Received: by 2002:a19:ef0c:0:0:0:0:0 with SMTP id n12csp980482lfh; Thu, 27 Jan 2022 04:44:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJwPbqmxCqHi5OvcYnKTf712+AUBmzsjPLZKsMfiO8yc9ZN17U0V5HZ7eKqfSwM/TXkWKfu5 X-Received: by 2002:a05:6402:50c6:: with SMTP id h6mr3489822edb.256.1643287456087; Thu, 27 Jan 2022 04:44:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643287456; cv=none; d=google.com; s=arc-20160816; b=qmLJjQWF5ACMRCsN9teeiWXkHGJvYCw0m4+Xhp3bFF087hTEHqM8W/5L3N9ipYcvv1 ClJf5Cz58A5N3Bf43WpS1oaggbafaCzXhHTtNrgblcABf0Bpf7EGS9k0UsZeLxLxcyea Z+qXhXc3RawD8jqWL0Kj3yM+2VVQtgM7r6R6NbUBE4viNhY1qN42Rj4vGUtvF5qPiuhO Idw80h1J93eVg3Ywso9ixJK0YGkJRqIe89gbUKotW116rI8NLOrTyoP5u1bbI1wHByVs 9zAgrwh5ogAYZ1gSPUAsjZdFsRpbaET2AAJC+eU6xA7nl9KbDSsi2oXsYczPULprWbKS PoeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=iXQyqo2emP8qs30+0vsyywvi13y9qFkO62eUsmTUog0=; b=fTO8BeiXhTxtPMPtv4XoPULuHF6LNGL2ZFI8+ysyvVNLvHUIt9B1bK2ge005Di1MKc 6sxkVvYcWwuTUiH4pqLL5kirOUT8oJcdVl/1kg0tVltLxPAvyAUoFtshhq069ktjbijX nDHFIXdox02jI+uQM4NhBk2l6onYdF1Npzw0wvFJNpsF1Qn0qygGQzv6gvhx6ldTJ4X7 04jyCGE1QPKGOXApseEmOajvBaEPj6gl5FcbqfceKScliaDhIXmFgyAlWSTFXptBQa// TtqLDGMIwNmQ47ylIbt3Y5oBNO6PSKttnKWl4EFSIwUzFe9WpSOlGxVMf7oRNbuy/P1O ZUpg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=wwwXm6or; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z28si1219652ejl.19.2022.01.27.04.43.51; Thu, 27 Jan 2022 04:44:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=wwwXm6or; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236817AbiA0GgB (ORCPT + 99 others); Thu, 27 Jan 2022 01:36:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51466 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236808AbiA0Gf6 (ORCPT ); Thu, 27 Jan 2022 01:35:58 -0500 Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AD8A7C061714 for ; Wed, 26 Jan 2022 22:35:57 -0800 (PST) Received: by mail-lj1-x22e.google.com with SMTP id t7so2774663ljc.10 for ; Wed, 26 Jan 2022 22:35:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=iXQyqo2emP8qs30+0vsyywvi13y9qFkO62eUsmTUog0=; b=wwwXm6orfaLkx3b880PAp1JYR9VKcE1pMHFQXnQtPFB3iE83rLvURHaBx+3W2RrE2Q C6TAQDuE8lWMb74FEXnD6AQRmrHhlNMNeM+9PSZcXqC592pXbih3fvs7PKN9E9YSI+4R /FjsbvFlZWt3ZmG6hBSJHbe8TEw05KRaBWcrS4jnW355VmhQYHVVTVH886I7BnIiarGo MilbeetbGTPJAK/uX8tB5BvvDefattBOZ6NrlC51roK4ecQq+dPOIO6QfWyapZLgfIis xwEFa2ZZo/7F9NbsNZENIL3ixHHxQN9E0nklaVCrBn6p9HOLyeyN5dGVR/gPbHmJ0ed2 kk8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=iXQyqo2emP8qs30+0vsyywvi13y9qFkO62eUsmTUog0=; b=eAZnFzy5koJX8iYH25wkuBSDldV2c7KZ9EM83THvmeNTkWuRMLRCmTVXZpI+8BYivH x6WnRbnYuJJWvxds2SJxafVCDcutS8thcSQm3By4TXD2GZ68d7KXpULtdZmO9jklFWvD e0nu0zz2sgmiLcGrtfUHEJllRszTfo2iJshvBpLP7bCbiHi5OATd6OwJa8XC6xuLP5pJ 6LTyzMCicAiJpp+seDFjb0rYds0py9cLIuPLnIrpKJ0o5M1OsW3cFW+F13Y612QSm3Cz fIOUNH6kX+9vkcn54AWdpFs1bIjcxl/4iEmFACey1wJjjM06ogDmBQxe5tomayCRq8/Y 3XUQ== X-Gm-Message-State: AOAM531s/z34Gi/Q8KqNLLU7kz5lS4P3sqWk52gDRafw9pmd0QOXK4ir zZK5wdCXakGD8ddGew0fCeJX2unIjqLwWY6RXdHlaA== X-Received: by 2002:a05:651c:1987:: with SMTP id bx7mr1922502ljb.136.1643265356024; Wed, 26 Jan 2022 22:35:56 -0800 (PST) MIME-Version: 1.0 References: <20220125162938.838382-1-jens.wiklander@linaro.org> <20220125162938.838382-10-jens.wiklander@linaro.org> In-Reply-To: <20220125162938.838382-10-jens.wiklander@linaro.org> From: Sumit Garg Date: Thu, 27 Jan 2022 12:05:44 +0530 Message-ID: Subject: Re: [PATCH v3 09/12] tee: add tee_shm_register_{user,kernel}_buf() To: Jens Wiklander Cc: linux-kernel@vger.kernel.org, op-tee@lists.trustedfirmware.org, Herbert Xu , Devaraj Rangasamy , Rijo Thomas , David Howells , Tyler Hicks Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 25 Jan 2022 at 21:59, Jens Wiklander wrote: > > Adds the two new functions tee_shm_register_user_buf() and > tee_shm_register_kernel_buf() which should be used instead of the old > tee_shm_register(). > > This avoids having the caller supplying the flags parameter which > exposes a bit more than desired of the internals of the TEE subsystem. > > Signed-off-by: Jens Wiklander > --- > drivers/tee/tee_core.c | 3 +-- > drivers/tee/tee_private.h | 2 ++ > drivers/tee/tee_shm.c | 33 +++++++++++++++++++++++++++++++++ > include/linux/tee_drv.h | 2 ++ > 4 files changed, 38 insertions(+), 2 deletions(-) > Reviewed-by: Sumit Garg -Sumit > diff --git a/drivers/tee/tee_core.c b/drivers/tee/tee_core.c > index a15812baaeb1..8aa1a4836b92 100644 > --- a/drivers/tee/tee_core.c > +++ b/drivers/tee/tee_core.c > @@ -334,8 +334,7 @@ tee_ioctl_shm_register(struct tee_context *ctx, > if (data.flags) > return -EINVAL; > > - shm = tee_shm_register(ctx, data.addr, data.length, > - TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED); > + shm = tee_shm_register_user_buf(ctx, data.addr, data.length); > if (IS_ERR(shm)) > return PTR_ERR(shm); > > diff --git a/drivers/tee/tee_private.h b/drivers/tee/tee_private.h > index 7265f47c6d8e..409cadcc1cff 100644 > --- a/drivers/tee/tee_private.h > +++ b/drivers/tee/tee_private.h > @@ -58,5 +58,7 @@ void teedev_ctx_get(struct tee_context *ctx); > void teedev_ctx_put(struct tee_context *ctx); > > struct tee_shm *tee_shm_alloc_user_buf(struct tee_context *ctx, size_t size); > +struct tee_shm *tee_shm_register_user_buf(struct tee_context *ctx, > + unsigned long addr, size_t length); > > #endif /*TEE_PRIVATE_H*/ > diff --git a/drivers/tee/tee_shm.c b/drivers/tee/tee_shm.c > index dc02afd7b5c9..0b6f7aabbf88 100644 > --- a/drivers/tee/tee_shm.c > +++ b/drivers/tee/tee_shm.c > @@ -299,6 +299,39 @@ struct tee_shm *tee_shm_register(struct tee_context *ctx, unsigned long addr, > } > EXPORT_SYMBOL_GPL(tee_shm_register); > > +/** > + * tee_shm_register_user_buf() - Register a userspace shared memory buffer > + * @ctx: Context that registers the shared memory > + * @addr: The userspace address of the shared buffer > + * @length: Length of the shared buffer > + * > + * @returns a pointer to 'struct tee_shm' > + */ > +struct tee_shm *tee_shm_register_user_buf(struct tee_context *ctx, > + unsigned long addr, size_t length) > +{ > + return tee_shm_register(ctx, addr, length, > + TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED); > +} > + > +/** > + * tee_shm_register_kernel_buf() - Register kernel memory to be shared with > + * secure world > + * @ctx: Context that registers the shared memory > + * @addr: The buffer > + * @length: Length of the buffer > + * > + * @returns a pointer to 'struct tee_shm' > + */ > + > +struct tee_shm *tee_shm_register_kernel_buf(struct tee_context *ctx, > + void *addr, size_t length) > +{ > + return tee_shm_register(ctx, (unsigned long)addr, length, > + TEE_SHM_DMA_BUF | TEE_SHM_KERNEL_MAPPED); > +} > +EXPORT_SYMBOL_GPL(tee_shm_register_kernel_buf); > + > static int tee_shm_fop_release(struct inode *inode, struct file *filp) > { > tee_shm_put(filp->private_data); > diff --git a/include/linux/tee_drv.h b/include/linux/tee_drv.h > index 7f038f8787c7..c9d2cc32a5ed 100644 > --- a/include/linux/tee_drv.h > +++ b/include/linux/tee_drv.h > @@ -287,6 +287,8 @@ struct tee_shm *tee_shm_alloc_kernel_buf(struct tee_context *ctx, size_t size); > */ > struct tee_shm *tee_shm_register(struct tee_context *ctx, unsigned long addr, > size_t length, u32 flags); > +struct tee_shm *tee_shm_register_kernel_buf(struct tee_context *ctx, > + void *addr, size_t length); > > /** > * tee_shm_is_registered() - Check if shared memory object in registered in TEE > -- > 2.31.1 >