// SPDX-License-Identifier: GPL-2.0 /* * Copyright (c) 2019 MediaTek Inc. */ /* * GenieZone (hypervisor-based seucrity platform) enables hardware protected * and isolated security execution environment, includes * 1. GZ hypervisor * 2. Hypervisor-TEE OS (built-in Trusty OS) * 3. Drivers (ex: debug, communication and interrupt) for GZ and * hypervisor-TEE OS * 4. GZ and hypervisor-TEE and GZ framework (supporting multiple TEE * ecosystem, ex: M-TEE, Trusty, GlobalPlatform, ...) */ /* * This is IPC driver * * For communication between client OS and hypervisor-TEE OS, IPC driver * is provided, including: * 1. standard call interface for communication and entering hypervisor-TEE * 2. virtio for message/command passing by shared memory * 3. IPC driver */ #include #include #include #include static int get_mem_attr(struct page *page, pgprot_t pgprot) { #if IS_ENABLED(CONFIG_ARM64) uint64_t mair; uint attr_index = (pgprot_val(pgprot) & PTE_ATTRINDX_MASK) >> 2; asm ("mrs %0, mair_el1\n" : "=&r" (mair)); return (mair >> (attr_index * 8)) & 0xff; #elif IS_ENABLED(CONFIG_ARM_LPAE) uint32_t mair; uint attr_index = ((pgprot_val(pgprot) & L_PTE_MT_MASK) >> 2); if (attr_index >= 4) { attr_index -= 4; asm volatile("mrc p15, 0, %0, c10, c2, 1\n" : "=&r" (mair)); } else { asm volatile("mrc p15, 0, %0, c10, c2, 0\n" : "=&r" (mair)); } return (mair >> (attr_index * 8)) & 0xff; #elif IS_ENABLED(CONFIG_ARM) /* check memory type */ switch (pgprot_val(pgprot) & L_PTE_MT_MASK) { case L_PTE_MT_WRITEALLOC: /* Normal: write back write allocate */ return 0xFF; case L_PTE_MT_BUFFERABLE: /* Normal: non-cacheble */ return 0x44; case L_PTE_MT_WRITEBACK: /* Normal: writeback, read allocate */ return 0xEE; case L_PTE_MT_WRITETHROUGH: /* Normal: write through */ return 0xAA; case L_PTE_MT_UNCACHED: /* strongly ordered */ return 0x00; case L_PTE_MT_DEV_SHARED: case L_PTE_MT_DEV_NONSHARED: /* device */ return 0x04; default: return -EINVAL; } #else return 0; #endif } int trusty_encode_page_info(struct ns_mem_page_info *inf, struct page *page, pgprot_t pgprot) { int mem_attr; uint64_t pte; if (!inf || !page) return -EINVAL; /* get physical address */ pte = (uint64_t) page_to_phys(page); /* get memory attributes */ mem_attr = get_mem_attr(page, pgprot); if (mem_attr < 0) return mem_attr; /* add other attributes */ #if IS_ENABLED(CONFIG_ARM64) || IS_ENABLED(CONFIG_ARM_LPAE) pte |= pgprot_val(pgprot); #elif IS_ENABLED(CONFIG_ARM) if (pgprot_val(pgprot) & L_PTE_USER) pte |= (1 << 6); if (pgprot_val(pgprot) & L_PTE_RDONLY) pte |= (1 << 7); if (pgprot_val(pgprot) & L_PTE_SHARED) pte |= (3 << 8); /* inner sharable */ #endif inf->attr = (pte & 0x0000FFFFFFFFFFFFull) | ((uint64_t)mem_attr << 48); return 0; } int trusty_call32_mem_buf(struct device *dev, u32 smcnr, struct page *page, u32 size, pgprot_t pgprot) { int ret; struct ns_mem_page_info pg_inf; if (!dev || !page) return -EINVAL; ret = trusty_encode_page_info(&pg_inf, page, pgprot); if (ret) return ret; if (SMC_IS_FASTCALL(smcnr)) { return trusty_fast_call32(dev, smcnr, (u32)pg_inf.attr, (u32)(pg_inf.attr >> 32), size); } else { return trusty_std_call32(dev, smcnr, (u32)pg_inf.attr, (u32)(pg_inf.attr >> 32), size); } }