From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753657AbdJMTe0 (ORCPT ); Fri, 13 Oct 2017 15:34:26 -0400 Received: from mail-eopbgr10063.outbound.protection.outlook.com ([40.107.1.63]:60130 "EHLO EUR02-HE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753620AbdJMTeX (ORCPT ); Fri, 13 Oct 2017 15:34:23 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Volodymyr_Babchuk@epam.com; From: Volodymyr Babchuk To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, tee-dev@lists.linaro.org, Jens Wiklander Cc: Volodymyr Babchuk , volodymyr_babchuk@epam.com Subject: [PATCH v1 10/14] tee: optee: store OP-TEE capabilities in private data Date: Fri, 13 Oct 2017 22:32:40 +0300 Message-Id: <1507923164-12796-11-git-send-email-volodymyr_babchuk@epam.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1507923164-12796-1-git-send-email-volodymyr_babchuk@epam.com> References: <1506621851-6929-1-git-send-email-volodymyr_babchuk@epam.com> <1507923164-12796-1-git-send-email-volodymyr_babchuk@epam.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [85.223.209.52] X-ClientProxiedBy: HE1PR0402CA0042.eurprd04.prod.outlook.com (2603:10a6:7:7c::31) To AM4PR0301MB2130.eurprd03.prod.outlook.com (2603:10a6:200:4d::15) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 67f5dcf9-50f0-4a37-f15a-08d512716629 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(2017030254152)(2017052603199)(201703131423075)(201703031133081)(201702281549075);SRVR:AM4PR0301MB2130; X-Microsoft-Exchange-Diagnostics: 1;AM4PR0301MB2130;3:2gyrGVZv+k8jivesqLQ56MNqLOiJg4R5oANMo4qDLW7koPP4ny6garfbGG08G/UmXQ3DT+LfXxYWDRDwk+y/3dwrhu/mLvbcJvIO494kTOdyMFUTc++HFAtWcCQTGzQcf5/C1o3AWOF+qWaAfZAL7sIQiNOlJd9cNanR8DzwdpiPbydajku1cEShnd2xDWLv5YgMdoeqseEjC+qpwmuaWAoPys0Xha68/c3CHslvbXWpGHP4Uc/kId0glyU+Liap;25:BN+mp11pemAGQ/wpaR2qPhRXp0hayHQs0NUnAPOWHrP+6nCJGlYBD4a5a+Tr/oWCLpAiF0nN88ZTjbTJzwTQuwb/McmBaIomfsvwS2UzyjTusbNZlmoWFJ3dbJKjf3fvJzXo/EZfJCHP7RzqhEGyKFBNGJjmF60aprbuI2qbvD7OoD2HSNmPunSHIyKLydoDIknnbgvVh9pIHgPpOeSqYXoXWQNSL1KKRtM6suhrCgpI/9mD11T6Nu3o0EtUqNPvOLewEPeDYvoGvb3dX1Firmg2yI/m5V93jEIAcFtAFSIsoQ6nrenUx+cO33pgJ6TEUvRIbket0cb2EN2cwbPPsQ==;31:u9ee6AB1/yMkt1rcBNmwZunma981FoUfkgOASXP8MXxm+JwFRGwK1hCvgHW3ht62Pju9ci4HOTWNlwtgsx+kMhMQwGDkdJHLm0H5pcsRPQfec+fQYRh8y+PyHgIFI7EhS/ShgeCKK2bQHgacJ8pf66elWYOts+RGyfaIZVS5Kw+gp4xU3jcpqyHL0VeONw12IAoQFe48WcbQIh5tP6wBvGWIX3nPOFs/uDorJ4aCZi8= X-MS-TrafficTypeDiagnostic: AM4PR0301MB2130: X-Microsoft-Exchange-Diagnostics: 1;AM4PR0301MB2130;20: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;4:pI6zhTco7Nx7Kf9Hbphf4pjL46DWWH6+Nfw8KAns2jCrV+2gGirXlAzH2hs165vpDptVHm0EjYMXp2ybCY2plCG4sVIpVP5+RxarBtu2s0iMJ7Sv/zZ7V7MY4oLoQzCR54IGnRSijEZ69NGjGyeIVdy2bGFVyNonDKgMKkZO4kaC8lBJ84yd8XFjOYjFq/aGZpPeMdzkDRJVCRCY9bZEtFG++LxVBYMi7a0ucDFx4/YsAJtqSxF4Yokrukirp0ER X-Exchange-Antispam-Report-Test: UriScan:; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(3002001)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123560025)(20161123558100)(20161123555025)(20161123564025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:AM4PR0301MB2130;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:AM4PR0301MB2130; X-Forefront-PRVS: 04599F3534 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(6009001)(376002)(346002)(199003)(189002)(2950100002)(66066001)(6916009)(47776003)(106356001)(105586002)(42186006)(33646002)(6116002)(316002)(16586007)(478600001)(72206003)(189998001)(80792005)(5003940100001)(3846002)(97736004)(6666003)(101416001)(4326008)(2906002)(50226002)(50986999)(48376002)(107886003)(53936002)(39060400002)(68736007)(76176999)(86362001)(36756003)(5660300001)(81166006)(8936002)(81156014)(50466002)(8676002)(305945005)(7736002)(122856001);DIR:OUT;SFP:1101;SCL:1;SRVR:AM4PR0301MB2130;H:EPUAKYIW2556.kyiv.epam.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;AM4PR0301MB2130;23:aS1+MacpuQ+b8yVRQc0wruFt0SUgygSucmgSllq?= =?us-ascii?Q?yZ+G6E5I6JYCqVHJaVqXCxVU2l7eaYyMEcP/62J+xNay47r9nROxufH/UM3I?= =?us-ascii?Q?/BaqgrbHwMtf6dKAxGjiISGLsxfycZzWbFyrNGPX9j+mdsNjvb6KqksWnkSa?= =?us-ascii?Q?wTMtWjXfUAzOnKppDSLqgJgNDdrqNhlb73np7W3Z+82+ryNJldp/o9FCzIfx?= =?us-ascii?Q?DImZwiJ+oWoqFLGSxUn/0k70aVd6AOofBhA0tqhmvT7QYRwEWhg3LESLD8va?= =?us-ascii?Q?TbM2VPtVwSeq4LJ/EeI9GCkHveSPE55OgJm2w5tQUMzsUamtN2XnEyjuju7j?= =?us-ascii?Q?hPp2qvXUPYcby48iOxKOP23eirutlHJUtgSpekBesVItf7qok5hbKxUy7SBw?= =?us-ascii?Q?Va8Ay2wa/Ra/e7LrhvvzkNmDUsMy912MZqQWBP9BpdxGNw/rgI18qdk75Pok?= =?us-ascii?Q?QyGLIXuJlS52tT3XplBvyyRcBj0VnKwXxn8pnNhkxv/C9F9JwqUYxHv+SYRn?= =?us-ascii?Q?5skZbiBKUC7LESCkyGQCR6Fp2fDDVH+3nlRSU49GsW/1iqOkGMUe9cPfK7Lr?= =?us-ascii?Q?1mjg99zeAqITlVwG+1AUzJ6LtWCIBatGjklQetPdk9t0geNxJAY1bRz5Wllj?= =?us-ascii?Q?ILXxeyMn4ktyk3BuCG0E9CQvKTWzjesho8nxCF9p1I9Bw6e1dz+qS33I3g05?= =?us-ascii?Q?KOhgM3RedrZQTuEjPTac62qO8f6GMQzK1QHuYFMV/RWHvSOfXwBCNu+vHini?= =?us-ascii?Q?kPjeoBpIBI47wpVWhsrXq7+Ra62UkuSkprY2KRbcCo7A55gBoakyQMGxrEV8?= =?us-ascii?Q?BtViC4Ig+9oCFr27uSXJO1XJxnRjexm772KPJzfQhilGA/3wxiF+Seni9MO2?= =?us-ascii?Q?iD85+Fy1ER8O4NY1OH9DJ25TqQGic8deTNmFyelZEuWVFfwlDvW9/xYbDulb?= =?us-ascii?Q?CTJXgaP76TpfrCF/xODseVnnNjU9ktY/Pr3yqwNgYUXfQhml25gmBKwm3pVw?= =?us-ascii?Q?M/useXcIbwYRw4YWFhvu1fiWKLK5Mbf7qYXSMNAHPSqdj5Tx4E3Du6A5E2y9?= =?us-ascii?Q?M0iz2d6s/hKH6xc3lesyd+g4pTZNTDUQWIlBLFlBYXaR2nrBkDw=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1;AM4PR0301MB2130;6:zxXVFv4L9lIIyqQAsiIY6SKlHv79V01JxSEmbaFtxLgRk+fIQ2AFNWqwTa6xbS+Aj2CNN+78Saf7CiZS/rP1SJ08HRQiCw4wHDDRD6O8+N7bUXvKgLBEyskkY34Ed6Caku53RnLoKjpxbRl5/VDPzWCub5ksp71qNgOl0yhXoiYmSkw0aU9PCaQJIjIzg1u3FpDNhg28d3Es1cQIoXicqk+48yWvhRd10llttJ35DFvFwqGJ1GlKN5iEbKnTcgtAwYQNlD5BSS45zBJUrGHBo09jcLwvu6d72QdLSgWR7XIHjVVh2ZHqc9rIWO0tjmY+pwPjSyTurgE/Isl3K4PZ0Q==;5:1gsLeBKUqW4xxldT3Rk4UaaoGT5b3Va3lNQIXjvEEdqRXqzOe5ty8VeSCm/dhjVRgpzPKDN3/N/E+1lffZAj52NDoA9q3ULzigkkeJ0+xrUihntZiEiY4C6N9QjiZ9gw5vhaUnjsx9+iYDCGHku6CWggCzdYMEiH79qRzk8g/A0=;24:mGsvwwi/UjpKvb+IltQ4ec+ZqZrZUwJD6kDXcS4MXPZfLxdT2JGkFd0/AQdtYWxDL0ph57ZmTq6ZyXXuE6CvYEv2n03fiQVygg01xFAHZbA=;7:7WnE9uPAiH7FXmqhXMIbOlgmLvQlRNf8vd+DT85S1mp6thKCMdm/HCs94rWyShmCJTj87/P/dEo5QgeqYM3HlKHTua6rb6IxeDVsK83qFPMpsLeQMoVAvTZwv/Mp9+F/iew4hWZ8sbgF5cjORePxwbVlFEqokGNQELzcmsxM69CuoyqryCqD9etSUfKP7i4KFl7uQ9wGqxTukgUMEJNKW+IezExypxm8wWurbi+L+ic= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Oct 2017 19:34:18.9609 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0301MB2130 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Volodymyr Babchuk Those capabilities will be used in subsequent patches. Signed-off-by: Volodymyr Babchuk --- drivers/tee/optee/core.c | 1 + drivers/tee/optee/optee_private.h | 3 +++ 2 files changed, 4 insertions(+) diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c index d22433c..dbe5a61 100644 --- a/drivers/tee/optee/core.c +++ b/drivers/tee/optee/core.c @@ -545,6 +545,7 @@ static struct optee *optee_probe(struct device_node *np) } optee->invoke_fn = invoke_fn; + optee->sec_caps = sec_caps; teedev = tee_device_alloc(&optee_desc, NULL, pool, optee); if (IS_ERR(teedev)) { diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h index 61a0052..de7962e 100644 --- a/drivers/tee/optee/optee_private.h +++ b/drivers/tee/optee/optee_private.h @@ -96,6 +96,8 @@ struct optee_supp { * @supp: supplicant synchronization struct for RPC to supplicant * @pool: shared memory pool * @memremaped_shm virtual address of memory in shared memory pool + * @sec_caps: secure world capabilities defined by + * OPTEE_SMC_SEC_CAP_* in optee_smc.h */ struct optee { struct tee_device *supp_teedev; @@ -106,6 +108,7 @@ struct optee { struct optee_supp supp; struct tee_shm_pool *pool; void *memremaped_shm; + u32 sec_caps; }; struct optee_session { -- 2.7.4 From mboxrd@z Thu Jan 1 00:00:00 1970 From: volodymyr_babchuk@epam.com (Volodymyr Babchuk) Date: Fri, 13 Oct 2017 22:32:40 +0300 Subject: [PATCH v1 10/14] tee: optee: store OP-TEE capabilities in private data In-Reply-To: <1507923164-12796-1-git-send-email-volodymyr_babchuk@epam.com> References: <1506621851-6929-1-git-send-email-volodymyr_babchuk@epam.com> <1507923164-12796-1-git-send-email-volodymyr_babchuk@epam.com> Message-ID: <1507923164-12796-11-git-send-email-volodymyr_babchuk@epam.com> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org From: Volodymyr Babchuk Those capabilities will be used in subsequent patches. Signed-off-by: Volodymyr Babchuk --- drivers/tee/optee/core.c | 1 + drivers/tee/optee/optee_private.h | 3 +++ 2 files changed, 4 insertions(+) diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c index d22433c..dbe5a61 100644 --- a/drivers/tee/optee/core.c +++ b/drivers/tee/optee/core.c @@ -545,6 +545,7 @@ static struct optee *optee_probe(struct device_node *np) } optee->invoke_fn = invoke_fn; + optee->sec_caps = sec_caps; teedev = tee_device_alloc(&optee_desc, NULL, pool, optee); if (IS_ERR(teedev)) { diff --git a/drivers/tee/optee/optee_private.h b/drivers/tee/optee/optee_private.h index 61a0052..de7962e 100644 --- a/drivers/tee/optee/optee_private.h +++ b/drivers/tee/optee/optee_private.h @@ -96,6 +96,8 @@ struct optee_supp { * @supp: supplicant synchronization struct for RPC to supplicant * @pool: shared memory pool * @memremaped_shm virtual address of memory in shared memory pool + * @sec_caps: secure world capabilities defined by + * OPTEE_SMC_SEC_CAP_* in optee_smc.h */ struct optee { struct tee_device *supp_teedev; @@ -106,6 +108,7 @@ struct optee { struct optee_supp supp; struct tee_shm_pool *pool; void *memremaped_shm; + u32 sec_caps; }; struct optee_session { -- 2.7.4