kernel_samsung_a34x-permissive/drivers/misc/mediatek/geniezone/gz-trusty/trusty-mem.c
2024-04-28 15:51:13 +02:00

148 lines
3.4 KiB
C

// SPDX-License-Identifier: GPL-2.0
/*
* Copyright (c) 2019 MediaTek Inc.
*/
/*
* GenieZone (hypervisor-based seucrity platform) enables hardware protected
* and isolated security execution environment, includes
* 1. GZ hypervisor
* 2. Hypervisor-TEE OS (built-in Trusty OS)
* 3. Drivers (ex: debug, communication and interrupt) for GZ and
* hypervisor-TEE OS
* 4. GZ and hypervisor-TEE and GZ framework (supporting multiple TEE
* ecosystem, ex: M-TEE, Trusty, GlobalPlatform, ...)
*/
/*
* This is IPC driver
*
* For communication between client OS and hypervisor-TEE OS, IPC driver
* is provided, including:
* 1. standard call interface for communication and entering hypervisor-TEE
* 2. virtio for message/command passing by shared memory
* 3. IPC driver
*/
#include <linux/types.h>
#include <linux/printk.h>
#include <gz-trusty/trusty.h>
#include <gz-trusty/smcall.h>
static int get_mem_attr(struct page *page, pgprot_t pgprot)
{
#if IS_ENABLED(CONFIG_ARM64)
uint64_t mair;
uint attr_index = (pgprot_val(pgprot) & PTE_ATTRINDX_MASK) >> 2;
asm ("mrs %0, mair_el1\n" : "=&r" (mair));
return (mair >> (attr_index * 8)) & 0xff;
#elif IS_ENABLED(CONFIG_ARM_LPAE)
uint32_t mair;
uint attr_index = ((pgprot_val(pgprot) & L_PTE_MT_MASK) >> 2);
if (attr_index >= 4) {
attr_index -= 4;
asm volatile("mrc p15, 0, %0, c10, c2, 1\n" : "=&r" (mair));
} else {
asm volatile("mrc p15, 0, %0, c10, c2, 0\n" : "=&r" (mair));
}
return (mair >> (attr_index * 8)) & 0xff;
#elif IS_ENABLED(CONFIG_ARM)
/* check memory type */
switch (pgprot_val(pgprot) & L_PTE_MT_MASK) {
case L_PTE_MT_WRITEALLOC:
/* Normal: write back write allocate */
return 0xFF;
case L_PTE_MT_BUFFERABLE:
/* Normal: non-cacheble */
return 0x44;
case L_PTE_MT_WRITEBACK:
/* Normal: writeback, read allocate */
return 0xEE;
case L_PTE_MT_WRITETHROUGH:
/* Normal: write through */
return 0xAA;
case L_PTE_MT_UNCACHED:
/* strongly ordered */
return 0x00;
case L_PTE_MT_DEV_SHARED:
case L_PTE_MT_DEV_NONSHARED:
/* device */
return 0x04;
default:
return -EINVAL;
}
#else
return 0;
#endif
}
int trusty_encode_page_info(struct ns_mem_page_info *inf,
struct page *page, pgprot_t pgprot)
{
int mem_attr;
uint64_t pte;
if (!inf || !page)
return -EINVAL;
/* get physical address */
pte = (uint64_t) page_to_phys(page);
/* get memory attributes */
mem_attr = get_mem_attr(page, pgprot);
if (mem_attr < 0)
return mem_attr;
/* add other attributes */
#if IS_ENABLED(CONFIG_ARM64) || IS_ENABLED(CONFIG_ARM_LPAE)
pte |= pgprot_val(pgprot);
#elif IS_ENABLED(CONFIG_ARM)
if (pgprot_val(pgprot) & L_PTE_USER)
pte |= (1 << 6);
if (pgprot_val(pgprot) & L_PTE_RDONLY)
pte |= (1 << 7);
if (pgprot_val(pgprot) & L_PTE_SHARED)
pte |= (3 << 8); /* inner sharable */
#endif
inf->attr = (pte & 0x0000FFFFFFFFFFFFull) | ((uint64_t)mem_attr << 48);
return 0;
}
int trusty_call32_mem_buf(struct device *dev, u32 smcnr,
struct page *page, u32 size,
pgprot_t pgprot)
{
int ret;
struct ns_mem_page_info pg_inf;
if (!dev || !page)
return -EINVAL;
ret = trusty_encode_page_info(&pg_inf, page, pgprot);
if (ret)
return ret;
if (SMC_IS_FASTCALL(smcnr)) {
return trusty_fast_call32(dev, smcnr,
(u32)pg_inf.attr,
(u32)(pg_inf.attr >> 32), size);
} else {
return trusty_std_call32(dev, smcnr,
(u32)pg_inf.attr,
(u32)(pg_inf.attr >> 32), size);
}
}