Received: by 2002:a05:7412:40d:b0:e2:908c:2ebd with SMTP id 13csp1101341rdf; Wed, 22 Nov 2023 05:48:38 -0800 (PST) X-Google-Smtp-Source: AGHT+IFHmZ5pbVBACpwIk0R6FTdm7KR9GoZemFbV9gfRqnbmENRk1HmcW4SHqOK08R1SPy6ttypD X-Received: by 2002:a9d:67c9:0:b0:6c4:9fda:a1e2 with SMTP id c9-20020a9d67c9000000b006c49fdaa1e2mr2693247otn.4.1700660918100; Wed, 22 Nov 2023 05:48:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700660918; cv=none; d=google.com; s=arc-20160816; b=TQ7danbfO0t6ZmI+wcYOpMihmxv0ZRzvRd9Erzq1qgiZ4HQ/3eMu1ctoGvrLoSU9VP 9Nd+2ahZR8wKGnpC2iMlq5Jqqi/+MECq90LF/vSYzIkMRS7V0BrUq93ZbFB3ZZ9Vu5kS K0/caDaUm9fFQo1ErQeHQlbNYku4VidLU0kVPpM54AJOLysSoxqCRv9jqOkiCUuV8jVq iICP1W1rkqCYXNfNp7yb2jDrxqHk1QpWag7TCOFFxhCF3US5hLT7+yykDPcri6OLI4iS fgDtn7wkBOHBJT9ZWq2Vn7Zci1P//UnXzX0I8+nA1n/Don3EwGNUKb51Zo5grp3MSBeH ZNzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=S4cI9vJXYr7sLH3ZEI3DdEwpZEQgnHH0HYsAhljLNE0=; fh=yhh3ndHpaxcUS8JfQWD8X6JD+2+pi7wCpOBMKISNbto=; b=Gw7aNz+/nMR+eOHPPteHICWLafVQE4k7ZPAfWwE9csiE2sMCZ63S0GI0QZ6SsyaJDf ZBoVLCv8EWWghJOvJV14rXEGZlqC3oVY7xvjX5WmY5FAcMV+7WoTc8i+6dPBsAWSVkfa db9ycHWWJPAoKdeR7gQBfBiN9YZ0Zl2zqh80D2K2TYcReNcz9f+nXiVJSmMRRNxfhIqx DxQCOcPfQV+ktchDKGuwFllnLubv2KpynAVT1c6cKSMTbBiz+ckRlVO2Wxl7J829cGf1 iZfjSsDwnwY+lOOySr0+aESFfuu1H2lkPgUxyQKsF2cq4PuUqAngrchZBDTP7VzTEPcE 4B4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b="b3AxD/xY"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id s140-20020a632c92000000b005aa644010a6si12805892pgs.205.2023.11.22.05.48.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 05:48:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b="b3AxD/xY"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 0C1DE81D2D57; Wed, 22 Nov 2023 05:48:37 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344234AbjKVNse (ORCPT + 99 others); Wed, 22 Nov 2023 08:48:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60546 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343843AbjKVNsd (ORCPT ); Wed, 22 Nov 2023 08:48:33 -0500 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3F7A3BC; Wed, 22 Nov 2023 05:48:29 -0800 (PST) Received: from pps.filterd (m0279871.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3AM9MZl1016892; Wed, 22 Nov 2023 13:48:18 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-type; s=qcppdkim1; bh=S4cI9vJXYr7sLH3ZEI3DdEwpZEQgnHH0HYsAhljLNE0=; b=b3AxD/xYkelorsqQW1/P0j9rGRJujQfMBYywztP/VXOTeYkVPHYtStRCEOSFHgXQJ1Iw uqRgF6PjiAhzTBWb693F3ilxrLJn0M/36qp6xFFK/mI+OJLPodYtP7fpu9Iha1Q9KqIJ 1XZjg6JRrbNaQAS7zStF8OApt7VnnGfXLcDml9fjPAlWyXvHdEt/UL61pe9al2HBXVI3 OwX6HtZTeQj/G0N2tVgugNPWz9oI4i1q97YXTOWN7nQTwVpUnr8OlxMoc8ehziG8qrn6 9UtBJYjcf9Y4qceiQmQHw5X5UsjA3LvypGDA3wRXxOPaO6WcXNQoMm8Zl1sUnUUjh9Ap iA== Received: from nasanppmta02.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3uhey58kut-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 22 Nov 2023 13:48:18 +0000 Received: from nasanex01c.na.qualcomm.com (nasanex01c.na.qualcomm.com [10.45.79.139]) by NASANPPMTA02.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 3AMDmHna006808 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 22 Nov 2023 13:48:17 GMT Received: from hu-pbrahma-hyd.qualcomm.com (10.80.80.8) by nasanex01c.na.qualcomm.com (10.45.79.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 22 Nov 2023 05:48:13 -0800 From: Pratyush Brahma To: , , , , , , , , , , CC: Vijayanand Jitta Subject: [PATCH 1/2] dma-buf: heaps: secure_heap: Add secure ops for CMA heap Date: Wed, 22 Nov 2023 19:17:46 +0530 Message-ID: <50efb85e259020cf011ba33cffc092e1115b1442.1700544802.git.quic_vjitta@quicinc.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nasanex01c.na.qualcomm.com (10.45.79.139) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: vseFvjOoKkok0GZGKOSGYWUoQEY1XO2B X-Proofpoint-GUID: vseFvjOoKkok0GZGKOSGYWUoQEY1XO2B X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-22_09,2023-11-22_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxlogscore=999 lowpriorityscore=0 spamscore=0 impostorscore=0 suspectscore=0 priorityscore=1501 mlxscore=0 malwarescore=0 clxscore=1015 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311060000 definitions=main-2311220097 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Wed, 22 Nov 2023 05:48:37 -0800 (PST) From: Vijayanand Jitta Add secure ops for CMA heap which would use qcom_scm_assign_mem to assign the memory to VMID. Change-Id: I05aff9cb9b7b9668c4352a24bec163b52e38835a Signed-off-by: Vijayanand Jitta --- drivers/dma-buf/heaps/secure_heap.c | 50 +++++++++++++++++++++++++++-- 1 file changed, 47 insertions(+), 3 deletions(-) diff --git a/drivers/dma-buf/heaps/secure_heap.c b/drivers/dma-buf/heaps/secure_heap.c index 8989ad5d03e9..04e2ee000e19 100644 --- a/drivers/dma-buf/heaps/secure_heap.c +++ b/drivers/dma-buf/heaps/secure_heap.c @@ -14,6 +14,7 @@ #include #include #include +#include #define TZ_TA_MEM_UUID_MTK "4477588a-8476-11e2-ad15-e41f1390d676" @@ -83,6 +84,12 @@ struct secure_heap_prv_data { */ const int tee_command_id_base; + /* + * VMID and permissions which will be used by QCOM secure system heap to assign mem. + */ + int vmid; + int perm; + int (*heap_init)(struct secure_heap *sec_heap); int (*memory_alloc)(struct secure_heap *sec_heap, struct secure_buffer *sec_buf); void (*memory_free)(struct secure_heap *sec_heap, struct secure_buffer *sec_buf); @@ -311,10 +318,47 @@ static void cma_secure_memory_free(struct secure_heap *sec_heap, cma_release(sec_heap->cma, sec_buf->cma_page, sec_buf->size >> PAGE_SHIFT); } -const struct secure_heap_prv_data cma_sec_mem_data = { +static int secure_heap_qcom_secure_memory(struct secure_heap *sec_heap, + struct secure_buffer *sec_buf) +{ + struct qcom_scm_vmperm next[1]; + u64 src_perms = BIT(QCOM_SCM_VMID_HLOS); + const struct secure_heap_prv_data *data = sec_heap->data; + int ret = 0; + + next[0].vmid = data->vmid; + next[0].perm = data->perm; + + + ret = qcom_scm_assign_mem(page_to_phys(sec_buf->cma_page), + sec_buf->size, &src_perms, + next, 1); + + return ret; +} + +static void secure_heap_qcom_unsecure_memory(struct secure_heap *sec_heap, + struct secure_buffer *sec_buf) +{ + struct qcom_scm_vmperm next[1]; + const struct secure_heap_prv_data *data = sec_heap->data; + u64 src_perms = BIT(data->vmid); + + next[0].vmid = QCOM_SCM_VMID_HLOS; + next[0].perm = QCOM_SCM_PERM_RWX; + + qcom_scm_assign_mem(page_to_phys(sec_buf->cma_page), + sec_buf->size, &src_perms, + next, 1); +} + +const struct secure_heap_prv_data qcom_cma_sec_mem_data = { + .vmid = QCOM_SCM_VMID_CP_BITSTREAM, + .perm = QCOM_SCM_PERM_RW, .memory_alloc = cma_secure_memory_allocate, .memory_free = cma_secure_memory_free, - /* TODO : secure the buffer. */ + .secure_the_memory = secure_heap_qcom_secure_memory, + .unsecure_the_memory = secure_heap_qcom_unsecure_memory, }; static int secure_heap_secure_memory_allocate(struct secure_heap *sec_heap, @@ -529,7 +573,7 @@ static struct secure_heap secure_heaps[] = { { .name = "secure_cma", .mem_type = SECURE_MEMORY_TYPE_CMA, - .data = &cma_sec_mem_data, + .data = &qcom_cma_sec_mem_data, }, { .name = "secure_mtk_cm", -- 2.34.1