linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: <dan.j.williams@intel.com>
To: Aneesh Kumar K.V <aneesh.kumar@kernel.org>,
	Alexey Kardashevskiy <aik@amd.com>,
	Dan Williams <dan.j.williams@intel.com>,
	<linux-coco@lists.linux.dev>, <linux-pci@vger.kernel.org>
Cc: <gregkh@linuxfoundation.org>, <bhelgaas@google.com>,
	<yilun.xu@linux.intel.com>
Subject: Re: [PATCH 1/7] PCI/TSM: Add pci_tsm_{bind,unbind}() methods for instantiating TDIs
Date: Tue, 9 Sep 2025 21:47:01 -0700	[thread overview]
Message-ID: <68c102c525c22_75e31005a@dwillia2-mobl4.notmuch> (raw)
In-Reply-To: <yq5aa53c3ngp.fsf@kernel.org>

Aneesh Kumar K.V wrote:
> Alexey Kardashevskiy <aik@amd.com> writes:
> 
> > On 27/8/25 13:52, Dan Williams wrote:
> >
> >
> > I suggest changing "pci_tsm_{bind,unbind}()" to "pci_tsm_bind/pci_tsm_unbind" or "pci_tsm_bind/_unbind" as otherwise cannot grep for pci_tsm_bind in git log.
> >
> >
> >> After a PCIe device has established a secure link and session between a TEE
> >> Security Manager (TSM) and its local Device Security Manager (DSM), the
> >> device or its subfunctions are candidates to be bound to a private memory
> >> context, a TVM. A PCIe device function interface assigned to a TVM is a TEE
> >> Device Interface (TDI).
> >> 
> >> The pci_tsm_bind() requests the low-level TSM driver to associate the
> >> device with private MMIO and private IOMMU context resources of a given TVM
> >> represented by a @kvm argument. A device in the bound state corresponds to
> >> the TDISP protocol LOCKED state and awaits validation by the TVM. It is a
> >> 'struct pci_tsm_link_ops' operation because, similar to IDE establishment,
> >> it involves host side resource establishment and context setup on behalf of
> >> the guest. It is also expected to be performed lazily to allow for
> >> operation of the device in non-confidential "shared" context for pre-lock
> >> configuration.
> >> 
> >
> >
> >
> >> Co-developed-by: Xu Yilun <yilun.xu@linux.intel.com>
> >> Signed-off-by: Xu Yilun <yilun.xu@linux.intel.com>
> >> Signed-off-by: Dan Williams <dan.j.williams@intel.com>
> >> ---
> >>   drivers/pci/tsm.c       | 95 +++++++++++++++++++++++++++++++++++++++++
> >>   include/linux/pci-tsm.h | 30 +++++++++++++
> >>   2 files changed, 125 insertions(+)
> >> 
> >> diff --git a/drivers/pci/tsm.c b/drivers/pci/tsm.c
> >> index 092e81c5208c..302a974f3632 100644
> >> --- a/drivers/pci/tsm.c
> >> +++ b/drivers/pci/tsm.c
> >> @@ -251,6 +251,99 @@ static int remove_fn(struct pci_dev *pdev, void *data)
> >>   	return 0;
> >>   }
> >>   
> >> +/*
> >> + * Note, this helper only returns an error code and takes an argument for
> >> + * compatibility with the pci_walk_bus() callback prototype. pci_tsm_unbind()
> >> + * always succeeds.
> >> + */
> >> +static int __pci_tsm_unbind(struct pci_dev *pdev, void *data)
> >> +{
> >> +	struct pci_tdi *tdi;
> >> +	struct pci_tsm_pf0 *tsm_pf0;
> >> +
> >> +	lockdep_assert_held(&pci_tsm_rwsem);
> >> +
> >> +	if (!pdev->tsm)
> >> +		return 0;
> >> +
> >> +	tsm_pf0 = to_pci_tsm_pf0(pdev->tsm);
> >
> > What is expected to be passed to __pci_tsm_unbind/pci_tsm_bind as pdev - PF0 or TEE-IO VF? I guess the latter.
> >
> > But to_pci_tsm_pf0() casts the pdev's tsm to pci_tsm_pf0 which makes sense for PF0 but not for VFs.
> >
> > What do I miss and how does this work for you? Thanks,
> >
> 
> I guess this needs
> 
> modified   drivers/pci/tsm.c
> @@ -44,7 +44,7 @@ static inline bool has_tee(struct pci_dev *pdev)
>  /* 'struct pci_tsm_pf0' wraps 'struct pci_tsm' when ->dsm == ->pdev (self) */
>  static struct pci_tsm_pf0 *to_pci_tsm_pf0(struct pci_tsm *pci_tsm)
>  {
> -	struct pci_dev *pdev = pci_tsm->pdev;
> +	struct pci_dev *pdev = pci_tsm->dsm;

Yup, guess I should have read one more message in the thread before
taking the time go off and finish off v6.

  reply	other threads:[~2025-09-10  4:47 UTC|newest]

Thread overview: 47+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-27  3:52 [PATCH 0/7] PCI/TSM: TEE I/O infrastructure Dan Williams
2025-08-27  3:52 ` [PATCH 1/7] PCI/TSM: Add pci_tsm_{bind,unbind}() methods for instantiating TDIs Dan Williams
2025-09-02  0:12   ` Alexey Kardashevskiy
2025-09-02 15:04     ` Aneesh Kumar K.V
2025-09-10  4:47       ` dan.j.williams [this message]
2025-09-10  4:46     ` dan.j.williams
2025-09-02 15:05   ` Aneesh Kumar K.V
2025-09-10  4:50     ` dan.j.williams
2025-09-03 15:17   ` Aneesh Kumar K.V
2025-09-04 10:38     ` Alexey Kardashevskiy
2025-09-04 12:56       ` Aneesh Kumar K.V
2025-09-05  2:32         ` Alexey Kardashevskiy
2025-09-10  5:09     ` dan.j.williams
2025-08-27  3:52 ` [PATCH 2/7] PCI/TSM: Add pci_tsm_guest_req() for managing TDIs Dan Williams
2025-08-28  9:53   ` Alexey Kardashevskiy
2025-08-28 22:07     ` dan.j.williams
2025-08-29  2:21       ` Alexey Kardashevskiy
2025-08-30  2:37         ` dan.j.williams
2025-09-01 23:49           ` Alexey Kardashevskiy
2025-09-08 11:09             ` Alexey Kardashevskiy
2025-09-10  5:35               ` dan.j.williams
2025-10-10  4:48           ` Xu Yilun
2025-08-28 13:02   ` Aneesh Kumar K.V
2025-08-28 22:14     ` dan.j.williams
2025-08-27  3:52 ` [PATCH 3/7] device core: Introduce confidential device acceptance Dan Williams
2025-08-27  6:14   ` Greg KH
2025-08-28 20:07     ` dan.j.williams
2025-09-16 16:58   ` Jonathan Cameron
2025-08-27  3:52 ` [PATCH 4/7] x86/ioremap, resource: Introduce IORES_DESC_ENCRYPTED for encrypted PCI MMIO Dan Williams
2025-09-17 21:30   ` Jason Gunthorpe
2025-10-07  8:23   ` Alexey Kardashevskiy
2025-10-07 21:31     ` Alexey Kardashevskiy
2025-08-27  3:52 ` [PATCH 5/7] PCI/TSM: Add Device Security (TVM Guest) operations support Dan Williams
2025-09-03 15:22   ` Aneesh Kumar K.V
2025-09-10  5:15     ` dan.j.williams
2025-09-11  8:31       ` Aneesh Kumar K.V
2025-09-04 15:02   ` Aneesh Kumar K.V
2025-09-10  5:31     ` dan.j.williams
2025-09-16 17:10   ` Jonathan Cameron
2025-08-27  3:52 ` [PATCH 6/7] samples/devsec: Introduce a "Device Security TSM" sample driver Dan Williams
2025-08-27 12:39   ` Jason Gunthorpe
2025-08-27 23:47     ` Alexey Kardashevskiy
2025-08-28 21:38     ` dan.j.williams
2025-08-29 16:02       ` Jason Gunthorpe
2025-08-29 20:00         ` dan.j.williams
2025-08-29 23:34           ` Jason Gunthorpe
2025-08-27  3:52 ` [PATCH 7/7] tools/testing/devsec: Add a script to exercise samples/devsec/ Dan Williams

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=68c102c525c22_75e31005a@dwillia2-mobl4.notmuch \
    --to=dan.j.williams@intel.com \
    --cc=aik@amd.com \
    --cc=aneesh.kumar@kernel.org \
    --cc=bhelgaas@google.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=linux-coco@lists.linux.dev \
    --cc=linux-pci@vger.kernel.org \
    --cc=yilun.xu@linux.intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).