mirror of
https://git.yoctoproject.org/meta-arm
synced 2026-05-06 16:48:54 +00:00
arm-bsp/linux: add ffa driver to TC0
This includes the initial version of ffa driver and optee driver support for FF-A to ACK 5.10 Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com> Change-Id: I8a2c6d0e26422bd2183f3c1f370b0c08eeba7c1e Signed-off-by: Jon Mason <jon.mason@arm.com>
This commit is contained in:
committed by
Jon Mason
parent
7612faf780
commit
9a20a5cc10
@@ -85,6 +85,19 @@ SRC_URI_append_tc0 = " \
|
||||
file://0006-mailbox-arm_mhuv2-Fix-sparse-warnings.patch \
|
||||
file://0007-mailbox-arm_mhuv2-make-remove-callback-return-void.patch \
|
||||
file://0008-mailbox-arm_mhuv2-Skip-calling-kfree-with-invalid-po.patch \
|
||||
file://0009-arm64-smccc-Add-support-for-SMCCCv1.2-extended-input.patch \
|
||||
file://0010-firmware-arm_ffa-Add-initial-FFA-bus-support-for-dev.patch \
|
||||
file://0011-firmware-arm_ffa-Add-initial-Arm-FFA-driver-support.patch \
|
||||
file://0012-firmware-arm_ffa-Add-support-for-SMCCC-as-transport-.patch \
|
||||
file://0013-firmware-arm_ffa-Setup-in-kernel-users-of-FFA-partit.patch \
|
||||
file://0014-firmware-arm_ffa-Add-support-for-MEM_-interfaces.patch \
|
||||
file://0015-tee-add-sec_world_id-to-struct-tee_shm.patch \
|
||||
file://0016-optee-simplify-optee_release.patch \
|
||||
file://0017-optee-sync-OP-TEE-headers.patch \
|
||||
file://0018-optee-refactor-driver-with-internal-callbacks.patch \
|
||||
file://0019-optee-add-a-FF-A-memory-pool.patch \
|
||||
file://0020-optee-add-FF-A-support.patch \
|
||||
file://0021-drivers-optee-hack-for-UUID-endianess-issue.patch \
|
||||
"
|
||||
|
||||
#
|
||||
|
||||
@@ -0,0 +1,188 @@
|
||||
From 6cc4b54570d508413982d86bf68f60ccdb8687f8 Mon Sep 17 00:00:00 2001
|
||||
From: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Date: Fri, 30 Apr 2021 11:24:24 +0100
|
||||
Subject: [PATCH 01/14] arm64: smccc: Add support for SMCCCv1.2 extended
|
||||
input/output registers
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
SMCCC v1.2 allows x8-x17 to be used as parameter registers and x4—x17
|
||||
to be used as result registers in SMC64/HVC64. Arm Firmware Framework
|
||||
for Armv8-A specification makes use of x0-x7 as parameter and result
|
||||
registers. There are other users like Hyper-V who intend to use beyond
|
||||
x0-x7 as well.
|
||||
|
||||
Current SMCCC interface in the kernel just use x0-x7 as parameter and
|
||||
x0-x3 as result registers as required by SMCCCv1.0. Let us add new
|
||||
interface to support this extended set of input/output registers namely
|
||||
x0-x17 as both parameter and result registers.
|
||||
|
||||
Acked-by: Mark Rutland <mark.rutland@arm.com>
|
||||
Tested-by: Michael Kelley <mikelley@microsoft.com>
|
||||
Reviewed-by: Michael Kelley <mikelley@microsoft.com>
|
||||
Cc: Will Deacon <will@kernel.org>
|
||||
Cc: Catalin Marinas <catalin.marinas@arm.com>
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git/commit/?h=v5.10/ffa&id=d3d7f68912d370e80f7c293e04c8fecf76d704c5]
|
||||
---
|
||||
arch/arm64/kernel/asm-offsets.c | 9 ++++++
|
||||
arch/arm64/kernel/smccc-call.S | 57 +++++++++++++++++++++++++++++++++
|
||||
include/linux/arm-smccc.h | 55 +++++++++++++++++++++++++++++++
|
||||
3 files changed, 121 insertions(+)
|
||||
|
||||
diff --git a/arch/arm64/kernel/asm-offsets.c b/arch/arm64/kernel/asm-offsets.c
|
||||
index f396d951ee54..6545c497064e 100644
|
||||
--- a/arch/arm64/kernel/asm-offsets.c
|
||||
+++ b/arch/arm64/kernel/asm-offsets.c
|
||||
@@ -138,6 +138,15 @@ int main(void)
|
||||
DEFINE(ARM_SMCCC_RES_X2_OFFS, offsetof(struct arm_smccc_res, a2));
|
||||
DEFINE(ARM_SMCCC_QUIRK_ID_OFFS, offsetof(struct arm_smccc_quirk, id));
|
||||
DEFINE(ARM_SMCCC_QUIRK_STATE_OFFS, offsetof(struct arm_smccc_quirk, state));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X0_OFFS, offsetof(struct arm_smccc_1_2_regs, a0));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X2_OFFS, offsetof(struct arm_smccc_1_2_regs, a2));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X4_OFFS, offsetof(struct arm_smccc_1_2_regs, a4));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X6_OFFS, offsetof(struct arm_smccc_1_2_regs, a6));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X8_OFFS, offsetof(struct arm_smccc_1_2_regs, a8));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X10_OFFS, offsetof(struct arm_smccc_1_2_regs, a10));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X12_OFFS, offsetof(struct arm_smccc_1_2_regs, a12));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X14_OFFS, offsetof(struct arm_smccc_1_2_regs, a14));
|
||||
+ DEFINE(ARM_SMCCC_1_2_REGS_X16_OFFS, offsetof(struct arm_smccc_1_2_regs, a16));
|
||||
BLANK();
|
||||
DEFINE(HIBERN_PBE_ORIG, offsetof(struct pbe, orig_address));
|
||||
DEFINE(HIBERN_PBE_ADDR, offsetof(struct pbe, address));
|
||||
diff --git a/arch/arm64/kernel/smccc-call.S b/arch/arm64/kernel/smccc-call.S
|
||||
index d62447964ed9..2def9d0dd3dd 100644
|
||||
--- a/arch/arm64/kernel/smccc-call.S
|
||||
+++ b/arch/arm64/kernel/smccc-call.S
|
||||
@@ -43,3 +43,60 @@ SYM_FUNC_START(__arm_smccc_hvc)
|
||||
SMCCC hvc
|
||||
SYM_FUNC_END(__arm_smccc_hvc)
|
||||
EXPORT_SYMBOL(__arm_smccc_hvc)
|
||||
+
|
||||
+ .macro SMCCC_1_2 instr
|
||||
+ /* Save `res` and free a GPR that won't be clobbered */
|
||||
+ stp x1, x19, [sp, #-16]!
|
||||
+
|
||||
+ /* Ensure `args` won't be clobbered while loading regs in next step */
|
||||
+ mov x19, x0
|
||||
+
|
||||
+ /* Load the registers x0 - x17 from the struct arm_smccc_1_2_regs */
|
||||
+ ldp x0, x1, [x19, #ARM_SMCCC_1_2_REGS_X0_OFFS]
|
||||
+ ldp x2, x3, [x19, #ARM_SMCCC_1_2_REGS_X2_OFFS]
|
||||
+ ldp x4, x5, [x19, #ARM_SMCCC_1_2_REGS_X4_OFFS]
|
||||
+ ldp x6, x7, [x19, #ARM_SMCCC_1_2_REGS_X6_OFFS]
|
||||
+ ldp x8, x9, [x19, #ARM_SMCCC_1_2_REGS_X8_OFFS]
|
||||
+ ldp x10, x11, [x19, #ARM_SMCCC_1_2_REGS_X10_OFFS]
|
||||
+ ldp x12, x13, [x19, #ARM_SMCCC_1_2_REGS_X12_OFFS]
|
||||
+ ldp x14, x15, [x19, #ARM_SMCCC_1_2_REGS_X14_OFFS]
|
||||
+ ldp x16, x17, [x19, #ARM_SMCCC_1_2_REGS_X16_OFFS]
|
||||
+
|
||||
+ \instr #0
|
||||
+
|
||||
+ /* Load the `res` from the stack */
|
||||
+ ldr x19, [sp]
|
||||
+
|
||||
+ /* Store the registers x0 - x17 into the result structure */
|
||||
+ stp x0, x1, [x19, #ARM_SMCCC_1_2_REGS_X0_OFFS]
|
||||
+ stp x2, x3, [x19, #ARM_SMCCC_1_2_REGS_X2_OFFS]
|
||||
+ stp x4, x5, [x19, #ARM_SMCCC_1_2_REGS_X4_OFFS]
|
||||
+ stp x6, x7, [x19, #ARM_SMCCC_1_2_REGS_X6_OFFS]
|
||||
+ stp x8, x9, [x19, #ARM_SMCCC_1_2_REGS_X8_OFFS]
|
||||
+ stp x10, x11, [x19, #ARM_SMCCC_1_2_REGS_X10_OFFS]
|
||||
+ stp x12, x13, [x19, #ARM_SMCCC_1_2_REGS_X12_OFFS]
|
||||
+ stp x14, x15, [x19, #ARM_SMCCC_1_2_REGS_X14_OFFS]
|
||||
+ stp x16, x17, [x19, #ARM_SMCCC_1_2_REGS_X16_OFFS]
|
||||
+
|
||||
+ /* Restore original x19 */
|
||||
+ ldp xzr, x19, [sp], #16
|
||||
+ ret
|
||||
+.endm
|
||||
+
|
||||
+/*
|
||||
+ * void arm_smccc_1_2_hvc(const struct arm_smccc_1_2_regs *args,
|
||||
+ * struct arm_smccc_1_2_regs *res);
|
||||
+ */
|
||||
+SYM_FUNC_START(arm_smccc_1_2_hvc)
|
||||
+ SMCCC_1_2 hvc
|
||||
+SYM_FUNC_END(arm_smccc_1_2_hvc)
|
||||
+EXPORT_SYMBOL(arm_smccc_1_2_hvc)
|
||||
+
|
||||
+/*
|
||||
+ * void arm_smccc_1_2_smc(const struct arm_smccc_1_2_regs *args,
|
||||
+ * struct arm_smccc_1_2_regs *res);
|
||||
+ */
|
||||
+SYM_FUNC_START(arm_smccc_1_2_smc)
|
||||
+ SMCCC_1_2 smc
|
||||
+SYM_FUNC_END(arm_smccc_1_2_smc)
|
||||
+EXPORT_SYMBOL(arm_smccc_1_2_smc)
|
||||
diff --git a/include/linux/arm-smccc.h b/include/linux/arm-smccc.h
|
||||
index 62c54234576c..c8eb24af3c62 100644
|
||||
--- a/include/linux/arm-smccc.h
|
||||
+++ b/include/linux/arm-smccc.h
|
||||
@@ -186,6 +186,61 @@ struct arm_smccc_res {
|
||||
unsigned long a3;
|
||||
};
|
||||
|
||||
+#ifdef CONFIG_ARM64
|
||||
+/**
|
||||
+ * struct arm_smccc_1_2_regs - Arguments for or Results from SMC/HVC call
|
||||
+ * @a0-a17 argument values from registers 0 to 17
|
||||
+ */
|
||||
+struct arm_smccc_1_2_regs {
|
||||
+ unsigned long a0;
|
||||
+ unsigned long a1;
|
||||
+ unsigned long a2;
|
||||
+ unsigned long a3;
|
||||
+ unsigned long a4;
|
||||
+ unsigned long a5;
|
||||
+ unsigned long a6;
|
||||
+ unsigned long a7;
|
||||
+ unsigned long a8;
|
||||
+ unsigned long a9;
|
||||
+ unsigned long a10;
|
||||
+ unsigned long a11;
|
||||
+ unsigned long a12;
|
||||
+ unsigned long a13;
|
||||
+ unsigned long a14;
|
||||
+ unsigned long a15;
|
||||
+ unsigned long a16;
|
||||
+ unsigned long a17;
|
||||
+};
|
||||
+
|
||||
+/**
|
||||
+ * arm_smccc_1_2_hvc() - make HVC calls
|
||||
+ * @args: arguments passed via struct arm_smccc_1_2_regs
|
||||
+ * @res: result values via struct arm_smccc_1_2_regs
|
||||
+ *
|
||||
+ * This function is used to make HVC calls following SMC Calling Convention
|
||||
+ * v1.2 or above. The content of the supplied param are copied from the
|
||||
+ * structure to registers prior to the HVC instruction. The return values
|
||||
+ * are updated with the content from registers on return from the HVC
|
||||
+ * instruction.
|
||||
+ */
|
||||
+asmlinkage void arm_smccc_1_2_hvc(const struct arm_smccc_1_2_regs *args,
|
||||
+ struct arm_smccc_1_2_regs *res);
|
||||
+
|
||||
+/**
|
||||
+ * arm_smccc_1_2_smc() - make SMC calls
|
||||
+ * @args: arguments passed via struct arm_smccc_1_2_regs
|
||||
+ * @res: result values via struct arm_smccc_1_2_regs
|
||||
+ *
|
||||
+ * This function is used to make SMC calls following SMC Calling Convention
|
||||
+ * v1.2 or above. The content of the supplied param are copied from the
|
||||
+ * structure to registers prior to the SMC instruction. The return values
|
||||
+ * are updated with the content from registers on return from the SMC
|
||||
+ * instruction.
|
||||
+ */
|
||||
+asmlinkage void arm_smccc_1_2_smc(const struct arm_smccc_1_2_regs *args,
|
||||
+ struct arm_smccc_1_2_regs *res);
|
||||
+#endif
|
||||
+
|
||||
/**
|
||||
* struct arm_smccc_quirk - Contains quirk information
|
||||
* @id: quirk identification
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,420 @@
|
||||
From 12e789c445956198f2c09798ecfc44fb2ff98b8e Mon Sep 17 00:00:00 2001
|
||||
From: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Date: Fri, 30 Apr 2021 11:24:33 +0100
|
||||
Subject: [PATCH 02/14] firmware: arm_ffa: Add initial FFA bus support for
|
||||
device enumeration
|
||||
|
||||
The Arm FF for Armv8-A specification has concept of endpoints or
|
||||
partitions. In the Normal world, a partition could be a VM when
|
||||
the Virtualization extension is enabled or the kernel itself.
|
||||
|
||||
In order to handle multiple partitions, we can create a FFA device for
|
||||
each such partition on a dedicated FFA bus. Similarly, different drivers
|
||||
requiring FFA transport can be registered on the same bus. We can match
|
||||
the device and drivers using UUID. This is mostly for the in-kernel
|
||||
users with FFA drivers.
|
||||
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git/commit/?h=v5.10/ffa&id=6c31a912d7cf9042d80b24f431f0739d53a7262d]
|
||||
---
|
||||
MAINTAINERS | 7 +
|
||||
drivers/firmware/Kconfig | 1 +
|
||||
drivers/firmware/Makefile | 1 +
|
||||
drivers/firmware/arm_ffa/Kconfig | 16 +++
|
||||
drivers/firmware/arm_ffa/Makefile | 4 +
|
||||
drivers/firmware/arm_ffa/bus.c | 207 ++++++++++++++++++++++++++++++
|
||||
include/linux/arm_ffa.h | 91 +++++++++++++
|
||||
7 files changed, 327 insertions(+)
|
||||
create mode 100644 drivers/firmware/arm_ffa/Kconfig
|
||||
create mode 100644 drivers/firmware/arm_ffa/Makefile
|
||||
create mode 100644 drivers/firmware/arm_ffa/bus.c
|
||||
create mode 100644 include/linux/arm_ffa.h
|
||||
|
||||
diff --git a/MAINTAINERS b/MAINTAINERS
|
||||
index 5234423c477a..d5fdc9e68c89 100644
|
||||
--- a/MAINTAINERS
|
||||
+++ b/MAINTAINERS
|
||||
@@ -6847,6 +6847,13 @@ F: include/linux/firewire.h
|
||||
F: include/uapi/linux/firewire*.h
|
||||
F: tools/firewire/
|
||||
|
||||
+FIRMWARE FRAMEWORK FOR ARMV8-A
|
||||
+M: Sudeep Holla <sudeep.holla@arm.com>
|
||||
+L: linux-arm-kernel@lists.infradead.org
|
||||
+S: Maintained
|
||||
+F: drivers/firmware/arm_ffa/
|
||||
+F: include/linux/arm_ffa.h
|
||||
+
|
||||
FIRMWARE LOADER (request_firmware)
|
||||
M: Luis Chamberlain <mcgrof@kernel.org>
|
||||
L: linux-kernel@vger.kernel.org
|
||||
diff --git a/drivers/firmware/Kconfig b/drivers/firmware/Kconfig
|
||||
index bfef3d8d14e7..90e6dd32f2cd 100644
|
||||
--- a/drivers/firmware/Kconfig
|
||||
+++ b/drivers/firmware/Kconfig
|
||||
@@ -296,6 +296,7 @@ config TURRIS_MOX_RWTM
|
||||
other manufacturing data and also utilize the Entropy Bit Generator
|
||||
for hardware random number generation.
|
||||
|
||||
+source "drivers/firmware/arm_ffa/Kconfig"
|
||||
source "drivers/firmware/broadcom/Kconfig"
|
||||
source "drivers/firmware/google/Kconfig"
|
||||
source "drivers/firmware/efi/Kconfig"
|
||||
diff --git a/drivers/firmware/Makefile b/drivers/firmware/Makefile
|
||||
index 523173cbff33..3c2af2e98def 100644
|
||||
--- a/drivers/firmware/Makefile
|
||||
+++ b/drivers/firmware/Makefile
|
||||
@@ -23,6 +23,7 @@ obj-$(CONFIG_TI_SCI_PROTOCOL) += ti_sci.o
|
||||
obj-$(CONFIG_TRUSTED_FOUNDATIONS) += trusted_foundations.o
|
||||
obj-$(CONFIG_TURRIS_MOX_RWTM) += turris-mox-rwtm.o
|
||||
|
||||
+obj-y += arm_ffa/
|
||||
obj-y += arm_scmi/
|
||||
obj-y += broadcom/
|
||||
obj-y += meson/
|
||||
diff --git a/drivers/firmware/arm_ffa/Kconfig b/drivers/firmware/arm_ffa/Kconfig
|
||||
new file mode 100644
|
||||
index 000000000000..261a3660650a
|
||||
--- /dev/null
|
||||
+++ b/drivers/firmware/arm_ffa/Kconfig
|
||||
@@ -0,0 +1,16 @@
|
||||
+# SPDX-License-Identifier: GPL-2.0-only
|
||||
+config ARM_FFA_TRANSPORT
|
||||
+ tristate "Arm Firmware Framework for Armv8-A"
|
||||
+ depends on OF
|
||||
+ depends on ARM64
|
||||
+ default n
|
||||
+ help
|
||||
+ This Firmware Framework(FF) for Arm A-profile processors describes
|
||||
+ interfaces that standardize communication between the various
|
||||
+ software images which includes communication between images in
|
||||
+ the Secure world and Normal world. It also leverages the
|
||||
+ virtualization extension to isolate software images provided
|
||||
+ by an ecosystem of vendors from each other.
|
||||
+
|
||||
+ This driver provides interface for all the client drivers making
|
||||
+ use of the features offered by ARM FF-A.
|
||||
diff --git a/drivers/firmware/arm_ffa/Makefile b/drivers/firmware/arm_ffa/Makefile
|
||||
new file mode 100644
|
||||
index 000000000000..bfe4323a8784
|
||||
--- /dev/null
|
||||
+++ b/drivers/firmware/arm_ffa/Makefile
|
||||
@@ -0,0 +1,4 @@
|
||||
+# SPDX-License-Identifier: GPL-2.0-only
|
||||
+ffa-bus-y = bus.o
|
||||
+ffa-module-objs := $(ffa-bus-y)
|
||||
+obj-$(CONFIG_ARM_FFA_TRANSPORT) = ffa-module.o
|
||||
diff --git a/drivers/firmware/arm_ffa/bus.c b/drivers/firmware/arm_ffa/bus.c
|
||||
new file mode 100644
|
||||
index 000000000000..b743fb2256e9
|
||||
--- /dev/null
|
||||
+++ b/drivers/firmware/arm_ffa/bus.c
|
||||
@@ -0,0 +1,207 @@
|
||||
+// SPDX-License-Identifier: GPL-2.0
|
||||
+/*
|
||||
+ * Copyright (C) 2020 ARM Ltd.
|
||||
+ */
|
||||
+
|
||||
+#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||
+
|
||||
+#include <linux/arm_ffa.h>
|
||||
+#include <linux/device.h>
|
||||
+#include <linux/fs.h>
|
||||
+#include <linux/kernel.h>
|
||||
+#include <linux/module.h>
|
||||
+#include <linux/slab.h>
|
||||
+#include <linux/types.h>
|
||||
+
|
||||
+static int ffa_device_match(struct device *dev, struct device_driver *drv)
|
||||
+{
|
||||
+ const struct ffa_device_id *id_table;
|
||||
+ struct ffa_device *ffa_dev;
|
||||
+
|
||||
+ id_table = to_ffa_driver(drv)->id_table;
|
||||
+ ffa_dev = to_ffa_dev(dev);
|
||||
+
|
||||
+ while (!uuid_is_null(&id_table->uuid)) {
|
||||
+ if (uuid_equal(&ffa_dev->uuid, &id_table->uuid))
|
||||
+ return 1;
|
||||
+ id_table++;
|
||||
+ }
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static int ffa_device_probe(struct device *dev)
|
||||
+{
|
||||
+ struct ffa_driver *ffa_drv = to_ffa_driver(dev->driver);
|
||||
+ struct ffa_device *ffa_dev = to_ffa_dev(dev);
|
||||
+
|
||||
+ if (!ffa_device_match(dev, dev->driver))
|
||||
+ return -ENODEV;
|
||||
+
|
||||
+ return ffa_drv->probe(ffa_dev);
|
||||
+}
|
||||
+
|
||||
+static int ffa_device_uevent(struct device *dev, struct kobj_uevent_env *env)
|
||||
+{
|
||||
+ struct ffa_device *ffa_dev = to_ffa_dev(dev);
|
||||
+
|
||||
+ return add_uevent_var(env, "MODALIAS=arm_ffa:%04x:%pUb",
|
||||
+ ffa_dev->vm_id, &ffa_dev->uuid);
|
||||
+}
|
||||
+
|
||||
+static ssize_t partition_id_show(struct device *dev,
|
||||
+ struct device_attribute *attr, char *buf)
|
||||
+{
|
||||
+ struct ffa_device *ffa_dev = to_ffa_dev(dev);
|
||||
+
|
||||
+ return sprintf(buf, "0x%04x\n", ffa_dev->vm_id);
|
||||
+}
|
||||
+static DEVICE_ATTR_RO(partition_id);
|
||||
+
|
||||
+static ssize_t uuid_show(struct device *dev, struct device_attribute *attr,
|
||||
+ char *buf)
|
||||
+{
|
||||
+ struct ffa_device *ffa_dev = to_ffa_dev(dev);
|
||||
+
|
||||
+ return sprintf(buf, "%pUb\n", &ffa_dev->uuid);
|
||||
+}
|
||||
+static DEVICE_ATTR_RO(uuid);
|
||||
+
|
||||
+static struct attribute *ffa_device_attributes_attrs[] = {
|
||||
+ &dev_attr_partition_id.attr,
|
||||
+ &dev_attr_uuid.attr,
|
||||
+ NULL,
|
||||
+};
|
||||
+ATTRIBUTE_GROUPS(ffa_device_attributes);
|
||||
+
|
||||
+struct bus_type ffa_bus_type = {
|
||||
+ .name = "arm_ffa",
|
||||
+ .match = ffa_device_match,
|
||||
+ .probe = ffa_device_probe,
|
||||
+ .uevent = ffa_device_uevent,
|
||||
+ .dev_groups = ffa_device_attributes_groups,
|
||||
+};
|
||||
+EXPORT_SYMBOL_GPL(ffa_bus_type);
|
||||
+
|
||||
+int ffa_driver_register(struct ffa_driver *driver, struct module *owner,
|
||||
+ const char *mod_name)
|
||||
+{
|
||||
+ int ret;
|
||||
+
|
||||
+ driver->driver.bus = &ffa_bus_type;
|
||||
+ driver->driver.name = driver->name;
|
||||
+ driver->driver.owner = owner;
|
||||
+ driver->driver.mod_name = mod_name;
|
||||
+
|
||||
+ ret = driver_register(&driver->driver);
|
||||
+ if (!ret)
|
||||
+ pr_debug("registered new ffa driver %s\n", driver->name);
|
||||
+
|
||||
+ return ret;
|
||||
+}
|
||||
+EXPORT_SYMBOL_GPL(ffa_driver_register);
|
||||
+
|
||||
+void ffa_driver_unregister(struct ffa_driver *driver)
|
||||
+{
|
||||
+ driver_unregister(&driver->driver);
|
||||
+}
|
||||
+EXPORT_SYMBOL_GPL(ffa_driver_unregister);
|
||||
+
|
||||
+static void ffa_release_device(struct device *dev)
|
||||
+{
|
||||
+ struct ffa_device *ffa_dev = to_ffa_dev(dev);
|
||||
+
|
||||
+ kfree(ffa_dev);
|
||||
+}
|
||||
+
|
||||
+static int __ffa_devices_unregister(struct device *dev, void *data)
|
||||
+{
|
||||
+ ffa_release_device(dev);
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static void ffa_devices_unregister(void)
|
||||
+{
|
||||
+ bus_for_each_dev(&ffa_bus_type, NULL, NULL,
|
||||
+ __ffa_devices_unregister);
|
||||
+}
|
||||
+
|
||||
+bool ffa_device_is_valid(struct ffa_device *ffa_dev)
|
||||
+{
|
||||
+ bool valid = false;
|
||||
+ struct device *dev = NULL;
|
||||
+ struct ffa_device *tmp_dev;
|
||||
+
|
||||
+ do {
|
||||
+ dev = bus_find_next_device(&ffa_bus_type, dev);
|
||||
+ tmp_dev = to_ffa_dev(dev);
|
||||
+ if (tmp_dev == ffa_dev) {
|
||||
+ valid = true;
|
||||
+ break;
|
||||
+ }
|
||||
+ put_device(dev);
|
||||
+ } while (dev);
|
||||
+
|
||||
+ put_device(dev);
|
||||
+
|
||||
+ return valid;
|
||||
+}
|
||||
+
|
||||
+struct ffa_device *ffa_device_register(const uuid_t *uuid, int vm_id)
|
||||
+{
|
||||
+ int ret;
|
||||
+ struct device *dev;
|
||||
+ struct ffa_device *ffa_dev;
|
||||
+
|
||||
+ ffa_dev = kzalloc(sizeof(*ffa_dev), GFP_KERNEL);
|
||||
+ if (!ffa_dev)
|
||||
+ return NULL;
|
||||
+
|
||||
+ dev = &ffa_dev->dev;
|
||||
+ dev->bus = &ffa_bus_type;
|
||||
+ dev->release = ffa_release_device;
|
||||
+ dev_set_name(&ffa_dev->dev, "arm-ffa-%04x", vm_id);
|
||||
+
|
||||
+ ffa_dev->vm_id = vm_id;
|
||||
+ uuid_copy(&ffa_dev->uuid, uuid);
|
||||
+
|
||||
+ ret = device_register(&ffa_dev->dev);
|
||||
+ if (ret) {
|
||||
+ dev_err(dev, "unable to register device %s err=%d\n",
|
||||
+ dev_name(dev), ret);
|
||||
+ put_device(dev);
|
||||
+ return NULL;
|
||||
+ }
|
||||
+
|
||||
+ return ffa_dev;
|
||||
+}
|
||||
+EXPORT_SYMBOL_GPL(ffa_device_register);
|
||||
+
|
||||
+void ffa_device_unregister(struct ffa_device *ffa_dev)
|
||||
+{
|
||||
+ if (!ffa_dev)
|
||||
+ return;
|
||||
+
|
||||
+ device_unregister(&ffa_dev->dev);
|
||||
+}
|
||||
+EXPORT_SYMBOL_GPL(ffa_device_unregister);
|
||||
+
|
||||
+static int __init arm_ffa_bus_init(void)
|
||||
+{
|
||||
+ return bus_register(&ffa_bus_type);
|
||||
+}
|
||||
+module_init(arm_ffa_bus_init);
|
||||
+
|
||||
+static void __exit arm_ffa_bus_exit(void)
|
||||
+{
|
||||
+ ffa_devices_unregister();
|
||||
+ bus_unregister(&ffa_bus_type);
|
||||
+}
|
||||
+
|
||||
+module_exit(arm_ffa_bus_exit);
|
||||
+
|
||||
+MODULE_ALIAS("arm-ffa-bus");
|
||||
+MODULE_AUTHOR("Sudeep Holla <sudeep.holla@arm.com>");
|
||||
+MODULE_DESCRIPTION("Arm FF-A bus driver");
|
||||
+MODULE_LICENSE("GPL v2");
|
||||
diff --git a/include/linux/arm_ffa.h b/include/linux/arm_ffa.h
|
||||
new file mode 100644
|
||||
index 000000000000..aaff89364541
|
||||
--- /dev/null
|
||||
+++ b/include/linux/arm_ffa.h
|
||||
@@ -0,0 +1,91 @@
|
||||
+/* SPDX-License-Identifier: GPL-2.0-only */
|
||||
+/*
|
||||
+ * Copyright (C) 2020 ARM Ltd.
|
||||
+ */
|
||||
+
|
||||
+#ifndef _LINUX_ARM_FFA_H
|
||||
+#define _LINUX_ARM_FFA_H
|
||||
+
|
||||
+#include <linux/cdev.h>
|
||||
+#include <linux/device.h>
|
||||
+#include <linux/module.h>
|
||||
+#include <linux/types.h>
|
||||
+#include <linux/uuid.h>
|
||||
+
|
||||
+/* FFA Bus/Device/Driver related */
|
||||
+struct ffa_device {
|
||||
+ int vm_id;
|
||||
+ uuid_t uuid;
|
||||
+ struct device dev;
|
||||
+};
|
||||
+
|
||||
+#define to_ffa_dev(d) container_of(d, struct ffa_device, dev)
|
||||
+
|
||||
+struct ffa_device_id {
|
||||
+ uuid_t uuid;
|
||||
+};
|
||||
+
|
||||
+struct ffa_driver {
|
||||
+ const char *name;
|
||||
+ int (*probe)(struct ffa_device *sdev);
|
||||
+ void (*remove)(struct ffa_device *sdev);
|
||||
+ const struct ffa_device_id *id_table;
|
||||
+
|
||||
+ struct device_driver driver;
|
||||
+};
|
||||
+
|
||||
+#define to_ffa_driver(d) container_of(d, struct ffa_driver, driver)
|
||||
+
|
||||
+static inline void ffa_dev_set_drvdata(struct ffa_device *fdev, void *data)
|
||||
+{
|
||||
+ fdev->dev.driver_data = data;
|
||||
+}
|
||||
+
|
||||
+#if IS_REACHABLE(CONFIG_ARM_FFA_TRANSPORT)
|
||||
+struct ffa_device *ffa_device_register(const uuid_t *uuid, int vm_id);
|
||||
+void ffa_device_unregister(struct ffa_device *ffa_dev);
|
||||
+int ffa_driver_register(struct ffa_driver *driver, struct module *owner,
|
||||
+ const char *mod_name);
|
||||
+void ffa_driver_unregister(struct ffa_driver *driver);
|
||||
+bool ffa_device_is_valid(struct ffa_device *ffa_dev);
|
||||
+
|
||||
+#else
|
||||
+static inline
|
||||
+struct ffa_device *ffa_device_register(const uuid_t *uuid, int vm_id)
|
||||
+{
|
||||
+ return NULL;
|
||||
+}
|
||||
+
|
||||
+static inline void ffa_device_unregister(struct ffa_device *dev) {}
|
||||
+
|
||||
+static inline int
|
||||
+ffa_driver_register(struct ffa_driver *driver, struct module *owner,
|
||||
+ const char *mod_name)
|
||||
+{
|
||||
+ return -EINVAL;
|
||||
+}
|
||||
+
|
||||
+static inline void ffa_driver_unregister(struct ffa_driver *driver) {}
|
||||
+
|
||||
+static inline
|
||||
+bool ffa_device_is_valid(struct ffa_device *ffa_dev) { return false; }
|
||||
+
|
||||
+#endif /* CONFIG_ARM_FFA_TRANSPORT */
|
||||
+
|
||||
+#define ffa_register(driver) \
|
||||
+ ffa_driver_register(driver, THIS_MODULE, KBUILD_MODNAME)
|
||||
+#define ffa_unregister(driver) \
|
||||
+ ffa_driver_unregister(driver)
|
||||
+
|
||||
+/**
|
||||
+ * module_ffa_driver() - Helper macro for registering a psa_ffa driver
|
||||
+ * @__ffa_driver: ffa_driver structure
|
||||
+ *
|
||||
+ * Helper macro for psa_ffa drivers to set up proper module init / exit
|
||||
+ * functions. Replaces module_init() and module_exit() and keeps people from
|
||||
+ * printing pointless things to the kernel log when their driver is loaded.
|
||||
+ */
|
||||
+#define module_ffa_driver(__ffa_driver) \
|
||||
+ module_driver(__ffa_driver, ffa_register, ffa_unregister)
|
||||
+
|
||||
+#endif /* _LINUX_ARM_FFA_H */
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,415 @@
|
||||
From 09e109d71c11f6c990d272cf5cc2c5515f184705 Mon Sep 17 00:00:00 2001
|
||||
From: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Date: Fri, 30 Apr 2021 11:24:39 +0100
|
||||
Subject: [PATCH 03/14] firmware: arm_ffa: Add initial Arm FFA driver support
|
||||
|
||||
This just add a basic driver that sets up the transport(e.g. SMCCC),
|
||||
checks the FFA version implemented, get the partition ID for self and
|
||||
sets up the Tx/Rx buffers for communication.
|
||||
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git/commit/?h=v5.10/ffa&id=13201f9a97be567e8c18fec5e357561f41d9b5f6]
|
||||
---
|
||||
drivers/firmware/arm_ffa/Makefile | 3 +-
|
||||
drivers/firmware/arm_ffa/bus.c | 14 +-
|
||||
drivers/firmware/arm_ffa/common.h | 24 +++
|
||||
drivers/firmware/arm_ffa/driver.c | 307 ++++++++++++++++++++++++++++++
|
||||
4 files changed, 337 insertions(+), 11 deletions(-)
|
||||
create mode 100644 drivers/firmware/arm_ffa/common.h
|
||||
create mode 100644 drivers/firmware/arm_ffa/driver.c
|
||||
|
||||
diff --git a/drivers/firmware/arm_ffa/Makefile b/drivers/firmware/arm_ffa/Makefile
|
||||
index bfe4323a8784..82d0d35c5324 100644
|
||||
--- a/drivers/firmware/arm_ffa/Makefile
|
||||
+++ b/drivers/firmware/arm_ffa/Makefile
|
||||
@@ -1,4 +1,5 @@
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
ffa-bus-y = bus.o
|
||||
-ffa-module-objs := $(ffa-bus-y)
|
||||
+ffa-driver-y = driver.o
|
||||
+ffa-module-objs := $(ffa-bus-y) $(ffa-driver-y)
|
||||
obj-$(CONFIG_ARM_FFA_TRANSPORT) = ffa-module.o
|
||||
diff --git a/drivers/firmware/arm_ffa/bus.c b/drivers/firmware/arm_ffa/bus.c
|
||||
index b743fb2256e9..58441266e60d 100644
|
||||
--- a/drivers/firmware/arm_ffa/bus.c
|
||||
+++ b/drivers/firmware/arm_ffa/bus.c
|
||||
@@ -13,6 +13,8 @@
|
||||
#include <linux/slab.h>
|
||||
#include <linux/types.h>
|
||||
|
||||
+#include "common.h"
|
||||
+
|
||||
static int ffa_device_match(struct device *dev, struct device_driver *drv)
|
||||
{
|
||||
const struct ffa_device_id *id_table;
|
||||
@@ -187,21 +189,13 @@ void ffa_device_unregister(struct ffa_device *ffa_dev)
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(ffa_device_unregister);
|
||||
|
||||
-static int __init arm_ffa_bus_init(void)
|
||||
+int __init arm_ffa_bus_init(void)
|
||||
{
|
||||
return bus_register(&ffa_bus_type);
|
||||
}
|
||||
-module_init(arm_ffa_bus_init);
|
||||
|
||||
-static void __exit arm_ffa_bus_exit(void)
|
||||
+void __exit arm_ffa_bus_exit(void)
|
||||
{
|
||||
ffa_devices_unregister();
|
||||
bus_unregister(&ffa_bus_type);
|
||||
}
|
||||
-
|
||||
-module_exit(arm_ffa_bus_exit);
|
||||
-
|
||||
-MODULE_ALIAS("arm-ffa-bus");
|
||||
-MODULE_AUTHOR("Sudeep Holla <sudeep.holla@arm.com>");
|
||||
-MODULE_DESCRIPTION("Arm FF-A bus driver");
|
||||
-MODULE_LICENSE("GPL v2");
|
||||
diff --git a/drivers/firmware/arm_ffa/common.h b/drivers/firmware/arm_ffa/common.h
|
||||
new file mode 100644
|
||||
index 000000000000..9195f66f826c
|
||||
--- /dev/null
|
||||
+++ b/drivers/firmware/arm_ffa/common.h
|
||||
@@ -0,0 +1,24 @@
|
||||
+/* SPDX-License-Identifier: GPL-2.0 */
|
||||
+/*
|
||||
+ * Copyright (C) 2020 ARM Ltd.
|
||||
+ */
|
||||
+
|
||||
+#ifndef _FFA_COMMON_H
|
||||
+#define _FFA_COMMON_H
|
||||
+
|
||||
+#include <linux/arm-smccc.h>
|
||||
+#include <linux/err.h>
|
||||
+
|
||||
+typedef struct arm_smccc_1_2_regs ffa_value_t;
|
||||
+
|
||||
+typedef void (ffa_fn)(ffa_value_t, ffa_value_t *);
|
||||
+
|
||||
+int __init arm_ffa_bus_init(void);
|
||||
+void __exit arm_ffa_bus_exit(void);
|
||||
+
|
||||
+static inline int __init ffa_transport_init(ffa_fn **invoke_ffa_fn)
|
||||
+{
|
||||
+ return -EOPNOTSUPP;
|
||||
+}
|
||||
+
|
||||
+#endif /* _FFA_COMMON_H */
|
||||
diff --git a/drivers/firmware/arm_ffa/driver.c b/drivers/firmware/arm_ffa/driver.c
|
||||
new file mode 100644
|
||||
index 000000000000..d74f03b773d2
|
||||
--- /dev/null
|
||||
+++ b/drivers/firmware/arm_ffa/driver.c
|
||||
@@ -0,0 +1,307 @@
|
||||
+// SPDX-License-Identifier: GPL-2.0-only
|
||||
+/*
|
||||
+ * Arm Firmware Framework for ARMv8-A(FFA) interface driver
|
||||
+ *
|
||||
+ * The Arm FFA specification[1] describes a software architecture to
|
||||
+ * leverages the virtualization extension to isolate software images
|
||||
+ * provided by an ecosystem of vendors from each other and describes
|
||||
+ * interfaces that standardize communication between the various software
|
||||
+ * images including communication between images in the Secure world and
|
||||
+ * Normal world. Any Hypervisor could use the FFA interfaces to enable
|
||||
+ * communication between VMs it manages.
|
||||
+ *
|
||||
+ * The Hypervisor a.k.a Partition managers in FFA terminology can assign
|
||||
+ * system resources(Memory regions, Devices, CPU cycles) to the partitions
|
||||
+ * and manage isolation amongst them.
|
||||
+ *
|
||||
+ * [1] https://developer.arm.com/docs/den0077/latest
|
||||
+ *
|
||||
+ * Copyright (C) 2020 Arm Ltd.
|
||||
+ */
|
||||
+
|
||||
+#define DRIVER_NAME "ARM FF-A"
|
||||
+#define pr_fmt(fmt) DRIVER_NAME ": " fmt
|
||||
+
|
||||
+#include <linux/arm_ffa.h>
|
||||
+#include <linux/bitfield.h>
|
||||
+#include <linux/io.h>
|
||||
+#include <linux/module.h>
|
||||
+#include <linux/slab.h>
|
||||
+
|
||||
+#include "common.h"
|
||||
+
|
||||
+#define FFA_DRIVER_VERSION FFA_VERSION_1_0
|
||||
+
|
||||
+#define FFA_SMC(calling_convention, func_num) \
|
||||
+ ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, (calling_convention), \
|
||||
+ ARM_SMCCC_OWNER_STANDARD, (func_num))
|
||||
+
|
||||
+#define FFA_SMC_32(func_num) FFA_SMC(ARM_SMCCC_SMC_32, (func_num))
|
||||
+#define FFA_SMC_64(func_num) FFA_SMC(ARM_SMCCC_SMC_64, (func_num))
|
||||
+
|
||||
+#define FFA_ERROR FFA_SMC_32(0x60)
|
||||
+#define FFA_SUCCESS FFA_SMC_32(0x61)
|
||||
+#define FFA_INTERRUPT FFA_SMC_32(0x62)
|
||||
+#define FFA_VERSION FFA_SMC_32(0x63)
|
||||
+#define FFA_FEATURES FFA_SMC_32(0x64)
|
||||
+#define FFA_RX_RELEASE FFA_SMC_32(0x65)
|
||||
+#define FFA_RXTX_MAP FFA_SMC_32(0x66)
|
||||
+#define FFA_FN64_RXTX_MAP FFA_SMC_64(0x66)
|
||||
+#define FFA_RXTX_UNMAP FFA_SMC_32(0x67)
|
||||
+#define FFA_PARTITION_INFO_GET FFA_SMC_32(0x68)
|
||||
+#define FFA_ID_GET FFA_SMC_32(0x69)
|
||||
+#define FFA_MSG_POLL FFA_SMC_32(0x6A)
|
||||
+#define FFA_MSG_WAIT FFA_SMC_32(0x6B)
|
||||
+#define FFA_YIELD FFA_SMC_32(0x6C)
|
||||
+#define FFA_RUN FFA_SMC_32(0x6D)
|
||||
+#define FFA_MSG_SEND FFA_SMC_32(0x6E)
|
||||
+#define FFA_MSG_SEND_DIRECT_REQ FFA_SMC_32(0x6F)
|
||||
+#define FFA_FN64_MSG_SEND_DIRECT_REQ FFA_SMC_64(0x6F)
|
||||
+#define FFA_MSG_SEND_DIRECT_RESP FFA_SMC_32(0x70)
|
||||
+#define FFA_FN64_MSG_SEND_DIRECT_RESP FFA_SMC_64(0x70)
|
||||
+#define FFA_MEM_DONATE FFA_SMC_32(0x71)
|
||||
+#define FFA_FN64_MEM_DONATE FFA_SMC_64(0x71)
|
||||
+#define FFA_MEM_LEND FFA_SMC_32(0x72)
|
||||
+#define FFA_FN64_MEM_LEND FFA_SMC_64(0x72)
|
||||
+#define FFA_MEM_SHARE FFA_SMC_32(0x73)
|
||||
+#define FFA_FN64_MEM_SHARE FFA_SMC_64(0x73)
|
||||
+#define FFA_MEM_RETRIEVE_REQ FFA_SMC_32(0x74)
|
||||
+#define FFA_FN64_MEM_RETRIEVE_REQ FFA_SMC_64(0x74)
|
||||
+#define FFA_MEM_RETRIEVE_RESP FFA_SMC_32(0x75)
|
||||
+#define FFA_MEM_RELINQUISH FFA_SMC_32(0x76)
|
||||
+#define FFA_MEM_RECLAIM FFA_SMC_32(0x77)
|
||||
+#define FFA_MEM_OP_PAUSE FFA_SMC_32(0x78)
|
||||
+#define FFA_MEM_OP_RESUME FFA_SMC_32(0x79)
|
||||
+#define FFA_MEM_FRAG_RX FFA_SMC_32(0x7A)
|
||||
+#define FFA_MEM_FRAG_TX FFA_SMC_32(0x7B)
|
||||
+#define FFA_NORMAL_WORLD_RESUME FFA_SMC_32(0x7C)
|
||||
+
|
||||
+/*
|
||||
+ * For some calls it is necessary to use SMC64 to pass or return 64-bit values.
|
||||
+ * For such calls FFA_FN_NATIVE(name) will choose the appropriate
|
||||
+ * (native-width) function ID.
|
||||
+ */
|
||||
+#ifdef CONFIG_64BIT
|
||||
+#define FFA_FN_NATIVE(name) FFA_FN64_##name
|
||||
+#else
|
||||
+#define FFA_FN_NATIVE(name) FFA_##name
|
||||
+#endif
|
||||
+
|
||||
+/* FFA error codes. */
|
||||
+#define FFA_RET_SUCCESS (0)
|
||||
+#define FFA_RET_NOT_SUPPORTED (-1)
|
||||
+#define FFA_RET_INVALID_PARAMETERS (-2)
|
||||
+#define FFA_RET_NO_MEMORY (-3)
|
||||
+#define FFA_RET_BUSY (-4)
|
||||
+#define FFA_RET_INTERRUPTED (-5)
|
||||
+#define FFA_RET_DENIED (-6)
|
||||
+#define FFA_RET_RETRY (-7)
|
||||
+#define FFA_RET_ABORTED (-8)
|
||||
+
|
||||
+#define MAJOR_VERSION_MASK GENMASK(30, 16)
|
||||
+#define MINOR_VERSION_MASK GENMASK(15, 0)
|
||||
+#define MAJOR_VERSION(x) ((u16)(FIELD_GET(MAJOR_VERSION_MASK, (x))))
|
||||
+#define MINOR_VERSION(x) ((u16)(FIELD_GET(MINOR_VERSION_MASK, (x))))
|
||||
+#define PACK_VERSION_INFO(major, minor) \
|
||||
+ (FIELD_PREP(MAJOR_VERSION_MASK, (major)) | \
|
||||
+ FIELD_PREP(MINOR_VERSION_MASK, (minor)))
|
||||
+#define FFA_VERSION_1_0 PACK_VERSION_INFO(1, 0)
|
||||
+#define FFA_MIN_VERSION FFA_VERSION_1_0
|
||||
+
|
||||
+#define SENDER_ID_MASK GENMASK(31, 16)
|
||||
+#define RECEIVER_ID_MASK GENMASK(15, 0)
|
||||
+#define SENDER_ID(x) ((u16)(FIELD_GET(SENDER_ID_MASK, (x))))
|
||||
+#define RECEIVER_ID(x) ((u16)(FIELD_GET(RECEIVER_ID_MASK, (x))))
|
||||
+#define PACK_TARGET_INFO(s, r) \
|
||||
+ (FIELD_PREP(SENDER_ID_MASK, (s)) | FIELD_PREP(RECEIVER_ID_MASK, (r)))
|
||||
+
|
||||
+/**
|
||||
+ * FF-A specification mentions explicitly about '4K pages'. This should
|
||||
+ * not be confused with the kernel PAGE_SIZE, which is the translation
|
||||
+ * granule kernel is configured and may be one among 4K, 16K and 64K.
|
||||
+ */
|
||||
+#define FFA_PAGE_SIZE SZ_4K
|
||||
+/*
|
||||
+ * Keeping RX TX buffer size as 4K for now
|
||||
+ * 64K may be preferred to keep it min a page in 64K PAGE_SIZE config
|
||||
+ */
|
||||
+#define RXTX_BUFFER_SIZE SZ_4K
|
||||
+
|
||||
+static ffa_fn *invoke_ffa_fn;
|
||||
+
|
||||
+static const int ffa_linux_errmap[] = {
|
||||
+ /* better than switch case as long as return value is continuous */
|
||||
+ 0, /* FFA_RET_SUCCESS */
|
||||
+ -EOPNOTSUPP, /* FFA_RET_NOT_SUPPORTED */
|
||||
+ -EINVAL, /* FFA_RET_INVALID_PARAMETERS */
|
||||
+ -ENOMEM, /* FFA_RET_NO_MEMORY */
|
||||
+ -EBUSY, /* FFA_RET_BUSY */
|
||||
+ -EINTR, /* FFA_RET_INTERRUPTED */
|
||||
+ -EACCES, /* FFA_RET_DENIED */
|
||||
+ -EAGAIN, /* FFA_RET_RETRY */
|
||||
+ -ECANCELED, /* FFA_RET_ABORTED */
|
||||
+};
|
||||
+
|
||||
+static inline int ffa_to_linux_errno(int errno)
|
||||
+{
|
||||
+ if (errno < FFA_RET_SUCCESS && errno >= -ARRAY_SIZE(ffa_linux_errmap))
|
||||
+ return ffa_linux_errmap[-errno];
|
||||
+ return -EINVAL;
|
||||
+}
|
||||
+
|
||||
+struct ffa_drv_info {
|
||||
+ u32 version;
|
||||
+ u16 vm_id;
|
||||
+ struct mutex rx_lock; /* lock to protect Rx buffer */
|
||||
+ struct mutex tx_lock; /* lock to protect Tx buffer */
|
||||
+ void *rx_buffer;
|
||||
+ void *tx_buffer;
|
||||
+};
|
||||
+
|
||||
+static struct ffa_drv_info *drv_info;
|
||||
+
|
||||
+static int ffa_version_check(u32 *version)
|
||||
+{
|
||||
+ ffa_value_t ver;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_VERSION, .a1 = FFA_DRIVER_VERSION,
|
||||
+ }, &ver);
|
||||
+
|
||||
+ if (ver.a0 == FFA_RET_NOT_SUPPORTED) {
|
||||
+ pr_info("FFA_VERSION returned not supported\n");
|
||||
+ return -EOPNOTSUPP;
|
||||
+ }
|
||||
+
|
||||
+ if (ver.a0 < FFA_MIN_VERSION || ver.a0 > FFA_DRIVER_VERSION) {
|
||||
+ pr_err("Incompatible version %d.%d found\n",
|
||||
+ MAJOR_VERSION(ver.a0), MINOR_VERSION(ver.a0));
|
||||
+ return -EINVAL;
|
||||
+ }
|
||||
+
|
||||
+ *version = ver.a0;
|
||||
+ pr_info("Version %d.%d found\n", MAJOR_VERSION(ver.a0),
|
||||
+ MINOR_VERSION(ver.a0));
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static int ffa_rxtx_map(phys_addr_t tx_buf, phys_addr_t rx_buf, u32 pg_cnt)
|
||||
+{
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_FN_NATIVE(RXTX_MAP),
|
||||
+ .a1 = tx_buf, .a2 = rx_buf, .a3 = pg_cnt,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static int ffa_rxtx_unmap(u16 vm_id)
|
||||
+{
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_RXTX_UNMAP, .a1 = PACK_TARGET_INFO(vm_id, 0),
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+#define VM_ID_MASK GENMASK(15, 0)
|
||||
+static int ffa_id_get(u16 *vm_id)
|
||||
+{
|
||||
+ ffa_value_t id;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_ID_GET,
|
||||
+ }, &id);
|
||||
+
|
||||
+ if (id.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)id.a2);
|
||||
+
|
||||
+ *vm_id = FIELD_GET(VM_ID_MASK, (id.a2));
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static int __init ffa_init(void)
|
||||
+{
|
||||
+ int ret;
|
||||
+
|
||||
+ ret = arm_ffa_bus_init();
|
||||
+ if (ret)
|
||||
+ return ret;
|
||||
+
|
||||
+ ret = ffa_transport_init(&invoke_ffa_fn);
|
||||
+ if (ret)
|
||||
+ return ret;
|
||||
+
|
||||
+ drv_info = kzalloc(sizeof(*drv_info), GFP_KERNEL);
|
||||
+ if (!drv_info)
|
||||
+ return -ENOMEM;
|
||||
+
|
||||
+ ret = ffa_version_check(&drv_info->version);
|
||||
+ if (ret)
|
||||
+ goto free_drv_info;
|
||||
+
|
||||
+ if (ffa_id_get(&drv_info->vm_id)) {
|
||||
+ pr_err("failed to obtain VM id for self\n");
|
||||
+ ret = -ENODEV;
|
||||
+ goto free_drv_info;
|
||||
+ }
|
||||
+
|
||||
+ drv_info->rx_buffer = alloc_pages_exact(RXTX_BUFFER_SIZE, GFP_KERNEL);
|
||||
+ if (!drv_info->rx_buffer) {
|
||||
+ ret = -ENOMEM;
|
||||
+ goto free_pages;
|
||||
+ }
|
||||
+
|
||||
+ drv_info->tx_buffer = alloc_pages_exact(RXTX_BUFFER_SIZE, GFP_KERNEL);
|
||||
+ if (!drv_info->tx_buffer) {
|
||||
+ ret = -ENOMEM;
|
||||
+ goto free_pages;
|
||||
+ }
|
||||
+
|
||||
+ ret = ffa_rxtx_map(virt_to_phys(drv_info->tx_buffer),
|
||||
+ virt_to_phys(drv_info->rx_buffer),
|
||||
+ RXTX_BUFFER_SIZE / FFA_PAGE_SIZE);
|
||||
+ if (ret) {
|
||||
+ pr_err("failed to register FFA RxTx buffers\n");
|
||||
+ goto free_pages;
|
||||
+ }
|
||||
+
|
||||
+ mutex_init(&drv_info->rx_lock);
|
||||
+ mutex_init(&drv_info->tx_lock);
|
||||
+
|
||||
+ return 0;
|
||||
+free_pages:
|
||||
+ if (drv_info->tx_buffer)
|
||||
+ free_pages_exact(drv_info->tx_buffer, RXTX_BUFFER_SIZE);
|
||||
+ free_pages_exact(drv_info->rx_buffer, RXTX_BUFFER_SIZE);
|
||||
+free_drv_info:
|
||||
+ kfree(drv_info);
|
||||
+ return ret;
|
||||
+}
|
||||
+module_init(ffa_init);
|
||||
+
|
||||
+static void __exit ffa_exit(void)
|
||||
+{
|
||||
+ ffa_rxtx_unmap(drv_info->vm_id);
|
||||
+ free_pages_exact(drv_info->tx_buffer, RXTX_BUFFER_SIZE);
|
||||
+ free_pages_exact(drv_info->rx_buffer, RXTX_BUFFER_SIZE);
|
||||
+ kfree(drv_info);
|
||||
+ arm_ffa_bus_exit();
|
||||
+}
|
||||
+module_exit(ffa_exit);
|
||||
+
|
||||
+MODULE_ALIAS("arm-ffa");
|
||||
+MODULE_AUTHOR("Sudeep Holla <sudeep.holla@arm.com>");
|
||||
+MODULE_DESCRIPTION("Arm FF-A interface driver");
|
||||
+MODULE_LICENSE("GPL v2");
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,115 @@
|
||||
From a4e518ab87ffdff5bbfa629334dff4a37524e579 Mon Sep 17 00:00:00 2001
|
||||
From: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Date: Fri, 30 Apr 2021 11:24:43 +0100
|
||||
Subject: [PATCH 04/14] firmware: arm_ffa: Add support for SMCCC as transport
|
||||
to FFA driver
|
||||
|
||||
There are requests to keep the transport separate in order to allow
|
||||
other possible transports like virtio. So let us keep the SMCCC transport
|
||||
specific routines abstracted.
|
||||
|
||||
It is kept simple for now. Once we add another transport, we can develop
|
||||
better abstraction.
|
||||
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git/commit/?h=v5.10/ffa&id=ba0c60e85cb3773a9e172425bd14d76cf9d6e67b]
|
||||
---
|
||||
drivers/firmware/arm_ffa/Kconfig | 5 ++++
|
||||
drivers/firmware/arm_ffa/Makefile | 3 ++-
|
||||
drivers/firmware/arm_ffa/common.h | 4 ++++
|
||||
drivers/firmware/arm_ffa/smccc.c | 39 +++++++++++++++++++++++++++++++
|
||||
4 files changed, 50 insertions(+), 1 deletion(-)
|
||||
create mode 100644 drivers/firmware/arm_ffa/smccc.c
|
||||
|
||||
diff --git a/drivers/firmware/arm_ffa/Kconfig b/drivers/firmware/arm_ffa/Kconfig
|
||||
index 261a3660650a..5e3ae5cf82e8 100644
|
||||
--- a/drivers/firmware/arm_ffa/Kconfig
|
||||
+++ b/drivers/firmware/arm_ffa/Kconfig
|
||||
@@ -14,3 +14,8 @@ config ARM_FFA_TRANSPORT
|
||||
|
||||
This driver provides interface for all the client drivers making
|
||||
use of the features offered by ARM FF-A.
|
||||
+
|
||||
+config ARM_FFA_SMCCC
|
||||
+ bool
|
||||
+ default ARM_FFA_TRANSPORT
|
||||
+ depends on ARM64 && HAVE_ARM_SMCCC_DISCOVERY
|
||||
diff --git a/drivers/firmware/arm_ffa/Makefile b/drivers/firmware/arm_ffa/Makefile
|
||||
index 82d0d35c5324..9d9f37523200 100644
|
||||
--- a/drivers/firmware/arm_ffa/Makefile
|
||||
+++ b/drivers/firmware/arm_ffa/Makefile
|
||||
@@ -1,5 +1,6 @@
|
||||
# SPDX-License-Identifier: GPL-2.0-only
|
||||
ffa-bus-y = bus.o
|
||||
ffa-driver-y = driver.o
|
||||
-ffa-module-objs := $(ffa-bus-y) $(ffa-driver-y)
|
||||
+ffa-transport-$(CONFIG_ARM_FFA_SMCCC) += smccc.o
|
||||
+ffa-module-objs := $(ffa-bus-y) $(ffa-driver-y) $(ffa-transport-y)
|
||||
obj-$(CONFIG_ARM_FFA_TRANSPORT) = ffa-module.o
|
||||
diff --git a/drivers/firmware/arm_ffa/common.h b/drivers/firmware/arm_ffa/common.h
|
||||
index 9195f66f826c..842451666827 100644
|
||||
--- a/drivers/firmware/arm_ffa/common.h
|
||||
+++ b/drivers/firmware/arm_ffa/common.h
|
||||
@@ -16,9 +16,13 @@ typedef void (ffa_fn)(ffa_value_t, ffa_value_t *);
|
||||
int __init arm_ffa_bus_init(void);
|
||||
void __exit arm_ffa_bus_exit(void);
|
||||
|
||||
+#ifdef CONFIG_ARM_FFA_SMCCC
|
||||
+int __init ffa_transport_init(ffa_fn **invoke_ffa_fn);
|
||||
+#else
|
||||
static inline int __init ffa_transport_init(ffa_fn **invoke_ffa_fn)
|
||||
{
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
+#endif
|
||||
|
||||
#endif /* _FFA_COMMON_H */
|
||||
diff --git a/drivers/firmware/arm_ffa/smccc.c b/drivers/firmware/arm_ffa/smccc.c
|
||||
new file mode 100644
|
||||
index 000000000000..22c34b788769
|
||||
--- /dev/null
|
||||
+++ b/drivers/firmware/arm_ffa/smccc.c
|
||||
@@ -0,0 +1,39 @@
|
||||
+// SPDX-License-Identifier: GPL-2.0-only
|
||||
+/*
|
||||
+ * Copyright (C) 2020 ARM Ltd.
|
||||
+ */
|
||||
+
|
||||
+#include <linux/printk.h>
|
||||
+
|
||||
+#include "common.h"
|
||||
+
|
||||
+static void __arm_ffa_fn_smc(ffa_value_t args, ffa_value_t *res)
|
||||
+{
|
||||
+ arm_smccc_1_2_smc(&args, res);
|
||||
+}
|
||||
+
|
||||
+static void __arm_ffa_fn_hvc(ffa_value_t args, ffa_value_t *res)
|
||||
+{
|
||||
+ arm_smccc_1_2_hvc(&args, res);
|
||||
+}
|
||||
+
|
||||
+int __init ffa_transport_init(ffa_fn **invoke_ffa_fn)
|
||||
+{
|
||||
+ enum arm_smccc_conduit conduit;
|
||||
+
|
||||
+ if (arm_smccc_get_version() < ARM_SMCCC_VERSION_1_2)
|
||||
+ return -EOPNOTSUPP;
|
||||
+
|
||||
+ conduit = arm_smccc_1_1_get_conduit();
|
||||
+ if (conduit == SMCCC_CONDUIT_NONE) {
|
||||
+ pr_err("%s: invalid SMCCC conduit\n", __func__);
|
||||
+ return -EOPNOTSUPP;
|
||||
+ }
|
||||
+
|
||||
+ if (conduit == SMCCC_CONDUIT_SMC)
|
||||
+ *invoke_ffa_fn = __arm_ffa_fn_smc;
|
||||
+ else
|
||||
+ *invoke_ffa_fn = __arm_ffa_fn_hvc;
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,398 @@
|
||||
From 4eff52bdae3113edf0256bfd1e986866f7282365 Mon Sep 17 00:00:00 2001
|
||||
From: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Date: Fri, 30 Apr 2021 11:24:48 +0100
|
||||
Subject: [PATCH 05/14] firmware: arm_ffa: Setup in-kernel users of FFA
|
||||
partitions
|
||||
|
||||
Parse the FFA nodes from the device-tree and register all the partitions
|
||||
whose services will be used in the kernel.
|
||||
|
||||
In order to also enable in-kernel users of FFA interface, let us add
|
||||
simple set of operations for such devices.
|
||||
|
||||
The in-kernel users are registered without the character device interface.
|
||||
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git/commit/?h=v5.10/ffa&id=f9a344783c03e17cf58f9846e5f689cd5233a844]
|
||||
---
|
||||
drivers/firmware/arm_ffa/bus.c | 9 ++
|
||||
drivers/firmware/arm_ffa/common.h | 3 +
|
||||
drivers/firmware/arm_ffa/driver.c | 213 ++++++++++++++++++++++++++++++
|
||||
include/linux/arm_ffa.h | 38 +++++-
|
||||
4 files changed, 262 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/drivers/firmware/arm_ffa/bus.c b/drivers/firmware/arm_ffa/bus.c
|
||||
index 58441266e60d..da23100c2e39 100644
|
||||
--- a/drivers/firmware/arm_ffa/bus.c
|
||||
+++ b/drivers/firmware/arm_ffa/bus.c
|
||||
@@ -24,6 +24,15 @@ static int ffa_device_match(struct device *dev, struct device_driver *drv)
|
||||
ffa_dev = to_ffa_dev(dev);
|
||||
|
||||
while (!uuid_is_null(&id_table->uuid)) {
|
||||
+ /*
|
||||
+ * FF-A v1.0 doesn't provide discovery of UUIDs, just the
|
||||
+ * partition IDs, so fetch the partitions IDs for this
|
||||
+ * id_table UUID and assign the UUID to the device if the
|
||||
+ * partition ID matches
|
||||
+ */
|
||||
+ if (uuid_is_null(&ffa_dev->uuid))
|
||||
+ ffa_device_match_uuid(ffa_dev, &id_table->uuid);
|
||||
+
|
||||
if (uuid_equal(&ffa_dev->uuid, &id_table->uuid))
|
||||
return 1;
|
||||
id_table++;
|
||||
diff --git a/drivers/firmware/arm_ffa/common.h b/drivers/firmware/arm_ffa/common.h
|
||||
index 842451666827..80ad71f02235 100644
|
||||
--- a/drivers/firmware/arm_ffa/common.h
|
||||
+++ b/drivers/firmware/arm_ffa/common.h
|
||||
@@ -6,6 +6,7 @@
|
||||
#ifndef _FFA_COMMON_H
|
||||
#define _FFA_COMMON_H
|
||||
|
||||
+#include <linux/arm_ffa.h>
|
||||
#include <linux/arm-smccc.h>
|
||||
#include <linux/err.h>
|
||||
|
||||
@@ -15,6 +16,8 @@ typedef void (ffa_fn)(ffa_value_t, ffa_value_t *);
|
||||
|
||||
int __init arm_ffa_bus_init(void);
|
||||
void __exit arm_ffa_bus_exit(void);
|
||||
+bool ffa_device_is_valid(struct ffa_device *ffa_dev);
|
||||
+void ffa_device_match_uuid(struct ffa_device *ffa_dev, const uuid_t *uuid);
|
||||
|
||||
#ifdef CONFIG_ARM_FFA_SMCCC
|
||||
int __init ffa_transport_init(ffa_fn **invoke_ffa_fn);
|
||||
diff --git a/drivers/firmware/arm_ffa/driver.c b/drivers/firmware/arm_ffa/driver.c
|
||||
index d74f03b773d2..cefbb3edf142 100644
|
||||
--- a/drivers/firmware/arm_ffa/driver.c
|
||||
+++ b/drivers/firmware/arm_ffa/driver.c
|
||||
@@ -24,9 +24,12 @@
|
||||
|
||||
#include <linux/arm_ffa.h>
|
||||
#include <linux/bitfield.h>
|
||||
+#include <linux/device.h>
|
||||
#include <linux/io.h>
|
||||
+#include <linux/kernel.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/slab.h>
|
||||
+#include <linux/uuid.h>
|
||||
|
||||
#include "common.h"
|
||||
|
||||
@@ -185,6 +188,22 @@ static int ffa_version_check(u32 *version)
|
||||
return 0;
|
||||
}
|
||||
|
||||
+static int ffa_rx_release(void)
|
||||
+{
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_RX_RELEASE,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ /* check for ret.a0 == FFA_RX_RELEASE ? */
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
static int ffa_rxtx_map(phys_addr_t tx_buf, phys_addr_t rx_buf, u32 pg_cnt)
|
||||
{
|
||||
ffa_value_t ret;
|
||||
@@ -214,6 +233,64 @@ static int ffa_rxtx_unmap(u16 vm_id)
|
||||
return 0;
|
||||
}
|
||||
|
||||
+/* buffer must be sizeof(struct ffa_partition_info) * num_partitions */
|
||||
+static int
|
||||
+__ffa_partition_info_get(u32 uuid0, u32 uuid1, u32 uuid2, u32 uuid3,
|
||||
+ struct ffa_partition_info *buffer, int num_partitions)
|
||||
+{
|
||||
+ int count;
|
||||
+ ffa_value_t partition_info;
|
||||
+
|
||||
+ mutex_lock(&drv_info->rx_lock);
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_PARTITION_INFO_GET,
|
||||
+ .a1 = uuid0, .a2 = uuid1, .a3 = uuid2, .a4 = uuid3,
|
||||
+ }, &partition_info);
|
||||
+
|
||||
+ if (partition_info.a0 == FFA_ERROR) {
|
||||
+ mutex_unlock(&drv_info->rx_lock);
|
||||
+ return ffa_to_linux_errno((int)partition_info.a2);
|
||||
+ }
|
||||
+
|
||||
+ count = partition_info.a2;
|
||||
+
|
||||
+ if (buffer && count <= num_partitions)
|
||||
+ memcpy(buffer, drv_info->rx_buffer, sizeof(*buffer) * count);
|
||||
+
|
||||
+ ffa_rx_release();
|
||||
+
|
||||
+ mutex_unlock(&drv_info->rx_lock);
|
||||
+
|
||||
+ return count;
|
||||
+}
|
||||
+
|
||||
+/* buffer is allocated and caller must free the same if returned count > 0 */
|
||||
+static int
|
||||
+ffa_partition_probe(const uuid_t *uuid, struct ffa_partition_info **buffer)
|
||||
+{
|
||||
+ int count;
|
||||
+ u32 uuid0_4[4];
|
||||
+ struct ffa_partition_info *pbuf;
|
||||
+
|
||||
+ export_uuid((u8 *)uuid0_4, uuid);
|
||||
+ count = __ffa_partition_info_get(uuid0_4[0], uuid0_4[1], uuid0_4[2],
|
||||
+ uuid0_4[3], NULL, 0);
|
||||
+ if (count <= 0)
|
||||
+ return count;
|
||||
+
|
||||
+ pbuf = kcalloc(count, sizeof(*pbuf), GFP_KERNEL);
|
||||
+ if (!pbuf)
|
||||
+ return -ENOMEM;
|
||||
+
|
||||
+ count = __ffa_partition_info_get(uuid0_4[0], uuid0_4[1], uuid0_4[2],
|
||||
+ uuid0_4[3], pbuf, count);
|
||||
+ if (count <= 0)
|
||||
+ kfree(pbuf);
|
||||
+
|
||||
+ *buffer = pbuf;
|
||||
+ return count;
|
||||
+}
|
||||
+
|
||||
#define VM_ID_MASK GENMASK(15, 0)
|
||||
static int ffa_id_get(u16 *vm_id)
|
||||
{
|
||||
@@ -231,6 +308,140 @@ static int ffa_id_get(u16 *vm_id)
|
||||
return 0;
|
||||
}
|
||||
|
||||
+static int ffa_msg_send_direct_req(u16 src_id, u16 dst_id, bool mode_32bit,
|
||||
+ struct ffa_send_direct_data *data)
|
||||
+{
|
||||
+ u32 req_id, resp_id, src_dst_ids = PACK_TARGET_INFO(src_id, dst_id);
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ if (mode_32bit) {
|
||||
+ req_id = FFA_MSG_SEND_DIRECT_REQ;
|
||||
+ resp_id = FFA_MSG_SEND_DIRECT_RESP;
|
||||
+ } else {
|
||||
+ req_id = FFA_FN_NATIVE(MSG_SEND_DIRECT_REQ);
|
||||
+ resp_id = FFA_FN_NATIVE(MSG_SEND_DIRECT_RESP);
|
||||
+ }
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = req_id, .a1 = src_dst_ids, .a2 = 0,
|
||||
+ .a3 = data->data0, .a4 = data->data1, .a5 = data->data2,
|
||||
+ .a6 = data->data3, .a7 = data->data4,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ while (ret.a0 == FFA_INTERRUPT)
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_RUN, .a1 = ret.a1,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ if (ret.a0 == resp_id) {
|
||||
+ data->data0 = ret.a3;
|
||||
+ data->data1 = ret.a4;
|
||||
+ data->data2 = ret.a5;
|
||||
+ data->data3 = ret.a6;
|
||||
+ data->data4 = ret.a7;
|
||||
+ return 0;
|
||||
+ }
|
||||
+
|
||||
+ return -EINVAL;
|
||||
+}
|
||||
+
|
||||
+static u32 ffa_api_version_get(void)
|
||||
+{
|
||||
+ return drv_info->version;
|
||||
+}
|
||||
+
|
||||
+static int ffa_partition_info_get(const char *uuid_str,
|
||||
+ struct ffa_partition_info *buffer)
|
||||
+{
|
||||
+ int count;
|
||||
+ uuid_t uuid;
|
||||
+ struct ffa_partition_info *pbuf;
|
||||
+
|
||||
+ if (uuid_parse(uuid_str, &uuid)) {
|
||||
+ pr_err("invalid uuid (%s)\n", uuid_str);
|
||||
+ return -ENODEV;
|
||||
+ }
|
||||
+
|
||||
+ count = ffa_partition_probe(&uuid_null, &pbuf);
|
||||
+ if (count <= 0)
|
||||
+ return -ENOENT;
|
||||
+
|
||||
+ memcpy(buffer, pbuf, sizeof(*pbuf) * count);
|
||||
+ kfree(pbuf);
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static void ffa_mode_32bit_set(struct ffa_device *dev)
|
||||
+{
|
||||
+ dev->mode_32bit = true;
|
||||
+}
|
||||
+
|
||||
+static int ffa_sync_send_receive(struct ffa_device *dev,
|
||||
+ struct ffa_send_direct_data *data)
|
||||
+{
|
||||
+ return ffa_msg_send_direct_req(drv_info->vm_id, dev->vm_id,
|
||||
+ dev->mode_32bit, data);
|
||||
+}
|
||||
+
|
||||
+static const struct ffa_dev_ops ffa_ops = {
|
||||
+ .api_version_get = ffa_api_version_get,
|
||||
+ .partition_info_get = ffa_partition_info_get,
|
||||
+ .mode_32bit_set = ffa_mode_32bit_set,
|
||||
+ .sync_send_receive = ffa_sync_send_receive,
|
||||
+};
|
||||
+
|
||||
+const struct ffa_dev_ops *ffa_dev_ops_get(struct ffa_device *dev)
|
||||
+{
|
||||
+ if (ffa_device_is_valid(dev))
|
||||
+ return &ffa_ops;
|
||||
+
|
||||
+ return NULL;
|
||||
+}
|
||||
+EXPORT_SYMBOL_GPL(ffa_dev_ops_get);
|
||||
+
|
||||
+void ffa_device_match_uuid(struct ffa_device *ffa_dev, const uuid_t *uuid)
|
||||
+{
|
||||
+ int count, idx;
|
||||
+ struct ffa_partition_info *pbuf, *tpbuf;
|
||||
+
|
||||
+ count = ffa_partition_probe(uuid, &pbuf);
|
||||
+ if (count <= 0)
|
||||
+ return;
|
||||
+
|
||||
+ for (idx = 0, tpbuf = pbuf; idx < count; idx++, tpbuf++)
|
||||
+ if (tpbuf->id == ffa_dev->vm_id)
|
||||
+ uuid_copy(&ffa_dev->uuid, uuid);
|
||||
+ kfree(pbuf);
|
||||
+}
|
||||
+
|
||||
+static void ffa_setup_partitions(void)
|
||||
+{
|
||||
+ int count, idx;
|
||||
+ struct ffa_device *ffa_dev;
|
||||
+ struct ffa_partition_info *pbuf, *tpbuf;
|
||||
+
|
||||
+ count = ffa_partition_probe(&uuid_null, &pbuf);
|
||||
+ if (count <= 0) {
|
||||
+ pr_info("%s: No partitions found, error %d\n", __func__, count);
|
||||
+ return;
|
||||
+ }
|
||||
+
|
||||
+ for (idx = 0, tpbuf = pbuf; idx < count; idx++, tpbuf++) {
|
||||
+ ffa_dev = ffa_device_register(&uuid_null, tpbuf->id);
|
||||
+ if (!ffa_dev) {
|
||||
+ pr_err("%s: failed to register partition ID 0x%x\n",
|
||||
+ __func__, tpbuf->id);
|
||||
+ continue;
|
||||
+ }
|
||||
+
|
||||
+ ffa_dev_set_drvdata(ffa_dev, drv_info);
|
||||
+ }
|
||||
+ kfree(pbuf);
|
||||
+}
|
||||
+
|
||||
static int __init ffa_init(void)
|
||||
{
|
||||
int ret;
|
||||
@@ -280,6 +491,8 @@ static int __init ffa_init(void)
|
||||
mutex_init(&drv_info->rx_lock);
|
||||
mutex_init(&drv_info->tx_lock);
|
||||
|
||||
+ ffa_setup_partitions();
|
||||
+
|
||||
return 0;
|
||||
free_pages:
|
||||
if (drv_info->tx_buffer)
|
||||
diff --git a/include/linux/arm_ffa.h b/include/linux/arm_ffa.h
|
||||
index aaff89364541..b242fbbce4f0 100644
|
||||
--- a/include/linux/arm_ffa.h
|
||||
+++ b/include/linux/arm_ffa.h
|
||||
@@ -6,7 +6,6 @@
|
||||
#ifndef _LINUX_ARM_FFA_H
|
||||
#define _LINUX_ARM_FFA_H
|
||||
|
||||
-#include <linux/cdev.h>
|
||||
#include <linux/device.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/types.h>
|
||||
@@ -15,6 +14,7 @@
|
||||
/* FFA Bus/Device/Driver related */
|
||||
struct ffa_device {
|
||||
int vm_id;
|
||||
+ bool mode_32bit;
|
||||
uuid_t uuid;
|
||||
struct device dev;
|
||||
};
|
||||
@@ -48,6 +48,7 @@ int ffa_driver_register(struct ffa_driver *driver, struct module *owner,
|
||||
const char *mod_name);
|
||||
void ffa_driver_unregister(struct ffa_driver *driver);
|
||||
bool ffa_device_is_valid(struct ffa_device *ffa_dev);
|
||||
+const struct ffa_dev_ops *ffa_dev_ops_get(struct ffa_device *dev);
|
||||
|
||||
#else
|
||||
static inline
|
||||
@@ -70,6 +71,10 @@ static inline void ffa_driver_unregister(struct ffa_driver *driver) {}
|
||||
static inline
|
||||
bool ffa_device_is_valid(struct ffa_device *ffa_dev) { return false; }
|
||||
|
||||
+const struct ffa_dev_ops *ffa_dev_ops_get(struct ffa_device *dev)
|
||||
+{
|
||||
+ return NULL;
|
||||
+}
|
||||
#endif /* CONFIG_ARM_FFA_TRANSPORT */
|
||||
|
||||
#define ffa_register(driver) \
|
||||
@@ -88,4 +93,35 @@ bool ffa_device_is_valid(struct ffa_device *ffa_dev) { return false; }
|
||||
#define module_ffa_driver(__ffa_driver) \
|
||||
module_driver(__ffa_driver, ffa_register, ffa_unregister)
|
||||
|
||||
+/* FFA transport related */
|
||||
+struct ffa_partition_info {
|
||||
+ u16 id;
|
||||
+ u16 exec_ctxt;
|
||||
+/* partition supports receipt of direct requests */
|
||||
+#define FFA_PARTITION_DIRECT_RECV BIT(0)
|
||||
+/* partition can send direct requests. */
|
||||
+#define FFA_PARTITION_DIRECT_SEND BIT(1)
|
||||
+/* partition can send and receive indirect messages. */
|
||||
+#define FFA_PARTITION_INDIRECT_MSG BIT(2)
|
||||
+ u32 properties;
|
||||
+};
|
||||
+
|
||||
+/* For use with FFA_MSG_SEND_DIRECT_{REQ,RESP} which pass data via registers */
|
||||
+struct ffa_send_direct_data {
|
||||
+ unsigned long data0; /* w3/x3 */
|
||||
+ unsigned long data1; /* w4/x4 */
|
||||
+ unsigned long data2; /* w5/x5 */
|
||||
+ unsigned long data3; /* w6/x6 */
|
||||
+ unsigned long data4; /* w7/x7 */
|
||||
+};
|
||||
+
|
||||
+struct ffa_dev_ops {
|
||||
+ u32 (*api_version_get)(void);
|
||||
+ int (*partition_info_get)(const char *uuid_str,
|
||||
+ struct ffa_partition_info *buffer);
|
||||
+ void (*mode_32bit_set)(struct ffa_device *dev);
|
||||
+ int (*sync_send_receive)(struct ffa_device *dev,
|
||||
+ struct ffa_send_direct_data *data);
|
||||
+};
|
||||
+
|
||||
#endif /* _LINUX_ARM_FFA_H */
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,406 @@
|
||||
From 6795f86f52751608a03cc6de0dda8e28a5c68cd1 Mon Sep 17 00:00:00 2001
|
||||
From: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Date: Fri, 30 Apr 2021 11:24:51 +0100
|
||||
Subject: [PATCH 06/14] firmware: arm_ffa: Add support for MEM_* interfaces
|
||||
|
||||
Most of the MEM_* APIs share the same parameters, so they can be
|
||||
generalised. Currently only MEM_SHARE is implemented and the user space
|
||||
interface for that is not added yet.
|
||||
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git/commit/?h=v5.10/ffa&id=f27cbd0b3f83cb40ff7385f00d05afe1be7577b2]
|
||||
---
|
||||
drivers/firmware/arm_ffa/driver.c | 199 ++++++++++++++++++++++++++++++
|
||||
include/linux/arm_ffa.h | 139 +++++++++++++++++++++
|
||||
2 files changed, 338 insertions(+)
|
||||
|
||||
diff --git a/drivers/firmware/arm_ffa/driver.c b/drivers/firmware/arm_ffa/driver.c
|
||||
index cefbb3edf142..056a3fca14d1 100644
|
||||
--- a/drivers/firmware/arm_ffa/driver.c
|
||||
+++ b/drivers/firmware/arm_ffa/driver.c
|
||||
@@ -28,6 +28,8 @@
|
||||
#include <linux/io.h>
|
||||
#include <linux/kernel.h>
|
||||
#include <linux/module.h>
|
||||
+#include <linux/mm.h>
|
||||
+#include <linux/scatterlist.h>
|
||||
#include <linux/slab.h>
|
||||
#include <linux/uuid.h>
|
||||
|
||||
@@ -348,6 +350,192 @@ static int ffa_msg_send_direct_req(u16 src_id, u16 dst_id, bool mode_32bit,
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
+static int ffa_mem_first_frag(u32 func_id, phys_addr_t buf, u32 buf_sz,
|
||||
+ u32 frag_len, u32 len, u64 *handle)
|
||||
+{
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = func_id, .a1 = len, .a2 = frag_len,
|
||||
+ .a3 = buf, .a4 = buf_sz,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ while (ret.a0 == FFA_MEM_OP_PAUSE)
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_MEM_OP_RESUME,
|
||||
+ .a1 = ret.a1, .a2 = ret.a2,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ if (ret.a0 != FFA_SUCCESS)
|
||||
+ return -EOPNOTSUPP;
|
||||
+
|
||||
+ if (handle)
|
||||
+ *handle = PACK_HANDLE(ret.a2, ret.a3);
|
||||
+
|
||||
+ return frag_len;
|
||||
+}
|
||||
+
|
||||
+static int ffa_mem_next_frag(u64 handle, u32 frag_len)
|
||||
+{
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_MEM_FRAG_TX,
|
||||
+ .a1 = HANDLE_LOW(handle), .a2 = HANDLE_HIGH(handle),
|
||||
+ .a3 = frag_len,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ while (ret.a0 == FFA_MEM_OP_PAUSE)
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_MEM_OP_RESUME,
|
||||
+ .a1 = ret.a1, .a2 = ret.a2,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ if (ret.a0 != FFA_MEM_FRAG_RX)
|
||||
+ return -EOPNOTSUPP;
|
||||
+
|
||||
+ return ret.a3;
|
||||
+}
|
||||
+
|
||||
+static int
|
||||
+ffa_transmit_fragment(u32 func_id, phys_addr_t buf, u32 buf_sz, u32 frag_len,
|
||||
+ u32 len, u64 *handle, bool first)
|
||||
+{
|
||||
+ if (!first)
|
||||
+ return ffa_mem_next_frag(*handle, frag_len);
|
||||
+
|
||||
+ return ffa_mem_first_frag(func_id, buf, buf_sz, frag_len, len, handle);
|
||||
+}
|
||||
+
|
||||
+static u32 ffa_get_num_pages_sg(struct scatterlist *sg)
|
||||
+{
|
||||
+ u32 num_pages = 0;
|
||||
+
|
||||
+ do {
|
||||
+ num_pages += sg->length / FFA_PAGE_SIZE;
|
||||
+ } while ((sg = sg_next(sg)));
|
||||
+
|
||||
+ return num_pages;
|
||||
+}
|
||||
+
|
||||
+static int
|
||||
+ffa_setup_and_transmit(u32 func_id, void *buffer, u32 max_fragsize,
|
||||
+ struct ffa_mem_ops_args *args)
|
||||
+{
|
||||
+ int rc = 0;
|
||||
+ bool first = true;
|
||||
+ phys_addr_t addr = 0;
|
||||
+ struct ffa_composite_mem_region *composite;
|
||||
+ struct ffa_mem_region_addr_range *constituents;
|
||||
+ struct ffa_mem_region_attributes *ep_mem_access;
|
||||
+ struct ffa_mem_region *mem_region = buffer;
|
||||
+ u32 idx, frag_len, length, buf_sz = 0, num_entries = sg_nents(args->sg);
|
||||
+
|
||||
+ mem_region->tag = args->tag;
|
||||
+ mem_region->flags = args->flags;
|
||||
+ mem_region->sender_id = drv_info->vm_id;
|
||||
+ mem_region->attributes = FFA_MEM_NORMAL | FFA_MEM_WRITE_BACK |
|
||||
+ FFA_MEM_INNER_SHAREABLE;
|
||||
+ ep_mem_access = &mem_region->ep_mem_access[0];
|
||||
+
|
||||
+ for (idx = 0; idx < args->nattrs; idx++, ep_mem_access++) {
|
||||
+ ep_mem_access->receiver = args->attrs[idx].receiver;
|
||||
+ ep_mem_access->attrs = args->attrs[idx].attrs;
|
||||
+ ep_mem_access->composite_off = COMPOSITE_OFFSET(args->nattrs);
|
||||
+ }
|
||||
+ mem_region->ep_count = args->nattrs;
|
||||
+
|
||||
+ composite = buffer + COMPOSITE_OFFSET(args->nattrs);
|
||||
+ composite->total_pg_cnt = ffa_get_num_pages_sg(args->sg);
|
||||
+ composite->addr_range_cnt = num_entries;
|
||||
+
|
||||
+ length = COMPOSITE_CONSTITUENTS_OFFSET(args->nattrs, num_entries);
|
||||
+ frag_len = COMPOSITE_CONSTITUENTS_OFFSET(args->nattrs, 0);
|
||||
+ if (frag_len > max_fragsize)
|
||||
+ return -ENXIO;
|
||||
+
|
||||
+ if (!args->use_txbuf) {
|
||||
+ addr = virt_to_phys(buffer);
|
||||
+ buf_sz = max_fragsize / FFA_PAGE_SIZE;
|
||||
+ }
|
||||
+
|
||||
+ constituents = buffer + frag_len;
|
||||
+ idx = 0;
|
||||
+ do {
|
||||
+ if (frag_len == max_fragsize) {
|
||||
+ rc = ffa_transmit_fragment(func_id, addr, buf_sz,
|
||||
+ frag_len, length,
|
||||
+ &args->g_handle, first);
|
||||
+ if (rc < 0)
|
||||
+ return -ENXIO;
|
||||
+
|
||||
+ first = false;
|
||||
+ idx = 0;
|
||||
+ frag_len = 0;
|
||||
+ constituents = buffer;
|
||||
+ }
|
||||
+
|
||||
+ if ((void *)constituents - buffer > max_fragsize) {
|
||||
+ pr_err("Memory Region Fragment > Tx Buffer size\n");
|
||||
+ return -EFAULT;
|
||||
+ }
|
||||
+
|
||||
+ constituents->address = sg_phys(args->sg);
|
||||
+ constituents->pg_cnt = args->sg->length / FFA_PAGE_SIZE;
|
||||
+ constituents++;
|
||||
+ frag_len += sizeof(struct ffa_mem_region_addr_range);
|
||||
+ } while ((args->sg = sg_next(args->sg)));
|
||||
+
|
||||
+ return ffa_transmit_fragment(func_id, addr, buf_sz, frag_len,
|
||||
+ length, &args->g_handle, first);
|
||||
+}
|
||||
+
|
||||
+static int ffa_memory_ops(u32 func_id, struct ffa_mem_ops_args *args)
|
||||
+{
|
||||
+ int ret;
|
||||
+ void *buffer;
|
||||
+
|
||||
+ if (!args->use_txbuf) {
|
||||
+ buffer = alloc_pages_exact(RXTX_BUFFER_SIZE, GFP_KERNEL);
|
||||
+ if (!buffer)
|
||||
+ return -ENOMEM;
|
||||
+ } else {
|
||||
+ buffer = drv_info->tx_buffer;
|
||||
+ mutex_lock(&drv_info->tx_lock);
|
||||
+ }
|
||||
+
|
||||
+ ret = ffa_setup_and_transmit(func_id, buffer, RXTX_BUFFER_SIZE, args);
|
||||
+
|
||||
+ if (args->use_txbuf)
|
||||
+ mutex_unlock(&drv_info->tx_lock);
|
||||
+ else
|
||||
+ free_pages_exact(buffer, RXTX_BUFFER_SIZE);
|
||||
+
|
||||
+ return ret < 0 ? ret : 0;
|
||||
+}
|
||||
+
|
||||
+static int ffa_memory_reclaim(u64 g_handle, u32 flags)
|
||||
+{
|
||||
+ ffa_value_t ret;
|
||||
+
|
||||
+ invoke_ffa_fn((ffa_value_t){
|
||||
+ .a0 = FFA_MEM_RECLAIM,
|
||||
+ .a1 = HANDLE_LOW(g_handle), .a2 = HANDLE_HIGH(g_handle),
|
||||
+ .a3 = flags,
|
||||
+ }, &ret);
|
||||
+
|
||||
+ if (ret.a0 == FFA_ERROR)
|
||||
+ return ffa_to_linux_errno((int)ret.a2);
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
static u32 ffa_api_version_get(void)
|
||||
{
|
||||
return drv_info->version;
|
||||
@@ -386,11 +574,22 @@ static int ffa_sync_send_receive(struct ffa_device *dev,
|
||||
dev->mode_32bit, data);
|
||||
}
|
||||
|
||||
+static int
|
||||
+ffa_memory_share(struct ffa_device *dev, struct ffa_mem_ops_args *args)
|
||||
+{
|
||||
+ if (dev->mode_32bit)
|
||||
+ return ffa_memory_ops(FFA_MEM_SHARE, args);
|
||||
+
|
||||
+ return ffa_memory_ops(FFA_FN_NATIVE(MEM_SHARE), args);
|
||||
+}
|
||||
+
|
||||
static const struct ffa_dev_ops ffa_ops = {
|
||||
.api_version_get = ffa_api_version_get,
|
||||
.partition_info_get = ffa_partition_info_get,
|
||||
.mode_32bit_set = ffa_mode_32bit_set,
|
||||
.sync_send_receive = ffa_sync_send_receive,
|
||||
+ .memory_reclaim = ffa_memory_reclaim,
|
||||
+ .memory_share = ffa_memory_share,
|
||||
};
|
||||
|
||||
const struct ffa_dev_ops *ffa_dev_ops_get(struct ffa_device *dev)
|
||||
diff --git a/include/linux/arm_ffa.h b/include/linux/arm_ffa.h
|
||||
index b242fbbce4f0..6dc0f4e425b9 100644
|
||||
--- a/include/linux/arm_ffa.h
|
||||
+++ b/include/linux/arm_ffa.h
|
||||
@@ -115,6 +115,142 @@ struct ffa_send_direct_data {
|
||||
unsigned long data4; /* w7/x7 */
|
||||
};
|
||||
|
||||
+struct ffa_mem_region_addr_range {
|
||||
+ /* The base IPA of the constituent memory region, aligned to 4 kiB */
|
||||
+ u64 address;
|
||||
+ /* The number of 4 kiB pages in the constituent memory region. */
|
||||
+ u32 pg_cnt;
|
||||
+ u32 reserved;
|
||||
+};
|
||||
+
|
||||
+struct ffa_composite_mem_region {
|
||||
+ /*
|
||||
+ * The total number of 4 kiB pages included in this memory region. This
|
||||
+ * must be equal to the sum of page counts specified in each
|
||||
+ * `struct ffa_mem_region_addr_range`.
|
||||
+ */
|
||||
+ u32 total_pg_cnt;
|
||||
+ /* The number of constituents included in this memory region range */
|
||||
+ u32 addr_range_cnt;
|
||||
+ u64 reserved;
|
||||
+ /** An array of `addr_range_cnt` memory region constituents. */
|
||||
+ struct ffa_mem_region_addr_range constituents[];
|
||||
+};
|
||||
+
|
||||
+struct ffa_mem_region_attributes {
|
||||
+ /* The ID of the VM to which the memory is being given or shared. */
|
||||
+ u16 receiver;
|
||||
+ /*
|
||||
+ * The permissions with which the memory region should be mapped in the
|
||||
+ * receiver's page table.
|
||||
+ */
|
||||
+#define FFA_MEM_EXEC BIT(3)
|
||||
+#define FFA_MEM_NO_EXEC BIT(2)
|
||||
+#define FFA_MEM_RW BIT(1)
|
||||
+#define FFA_MEM_RO BIT(0)
|
||||
+ u8 attrs;
|
||||
+ /*
|
||||
+ * Flags used during FFA_MEM_RETRIEVE_REQ and FFA_MEM_RETRIEVE_RESP
|
||||
+ * for memory regions with multiple borrowers.
|
||||
+ */
|
||||
+#define FFA_MEM_RETRIEVE_SELF_BORROWER BIT(0)
|
||||
+ u8 flag;
|
||||
+ u32 composite_off;
|
||||
+ /*
|
||||
+ * Offset in bytes from the start of the outer `ffa_memory_region` to
|
||||
+ * an `struct ffa_mem_region_addr_range`.
|
||||
+ */
|
||||
+ u64 reserved;
|
||||
+};
|
||||
+
|
||||
+struct ffa_mem_region {
|
||||
+ /* The ID of the VM/owner which originally sent the memory region */
|
||||
+ u16 sender_id;
|
||||
+#define FFA_MEM_NORMAL BIT(5)
|
||||
+#define FFA_MEM_DEVICE BIT(4)
|
||||
+
|
||||
+#define FFA_MEM_WRITE_BACK (3 << 2)
|
||||
+#define FFA_MEM_NON_CACHEABLE (1 << 2)
|
||||
+
|
||||
+#define FFA_DEV_nGnRnE (0 << 2)
|
||||
+#define FFA_DEV_nGnRE (1 << 2)
|
||||
+#define FFA_DEV_nGRE (2 << 2)
|
||||
+#define FFA_DEV_GRE (3 << 2)
|
||||
+
|
||||
+#define FFA_MEM_NON_SHAREABLE (0)
|
||||
+#define FFA_MEM_OUTER_SHAREABLE (2)
|
||||
+#define FFA_MEM_INNER_SHAREABLE (3)
|
||||
+ u8 attributes;
|
||||
+ u8 reserved_0;
|
||||
+/*
|
||||
+ * Clear memory region contents after unmapping it from the sender and
|
||||
+ * before mapping it for any receiver.
|
||||
+ */
|
||||
+#define FFA_MEM_CLEAR BIT(0)
|
||||
+/*
|
||||
+ * Whether the hypervisor may time slice the memory sharing or retrieval
|
||||
+ * operation.
|
||||
+ */
|
||||
+#define FFA_TIME_SLICE_ENABLE BIT(1)
|
||||
+
|
||||
+#define FFA_MEM_RETRIEVE_TYPE_IN_RESP (0 << 3)
|
||||
+#define FFA_MEM_RETRIEVE_TYPE_SHARE (1 << 3)
|
||||
+#define FFA_MEM_RETRIEVE_TYPE_LEND (2 << 3)
|
||||
+#define FFA_MEM_RETRIEVE_TYPE_DONATE (3 << 3)
|
||||
+
|
||||
+#define FFA_MEM_RETRIEVE_ADDR_ALIGN_HINT BIT(9)
|
||||
+#define FFA_MEM_RETRIEVE_ADDR_ALIGN(x) ((x) << 5)
|
||||
+ /* Flags to control behaviour of the transaction. */
|
||||
+ u32 flags;
|
||||
+#define HANDLE_LOW_MASK GENMASK_ULL(31, 0)
|
||||
+#define HANDLE_HIGH_MASK GENMASK_ULL(63, 32)
|
||||
+#define HANDLE_LOW(x) ((u32)(FIELD_GET(HANDLE_LOW_MASK, (x))))
|
||||
+#define HANDLE_HIGH(x) ((u32)(FIELD_GET(HANDLE_HIGH_MASK, (x))))
|
||||
+
|
||||
+#define PACK_HANDLE(l, h) \
|
||||
+ (FIELD_PREP(HANDLE_LOW_MASK, (l)) | FIELD_PREP(HANDLE_HIGH_MASK, (h)))
|
||||
+ /*
|
||||
+ * A globally-unique ID assigned by the hypervisor for a region
|
||||
+ * of memory being sent between VMs.
|
||||
+ */
|
||||
+ u64 handle;
|
||||
+ /*
|
||||
+ * An implementation defined value associated with the receiver and the
|
||||
+ * memory region.
|
||||
+ */
|
||||
+ u64 tag;
|
||||
+ u32 reserved_1;
|
||||
+ /*
|
||||
+ * The number of `ffa_mem_region_attributes` entries included in this
|
||||
+ * transaction.
|
||||
+ */
|
||||
+ u32 ep_count;
|
||||
+ /*
|
||||
+ * An array of endpoint memory access descriptors.
|
||||
+ * Each one specifies a memory region offset, an endpoint and the
|
||||
+ * attributes with which this memory region should be mapped in that
|
||||
+ * endpoint's page table.
|
||||
+ */
|
||||
+ struct ffa_mem_region_attributes ep_mem_access[];
|
||||
+};
|
||||
+
|
||||
+#define COMPOSITE_OFFSET(x) \
|
||||
+ (offsetof(struct ffa_mem_region, ep_mem_access[x]))
|
||||
+#define CONSTITUENTS_OFFSET(x) \
|
||||
+ (offsetof(struct ffa_composite_mem_region, constituents[x]))
|
||||
+#define COMPOSITE_CONSTITUENTS_OFFSET(x, y) \
|
||||
+ (COMPOSITE_OFFSET(x) + CONSTITUENTS_OFFSET(y))
|
||||
+
|
||||
+struct ffa_mem_ops_args {
|
||||
+ bool use_txbuf;
|
||||
+ u32 nattrs;
|
||||
+ u32 flags;
|
||||
+ u64 tag;
|
||||
+ u64 g_handle;
|
||||
+ struct scatterlist *sg;
|
||||
+ struct ffa_mem_region_attributes *attrs;
|
||||
+};
|
||||
+
|
||||
struct ffa_dev_ops {
|
||||
u32 (*api_version_get)(void);
|
||||
int (*partition_info_get)(const char *uuid_str,
|
||||
@@ -122,6 +258,9 @@ struct ffa_dev_ops {
|
||||
void (*mode_32bit_set)(struct ffa_device *dev);
|
||||
int (*sync_send_receive)(struct ffa_device *dev,
|
||||
struct ffa_send_direct_data *data);
|
||||
+ int (*memory_reclaim)(u64 g_handle, u32 flags);
|
||||
+ int (*memory_share)(struct ffa_device *dev,
|
||||
+ struct ffa_mem_ops_args *args);
|
||||
};
|
||||
|
||||
#endif /* _LINUX_ARM_FFA_H */
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
From 0f6e0009dc123faa5630bc02977674e182c5938c Mon Sep 17 00:00:00 2001
|
||||
From: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
Date: Thu, 25 Mar 2021 15:08:44 +0100
|
||||
Subject: [PATCH 07/14] tee: add sec_world_id to struct tee_shm
|
||||
|
||||
Adds sec_world_id to struct tee_shm which describes a shared memory
|
||||
object. sec_world_id can be used by a driver to store an id assigned by
|
||||
secure world.
|
||||
|
||||
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
|
||||
Upstream-Status: Pending [Not submitted to upstream yet]
|
||||
---
|
||||
include/linux/tee_drv.h | 7 ++++++-
|
||||
1 file changed, 6 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/include/linux/tee_drv.h b/include/linux/tee_drv.h
|
||||
index cdd049a724b1..93d836fded8b 100644
|
||||
--- a/include/linux/tee_drv.h
|
||||
+++ b/include/linux/tee_drv.h
|
||||
@@ -196,7 +196,11 @@ int tee_session_calc_client_uuid(uuid_t *uuid, u32 connection_method,
|
||||
* @num_pages: number of locked pages
|
||||
* @dmabuf: dmabuf used to for exporting to user space
|
||||
* @flags: defined by TEE_SHM_* in tee_drv.h
|
||||
- * @id: unique id of a shared memory object on this device
|
||||
+ * @id: unique id of a shared memory object on this device, shared
|
||||
+ * with user space
|
||||
+ * @sec_world_id:
|
||||
+ * secure world assigned id of this shared memory object, not
|
||||
+ * used by all drivers
|
||||
*
|
||||
* This pool is only supposed to be accessed directly from the TEE
|
||||
* subsystem and from drivers that implements their own shm pool manager.
|
||||
@@ -212,6 +216,7 @@ struct tee_shm {
|
||||
struct dma_buf *dmabuf;
|
||||
u32 flags;
|
||||
int id;
|
||||
+ u64 sec_world_id;
|
||||
};
|
||||
|
||||
/**
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,179 @@
|
||||
From 0c25ca5835725220605f3dbf6225dcf22923cc0f Mon Sep 17 00:00:00 2001
|
||||
From: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
Date: Thu, 25 Mar 2021 15:08:46 +0100
|
||||
Subject: [PATCH 08/14] optee: simplify optee_release()
|
||||
|
||||
Simplifies optee_release() with a new helper function,
|
||||
optee_close_session_helper() which has been factored out from
|
||||
optee_close_session().
|
||||
|
||||
A separate optee_release_supp() is added for the supplicant device.
|
||||
|
||||
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
|
||||
Upstream-Status: Pending [Not submitted to upstream yet]
|
||||
---
|
||||
drivers/tee/optee/call.c | 31 ++++++++++-------
|
||||
drivers/tee/optee/core.c | 55 +++++++++++--------------------
|
||||
drivers/tee/optee/optee_private.h | 1 +
|
||||
3 files changed, 39 insertions(+), 48 deletions(-)
|
||||
|
||||
diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c
|
||||
index 780d7c4fd756..c0eca4d7d7f2 100644
|
||||
--- a/drivers/tee/optee/call.c
|
||||
+++ b/drivers/tee/optee/call.c
|
||||
@@ -283,12 +283,28 @@ int optee_open_session(struct tee_context *ctx,
|
||||
return rc;
|
||||
}
|
||||
|
||||
-int optee_close_session(struct tee_context *ctx, u32 session)
|
||||
+int optee_close_session_helper(struct tee_context *ctx, u32 session)
|
||||
{
|
||||
- struct optee_context_data *ctxdata = ctx->data;
|
||||
struct tee_shm *shm;
|
||||
struct optee_msg_arg *msg_arg;
|
||||
phys_addr_t msg_parg;
|
||||
+
|
||||
+ shm = get_msg_arg(ctx, 0, &msg_arg, &msg_parg);
|
||||
+ if (IS_ERR(shm))
|
||||
+ return PTR_ERR(shm);
|
||||
+
|
||||
+ msg_arg->cmd = OPTEE_MSG_CMD_CLOSE_SESSION;
|
||||
+ msg_arg->session = session;
|
||||
+ optee_do_call_with_arg(ctx, msg_parg);
|
||||
+
|
||||
+ tee_shm_free(shm);
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+int optee_close_session(struct tee_context *ctx, u32 session)
|
||||
+{
|
||||
+ struct optee_context_data *ctxdata = ctx->data;
|
||||
struct optee_session *sess;
|
||||
|
||||
/* Check that the session is valid and remove it from the list */
|
||||
@@ -301,16 +317,7 @@ int optee_close_session(struct tee_context *ctx, u32 session)
|
||||
return -EINVAL;
|
||||
kfree(sess);
|
||||
|
||||
- shm = get_msg_arg(ctx, 0, &msg_arg, &msg_parg);
|
||||
- if (IS_ERR(shm))
|
||||
- return PTR_ERR(shm);
|
||||
-
|
||||
- msg_arg->cmd = OPTEE_MSG_CMD_CLOSE_SESSION;
|
||||
- msg_arg->session = session;
|
||||
- optee_do_call_with_arg(ctx, msg_parg);
|
||||
-
|
||||
- tee_shm_free(shm);
|
||||
- return 0;
|
||||
+ return optee_close_session_helper(ctx, session);
|
||||
}
|
||||
|
||||
int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
||||
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c
|
||||
index 63542c1cc291..e39c6d290d83 100644
|
||||
--- a/drivers/tee/optee/core.c
|
||||
+++ b/drivers/tee/optee/core.c
|
||||
@@ -263,59 +263,42 @@ static int optee_open(struct tee_context *ctx)
|
||||
return 0;
|
||||
}
|
||||
|
||||
-static void optee_release(struct tee_context *ctx)
|
||||
+static void optee_release_helper(struct tee_context *ctx,
|
||||
+ int (*close_session)(struct tee_context *ctx,
|
||||
+ u32 session))
|
||||
{
|
||||
struct optee_context_data *ctxdata = ctx->data;
|
||||
- struct tee_device *teedev = ctx->teedev;
|
||||
- struct optee *optee = tee_get_drvdata(teedev);
|
||||
- struct tee_shm *shm;
|
||||
- struct optee_msg_arg *arg = NULL;
|
||||
- phys_addr_t parg;
|
||||
struct optee_session *sess;
|
||||
struct optee_session *sess_tmp;
|
||||
|
||||
if (!ctxdata)
|
||||
return;
|
||||
|
||||
- shm = tee_shm_alloc(ctx, sizeof(struct optee_msg_arg), TEE_SHM_MAPPED);
|
||||
- if (!IS_ERR(shm)) {
|
||||
- arg = tee_shm_get_va(shm, 0);
|
||||
- /*
|
||||
- * If va2pa fails for some reason, we can't call into
|
||||
- * secure world, only free the memory. Secure OS will leak
|
||||
- * sessions and finally refuse more sessions, but we will
|
||||
- * at least let normal world reclaim its memory.
|
||||
- */
|
||||
- if (!IS_ERR(arg))
|
||||
- if (tee_shm_va2pa(shm, arg, &parg))
|
||||
- arg = NULL; /* prevent usage of parg below */
|
||||
- }
|
||||
-
|
||||
list_for_each_entry_safe(sess, sess_tmp, &ctxdata->sess_list,
|
||||
list_node) {
|
||||
list_del(&sess->list_node);
|
||||
- if (!IS_ERR_OR_NULL(arg)) {
|
||||
- memset(arg, 0, sizeof(*arg));
|
||||
- arg->cmd = OPTEE_MSG_CMD_CLOSE_SESSION;
|
||||
- arg->session = sess->session_id;
|
||||
- optee_do_call_with_arg(ctx, parg);
|
||||
- }
|
||||
+ close_session(ctx, sess->session_id);
|
||||
kfree(sess);
|
||||
}
|
||||
kfree(ctxdata);
|
||||
+ ctx->data = NULL;
|
||||
+}
|
||||
|
||||
- if (!IS_ERR(shm))
|
||||
- tee_shm_free(shm);
|
||||
+static void optee_release(struct tee_context *ctx)
|
||||
+{
|
||||
+ optee_release_helper(ctx, optee_close_session_helper);
|
||||
+}
|
||||
|
||||
- ctx->data = NULL;
|
||||
+static void optee_release_supp(struct tee_context *ctx)
|
||||
+{
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
|
||||
- if (teedev == optee->supp_teedev) {
|
||||
- if (optee->scan_bus_wq) {
|
||||
- destroy_workqueue(optee->scan_bus_wq);
|
||||
- optee->scan_bus_wq = NULL;
|
||||
- }
|
||||
- optee_supp_release(&optee->supp);
|
||||
+ optee_release_helper(ctx, optee_close_session_helper);
|
||||
+ if (optee->scan_bus_wq) {
|
||||
+ destroy_workqueue(optee->scan_bus_wq);
|
||||
+ optee->scan_bus_wq = NULL;
|
||||
}
|
||||
+ optee_supp_release(&optee->supp);
|
||||
}
|
||||
|
||||
static const struct tee_driver_ops optee_ops = {
|
||||
@@ -339,7 +322,7 @@ static const struct tee_desc optee_desc = {
|
||||
static const struct tee_driver_ops optee_supp_ops = {
|
||||
.get_version = optee_get_version,
|
||||
.open = optee_open,
|
||||
- .release = optee_release,
|
||||
+ .release = optee_release_supp,
|
||||
.supp_recv = optee_supp_recv,
|
||||
.supp_send = optee_supp_send,
|
||||
.shm_register = optee_shm_register_supp,
|
||||
diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h
|
||||
index e25b216a14ef..2b63b796645e 100644
|
||||
--- a/drivers/tee/optee/optee_private.h
|
||||
+++ b/drivers/tee/optee/optee_private.h
|
||||
@@ -152,6 +152,7 @@ u32 optee_do_call_with_arg(struct tee_context *ctx, phys_addr_t parg);
|
||||
int optee_open_session(struct tee_context *ctx,
|
||||
struct tee_ioctl_open_session_arg *arg,
|
||||
struct tee_param *param);
|
||||
+int optee_close_session_helper(struct tee_context *ctx, u32 session);
|
||||
int optee_close_session(struct tee_context *ctx, u32 session);
|
||||
int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
||||
struct tee_param *param);
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,644 @@
|
||||
From c325e66e1cbacc074051034ce7e40b3e0e987c99 Mon Sep 17 00:00:00 2001
|
||||
From: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
Date: Wed, 20 Jan 2021 11:14:12 +0100
|
||||
Subject: [PATCH 09/14] optee: sync OP-TEE headers
|
||||
|
||||
Pulls in updates in the internal headers from OP-TEE OS [1]. A few
|
||||
defines has been shortened, hence the changes in rpc.c. Defines not used
|
||||
by the driver in tee_rpc_cmd.h has been filtered out.
|
||||
|
||||
Note that this does not change the ABI.
|
||||
|
||||
Link: [1] https://github.com/OP-TEE/optee_os
|
||||
Reviewed-by: Sumit Garg <sumit.garg@linaro.org>
|
||||
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
Change-Id: I5d20a22a3f38bfc9d232279d5f00505c4d3ba965
|
||||
|
||||
Upstream-Status: Backport [https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.13-rc7&id=617d8e8b347edcee6da38df0aeb671fc9c9ba19c]
|
||||
---
|
||||
drivers/tee/optee/optee_msg.h | 156 ++----------------------------
|
||||
drivers/tee/optee/optee_rpc_cmd.h | 103 ++++++++++++++++++++
|
||||
drivers/tee/optee/optee_smc.h | 70 +++++++++-----
|
||||
drivers/tee/optee/rpc.c | 39 ++++----
|
||||
4 files changed, 179 insertions(+), 189 deletions(-)
|
||||
create mode 100644 drivers/tee/optee/optee_rpc_cmd.h
|
||||
|
||||
diff --git a/drivers/tee/optee/optee_msg.h b/drivers/tee/optee/optee_msg.h
|
||||
index 7b2d919da2ac..1e1341a5eaf2 100644
|
||||
--- a/drivers/tee/optee/optee_msg.h
|
||||
+++ b/drivers/tee/optee/optee_msg.h
|
||||
@@ -1,6 +1,6 @@
|
||||
/* SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) */
|
||||
/*
|
||||
- * Copyright (c) 2015-2019, Linaro Limited
|
||||
+ * Copyright (c) 2015-2021, Linaro Limited
|
||||
*/
|
||||
#ifndef _OPTEE_MSG_H
|
||||
#define _OPTEE_MSG_H
|
||||
@@ -12,11 +12,9 @@
|
||||
* This file defines the OP-TEE message protocol used to communicate
|
||||
* with an instance of OP-TEE running in secure world.
|
||||
*
|
||||
- * This file is divided into three sections.
|
||||
+ * This file is divided into two sections.
|
||||
* 1. Formatting of messages.
|
||||
* 2. Requests from normal world
|
||||
- * 3. Requests from secure world, Remote Procedure Call (RPC), handled by
|
||||
- * tee-supplicant.
|
||||
*/
|
||||
|
||||
/*****************************************************************************
|
||||
@@ -54,8 +52,8 @@
|
||||
* Every entry in buffer should point to a 4k page beginning (12 least
|
||||
* significant bits must be equal to zero).
|
||||
*
|
||||
- * 12 least significant bints of optee_msg_param.u.tmem.buf_ptr should hold page
|
||||
- * offset of the user buffer.
|
||||
+ * 12 least significant bits of optee_msg_param.u.tmem.buf_ptr should hold
|
||||
+ * page offset of user buffer.
|
||||
*
|
||||
* So, entries should be placed like members of this structure:
|
||||
*
|
||||
@@ -176,17 +174,9 @@ struct optee_msg_param {
|
||||
* @params: the parameters supplied to the OS Command
|
||||
*
|
||||
* All normal calls to Trusted OS uses this struct. If cmd requires further
|
||||
- * information than what these field holds it can be passed as a parameter
|
||||
+ * information than what these fields hold it can be passed as a parameter
|
||||
* tagged as meta (setting the OPTEE_MSG_ATTR_META bit in corresponding
|
||||
- * attrs field). All parameters tagged as meta has to come first.
|
||||
- *
|
||||
- * Temp memref parameters can be fragmented if supported by the Trusted OS
|
||||
- * (when optee_smc.h is bearer of this protocol this is indicated with
|
||||
- * OPTEE_SMC_SEC_CAP_UNREGISTERED_SHM). If a logical memref parameter is
|
||||
- * fragmented then has all but the last fragment the
|
||||
- * OPTEE_MSG_ATTR_FRAGMENT bit set in attrs. Even if a memref is fragmented
|
||||
- * it will still be presented as a single logical memref to the Trusted
|
||||
- * Application.
|
||||
+ * attrs field). All parameters tagged as meta have to come first.
|
||||
*/
|
||||
struct optee_msg_arg {
|
||||
u32 cmd;
|
||||
@@ -290,15 +280,12 @@ struct optee_msg_arg {
|
||||
* OPTEE_MSG_CMD_REGISTER_SHM registers a shared memory reference. The
|
||||
* information is passed as:
|
||||
* [in] param[0].attr OPTEE_MSG_ATTR_TYPE_TMEM_INPUT
|
||||
- * [| OPTEE_MSG_ATTR_FRAGMENT]
|
||||
+ * [| OPTEE_MSG_ATTR_NONCONTIG]
|
||||
* [in] param[0].u.tmem.buf_ptr physical address (of first fragment)
|
||||
* [in] param[0].u.tmem.size size (of first fragment)
|
||||
* [in] param[0].u.tmem.shm_ref holds shared memory reference
|
||||
- * ...
|
||||
- * The shared memory can optionally be fragmented, temp memrefs can follow
|
||||
- * each other with all but the last with the OPTEE_MSG_ATTR_FRAGMENT bit set.
|
||||
*
|
||||
- * OPTEE_MSG_CMD_UNREGISTER_SHM unregisteres a previously registered shared
|
||||
+ * OPTEE_MSG_CMD_UNREGISTER_SHM unregisters a previously registered shared
|
||||
* memory reference. The information is passed as:
|
||||
* [in] param[0].attr OPTEE_MSG_ATTR_TYPE_RMEM_INPUT
|
||||
* [in] param[0].u.rmem.shm_ref holds shared memory reference
|
||||
@@ -313,131 +300,4 @@ struct optee_msg_arg {
|
||||
#define OPTEE_MSG_CMD_UNREGISTER_SHM 5
|
||||
#define OPTEE_MSG_FUNCID_CALL_WITH_ARG 0x0004
|
||||
|
||||
-/*****************************************************************************
|
||||
- * Part 3 - Requests from secure world, RPC
|
||||
- *****************************************************************************/
|
||||
-
|
||||
-/*
|
||||
- * All RPC is done with a struct optee_msg_arg as bearer of information,
|
||||
- * struct optee_msg_arg::arg holds values defined by OPTEE_MSG_RPC_CMD_* below
|
||||
- *
|
||||
- * RPC communication with tee-supplicant is reversed compared to normal
|
||||
- * client communication desribed above. The supplicant receives requests
|
||||
- * and sends responses.
|
||||
- */
|
||||
-
|
||||
-/*
|
||||
- * Load a TA into memory, defined in tee-supplicant
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_LOAD_TA 0
|
||||
-
|
||||
-/*
|
||||
- * Reserved
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_RPMB 1
|
||||
-
|
||||
-/*
|
||||
- * File system access, defined in tee-supplicant
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_FS 2
|
||||
-
|
||||
-/*
|
||||
- * Get time
|
||||
- *
|
||||
- * Returns number of seconds and nano seconds since the Epoch,
|
||||
- * 1970-01-01 00:00:00 +0000 (UTC).
|
||||
- *
|
||||
- * [out] param[0].u.value.a Number of seconds
|
||||
- * [out] param[0].u.value.b Number of nano seconds.
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_GET_TIME 3
|
||||
-
|
||||
-/*
|
||||
- * Wait queue primitive, helper for secure world to implement a wait queue.
|
||||
- *
|
||||
- * If secure world need to wait for a secure world mutex it issues a sleep
|
||||
- * request instead of spinning in secure world. Conversely is a wakeup
|
||||
- * request issued when a secure world mutex with a thread waiting thread is
|
||||
- * unlocked.
|
||||
- *
|
||||
- * Waiting on a key
|
||||
- * [in] param[0].u.value.a OPTEE_MSG_RPC_WAIT_QUEUE_SLEEP
|
||||
- * [in] param[0].u.value.b wait key
|
||||
- *
|
||||
- * Waking up a key
|
||||
- * [in] param[0].u.value.a OPTEE_MSG_RPC_WAIT_QUEUE_WAKEUP
|
||||
- * [in] param[0].u.value.b wakeup key
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_WAIT_QUEUE 4
|
||||
-#define OPTEE_MSG_RPC_WAIT_QUEUE_SLEEP 0
|
||||
-#define OPTEE_MSG_RPC_WAIT_QUEUE_WAKEUP 1
|
||||
-
|
||||
-/*
|
||||
- * Suspend execution
|
||||
- *
|
||||
- * [in] param[0].value .a number of milliseconds to suspend
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_SUSPEND 5
|
||||
-
|
||||
-/*
|
||||
- * Allocate a piece of shared memory
|
||||
- *
|
||||
- * Shared memory can optionally be fragmented, to support that additional
|
||||
- * spare param entries are allocated to make room for eventual fragments.
|
||||
- * The spare param entries has .attr = OPTEE_MSG_ATTR_TYPE_NONE when
|
||||
- * unused. All returned temp memrefs except the last should have the
|
||||
- * OPTEE_MSG_ATTR_FRAGMENT bit set in the attr field.
|
||||
- *
|
||||
- * [in] param[0].u.value.a type of memory one of
|
||||
- * OPTEE_MSG_RPC_SHM_TYPE_* below
|
||||
- * [in] param[0].u.value.b requested size
|
||||
- * [in] param[0].u.value.c required alignment
|
||||
- *
|
||||
- * [out] param[0].u.tmem.buf_ptr physical address (of first fragment)
|
||||
- * [out] param[0].u.tmem.size size (of first fragment)
|
||||
- * [out] param[0].u.tmem.shm_ref shared memory reference
|
||||
- * ...
|
||||
- * [out] param[n].u.tmem.buf_ptr physical address
|
||||
- * [out] param[n].u.tmem.size size
|
||||
- * [out] param[n].u.tmem.shm_ref shared memory reference (same value
|
||||
- * as in param[n-1].u.tmem.shm_ref)
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_SHM_ALLOC 6
|
||||
-/* Memory that can be shared with a non-secure user space application */
|
||||
-#define OPTEE_MSG_RPC_SHM_TYPE_APPL 0
|
||||
-/* Memory only shared with non-secure kernel */
|
||||
-#define OPTEE_MSG_RPC_SHM_TYPE_KERNEL 1
|
||||
-
|
||||
-/*
|
||||
- * Free shared memory previously allocated with OPTEE_MSG_RPC_CMD_SHM_ALLOC
|
||||
- *
|
||||
- * [in] param[0].u.value.a type of memory one of
|
||||
- * OPTEE_MSG_RPC_SHM_TYPE_* above
|
||||
- * [in] param[0].u.value.b value of shared memory reference
|
||||
- * returned in param[0].u.tmem.shm_ref
|
||||
- * above
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_SHM_FREE 7
|
||||
-
|
||||
-/*
|
||||
- * Access a device on an i2c bus
|
||||
- *
|
||||
- * [in] param[0].u.value.a mode: RD(0), WR(1)
|
||||
- * [in] param[0].u.value.b i2c adapter
|
||||
- * [in] param[0].u.value.c i2c chip
|
||||
- *
|
||||
- * [in] param[1].u.value.a i2c control flags
|
||||
- *
|
||||
- * [in/out] memref[2] buffer to exchange the transfer data
|
||||
- * with the secure world
|
||||
- *
|
||||
- * [out] param[3].u.value.a bytes transferred by the driver
|
||||
- */
|
||||
-#define OPTEE_MSG_RPC_CMD_I2C_TRANSFER 21
|
||||
-/* I2C master transfer modes */
|
||||
-#define OPTEE_MSG_RPC_CMD_I2C_TRANSFER_RD 0
|
||||
-#define OPTEE_MSG_RPC_CMD_I2C_TRANSFER_WR 1
|
||||
-/* I2C master control flags */
|
||||
-#define OPTEE_MSG_RPC_CMD_I2C_FLAGS_TEN_BIT BIT(0)
|
||||
-
|
||||
#endif /* _OPTEE_MSG_H */
|
||||
diff --git a/drivers/tee/optee/optee_rpc_cmd.h b/drivers/tee/optee/optee_rpc_cmd.h
|
||||
new file mode 100644
|
||||
index 000000000000..b8275140cef8
|
||||
--- /dev/null
|
||||
+++ b/drivers/tee/optee/optee_rpc_cmd.h
|
||||
@@ -0,0 +1,103 @@
|
||||
+/* SPDX-License-Identifier: BSD-2-Clause */
|
||||
+/*
|
||||
+ * Copyright (c) 2016-2021, Linaro Limited
|
||||
+ */
|
||||
+
|
||||
+#ifndef __OPTEE_RPC_CMD_H
|
||||
+#define __OPTEE_RPC_CMD_H
|
||||
+
|
||||
+/*
|
||||
+ * All RPC is done with a struct optee_msg_arg as bearer of information,
|
||||
+ * struct optee_msg_arg::arg holds values defined by OPTEE_RPC_CMD_* below.
|
||||
+ * Only the commands handled by the kernel driver are defined here.
|
||||
+ *
|
||||
+ * RPC communication with tee-supplicant is reversed compared to normal
|
||||
+ * client communication described above. The supplicant receives requests
|
||||
+ * and sends responses.
|
||||
+ */
|
||||
+
|
||||
+/*
|
||||
+ * Get time
|
||||
+ *
|
||||
+ * Returns number of seconds and nano seconds since the Epoch,
|
||||
+ * 1970-01-01 00:00:00 +0000 (UTC).
|
||||
+ *
|
||||
+ * [out] value[0].a Number of seconds
|
||||
+ * [out] value[0].b Number of nano seconds.
|
||||
+ */
|
||||
+#define OPTEE_RPC_CMD_GET_TIME 3
|
||||
+
|
||||
+/*
|
||||
+ * Wait queue primitive, helper for secure world to implement a wait queue.
|
||||
+ *
|
||||
+ * If secure world needs to wait for a secure world mutex it issues a sleep
|
||||
+ * request instead of spinning in secure world. Conversely is a wakeup
|
||||
+ * request issued when a secure world mutex with a thread waiting thread is
|
||||
+ * unlocked.
|
||||
+ *
|
||||
+ * Waiting on a key
|
||||
+ * [in] value[0].a OPTEE_RPC_WAIT_QUEUE_SLEEP
|
||||
+ * [in] value[0].b Wait key
|
||||
+ *
|
||||
+ * Waking up a key
|
||||
+ * [in] value[0].a OPTEE_RPC_WAIT_QUEUE_WAKEUP
|
||||
+ * [in] value[0].b Wakeup key
|
||||
+ */
|
||||
+#define OPTEE_RPC_CMD_WAIT_QUEUE 4
|
||||
+#define OPTEE_RPC_WAIT_QUEUE_SLEEP 0
|
||||
+#define OPTEE_RPC_WAIT_QUEUE_WAKEUP 1
|
||||
+
|
||||
+/*
|
||||
+ * Suspend execution
|
||||
+ *
|
||||
+ * [in] value[0].a Number of milliseconds to suspend
|
||||
+ */
|
||||
+#define OPTEE_RPC_CMD_SUSPEND 5
|
||||
+
|
||||
+/*
|
||||
+ * Allocate a piece of shared memory
|
||||
+ *
|
||||
+ * [in] value[0].a Type of memory one of
|
||||
+ * OPTEE_RPC_SHM_TYPE_* below
|
||||
+ * [in] value[0].b Requested size
|
||||
+ * [in] value[0].c Required alignment
|
||||
+ * [out] memref[0] Buffer
|
||||
+ */
|
||||
+#define OPTEE_RPC_CMD_SHM_ALLOC 6
|
||||
+/* Memory that can be shared with a non-secure user space application */
|
||||
+#define OPTEE_RPC_SHM_TYPE_APPL 0
|
||||
+/* Memory only shared with non-secure kernel */
|
||||
+#define OPTEE_RPC_SHM_TYPE_KERNEL 1
|
||||
+
|
||||
+/*
|
||||
+ * Free shared memory previously allocated with OPTEE_RPC_CMD_SHM_ALLOC
|
||||
+ *
|
||||
+ * [in] value[0].a Type of memory one of
|
||||
+ * OPTEE_RPC_SHM_TYPE_* above
|
||||
+ * [in] value[0].b Value of shared memory reference or cookie
|
||||
+ */
|
||||
+#define OPTEE_RPC_CMD_SHM_FREE 7
|
||||
+
|
||||
+/*
|
||||
+ * Issue master requests (read and write operations) to an I2C chip.
|
||||
+ *
|
||||
+ * [in] value[0].a Transfer mode (OPTEE_RPC_I2C_TRANSFER_*)
|
||||
+ * [in] value[0].b The I2C bus (a.k.a adapter).
|
||||
+ * 16 bit field.
|
||||
+ * [in] value[0].c The I2C chip (a.k.a address).
|
||||
+ * 16 bit field (either 7 or 10 bit effective).
|
||||
+ * [in] value[1].a The I2C master control flags (ie, 10 bit address).
|
||||
+ * 16 bit field.
|
||||
+ * [in/out] memref[2] Buffer used for data transfers.
|
||||
+ * [out] value[3].a Number of bytes transferred by the REE.
|
||||
+ */
|
||||
+#define OPTEE_RPC_CMD_I2C_TRANSFER 21
|
||||
+
|
||||
+/* I2C master transfer modes */
|
||||
+#define OPTEE_RPC_I2C_TRANSFER_RD 0
|
||||
+#define OPTEE_RPC_I2C_TRANSFER_WR 1
|
||||
+
|
||||
+/* I2C master control flags */
|
||||
+#define OPTEE_RPC_I2C_FLAGS_TEN_BIT BIT(0)
|
||||
+
|
||||
+#endif /*__OPTEE_RPC_CMD_H*/
|
||||
diff --git a/drivers/tee/optee/optee_smc.h b/drivers/tee/optee/optee_smc.h
|
||||
index 777ad54d4c2c..821e1c30c150 100644
|
||||
--- a/drivers/tee/optee/optee_smc.h
|
||||
+++ b/drivers/tee/optee/optee_smc.h
|
||||
@@ -1,6 +1,6 @@
|
||||
/* SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) */
|
||||
/*
|
||||
- * Copyright (c) 2015-2019, Linaro Limited
|
||||
+ * Copyright (c) 2015-2021, Linaro Limited
|
||||
*/
|
||||
#ifndef OPTEE_SMC_H
|
||||
#define OPTEE_SMC_H
|
||||
@@ -39,10 +39,10 @@
|
||||
/*
|
||||
* Function specified by SMC Calling convention
|
||||
*
|
||||
- * Return one of the following UIDs if using API specified in this file
|
||||
- * without further extentions:
|
||||
- * 65cb6b93-af0c-4617-8ed6-644a8d1140f8
|
||||
- * see also OPTEE_SMC_UID_* in optee_msg.h
|
||||
+ * Return the following UID if using API specified in this file
|
||||
+ * without further extensions:
|
||||
+ * 384fb3e0-e7f8-11e3-af63-0002a5d5c51b.
|
||||
+ * see also OPTEE_MSG_UID_* in optee_msg.h
|
||||
*/
|
||||
#define OPTEE_SMC_FUNCID_CALLS_UID OPTEE_MSG_FUNCID_CALLS_UID
|
||||
#define OPTEE_SMC_CALLS_UID \
|
||||
@@ -53,7 +53,7 @@
|
||||
/*
|
||||
* Function specified by SMC Calling convention
|
||||
*
|
||||
- * Returns 2.0 if using API specified in this file without further extentions.
|
||||
+ * Returns 2.0 if using API specified in this file without further extensions.
|
||||
* see also OPTEE_MSG_REVISION_* in optee_msg.h
|
||||
*/
|
||||
#define OPTEE_SMC_FUNCID_CALLS_REVISION OPTEE_MSG_FUNCID_CALLS_REVISION
|
||||
@@ -109,8 +109,8 @@ struct optee_smc_call_get_os_revision_result {
|
||||
*
|
||||
* Call register usage:
|
||||
* a0 SMC Function ID, OPTEE_SMC*CALL_WITH_ARG
|
||||
- * a1 Upper 32bit of a 64bit physical pointer to a struct optee_msg_arg
|
||||
- * a2 Lower 32bit of a 64bit physical pointer to a struct optee_msg_arg
|
||||
+ * a1 Upper 32 bits of a 64-bit physical pointer to a struct optee_msg_arg
|
||||
+ * a2 Lower 32 bits of a 64-bit physical pointer to a struct optee_msg_arg
|
||||
* a3 Cache settings, not used if physical pointer is in a predefined shared
|
||||
* memory area else per OPTEE_SMC_SHM_*
|
||||
* a4-6 Not used
|
||||
@@ -214,8 +214,9 @@ struct optee_smc_get_shm_config_result {
|
||||
* secure world accepts command buffers located in any parts of non-secure RAM
|
||||
*/
|
||||
#define OPTEE_SMC_SEC_CAP_DYNAMIC_SHM BIT(2)
|
||||
-
|
||||
-/* Secure world supports Shared Memory with a NULL buffer reference */
|
||||
+/* Secure world is built with virtualization support */
|
||||
+#define OPTEE_SMC_SEC_CAP_VIRTUALIZATION BIT(3)
|
||||
+/* Secure world supports Shared Memory with a NULL reference */
|
||||
#define OPTEE_SMC_SEC_CAP_MEMREF_NULL BIT(4)
|
||||
|
||||
#define OPTEE_SMC_FUNCID_EXCHANGE_CAPABILITIES 9
|
||||
@@ -245,8 +246,8 @@ struct optee_smc_exchange_capabilities_result {
|
||||
*
|
||||
* Normal return register usage:
|
||||
* a0 OPTEE_SMC_RETURN_OK
|
||||
- * a1 Upper 32bit of a 64bit Shared memory cookie
|
||||
- * a2 Lower 32bit of a 64bit Shared memory cookie
|
||||
+ * a1 Upper 32 bits of a 64-bit Shared memory cookie
|
||||
+ * a2 Lower 32 bits of a 64-bit Shared memory cookie
|
||||
* a3-7 Preserved
|
||||
*
|
||||
* Cache empty return register usage:
|
||||
@@ -293,6 +294,31 @@ struct optee_smc_disable_shm_cache_result {
|
||||
#define OPTEE_SMC_ENABLE_SHM_CACHE \
|
||||
OPTEE_SMC_FAST_CALL_VAL(OPTEE_SMC_FUNCID_ENABLE_SHM_CACHE)
|
||||
|
||||
+/*
|
||||
+ * Query OP-TEE about number of supported threads
|
||||
+ *
|
||||
+ * Normal World OS or Hypervisor issues this call to find out how many
|
||||
+ * threads OP-TEE supports. That is how many standard calls can be issued
|
||||
+ * in parallel before OP-TEE will return OPTEE_SMC_RETURN_ETHREAD_LIMIT.
|
||||
+ *
|
||||
+ * Call requests usage:
|
||||
+ * a0 SMC Function ID, OPTEE_SMC_GET_THREAD_COUNT
|
||||
+ * a1-6 Not used
|
||||
+ * a7 Hypervisor Client ID register
|
||||
+ *
|
||||
+ * Normal return register usage:
|
||||
+ * a0 OPTEE_SMC_RETURN_OK
|
||||
+ * a1 Number of threads
|
||||
+ * a2-7 Preserved
|
||||
+ *
|
||||
+ * Error return:
|
||||
+ * a0 OPTEE_SMC_RETURN_UNKNOWN_FUNCTION Requested call is not implemented
|
||||
+ * a1-7 Preserved
|
||||
+ */
|
||||
+#define OPTEE_SMC_FUNCID_GET_THREAD_COUNT 15
|
||||
+#define OPTEE_SMC_GET_THREAD_COUNT \
|
||||
+ OPTEE_SMC_FAST_CALL_VAL(OPTEE_SMC_FUNCID_GET_THREAD_COUNT)
|
||||
+
|
||||
/*
|
||||
* Resume from RPC (for example after processing a foreign interrupt)
|
||||
*
|
||||
@@ -341,16 +367,16 @@ struct optee_smc_disable_shm_cache_result {
|
||||
*
|
||||
* "Return" register usage:
|
||||
* a0 SMC Function ID, OPTEE_SMC_CALL_RETURN_FROM_RPC.
|
||||
- * a1 Upper 32bits of 64bit physical pointer to allocated
|
||||
+ * a1 Upper 32 bits of 64-bit physical pointer to allocated
|
||||
* memory, (a1 == 0 && a2 == 0) if size was 0 or if memory can't
|
||||
* be allocated.
|
||||
- * a2 Lower 32bits of 64bit physical pointer to allocated
|
||||
+ * a2 Lower 32 bits of 64-bit physical pointer to allocated
|
||||
* memory, (a1 == 0 && a2 == 0) if size was 0 or if memory can't
|
||||
* be allocated
|
||||
* a3 Preserved
|
||||
- * a4 Upper 32bits of 64bit Shared memory cookie used when freeing
|
||||
+ * a4 Upper 32 bits of 64-bit Shared memory cookie used when freeing
|
||||
* the memory or doing an RPC
|
||||
- * a5 Lower 32bits of 64bit Shared memory cookie used when freeing
|
||||
+ * a5 Lower 32 bits of 64-bit Shared memory cookie used when freeing
|
||||
* the memory or doing an RPC
|
||||
* a6-7 Preserved
|
||||
*/
|
||||
@@ -363,9 +389,9 @@ struct optee_smc_disable_shm_cache_result {
|
||||
*
|
||||
* "Call" register usage:
|
||||
* a0 This value, OPTEE_SMC_RETURN_RPC_FREE
|
||||
- * a1 Upper 32bits of 64bit shared memory cookie belonging to this
|
||||
+ * a1 Upper 32 bits of 64-bit shared memory cookie belonging to this
|
||||
* argument memory
|
||||
- * a2 Lower 32bits of 64bit shared memory cookie belonging to this
|
||||
+ * a2 Lower 32 bits of 64-bit shared memory cookie belonging to this
|
||||
* argument memory
|
||||
* a3-7 Resume information, must be preserved
|
||||
*
|
||||
@@ -379,7 +405,7 @@ struct optee_smc_disable_shm_cache_result {
|
||||
OPTEE_SMC_RPC_VAL(OPTEE_SMC_RPC_FUNC_FREE)
|
||||
|
||||
/*
|
||||
- * Deliver foreign interrupt to normal world.
|
||||
+ * Deliver a foreign interrupt in normal world.
|
||||
*
|
||||
* "Call" register usage:
|
||||
* a0 OPTEE_SMC_RETURN_RPC_FOREIGN_INTR
|
||||
@@ -389,7 +415,7 @@ struct optee_smc_disable_shm_cache_result {
|
||||
* a0 SMC Function ID, OPTEE_SMC_CALL_RETURN_FROM_RPC.
|
||||
* a1-7 Preserved
|
||||
*/
|
||||
-#define OPTEE_SMC_RPC_FUNC_FOREIGN_INTR 4
|
||||
+#define OPTEE_SMC_RPC_FUNC_FOREIGN_INTR 4
|
||||
#define OPTEE_SMC_RETURN_RPC_FOREIGN_INTR \
|
||||
OPTEE_SMC_RPC_VAL(OPTEE_SMC_RPC_FUNC_FOREIGN_INTR)
|
||||
|
||||
@@ -405,10 +431,10 @@ struct optee_smc_disable_shm_cache_result {
|
||||
*
|
||||
* "Call" register usage:
|
||||
* a0 OPTEE_SMC_RETURN_RPC_CMD
|
||||
- * a1 Upper 32bit of a 64bit Shared memory cookie holding a
|
||||
+ * a1 Upper 32 bits of a 64-bit Shared memory cookie holding a
|
||||
* struct optee_msg_arg, must be preserved, only the data should
|
||||
* be updated
|
||||
- * a2 Lower 32bit of a 64bit Shared memory cookie holding a
|
||||
+ * a2 Lower 32 bits of a 64-bit Shared memory cookie holding a
|
||||
* struct optee_msg_arg, must be preserved, only the data should
|
||||
* be updated
|
||||
* a3-7 Resume information, must be preserved
|
||||
diff --git a/drivers/tee/optee/rpc.c b/drivers/tee/optee/rpc.c
|
||||
index 6cbb3643c6c4..1849180b0278 100644
|
||||
--- a/drivers/tee/optee/rpc.c
|
||||
+++ b/drivers/tee/optee/rpc.c
|
||||
@@ -12,6 +12,7 @@
|
||||
#include <linux/tee_drv.h>
|
||||
#include "optee_private.h"
|
||||
#include "optee_smc.h"
|
||||
+#include "optee_rpc_cmd.h"
|
||||
|
||||
struct wq_entry {
|
||||
struct list_head link;
|
||||
@@ -90,7 +91,7 @@ static void handle_rpc_func_cmd_i2c_transfer(struct tee_context *ctx,
|
||||
if (!adapter)
|
||||
goto bad;
|
||||
|
||||
- if (params[1].u.value.a & OPTEE_MSG_RPC_CMD_I2C_FLAGS_TEN_BIT) {
|
||||
+ if (params[1].u.value.a & OPTEE_RPC_I2C_FLAGS_TEN_BIT) {
|
||||
if (!i2c_check_functionality(adapter,
|
||||
I2C_FUNC_10BIT_ADDR)) {
|
||||
i2c_put_adapter(adapter);
|
||||
@@ -105,10 +106,10 @@ static void handle_rpc_func_cmd_i2c_transfer(struct tee_context *ctx,
|
||||
msg.len = params[2].u.memref.size;
|
||||
|
||||
switch (params[0].u.value.a) {
|
||||
- case OPTEE_MSG_RPC_CMD_I2C_TRANSFER_RD:
|
||||
+ case OPTEE_RPC_I2C_TRANSFER_RD:
|
||||
msg.flags |= I2C_M_RD;
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_CMD_I2C_TRANSFER_WR:
|
||||
+ case OPTEE_RPC_I2C_TRANSFER_WR:
|
||||
break;
|
||||
default:
|
||||
i2c_put_adapter(adapter);
|
||||
@@ -195,10 +196,10 @@ static void handle_rpc_func_cmd_wq(struct optee *optee,
|
||||
goto bad;
|
||||
|
||||
switch (arg->params[0].u.value.a) {
|
||||
- case OPTEE_MSG_RPC_WAIT_QUEUE_SLEEP:
|
||||
+ case OPTEE_RPC_WAIT_QUEUE_SLEEP:
|
||||
wq_sleep(&optee->wait_queue, arg->params[0].u.value.b);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_WAIT_QUEUE_WAKEUP:
|
||||
+ case OPTEE_RPC_WAIT_QUEUE_WAKEUP:
|
||||
wq_wakeup(&optee->wait_queue, arg->params[0].u.value.b);
|
||||
break;
|
||||
default:
|
||||
@@ -268,11 +269,11 @@ static struct tee_shm *cmd_alloc_suppl(struct tee_context *ctx, size_t sz)
|
||||
struct tee_shm *shm;
|
||||
|
||||
param.attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
|
||||
- param.u.value.a = OPTEE_MSG_RPC_SHM_TYPE_APPL;
|
||||
+ param.u.value.a = OPTEE_RPC_SHM_TYPE_APPL;
|
||||
param.u.value.b = sz;
|
||||
param.u.value.c = 0;
|
||||
|
||||
- ret = optee_supp_thrd_req(ctx, OPTEE_MSG_RPC_CMD_SHM_ALLOC, 1, ¶m);
|
||||
+ ret = optee_supp_thrd_req(ctx, OPTEE_RPC_CMD_SHM_ALLOC, 1, ¶m);
|
||||
if (ret)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
@@ -309,10 +310,10 @@ static void handle_rpc_func_cmd_shm_alloc(struct tee_context *ctx,
|
||||
|
||||
sz = arg->params[0].u.value.b;
|
||||
switch (arg->params[0].u.value.a) {
|
||||
- case OPTEE_MSG_RPC_SHM_TYPE_APPL:
|
||||
+ case OPTEE_RPC_SHM_TYPE_APPL:
|
||||
shm = cmd_alloc_suppl(ctx, sz);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_SHM_TYPE_KERNEL:
|
||||
+ case OPTEE_RPC_SHM_TYPE_KERNEL:
|
||||
shm = tee_shm_alloc(ctx, sz, TEE_SHM_MAPPED);
|
||||
break;
|
||||
default:
|
||||
@@ -384,7 +385,7 @@ static void cmd_free_suppl(struct tee_context *ctx, struct tee_shm *shm)
|
||||
struct tee_param param;
|
||||
|
||||
param.attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT;
|
||||
- param.u.value.a = OPTEE_MSG_RPC_SHM_TYPE_APPL;
|
||||
+ param.u.value.a = OPTEE_RPC_SHM_TYPE_APPL;
|
||||
param.u.value.b = tee_shm_get_id(shm);
|
||||
param.u.value.c = 0;
|
||||
|
||||
@@ -401,7 +402,7 @@ static void cmd_free_suppl(struct tee_context *ctx, struct tee_shm *shm)
|
||||
*/
|
||||
tee_shm_put(shm);
|
||||
|
||||
- optee_supp_thrd_req(ctx, OPTEE_MSG_RPC_CMD_SHM_FREE, 1, ¶m);
|
||||
+ optee_supp_thrd_req(ctx, OPTEE_RPC_CMD_SHM_FREE, 1, ¶m);
|
||||
}
|
||||
|
||||
static void handle_rpc_func_cmd_shm_free(struct tee_context *ctx,
|
||||
@@ -419,10 +420,10 @@ static void handle_rpc_func_cmd_shm_free(struct tee_context *ctx,
|
||||
|
||||
shm = (struct tee_shm *)(unsigned long)arg->params[0].u.value.b;
|
||||
switch (arg->params[0].u.value.a) {
|
||||
- case OPTEE_MSG_RPC_SHM_TYPE_APPL:
|
||||
+ case OPTEE_RPC_SHM_TYPE_APPL:
|
||||
cmd_free_suppl(ctx, shm);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_SHM_TYPE_KERNEL:
|
||||
+ case OPTEE_RPC_SHM_TYPE_KERNEL:
|
||||
tee_shm_free(shm);
|
||||
break;
|
||||
default:
|
||||
@@ -459,23 +460,23 @@ static void handle_rpc_func_cmd(struct tee_context *ctx, struct optee *optee,
|
||||
}
|
||||
|
||||
switch (arg->cmd) {
|
||||
- case OPTEE_MSG_RPC_CMD_GET_TIME:
|
||||
+ case OPTEE_RPC_CMD_GET_TIME:
|
||||
handle_rpc_func_cmd_get_time(arg);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_CMD_WAIT_QUEUE:
|
||||
+ case OPTEE_RPC_CMD_WAIT_QUEUE:
|
||||
handle_rpc_func_cmd_wq(optee, arg);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_CMD_SUSPEND:
|
||||
+ case OPTEE_RPC_CMD_SUSPEND:
|
||||
handle_rpc_func_cmd_wait(arg);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_CMD_SHM_ALLOC:
|
||||
+ case OPTEE_RPC_CMD_SHM_ALLOC:
|
||||
free_pages_list(call_ctx);
|
||||
handle_rpc_func_cmd_shm_alloc(ctx, arg, call_ctx);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_CMD_SHM_FREE:
|
||||
+ case OPTEE_RPC_CMD_SHM_FREE:
|
||||
handle_rpc_func_cmd_shm_free(ctx, arg);
|
||||
break;
|
||||
- case OPTEE_MSG_RPC_CMD_I2C_TRANSFER:
|
||||
+ case OPTEE_RPC_CMD_I2C_TRANSFER:
|
||||
handle_rpc_func_cmd_i2c_transfer(ctx, arg);
|
||||
break;
|
||||
default:
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,720 @@
|
||||
From ca74085bd229be214f9bb9eec33f84a8f0a9090c Mon Sep 17 00:00:00 2001
|
||||
From: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
Date: Thu, 25 Mar 2021 15:08:50 +0100
|
||||
Subject: [PATCH 10/14] optee: refactor driver with internal callbacks
|
||||
|
||||
The OP-TEE driver is refactored with three internal callbacks replacing
|
||||
direct calls to optee_from_msg_param(), optee_to_msg_param() and
|
||||
optee_do_call_with_arg().
|
||||
|
||||
These functions a central to communicating with OP-TEE in secure world
|
||||
by using the SMC Calling Convention directly.
|
||||
|
||||
This refactoring makes room for using other primitives to communicate
|
||||
with OP-TEE in secure world while being able to reuse as much as
|
||||
possible from the present driver.
|
||||
|
||||
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
|
||||
Upstream-Status: Pending [Not submitted to upstream yet]
|
||||
---
|
||||
drivers/tee/optee/call.c | 86 +++++++++--------
|
||||
drivers/tee/optee/core.c | 148 ++++++++++++++++++++----------
|
||||
drivers/tee/optee/optee_private.h | 35 +++++--
|
||||
drivers/tee/optee/rpc.c | 19 ++--
|
||||
4 files changed, 182 insertions(+), 106 deletions(-)
|
||||
|
||||
diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c
|
||||
index c0eca4d7d7f2..1439ab896cd0 100644
|
||||
--- a/drivers/tee/optee/call.c
|
||||
+++ b/drivers/tee/optee/call.c
|
||||
@@ -1,6 +1,6 @@
|
||||
// SPDX-License-Identifier: GPL-2.0-only
|
||||
/*
|
||||
- * Copyright (c) 2015, Linaro Limited
|
||||
+ * Copyright (c) 2015-2021, Linaro Limited
|
||||
*/
|
||||
#include <linux/arm-smccc.h>
|
||||
#include <linux/device.h>
|
||||
@@ -116,20 +116,25 @@ static struct optee_session *find_session(struct optee_context_data *ctxdata,
|
||||
/**
|
||||
* optee_do_call_with_arg() - Do an SMC to OP-TEE in secure world
|
||||
* @ctx: calling context
|
||||
- * @parg: physical address of message to pass to secure world
|
||||
+ * @arg: shared memory holding the message to pass to secure world
|
||||
*
|
||||
* Does and SMC to OP-TEE in secure world and handles eventual resulting
|
||||
* Remote Procedure Calls (RPC) from OP-TEE.
|
||||
*
|
||||
* Returns return code from secure world, 0 is OK
|
||||
*/
|
||||
-u32 optee_do_call_with_arg(struct tee_context *ctx, phys_addr_t parg)
|
||||
+int optee_do_call_with_arg(struct tee_context *ctx, struct tee_shm *arg)
|
||||
{
|
||||
struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_call_waiter w;
|
||||
struct optee_rpc_param param = { };
|
||||
struct optee_call_ctx call_ctx = { };
|
||||
- u32 ret;
|
||||
+ phys_addr_t parg;
|
||||
+ int rc;
|
||||
+
|
||||
+ rc = tee_shm_get_pa(arg, 0, &parg);
|
||||
+ if (rc)
|
||||
+ return rc;
|
||||
|
||||
param.a0 = OPTEE_SMC_CALL_WITH_ARG;
|
||||
reg_pair_from_64(¶m.a1, ¶m.a2, parg);
|
||||
@@ -157,7 +162,7 @@ u32 optee_do_call_with_arg(struct tee_context *ctx, phys_addr_t parg)
|
||||
param.a3 = res.a3;
|
||||
optee_handle_rpc(ctx, ¶m, &call_ctx);
|
||||
} else {
|
||||
- ret = res.a0;
|
||||
+ rc = res.a0;
|
||||
break;
|
||||
}
|
||||
}
|
||||
@@ -169,14 +174,12 @@ u32 optee_do_call_with_arg(struct tee_context *ctx, phys_addr_t parg)
|
||||
*/
|
||||
optee_cq_wait_final(&optee->call_queue, &w);
|
||||
|
||||
- return ret;
|
||||
+ return rc;
|
||||
}
|
||||
|
||||
static struct tee_shm *get_msg_arg(struct tee_context *ctx, size_t num_params,
|
||||
- struct optee_msg_arg **msg_arg,
|
||||
- phys_addr_t *msg_parg)
|
||||
+ struct optee_msg_arg **msg_arg)
|
||||
{
|
||||
- int rc;
|
||||
struct tee_shm *shm;
|
||||
struct optee_msg_arg *ma;
|
||||
|
||||
@@ -187,22 +190,13 @@ static struct tee_shm *get_msg_arg(struct tee_context *ctx, size_t num_params,
|
||||
|
||||
ma = tee_shm_get_va(shm, 0);
|
||||
if (IS_ERR(ma)) {
|
||||
- rc = PTR_ERR(ma);
|
||||
- goto out;
|
||||
+ tee_shm_free(shm);
|
||||
+ return (void *)ma;
|
||||
}
|
||||
|
||||
- rc = tee_shm_get_pa(shm, 0, msg_parg);
|
||||
- if (rc)
|
||||
- goto out;
|
||||
-
|
||||
memset(ma, 0, OPTEE_MSG_GET_ARG_SIZE(num_params));
|
||||
ma->num_params = num_params;
|
||||
*msg_arg = ma;
|
||||
-out:
|
||||
- if (rc) {
|
||||
- tee_shm_free(shm);
|
||||
- return ERR_PTR(rc);
|
||||
- }
|
||||
|
||||
return shm;
|
||||
}
|
||||
@@ -211,15 +205,15 @@ int optee_open_session(struct tee_context *ctx,
|
||||
struct tee_ioctl_open_session_arg *arg,
|
||||
struct tee_param *param)
|
||||
{
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_context_data *ctxdata = ctx->data;
|
||||
int rc;
|
||||
struct tee_shm *shm;
|
||||
struct optee_msg_arg *msg_arg;
|
||||
- phys_addr_t msg_parg;
|
||||
struct optee_session *sess = NULL;
|
||||
|
||||
/* +2 for the meta parameters added below */
|
||||
- shm = get_msg_arg(ctx, arg->num_params + 2, &msg_arg, &msg_parg);
|
||||
+ shm = get_msg_arg(ctx, arg->num_params + 2, &msg_arg);
|
||||
if (IS_ERR(shm))
|
||||
return PTR_ERR(shm);
|
||||
|
||||
@@ -242,7 +236,8 @@ int optee_open_session(struct tee_context *ctx,
|
||||
if (rc)
|
||||
goto out;
|
||||
|
||||
- rc = optee_to_msg_param(msg_arg->params + 2, arg->num_params, param);
|
||||
+ rc = optee->ops->to_msg_param(optee, msg_arg->params + 2,
|
||||
+ arg->num_params, param);
|
||||
if (rc)
|
||||
goto out;
|
||||
|
||||
@@ -252,7 +247,7 @@ int optee_open_session(struct tee_context *ctx,
|
||||
goto out;
|
||||
}
|
||||
|
||||
- if (optee_do_call_with_arg(ctx, msg_parg)) {
|
||||
+ if (optee->ops->do_call_with_arg(ctx, shm)) {
|
||||
msg_arg->ret = TEEC_ERROR_COMMUNICATION;
|
||||
msg_arg->ret_origin = TEEC_ORIGIN_COMMS;
|
||||
}
|
||||
@@ -267,7 +262,8 @@ int optee_open_session(struct tee_context *ctx,
|
||||
kfree(sess);
|
||||
}
|
||||
|
||||
- if (optee_from_msg_param(param, arg->num_params, msg_arg->params + 2)) {
|
||||
+ if (optee->ops->from_msg_param(optee, param, arg->num_params,
|
||||
+ msg_arg->params + 2)) {
|
||||
arg->ret = TEEC_ERROR_COMMUNICATION;
|
||||
arg->ret_origin = TEEC_ORIGIN_COMMS;
|
||||
/* Close session again to avoid leakage */
|
||||
@@ -286,16 +282,16 @@ int optee_open_session(struct tee_context *ctx,
|
||||
int optee_close_session_helper(struct tee_context *ctx, u32 session)
|
||||
{
|
||||
struct tee_shm *shm;
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_msg_arg *msg_arg;
|
||||
- phys_addr_t msg_parg;
|
||||
|
||||
- shm = get_msg_arg(ctx, 0, &msg_arg, &msg_parg);
|
||||
+ shm = get_msg_arg(ctx, 0, &msg_arg);
|
||||
if (IS_ERR(shm))
|
||||
return PTR_ERR(shm);
|
||||
|
||||
msg_arg->cmd = OPTEE_MSG_CMD_CLOSE_SESSION;
|
||||
msg_arg->session = session;
|
||||
- optee_do_call_with_arg(ctx, msg_parg);
|
||||
+ optee->ops->do_call_with_arg(ctx, shm);
|
||||
|
||||
tee_shm_free(shm);
|
||||
|
||||
@@ -323,10 +319,10 @@ int optee_close_session(struct tee_context *ctx, u32 session)
|
||||
int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
||||
struct tee_param *param)
|
||||
{
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_context_data *ctxdata = ctx->data;
|
||||
struct tee_shm *shm;
|
||||
struct optee_msg_arg *msg_arg;
|
||||
- phys_addr_t msg_parg;
|
||||
struct optee_session *sess;
|
||||
int rc;
|
||||
|
||||
@@ -337,7 +333,7 @@ int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
||||
if (!sess)
|
||||
return -EINVAL;
|
||||
|
||||
- shm = get_msg_arg(ctx, arg->num_params, &msg_arg, &msg_parg);
|
||||
+ shm = get_msg_arg(ctx, arg->num_params, &msg_arg);
|
||||
if (IS_ERR(shm))
|
||||
return PTR_ERR(shm);
|
||||
msg_arg->cmd = OPTEE_MSG_CMD_INVOKE_COMMAND;
|
||||
@@ -345,16 +341,18 @@ int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
||||
msg_arg->session = arg->session;
|
||||
msg_arg->cancel_id = arg->cancel_id;
|
||||
|
||||
- rc = optee_to_msg_param(msg_arg->params, arg->num_params, param);
|
||||
+ rc = optee->ops->to_msg_param(optee, msg_arg->params, arg->num_params,
|
||||
+ param);
|
||||
if (rc)
|
||||
goto out;
|
||||
|
||||
- if (optee_do_call_with_arg(ctx, msg_parg)) {
|
||||
+ if (optee->ops->do_call_with_arg(ctx, shm)) {
|
||||
msg_arg->ret = TEEC_ERROR_COMMUNICATION;
|
||||
msg_arg->ret_origin = TEEC_ORIGIN_COMMS;
|
||||
}
|
||||
|
||||
- if (optee_from_msg_param(param, arg->num_params, msg_arg->params)) {
|
||||
+ if (optee->ops->from_msg_param(optee, param, arg->num_params,
|
||||
+ msg_arg->params)) {
|
||||
msg_arg->ret = TEEC_ERROR_COMMUNICATION;
|
||||
msg_arg->ret_origin = TEEC_ORIGIN_COMMS;
|
||||
}
|
||||
@@ -368,10 +366,10 @@ int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
||||
|
||||
int optee_cancel_req(struct tee_context *ctx, u32 cancel_id, u32 session)
|
||||
{
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_context_data *ctxdata = ctx->data;
|
||||
struct tee_shm *shm;
|
||||
struct optee_msg_arg *msg_arg;
|
||||
- phys_addr_t msg_parg;
|
||||
struct optee_session *sess;
|
||||
|
||||
/* Check that the session is valid */
|
||||
@@ -381,14 +379,14 @@ int optee_cancel_req(struct tee_context *ctx, u32 cancel_id, u32 session)
|
||||
if (!sess)
|
||||
return -EINVAL;
|
||||
|
||||
- shm = get_msg_arg(ctx, 0, &msg_arg, &msg_parg);
|
||||
+ shm = get_msg_arg(ctx, 0, &msg_arg);
|
||||
if (IS_ERR(shm))
|
||||
return PTR_ERR(shm);
|
||||
|
||||
msg_arg->cmd = OPTEE_MSG_CMD_CANCEL;
|
||||
msg_arg->session = session;
|
||||
msg_arg->cancel_id = cancel_id;
|
||||
- optee_do_call_with_arg(ctx, msg_parg);
|
||||
+ optee->ops->do_call_with_arg(ctx, shm);
|
||||
|
||||
tee_shm_free(shm);
|
||||
return 0;
|
||||
@@ -587,10 +585,10 @@ int optee_shm_register(struct tee_context *ctx, struct tee_shm *shm,
|
||||
struct page **pages, size_t num_pages,
|
||||
unsigned long start)
|
||||
{
|
||||
- struct tee_shm *shm_arg = NULL;
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_msg_arg *msg_arg;
|
||||
+ struct tee_shm *shm_arg;
|
||||
u64 *pages_list;
|
||||
- phys_addr_t msg_parg;
|
||||
int rc;
|
||||
|
||||
if (!num_pages)
|
||||
@@ -604,7 +602,7 @@ int optee_shm_register(struct tee_context *ctx, struct tee_shm *shm,
|
||||
if (!pages_list)
|
||||
return -ENOMEM;
|
||||
|
||||
- shm_arg = get_msg_arg(ctx, 1, &msg_arg, &msg_parg);
|
||||
+ shm_arg = get_msg_arg(ctx, 1, &msg_arg);
|
||||
if (IS_ERR(shm_arg)) {
|
||||
rc = PTR_ERR(shm_arg);
|
||||
goto out;
|
||||
@@ -625,7 +623,7 @@ int optee_shm_register(struct tee_context *ctx, struct tee_shm *shm,
|
||||
msg_arg->params->u.tmem.buf_ptr = virt_to_phys(pages_list) |
|
||||
(tee_shm_get_page_offset(shm) & (OPTEE_MSG_NONCONTIG_PAGE_SIZE - 1));
|
||||
|
||||
- if (optee_do_call_with_arg(ctx, msg_parg) ||
|
||||
+ if (optee->ops->do_call_with_arg(ctx, shm) ||
|
||||
msg_arg->ret != TEEC_SUCCESS)
|
||||
rc = -EINVAL;
|
||||
|
||||
@@ -637,12 +635,12 @@ int optee_shm_register(struct tee_context *ctx, struct tee_shm *shm,
|
||||
|
||||
int optee_shm_unregister(struct tee_context *ctx, struct tee_shm *shm)
|
||||
{
|
||||
- struct tee_shm *shm_arg;
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct optee_msg_arg *msg_arg;
|
||||
- phys_addr_t msg_parg;
|
||||
+ struct tee_shm *shm_arg;
|
||||
int rc = 0;
|
||||
|
||||
- shm_arg = get_msg_arg(ctx, 1, &msg_arg, &msg_parg);
|
||||
+ shm_arg = get_msg_arg(ctx, 1, &msg_arg);
|
||||
if (IS_ERR(shm_arg))
|
||||
return PTR_ERR(shm_arg);
|
||||
|
||||
@@ -651,7 +649,7 @@ int optee_shm_unregister(struct tee_context *ctx, struct tee_shm *shm)
|
||||
msg_arg->params[0].attr = OPTEE_MSG_ATTR_TYPE_RMEM_INPUT;
|
||||
msg_arg->params[0].u.rmem.shm_ref = (unsigned long)shm;
|
||||
|
||||
- if (optee_do_call_with_arg(ctx, msg_parg) ||
|
||||
+ if (optee->ops->do_call_with_arg(ctx, shm) ||
|
||||
msg_arg->ret != TEEC_SUCCESS)
|
||||
rc = -EINVAL;
|
||||
tee_shm_free(shm_arg);
|
||||
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c
|
||||
index e39c6d290d83..ab602bb8e14a 100644
|
||||
--- a/drivers/tee/optee/core.c
|
||||
+++ b/drivers/tee/optee/core.c
|
||||
@@ -1,6 +1,6 @@
|
||||
// SPDX-License-Identifier: GPL-2.0-only
|
||||
/*
|
||||
- * Copyright (c) 2015, Linaro Limited
|
||||
+ * Copyright (c) 2015-2021, Linaro Limited
|
||||
*/
|
||||
|
||||
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||
@@ -26,21 +26,87 @@
|
||||
|
||||
#define OPTEE_SHM_NUM_PRIV_PAGES CONFIG_OPTEE_SHM_NUM_PRIV_PAGES
|
||||
|
||||
+static void from_msg_param_value(struct tee_param *p, u32 attr,
|
||||
+ const struct optee_msg_param *mp)
|
||||
+{
|
||||
+ p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT +
|
||||
+ attr - OPTEE_MSG_ATTR_TYPE_VALUE_INPUT;
|
||||
+ p->u.value.a = mp->u.value.a;
|
||||
+ p->u.value.b = mp->u.value.b;
|
||||
+ p->u.value.c = mp->u.value.c;
|
||||
+}
|
||||
+
|
||||
+static int from_msg_param_tmp_mem(struct tee_param *p, u32 attr,
|
||||
+ const struct optee_msg_param *mp)
|
||||
+{
|
||||
+ struct tee_shm *shm;
|
||||
+ phys_addr_t pa;
|
||||
+ int rc;
|
||||
+
|
||||
+ p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT +
|
||||
+ attr - OPTEE_MSG_ATTR_TYPE_TMEM_INPUT;
|
||||
+ p->u.memref.size = mp->u.tmem.size;
|
||||
+ shm = (struct tee_shm *)(unsigned long)mp->u.tmem.shm_ref;
|
||||
+ if (!shm) {
|
||||
+ p->u.memref.shm_offs = 0;
|
||||
+ p->u.memref.shm = NULL;
|
||||
+ return 0;
|
||||
+ }
|
||||
+
|
||||
+ rc = tee_shm_get_pa(shm, 0, &pa);
|
||||
+ if (rc)
|
||||
+ return rc;
|
||||
+
|
||||
+ p->u.memref.shm_offs = mp->u.tmem.buf_ptr - pa;
|
||||
+ p->u.memref.shm = shm;
|
||||
+
|
||||
+ /* Check that the memref is covered by the shm object */
|
||||
+ if (p->u.memref.size) {
|
||||
+ size_t o = p->u.memref.shm_offs +
|
||||
+ p->u.memref.size - 1;
|
||||
+
|
||||
+ rc = tee_shm_get_pa(shm, o, NULL);
|
||||
+ if (rc)
|
||||
+ return rc;
|
||||
+ }
|
||||
+
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
+static void from_msg_param_reg_mem(struct tee_param *p, u32 attr,
|
||||
+ const struct optee_msg_param *mp)
|
||||
+{
|
||||
+ struct tee_shm *shm;
|
||||
+
|
||||
+ p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT +
|
||||
+ attr - OPTEE_MSG_ATTR_TYPE_RMEM_INPUT;
|
||||
+ p->u.memref.size = mp->u.rmem.size;
|
||||
+ shm = (struct tee_shm *)(unsigned long)mp->u.rmem.shm_ref;
|
||||
+
|
||||
+ if (shm) {
|
||||
+ p->u.memref.shm_offs = mp->u.rmem.offs;
|
||||
+ p->u.memref.shm = shm;
|
||||
+ } else {
|
||||
+ p->u.memref.shm_offs = 0;
|
||||
+ p->u.memref.shm = NULL;
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
/**
|
||||
* optee_from_msg_param() - convert from OPTEE_MSG parameters to
|
||||
* struct tee_param
|
||||
+ * @optee: main service struct
|
||||
* @params: subsystem internal parameter representation
|
||||
* @num_params: number of elements in the parameter arrays
|
||||
* @msg_params: OPTEE_MSG parameters
|
||||
* Returns 0 on success or <0 on failure
|
||||
*/
|
||||
-int optee_from_msg_param(struct tee_param *params, size_t num_params,
|
||||
- const struct optee_msg_param *msg_params)
|
||||
+static int optee_from_msg_param(struct optee *optee, struct tee_param *params,
|
||||
+ size_t num_params,
|
||||
+ const struct optee_msg_param *msg_params)
|
||||
{
|
||||
int rc;
|
||||
size_t n;
|
||||
- struct tee_shm *shm;
|
||||
- phys_addr_t pa;
|
||||
|
||||
for (n = 0; n < num_params; n++) {
|
||||
struct tee_param *p = params + n;
|
||||
@@ -55,48 +121,19 @@ int optee_from_msg_param(struct tee_param *params, size_t num_params,
|
||||
case OPTEE_MSG_ATTR_TYPE_VALUE_INPUT:
|
||||
case OPTEE_MSG_ATTR_TYPE_VALUE_OUTPUT:
|
||||
case OPTEE_MSG_ATTR_TYPE_VALUE_INOUT:
|
||||
- p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT +
|
||||
- attr - OPTEE_MSG_ATTR_TYPE_VALUE_INPUT;
|
||||
- p->u.value.a = mp->u.value.a;
|
||||
- p->u.value.b = mp->u.value.b;
|
||||
- p->u.value.c = mp->u.value.c;
|
||||
+ from_msg_param_value(p, attr, mp);
|
||||
break;
|
||||
case OPTEE_MSG_ATTR_TYPE_TMEM_INPUT:
|
||||
case OPTEE_MSG_ATTR_TYPE_TMEM_OUTPUT:
|
||||
case OPTEE_MSG_ATTR_TYPE_TMEM_INOUT:
|
||||
- p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT +
|
||||
- attr - OPTEE_MSG_ATTR_TYPE_TMEM_INPUT;
|
||||
- p->u.memref.size = mp->u.tmem.size;
|
||||
- shm = (struct tee_shm *)(unsigned long)
|
||||
- mp->u.tmem.shm_ref;
|
||||
- if (!shm) {
|
||||
- p->u.memref.shm_offs = 0;
|
||||
- p->u.memref.shm = NULL;
|
||||
- break;
|
||||
- }
|
||||
- rc = tee_shm_get_pa(shm, 0, &pa);
|
||||
+ rc = from_msg_param_tmp_mem(p, attr, mp);
|
||||
if (rc)
|
||||
return rc;
|
||||
- p->u.memref.shm_offs = mp->u.tmem.buf_ptr - pa;
|
||||
- p->u.memref.shm = shm;
|
||||
break;
|
||||
case OPTEE_MSG_ATTR_TYPE_RMEM_INPUT:
|
||||
case OPTEE_MSG_ATTR_TYPE_RMEM_OUTPUT:
|
||||
case OPTEE_MSG_ATTR_TYPE_RMEM_INOUT:
|
||||
- p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT +
|
||||
- attr - OPTEE_MSG_ATTR_TYPE_RMEM_INPUT;
|
||||
- p->u.memref.size = mp->u.rmem.size;
|
||||
- shm = (struct tee_shm *)(unsigned long)
|
||||
- mp->u.rmem.shm_ref;
|
||||
-
|
||||
- if (!shm) {
|
||||
- p->u.memref.shm_offs = 0;
|
||||
- p->u.memref.shm = NULL;
|
||||
- break;
|
||||
- }
|
||||
- p->u.memref.shm_offs = mp->u.rmem.offs;
|
||||
- p->u.memref.shm = shm;
|
||||
-
|
||||
+ from_msg_param_reg_mem(p, attr, mp);
|
||||
break;
|
||||
|
||||
default:
|
||||
@@ -106,6 +143,16 @@ int optee_from_msg_param(struct tee_param *params, size_t num_params,
|
||||
return 0;
|
||||
}
|
||||
|
||||
+static void to_msg_param_value(struct optee_msg_param *mp,
|
||||
+ const struct tee_param *p)
|
||||
+{
|
||||
+ mp->attr = OPTEE_MSG_ATTR_TYPE_VALUE_INPUT + p->attr -
|
||||
+ TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
|
||||
+ mp->u.value.a = p->u.value.a;
|
||||
+ mp->u.value.b = p->u.value.b;
|
||||
+ mp->u.value.c = p->u.value.c;
|
||||
+}
|
||||
+
|
||||
static int to_msg_param_tmp_mem(struct optee_msg_param *mp,
|
||||
const struct tee_param *p)
|
||||
{
|
||||
@@ -148,13 +195,15 @@ static int to_msg_param_reg_mem(struct optee_msg_param *mp,
|
||||
|
||||
/**
|
||||
* optee_to_msg_param() - convert from struct tee_params to OPTEE_MSG parameters
|
||||
+ * @optee: main service struct
|
||||
* @msg_params: OPTEE_MSG parameters
|
||||
* @num_params: number of elements in the parameter arrays
|
||||
* @params: subsystem itnernal parameter representation
|
||||
* Returns 0 on success or <0 on failure
|
||||
*/
|
||||
-int optee_to_msg_param(struct optee_msg_param *msg_params, size_t num_params,
|
||||
- const struct tee_param *params)
|
||||
+static int optee_to_msg_param(struct optee *optee,
|
||||
+ struct optee_msg_param *msg_params,
|
||||
+ size_t num_params, const struct tee_param *params)
|
||||
{
|
||||
int rc;
|
||||
size_t n;
|
||||
@@ -171,11 +220,7 @@ int optee_to_msg_param(struct optee_msg_param *msg_params, size_t num_params,
|
||||
case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT:
|
||||
case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT:
|
||||
case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT:
|
||||
- mp->attr = OPTEE_MSG_ATTR_TYPE_VALUE_INPUT + p->attr -
|
||||
- TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT;
|
||||
- mp->u.value.a = p->u.value.a;
|
||||
- mp->u.value.b = p->u.value.b;
|
||||
- mp->u.value.c = p->u.value.c;
|
||||
+ to_msg_param_value(mp, p);
|
||||
break;
|
||||
case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT:
|
||||
case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT:
|
||||
@@ -301,7 +346,7 @@ static void optee_release_supp(struct tee_context *ctx)
|
||||
optee_supp_release(&optee->supp);
|
||||
}
|
||||
|
||||
-static const struct tee_driver_ops optee_ops = {
|
||||
+static const struct tee_driver_ops optee_clnt_ops = {
|
||||
.get_version = optee_get_version,
|
||||
.open = optee_open,
|
||||
.release = optee_release,
|
||||
@@ -313,9 +358,9 @@ static const struct tee_driver_ops optee_ops = {
|
||||
.shm_unregister = optee_shm_unregister,
|
||||
};
|
||||
|
||||
-static const struct tee_desc optee_desc = {
|
||||
+static const struct tee_desc optee_clnt_desc = {
|
||||
.name = DRIVER_NAME "-clnt",
|
||||
- .ops = &optee_ops,
|
||||
+ .ops = &optee_clnt_ops,
|
||||
.owner = THIS_MODULE,
|
||||
};
|
||||
|
||||
@@ -336,6 +381,12 @@ static const struct tee_desc optee_supp_desc = {
|
||||
.flags = TEE_DESC_PRIVILEGED,
|
||||
};
|
||||
|
||||
+static const struct optee_ops optee_ops = {
|
||||
+ .do_call_with_arg = optee_do_call_with_arg,
|
||||
+ .to_msg_param = optee_to_msg_param,
|
||||
+ .from_msg_param = optee_from_msg_param,
|
||||
+};
|
||||
+
|
||||
static bool optee_msg_api_uid_is_optee_api(optee_invoke_fn *invoke_fn)
|
||||
{
|
||||
struct arm_smccc_res res;
|
||||
@@ -637,10 +688,11 @@ static int optee_probe(struct platform_device *pdev)
|
||||
goto err;
|
||||
}
|
||||
|
||||
+ optee->ops = &optee_ops;
|
||||
optee->invoke_fn = invoke_fn;
|
||||
optee->sec_caps = sec_caps;
|
||||
|
||||
- teedev = tee_device_alloc(&optee_desc, NULL, pool, optee);
|
||||
+ teedev = tee_device_alloc(&optee_clnt_desc, NULL, pool, optee);
|
||||
if (IS_ERR(teedev)) {
|
||||
rc = PTR_ERR(teedev);
|
||||
goto err;
|
||||
diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h
|
||||
index 2b63b796645e..c5741e96e967 100644
|
||||
--- a/drivers/tee/optee/optee_private.h
|
||||
+++ b/drivers/tee/optee/optee_private.h
|
||||
@@ -1,6 +1,6 @@
|
||||
/* SPDX-License-Identifier: GPL-2.0-only */
|
||||
/*
|
||||
- * Copyright (c) 2015, Linaro Limited
|
||||
+ * Copyright (c) 2015-2021, Linaro Limited
|
||||
*/
|
||||
|
||||
#ifndef OPTEE_PRIVATE_H
|
||||
@@ -66,9 +66,34 @@ struct optee_supp {
|
||||
struct completion reqs_c;
|
||||
};
|
||||
|
||||
+struct optee;
|
||||
+
|
||||
+/**
|
||||
+ * struct optee_ops - OP-TEE driver internal operations
|
||||
+ * @do_call_with_arg: enters OP-TEE in secure world
|
||||
+ * @to_msg_param: converts from struct tee_param to OPTEE_MSG parameters
|
||||
+ * @from_msg_param: converts from OPTEE_MSG parameters to struct tee_param
|
||||
+ *
|
||||
+ * These OPs are only supposed to be used internally in the OP-TEE driver
|
||||
+ * as a way of abstracting the different methogs of entering OP-TEE in
|
||||
+ * secure world.
|
||||
+ */
|
||||
+struct optee_ops {
|
||||
+ int (*do_call_with_arg)(struct tee_context *ctx,
|
||||
+ struct tee_shm *shm_arg);
|
||||
+ int (*to_msg_param)(struct optee *optee,
|
||||
+ struct optee_msg_param *msg_params,
|
||||
+ size_t num_params, const struct tee_param *params);
|
||||
+ int (*from_msg_param)(struct optee *optee, struct tee_param *params,
|
||||
+ size_t num_params,
|
||||
+ const struct optee_msg_param *msg_params);
|
||||
+};
|
||||
+
|
||||
/**
|
||||
* struct optee - main service struct
|
||||
* @supp_teedev: supplicant device
|
||||
+ * @ops: internal callbacks for different ways to reach secure
|
||||
+ * world
|
||||
* @teedev: client device
|
||||
* @invoke_fn: function to issue smc or hvc
|
||||
* @call_queue: queue of threads waiting to call @invoke_fn
|
||||
@@ -86,6 +111,7 @@ struct optee_supp {
|
||||
struct optee {
|
||||
struct tee_device *supp_teedev;
|
||||
struct tee_device *teedev;
|
||||
+ const struct optee_ops *ops;
|
||||
optee_invoke_fn *invoke_fn;
|
||||
struct optee_call_queue call_queue;
|
||||
struct optee_wait_queue wait_queue;
|
||||
@@ -148,7 +174,7 @@ int optee_supp_recv(struct tee_context *ctx, u32 *func, u32 *num_params,
|
||||
int optee_supp_send(struct tee_context *ctx, u32 ret, u32 num_params,
|
||||
struct tee_param *param);
|
||||
|
||||
-u32 optee_do_call_with_arg(struct tee_context *ctx, phys_addr_t parg);
|
||||
+int optee_do_call_with_arg(struct tee_context *ctx, struct tee_shm *arg);
|
||||
int optee_open_session(struct tee_context *ctx,
|
||||
struct tee_ioctl_open_session_arg *arg,
|
||||
struct tee_param *param);
|
||||
@@ -171,11 +197,6 @@ int optee_shm_register_supp(struct tee_context *ctx, struct tee_shm *shm,
|
||||
unsigned long start);
|
||||
int optee_shm_unregister_supp(struct tee_context *ctx, struct tee_shm *shm);
|
||||
|
||||
-int optee_from_msg_param(struct tee_param *params, size_t num_params,
|
||||
- const struct optee_msg_param *msg_params);
|
||||
-int optee_to_msg_param(struct optee_msg_param *msg_params, size_t num_params,
|
||||
- const struct tee_param *params);
|
||||
-
|
||||
u64 *optee_allocate_pages_list(size_t num_entries);
|
||||
void optee_free_pages_list(void *array, size_t num_entries);
|
||||
void optee_fill_pages_list(u64 *dst, struct page **pages, int num_pages,
|
||||
diff --git a/drivers/tee/optee/rpc.c b/drivers/tee/optee/rpc.c
|
||||
index 1849180b0278..39562fb6841e 100644
|
||||
--- a/drivers/tee/optee/rpc.c
|
||||
+++ b/drivers/tee/optee/rpc.c
|
||||
@@ -1,6 +1,6 @@
|
||||
// SPDX-License-Identifier: GPL-2.0-only
|
||||
/*
|
||||
- * Copyright (c) 2015-2016, Linaro Limited
|
||||
+ * Copyright (c) 2015-2021, Linaro Limited
|
||||
*/
|
||||
|
||||
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||
@@ -55,6 +55,7 @@ static void handle_rpc_func_cmd_get_time(struct optee_msg_arg *arg)
|
||||
static void handle_rpc_func_cmd_i2c_transfer(struct tee_context *ctx,
|
||||
struct optee_msg_arg *arg)
|
||||
{
|
||||
+ struct optee *optee = tee_get_drvdata(ctx->teedev);
|
||||
struct tee_param *params;
|
||||
struct i2c_adapter *adapter;
|
||||
struct i2c_msg msg = { };
|
||||
@@ -79,7 +80,8 @@ static void handle_rpc_func_cmd_i2c_transfer(struct tee_context *ctx,
|
||||
return;
|
||||
}
|
||||
|
||||
- if (optee_from_msg_param(params, arg->num_params, arg->params))
|
||||
+ if (optee->ops->from_msg_param(optee, params, arg->num_params,
|
||||
+ arg->params))
|
||||
goto bad;
|
||||
|
||||
for (i = 0; i < arg->num_params; i++) {
|
||||
@@ -122,7 +124,8 @@ static void handle_rpc_func_cmd_i2c_transfer(struct tee_context *ctx,
|
||||
arg->ret = TEEC_ERROR_COMMUNICATION;
|
||||
} else {
|
||||
params[3].u.value.a = msg.len;
|
||||
- if (optee_to_msg_param(arg->params, arg->num_params, params))
|
||||
+ if (optee->ops->to_msg_param(optee, arg->params,
|
||||
+ arg->num_params, params))
|
||||
arg->ret = TEEC_ERROR_BAD_PARAMETERS;
|
||||
else
|
||||
arg->ret = TEEC_SUCCESS;
|
||||
@@ -234,7 +237,7 @@ static void handle_rpc_func_cmd_wait(struct optee_msg_arg *arg)
|
||||
arg->ret = TEEC_ERROR_BAD_PARAMETERS;
|
||||
}
|
||||
|
||||
-static void handle_rpc_supp_cmd(struct tee_context *ctx,
|
||||
+static void handle_rpc_supp_cmd(struct tee_context *ctx, struct optee *optee,
|
||||
struct optee_msg_arg *arg)
|
||||
{
|
||||
struct tee_param *params;
|
||||
@@ -248,14 +251,16 @@ static void handle_rpc_supp_cmd(struct tee_context *ctx,
|
||||
return;
|
||||
}
|
||||
|
||||
- if (optee_from_msg_param(params, arg->num_params, arg->params)) {
|
||||
+ if (optee->ops->from_msg_param(optee, params, arg->num_params,
|
||||
+ arg->params)) {
|
||||
arg->ret = TEEC_ERROR_BAD_PARAMETERS;
|
||||
goto out;
|
||||
}
|
||||
|
||||
arg->ret = optee_supp_thrd_req(ctx, arg->cmd, arg->num_params, params);
|
||||
|
||||
- if (optee_to_msg_param(arg->params, arg->num_params, params))
|
||||
+ if (optee->ops->to_msg_param(optee, arg->params, arg->num_params,
|
||||
+ params))
|
||||
arg->ret = TEEC_ERROR_BAD_PARAMETERS;
|
||||
out:
|
||||
kfree(params);
|
||||
@@ -480,7 +485,7 @@ static void handle_rpc_func_cmd(struct tee_context *ctx, struct optee *optee,
|
||||
handle_rpc_func_cmd_i2c_transfer(ctx, arg);
|
||||
break;
|
||||
default:
|
||||
- handle_rpc_supp_cmd(ctx, arg);
|
||||
+ handle_rpc_supp_cmd(ctx, optee, arg);
|
||||
}
|
||||
}
|
||||
|
||||
--
|
||||
2.29.2
|
||||
|
||||
@@ -0,0 +1,131 @@
|
||||
From 69f802594252a0745ba4e798012a0fb6524b6267 Mon Sep 17 00:00:00 2001
|
||||
From: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
Date: Thu, 25 Mar 2021 15:08:52 +0100
|
||||
Subject: [PATCH 11/14] optee: add a FF-A memory pool
|
||||
|
||||
Adds a memory pool to be used when the driver uses FF-A [1] as transport
|
||||
layer.
|
||||
|
||||
[1] https://developer.arm.com/documentation/den0077/latest
|
||||
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
|
||||
|
||||
Upstream-Status: Pending [Not submitted to upstream yet]
|
||||
---
|
||||
drivers/tee/optee/shm_pool.c | 65 +++++++++++++++++++++++++++++++++---
|
||||
drivers/tee/optee/shm_pool.h | 1 +
|
||||
2 files changed, 61 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/drivers/tee/optee/shm_pool.c b/drivers/tee/optee/shm_pool.c
|
||||
index d767eebf30bd..d2116cb39c8b 100644
|
||||
--- a/drivers/tee/optee/shm_pool.c
|
||||
+++ b/drivers/tee/optee/shm_pool.c
|
||||
@@ -12,8 +12,14 @@
|
||||
#include "optee_smc.h"
|
||||
#include "shm_pool.h"
|
||||
|
||||
-static int pool_op_alloc(struct tee_shm_pool_mgr *poolm,
|
||||
- struct tee_shm *shm, size_t size)
|
||||
+static int
|
||||
+pool_op_alloc_helper(struct tee_shm_pool_mgr *poolm,
|
||||
+ struct tee_shm *shm, size_t size,
|
||||
+ int (*shm_register)(struct tee_context *ctx,
|
||||
+ struct tee_shm *shm,
|
||||
+ struct page **pages,
|
||||
+ size_t num_pages,
|
||||
+ unsigned long start))
|
||||
{
|
||||
unsigned int order = get_order(size);
|
||||
struct page *page;
|
||||
@@ -27,7 +33,7 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm,
|
||||
shm->paddr = page_to_phys(page);
|
||||
shm->size = PAGE_SIZE << order;
|
||||
|
||||
- if (shm->flags & TEE_SHM_DMA_BUF) {
|
||||
+ if (shm_register) {
|
||||
unsigned int nr_pages = 1 << order, i;
|
||||
struct page **pages;
|
||||
|
||||
@@ -41,14 +47,23 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm,
|
||||
}
|
||||
|
||||
shm->flags |= TEE_SHM_REGISTER;
|
||||
- rc = optee_shm_register(shm->ctx, shm, pages, nr_pages,
|
||||
- (unsigned long)shm->kaddr);
|
||||
+ rc = shm_register(shm->ctx, shm, pages, nr_pages,
|
||||
+ (unsigned long)shm->kaddr);
|
||||
kfree(pages);
|
||||
}
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
+static int pool_op_alloc(struct tee_shm_pool_mgr *poolm,
|
||||
+ struct tee_shm *shm, size_t size)
|
||||
+{
|
||||
+ if (!(shm->flags & TEE_SHM_DMA_BUF))
|
||||
+ return pool_op_alloc_helper(poolm, shm, size, NULL);
|
||||
+
|
||||
+ return pool_op_alloc_helper(poolm, shm, size, optee_shm_register);
|
||||
+}
|
||||
+
|
||||
static void pool_op_free(struct tee_shm_pool_mgr *poolm,
|
||||
struct tee_shm *shm)
|
||||
{
|
||||
@@ -87,3 +102,43 @@ struct tee_shm_pool_mgr *optee_shm_pool_alloc_pages(void)
|
||||
|
||||
return mgr;
|
||||
}
|
||||
+
|
||||
+#ifdef CONFIG_ARM_FFA_TRANSPORT
|
||||
+static int pool_ffa_op_alloc(struct tee_shm_pool_mgr *poolm,
|
||||
+ struct tee_shm *shm, size_t size)
|
||||
+{
|
||||
+ return pool_op_alloc_helper(poolm, shm, size, optee_ffa_shm_register);
|
||||
+}
|
||||
+
|
||||
+static void pool_ffa_op_free(struct tee_shm_pool_mgr *poolm,
|
||||
+ struct tee_shm *shm)
|
||||
+{
|
||||
+ optee_ffa_shm_unregister(shm->ctx, shm);
|
||||
+ free_pages((unsigned long)shm->kaddr, get_order(shm->size));
|
||||
+ shm->kaddr = NULL;
|
||||
+}
|
||||
+
|
||||
+static const struct tee_shm_pool_mgr_ops pool_ffa_ops = {
|
||||
+ .alloc = pool_ffa_op_alloc,
|
||||
+ .free = pool_ffa_op_free,
|
||||
+ .destroy_poolmgr = pool_op_destroy_poolmgr,
|
||||
+};
|
||||
+
|
||||
+/**
|
||||
+ * optee_ffa_shm_pool_alloc_pages() - create page-based allocator pool
|
||||
+ *
|
||||
+ * This pool is used with OP-TEE over FF-A. In this case command buffers
|
||||
+ * and such are allocated from kernel's own memory.
|
||||
+ */
|
||||
+struct tee_shm_pool_mgr *optee_ffa_shm_pool_alloc_pages(void)
|
||||
+{
|
||||
+ struct tee_shm_pool_mgr *mgr = kzalloc(sizeof(*mgr), GFP_KERNEL);
|
||||
+
|
||||
+ if (!mgr)
|
||||
+ return ERR_PTR(-ENOMEM);
|
||||
+
|
||||
+ mgr->ops = &pool_ffa_ops;
|
||||
+
|
||||
+ return mgr;
|
||||
+}
|
||||
+#endif /*CONFIG_ARM_FFA_TRANSPORT*/
|
||||
diff --git a/drivers/tee/optee/shm_pool.h b/drivers/tee/optee/shm_pool.h
|
||||
index 28109d991c4b..34c5fd74a3ff 100644
|
||||
--- a/drivers/tee/optee/shm_pool.h
|
||||
+++ b/drivers/tee/optee/shm_pool.h
|
||||
@@ -10,5 +10,6 @@
|
||||
#include <linux/tee_drv.h>
|
||||
|
||||
struct tee_shm_pool_mgr *optee_shm_pool_alloc_pages(void);
|
||||
+struct tee_shm_pool_mgr *optee_ffa_shm_pool_alloc_pages(void);
|
||||
|
||||
#endif
|
||||
--
|
||||
2.29.2
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -0,0 +1,58 @@
|
||||
From 831d01e34ff2065c585da91c8923ea44146097cd Mon Sep 17 00:00:00 2001
|
||||
From: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
|
||||
Date: Thu, 27 May 2021 13:40:33 +0100
|
||||
Subject: [PATCH 13/14] drivers: optee: hack for UUID endianess issue
|
||||
|
||||
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
|
||||
Signed-off-by: Sudeep Holla <sudeep.holla@arm.com>
|
||||
Change-Id: Id5c42e4fe491a448f746b9d132dae20c85666554
|
||||
|
||||
Upstream-Status: Inappropriate [will not be submitted as its only a workaround]
|
||||
---
|
||||
drivers/firmware/arm_ffa/driver.c | 19 +++++++++++++++++++
|
||||
1 file changed, 19 insertions(+)
|
||||
|
||||
diff --git a/drivers/firmware/arm_ffa/driver.c b/drivers/firmware/arm_ffa/driver.c
|
||||
index 056a3fca14d1..82c84fe10be2 100644
|
||||
--- a/drivers/firmware/arm_ffa/driver.c
|
||||
+++ b/drivers/firmware/arm_ffa/driver.c
|
||||
@@ -275,8 +275,18 @@ ffa_partition_probe(const uuid_t *uuid, struct ffa_partition_info **buffer)
|
||||
struct ffa_partition_info *pbuf;
|
||||
|
||||
export_uuid((u8 *)uuid0_4, uuid);
|
||||
+
|
||||
+#if 0
|
||||
count = __ffa_partition_info_get(uuid0_4[0], uuid0_4[1], uuid0_4[2],
|
||||
uuid0_4[3], NULL, 0);
|
||||
+#else
|
||||
+ /* hack for optee UUID endianess issue */
|
||||
+ count = __ffa_partition_info_get(be32_to_cpup(&uuid0_4[0]),
|
||||
+ be32_to_cpup(&uuid0_4[1]),
|
||||
+ be32_to_cpup(&uuid0_4[2]),
|
||||
+ be32_to_cpup(&uuid0_4[3]), NULL, 0);
|
||||
+#endif
|
||||
+
|
||||
if (count <= 0)
|
||||
return count;
|
||||
|
||||
@@ -284,8 +294,17 @@ ffa_partition_probe(const uuid_t *uuid, struct ffa_partition_info **buffer)
|
||||
if (!pbuf)
|
||||
return -ENOMEM;
|
||||
|
||||
+#if 0
|
||||
count = __ffa_partition_info_get(uuid0_4[0], uuid0_4[1], uuid0_4[2],
|
||||
uuid0_4[3], pbuf, count);
|
||||
+#else
|
||||
+ /* hack for optee UUID endianess issue */
|
||||
+ count = __ffa_partition_info_get(be32_to_cpup(&uuid0_4[0]),
|
||||
+ be32_to_cpup(&uuid0_4[1]),
|
||||
+ be32_to_cpup(&uuid0_4[2]),
|
||||
+ be32_to_cpup(&uuid0_4[3]),
|
||||
+ pbuf, count);
|
||||
+#endif
|
||||
if (count <= 0)
|
||||
kfree(pbuf);
|
||||
|
||||
--
|
||||
2.29.2
|
||||
|
||||
Reference in New Issue
Block a user