the core on SCMI core unload.

I would recommend placing a check on 'register_to_optee' also here on exit
so that the SCMI core on its unload won't try to deregister a driver which
was never successfully registered.

> May I get your opinion?
> 

I wrote way too much ... sorry.

Thanks,
Cristian
diff mbox series

Patch

diff --git a/drivers/firmware/arm_scmi/Kconfig b/drivers/firmware/arm_scmi/Kconfig
index 3d7081e84853..9107e249023c 100644
--- a/drivers/firmware/arm_scmi/Kconfig
+++ b/drivers/firmware/arm_scmi/Kconfig
@@ -77,6 +77,18 @@  config ARM_SCMI_TRANSPORT_VIRTIO
 	  If you want the ARM SCMI PROTOCOL stack to include support for a
 	  transport based on VirtIO, answer Y.
 
+config ARM_SCMI_TRANSPORT_OPTEE
+	bool "SCMI transport based on OP-TEE service"
+	depends on OPTEE
+	select ARM_SCMI_HAVE_TRANSPORT
+	select ARM_SCMI_HAVE_SHMEM
+	default y
+	help
+	  This enables the OP-TEE service based transport for SCMI.
+
+	  If you want the ARM SCMI PROTOCOL stack to include support for a
+	  transport based on OP-TEE SCMI service, answer Y.
+
 endif #ARM_SCMI_PROTOCOL
 
 config ARM_SCMI_POWER_DOMAIN
diff --git a/drivers/firmware/arm_scmi/Makefile b/drivers/firmware/arm_scmi/Makefile
index 1dcf123d64ab..ef66ec8ca917 100644
--- a/drivers/firmware/arm_scmi/Makefile
+++ b/drivers/firmware/arm_scmi/Makefile
@@ -6,6 +6,7 @@  scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_MAILBOX) += mailbox.o
 scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_SMC) += smc.o
 scmi-transport-$(CONFIG_ARM_SCMI_HAVE_MSG) += msg.o
 scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_VIRTIO) += virtio.o
+scmi-transport-$(CONFIG_ARM_SCMI_TRANSPORT_OPTEE) += optee.o
 scmi-protocols-y = base.o clock.o perf.o power.o reset.o sensors.o system.o voltage.o
 scmi-module-objs := $(scmi-bus-y) $(scmi-driver-y) $(scmi-protocols-y) \
 		    $(scmi-transport-y)
diff --git a/drivers/firmware/arm_scmi/common.h b/drivers/firmware/arm_scmi/common.h
index dea1bfbe1052..82ff3c3a6d2d 100644
--- a/drivers/firmware/arm_scmi/common.h
+++ b/drivers/firmware/arm_scmi/common.h
@@ -421,6 +421,9 @@  extern const struct scmi_desc scmi_smc_desc;
 #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
 extern const struct scmi_desc scmi_virtio_desc;
 #endif
+#ifdef CONFIG_OPTEE
+extern const struct scmi_desc scmi_optee_desc;
+#endif
 
 void scmi_rx_callback(struct scmi_chan_info *cinfo, u32 msg_hdr, void *priv);
 void scmi_free_channel(struct scmi_chan_info *cinfo, struct idr *idr, int id);
diff --git a/drivers/firmware/arm_scmi/driver.c b/drivers/firmware/arm_scmi/driver.c
index b406b3f78f46..06f0a9846c7e 100644
--- a/drivers/firmware/arm_scmi/driver.c
+++ b/drivers/firmware/arm_scmi/driver.c
@@ -1999,6 +1999,9 @@  static const struct of_device_id scmi_of_match[] = {
 #endif
 #ifdef CONFIG_ARM_SCMI_TRANSPORT_VIRTIO
 	{ .compatible = "arm,scmi-virtio", .data = &scmi_virtio_desc},
+#endif
+#ifdef CONFIG_OPTEE
+	{ .compatible = "linaro,scmi-optee", .data = &scmi_optee_desc },
 #endif
 	{ /* Sentinel */ },
 };
diff --git a/drivers/firmware/arm_scmi/optee.c b/drivers/firmware/arm_scmi/optee.c
new file mode 100644
index 000000000000..e294cff37bea
--- /dev/null
+++ b/drivers/firmware/arm_scmi/optee.c
@@ -0,0 +1,559 @@ 
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * Copyright (C) 2019-2021 Linaro Ltd.
+ */
+
+#include <linux/io.h>
+#include <linux/of.h>
+#include <linux/of_address.h>
+#include <linux/kernel.h>
+#include <linux/module.h>
+#include <linux/mutex.h>
+#include <linux/slab.h>
+#include <linux/tee_drv.h>
+#include <linux/uuid.h>
+#include <uapi/linux/tee.h>
+
+#include "common.h"
+
+#define DRIVER_NAME "optee-scmi"
+
+enum optee_smci_pta_cmd {
+	/*
+	 * PTA_SCMI_CMD_CAPABILITIES - Get channel capabilities
+	 *
+	 * [out]    value[0].a: Capability bit mask (enum pta_scmi_caps)
+	 * [out]    value[0].b: Extended capabilities or 0
+	 */
+	PTA_SCMI_CMD_CAPABILITIES = 0,
+
+	/*
+	 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL - Process SCMI message in SMT buffer
+	 *
+	 * [in]     value[0].a: Channel handle
+	 *
+	 * Shared memory used for SCMI message/response exhange is expected
+	 * already identified and bound to channel handle in both SCMI agent
+	 * and SCMI server (OP-TEE) parts.
+	 * The memory uses SMT header to carry SCMI meta-data (protocol ID and
+	 * protocol message ID).
+	 */
+	PTA_SCMI_CMD_PROCESS_SMT_CHANNEL = 1,
+
+	/*
+	 * PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE - Process SMT/SCMI message
+	 *
+	 * [in]     value[0].a: Channel handle
+	 * [in/out] memref[1]: Message/response buffer (SMT and SCMI payload)
+	 *
+	 * Shared memory used for SCMI message/response is a SMT buffer
+	 * referenced by param[1]. It shall be 128 bytes large to fit response
+	 * payload whatever message playload size.
+	 * The memory uses SMT header to carry SCMI meta-data (protocol ID and
+	 * protocol message ID).
+	 */
+	PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE = 2,
+
+	/*
+	 * PTA_SCMI_CMD_GET_CHANNEL - Get channel handle
+	 *
+	 * SCMI shm information are 0 if agent expects to use OP-TEE regular SHM
+	 *
+	 * [in]     value[0].a: Channel identifier
+	 * [out]    value[0].a: Returned channel handle
+	 * [in]     value[0].b: Requested capabilities mask (enum pta_scmi_caps)
+	 */
+	PTA_SCMI_CMD_GET_CHANNEL = 3,
+};
+
+/*
+ * Capabilities
+ */
+enum pta_scmi_caps {
+	PTA_SCMI_CAPS_NONE = 0,
+	/*
+	 * Supports command using SMT header protocol (SCMI shmem) in shared
+	 * memory buffers to carry SCMI protocol synchronisation information.
+	 */
+	PTA_SCMI_CAPS_SMT_HEADER = BIT(0),
+};
+
+/**
+ * struct optee_channel - Description of an OP-TEE SCMI channel
+ *
+ * @channel_id: OP-TEE channel ID used for this transport
+ * @mu: Mutex protection on channel access
+ * @tee_session: TEE session identifier
+ * @cinfo: SCMI channel information
+ * @shmem: Virtual base address of the shared memory
+ * @tee_shm: Reference to TEE shared memory or NULL if using static shmem
+ * @caps: OP-TEE SCMI channel capabilities
+ * @link: Reference in agent's channel list
+ */
+struct optee_channel {
+	u32 channel_id;
+	struct mutex mu;
+	u32 tee_session;
+	struct scmi_chan_info *cinfo;
+	struct scmi_shared_mem __iomem *shmem;
+	struct tee_shm *tee_shm;
+	enum pta_scmi_caps caps;
+	struct list_head link;
+};
+
+/**
+ * struct optee_agent - OP-TEE transport private data
+ *
+ * @dev: Device used for communication with TEE
+ * @tee_ctx: TEE context used for communication
+ * @caps: Supported channel capabilities
+ * @mu: Mutex for protection of @channel_list
+ * @channel_list: List of all created channels for the agent
+ */
+struct optee_agent {
+	struct device *dev;
+	struct tee_context *tee_ctx;
+	enum pta_scmi_caps caps;
+	struct mutex mu;
+	struct list_head channel_list;
+};
+
+/* There can be only 1 SCMI service in OP-TEE we connect to */
+static struct optee_agent *optee_private;
+
+/* Open a session toward SCMI OP-TEE service with REE_KERNEL identity */
+static int open_session(u32 *tee_session)
+{
+	struct device *dev = optee_private->dev;
+	struct tee_client_device *scmi_pta = to_tee_client_device(dev);
+	struct tee_ioctl_open_session_arg arg = { };
+	int ret;
+
+	memcpy(arg.uuid, scmi_pta->id.uuid.b, TEE_IOCTL_UUID_LEN);
+	arg.clnt_login = TEE_IOCTL_LOGIN_REE_KERNEL;
+
+	ret = tee_client_open_session(optee_private->tee_ctx, &arg, NULL);
+	if (ret < 0 || arg.ret) {
+		dev_err(dev, "Can't open tee session: %d / %#x\n", ret, arg.ret);
+
+		return -EOPNOTSUPP;
+	}
+
+	*tee_session = arg.session;
+
+	return 0;
+}
+
+static void close_session(u32 tee_session)
+{
+	tee_client_close_session(optee_private->tee_ctx, tee_session);
+}
+
+static int get_capabilities(void)
+{
+	struct optee_agent *agent = optee_private;
+	struct tee_ioctl_invoke_arg arg = { };
+	struct tee_param param[1] = { };
+	u32 tee_session;
+	int ret;
+
+	ret = open_session(&tee_session);
+	if (ret)
+		return ret;
+
+	arg.func = PTA_SCMI_CMD_CAPABILITIES;
+	arg.session = tee_session;
+	arg.num_params = 1;
+
+	param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT;
+
+	ret = tee_client_invoke_func(agent->tee_ctx, &arg, param);
+
+	close_session(tee_session);
+
+	if (ret < 0 || arg.ret) {
+		dev_err(agent->dev, "Can't get capabilities: %d / %#x\n", ret, arg.ret);
+
+		return -EOPNOTSUPP;
+	}
+
+	agent->caps = param[0].u.value.a;
+
+	if (!(agent->caps & PTA_SCMI_CAPS_SMT_HEADER)) {
+		dev_err(agent->dev, "OP-TEE SCMI PTA doesn't support SMT\n");
+
+		return -EOPNOTSUPP;
+	}
+
+	return 0;
+}
+
+static int get_channel(struct optee_channel *channel)
+{
+	struct device *dev = optee_private->dev;
+	struct tee_ioctl_invoke_arg arg = { };
+	struct tee_param param[1] = { };
+	unsigned int caps = PTA_SCMI_CAPS_SMT_HEADER;
+	int ret;
+
+	arg.func = PTA_SCMI_CMD_GET_CHANNEL;
+	arg.session = channel->tee_session;
+	arg.num_params = 1;
+
+	param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
+	param[0].u.value.a = channel->channel_id;
+	param[0].u.value.b = caps;
+
+	ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
+
+	if (ret || arg.ret) {
+		dev_err(dev, "Can't get channel with caps %#x: %d / %#x\n", caps, ret, arg.ret);
+
+		return -EOPNOTSUPP;
+	}
+
+	/* From now on use channel identifer provided by OP-TEE SCMI service */
+	channel->channel_id = param[0].u.value.a;
+	channel->caps = caps;
+
+	return 0;
+}
+
+static int invoke_process_smt_channel(struct optee_channel *channel)
+{
+	struct tee_ioctl_invoke_arg arg = { };
+	struct tee_param param[2] = { };
+	int ret;
+
+	arg.session = channel->tee_session;
+	param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
+	param[0].u.value.a = channel->channel_id;
+
+	if (channel->tee_shm) {
+		const size_t msg_size = scmi_optee_desc.max_msg_size;
+
+		param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT;
+		param[1].u.memref.shm = channel->tee_shm;
+		param[1].u.memref.size = msg_size;
+		arg.num_params = 2;
+		arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL_MESSAGE;
+	} else {
+		arg.num_params = 1;
+		arg.func = PTA_SCMI_CMD_PROCESS_SMT_CHANNEL;
+	}
+
+	ret = tee_client_invoke_func(optee_private->tee_ctx, &arg, param);
+	if (ret < 0 || arg.ret) {
+		dev_err(optee_private->dev, "Failed on channel %u: %d / %#x\n",
+			channel->channel_id, ret, arg.ret);
+
+		return -EIO;
+	}
+
+	return 0;
+}
+
+static bool optee_chan_available(struct device *dev, int idx)
+{
+	u32 channel_id;
+
+	return !of_property_read_u32_index(dev->of_node, "linaro,optee-channel-id",
+					   idx, &channel_id);
+}
+
+static int setup_dynamic_shmem(struct device *dev, struct optee_channel *channel)
+{
+	const size_t msg_size = scmi_optee_desc.max_msg_size;
+
+	channel->tee_shm = tee_shm_alloc_kernel_buf(optee_private->tee_ctx, msg_size);
+	if (IS_ERR(channel->tee_shm)) {
+		dev_err(channel->cinfo->dev, "shmem allocation failed\n");
+		return -ENOMEM;
+	}
+
+	channel->shmem = (void *)tee_shm_get_va(channel->tee_shm, 0);
+	memset(channel->shmem, 0, msg_size);
+	shmem_clear_channel(channel->shmem);
+
+	return 0;
+}
+
+static int setup_static_shmem(struct device *dev, struct scmi_chan_info *cinfo,
+			      struct optee_channel *channel)
+{
+	struct device_node *np;
+	resource_size_t size;
+	struct resource res;
+	int ret;
+
+	np = of_parse_phandle(cinfo->dev->of_node, "shmem", 0);
+	if (!of_device_is_compatible(np, "arm,scmi-shmem")) {
+		ret = -ENXIO;
+		goto out;
+	}
+
+	ret = of_address_to_resource(np, 0, &res);
+	if (ret) {
+		dev_err(dev, "Failed to get SCMI Tx shared memory\n");
+		goto out;
+	}
+
+	size = resource_size(&res);
+
+	channel->shmem = devm_ioremap(dev, res.start, size);
+	if (!channel->shmem) {
+		dev_err(dev, "Failed to ioremap SCMI Tx shared memory\n");
+		ret = -EADDRNOTAVAIL;
+		goto out;
+	}
+
+	ret = 0;
+
+out:
+	of_node_put(np);
+
+	return ret;
+}
+
+static int optee_chan_setup_shmem(struct device *dev, struct scmi_chan_info *cinfo,
+				  bool tx, struct optee_channel *channel)
+{
+	struct device *cdev = cinfo->dev;
+
+	if (of_find_property(cdev->of_node, "shmem", NULL))
+		return setup_static_shmem(dev, cinfo, channel);
+	else
+		return setup_dynamic_shmem(dev, channel);
+}
+
+static void optee_clear_channel(struct scmi_chan_info *cinfo)
+{
+	struct optee_channel *channel = cinfo->transport_info;
+
+	shmem_clear_channel(channel->shmem);
+}
+
+static int optee_chan_setup(struct scmi_chan_info *cinfo, struct device *dev, bool tx)
+{
+	struct optee_channel *channel;
+	uint32_t channel_id;
+	int ret;
+
+	if (!tx)
+		return -ENODEV;
+
+	/* Shall wait for OP-TEE driver to be up and ready */
+	if (!optee_private || !optee_private->tee_ctx)
+		return -EPROBE_DEFER;
+
+	channel = devm_kzalloc(dev, sizeof(*channel), GFP_KERNEL);
+	if (!channel)
+		return -ENOMEM;
+
+	ret = of_property_read_u32_index(cinfo->dev->of_node, "linaro,optee-channel-id",
+					 0, &channel_id);
+	if (ret)
+		return ret;
+
+	cinfo->transport_info = channel;
+	channel->cinfo = cinfo;
+	channel->channel_id = channel_id;
+	mutex_init(&channel->mu);
+
+	ret = optee_chan_setup_shmem(dev, cinfo, tx, channel);
+	if (ret)
+		return ret;
+
+	ret = open_session(&channel->tee_session);
+	if (ret)
+		return ret;
+
+	ret = get_channel(channel);
+	if (ret) {
+		close_session(channel->tee_session);
+
+		return ret;
+	}
+
+	mutex_lock(&optee_private->mu);
+	list_add(&channel->link, &optee_private->channel_list);
+	mutex_unlock(&optee_private->mu);
+
+	return 0;
+}
+
+static int optee_chan_free(int id, void *p, void *data)
+{
+	struct scmi_chan_info *cinfo = p;
+	struct optee_channel *channel = cinfo->transport_info;
+
+	mutex_lock(&optee_private->mu);
+	list_del(&channel->link);
+	mutex_unlock(&optee_private->mu);
+
+	if (channel->tee_shm) {
+		tee_shm_free(channel->tee_shm);
+		channel->tee_shm = NULL;
+	}
+
+	cinfo->transport_info = NULL;
+	channel->cinfo = NULL;
+
+	scmi_free_channel(cinfo, data, id);
+
+	return 0;
+}
+
+static struct scmi_shared_mem *get_channel_shm(struct optee_channel *chan, struct scmi_xfer *xfer)
+{
+	if (!chan)
+		return NULL;
+
+	return chan->shmem;
+}
+
+
+static int optee_send_message(struct scmi_chan_info *cinfo,
+			      struct scmi_xfer *xfer)
+{
+	struct optee_channel *channel = cinfo->transport_info;
+	struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
+	int ret;
+
+	mutex_lock(&channel->mu);
+	shmem_tx_prepare(shmem, xfer);
+
+	ret = invoke_process_smt_channel(channel);
+
+	scmi_rx_callback(cinfo, shmem_read_header(shmem), NULL);
+	mutex_unlock(&channel->mu);
+
+	return ret;
+}
+
+static void optee_fetch_response(struct scmi_chan_info *cinfo,
+				 struct scmi_xfer *xfer)
+{
+	struct optee_channel *channel = cinfo->transport_info;
+	struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
+
+	shmem_fetch_response(shmem, xfer);
+}
+
+static bool optee_poll_done(struct scmi_chan_info *cinfo,
+			    struct scmi_xfer *xfer)
+{
+	struct optee_channel *channel = cinfo->transport_info;
+	struct scmi_shared_mem *shmem = get_channel_shm(channel, xfer);
+
+	return shmem_poll_done(shmem, xfer);
+}
+
+static struct scmi_transport_ops scmi_optee_ops = {
+	.chan_available = optee_chan_available,
+	.chan_setup = optee_chan_setup,
+	.chan_free = optee_chan_free,
+	.send_message = optee_send_message,
+	.fetch_response = optee_fetch_response,
+	.clear_channel = optee_clear_channel,
+	.poll_done = optee_poll_done,
+};
+
+const struct scmi_desc scmi_optee_desc = {
+	.ops = &scmi_optee_ops,
+	.max_rx_timeout_ms = 30,
+	.max_msg = 20,
+	.max_msg_size = 128,
+};
+
+static int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data)
+{
+	return ver->impl_id == TEE_IMPL_ID_OPTEE;
+}
+
+static int optee_service_probe(struct device *dev)
+{
+	struct optee_agent *agent;
+	struct tee_context *tee_ctx;
+	int ret;
+
+	/* Only one SCMI OP-TEE device allowed */
+	if (optee_private) {
+		dev_err(dev, "An SCMI OP-TEE device was already initialized: only one allowed\n");
+		return -EBUSY;
+	}
+
+	tee_ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, NULL);
+	if (IS_ERR(tee_ctx))
+		return -ENODEV;
+
+	agent = devm_kzalloc(dev, sizeof(*agent), GFP_KERNEL);
+	if (!agent) {
+		ret = -ENOMEM;
+		goto out;
+	}
+
+	agent->dev = dev;
+	agent->tee_ctx = tee_ctx;
+	INIT_LIST_HEAD(&agent->channel_list);
+
+	optee_private = agent;
+
+	ret = get_capabilities();
+
+out:
+	if (ret) {
+		tee_client_close_context(tee_ctx);
+		optee_private = NULL;
+	}
+
+	return ret;
+}
+
+static int optee_service_remove(struct device *dev)
+{
+	if (optee_private)
+		return -EINVAL;
+
+	if (!list_empty(&optee_private->channel_list))
+		return -EBUSY;
+
+	tee_client_close_context(optee_private->tee_ctx);
+
+	optee_private = NULL;
+
+	return 0;
+}
+
+static const struct tee_client_device_id scmi_optee_service_id[] = {
+	{
+		UUID_INIT(0xa8cfe406, 0xd4f5, 0x4a2e,
+			  0x9f, 0x8d, 0xa2, 0x5d, 0xc7, 0x54, 0xc0, 0x99)
+	},
+	{ }
+};
+
+MODULE_DEVICE_TABLE(tee, scmi_optee_service_id);
+
+static struct tee_client_driver scmi_optee_driver = {
+	.id_table	= scmi_optee_service_id,
+	.driver		= {
+		.name = "scmi-optee",
+		.bus = &tee_bus_type,
+		.probe = optee_service_probe,
+		.remove = optee_service_remove,
+	},
+};
+
+static int __init scmi_optee_init(void)
+{
+	return driver_register(&scmi_optee_driver.driver);
+}
+
+static void __exit scmi_optee_exit(void)
+{
+	driver_unregister(&scmi_optee_driver.driver);
+}
+
+device_initcall(scmi_optee_init)
+module_exit(scmi_optee_exit);