04 Jan, 2018

1 commit


11 Dec, 2017

5 commits

  • Adds TEE_IOCTL_PARAM_ATTR_META with can be used to indicate meta
    parameters when communicating with user space. These meta parameters can
    be used by supplicant support multiple parallel requests at a time.

    Reviewed-by: Etienne Carriere
    Signed-off-by: Jens Wiklander

    Modified from: From: https://github.com/linaro-swg/linux.git
    Conflicts:
    drivers/tee/tee_core.c
    (cherry picked from commit 66d81fcf145fdc55322c0a11764c76a43d90ecad)

    Jens Wiklander
     
  • Mirrors the TEE_DESC_PRIVILEGED bit of struct tee_desc:flags into struct
    tee_ioctl_version_data:gen_caps as TEE_GEN_CAP_PRIVILEGED in
    tee_ioctl_version()

    Reviewed-by: Jerome Forissier
    Signed-off-by: Jens Wiklander
    From: https://github.com/linaro-swg/linux.git
    (cherry picked from commit 627497c586eb6074f0241d772bd0b795b709f9ba)

    Jens Wiklander
     
  • This change allows userland to create a tee_shm object that refers
    to a dmabuf reference.

    Userland provides a dmabuf file descriptor as buffer reference.
    The created tee_shm object exported as a brand new dmabuf reference
    used to provide a clean fd to userland. Userland shall closed this new
    fd to release the tee_shm object resources. The initial dmabuf resources
    are tracked independently through original dmabuf file descriptor.

    Once the buffer is registered and until it is released, TEE driver
    keeps a refcount on the registered dmabuf structure.

    This change only support dmabuf references that relates to physically
    contiguous memory buffers.

    New tee_shm flag to identify tee_shm objects built from a registered
    dmabuf: TEE_SHM_EXT_DMA_BUF. Such tee_shm structures are flagged both
    TEE_SHM_DMA_BUF and TEE_SHM_EXT_DMA_BUF.

    Signed-off-by: Etienne Carriere
    Reviewed-by: Jens Wiklander
    From: https://github.com/linaro-swg/linux.git
    (cherry picked from commit 41e21e5c405530590dc2dd10b2a8dbe64589840f)

    Etienne Carriere
     
  • Initial patch for generic TEE subsystem.
    This subsystem provides:
    * Registration/un-registration of TEE drivers.
    * Shared memory between normal world and secure world.
    * Ioctl interface for interaction with user space.
    * Sysfs implementation_id of TEE driver

    A TEE (Trusted Execution Environment) driver is a driver that interfaces
    with a trusted OS running in some secure environment, for example,
    TrustZone on ARM cpus, or a separate secure co-processor etc.

    The TEE subsystem can serve a TEE driver for a Global Platform compliant
    TEE, but it's not limited to only Global Platform TEEs.

    This patch builds on other similar implementations trying to solve
    the same problem:
    * "optee_linuxdriver" by among others
    Jean-michel DELORME and
    Emmanuel MICHEL
    * "Generic TrustZone Driver" by Javier González

    Acked-by: Andreas Dannenberg
    Tested-by: Jerome Forissier (HiKey)
    Tested-by: Volodymyr Babchuk (RCAR H3)
    Tested-by: Scott Branden
    Reviewed-by: Javier González
    Signed-off-by: Jens Wiklander
    (cherry picked from commit 967c9cca2cc50569efc65945325c173cecba83bd)

    Jens Wiklander
     
  • add reset command declaration into mxc_hifi4.h file,
    this command is used to reset hifi4 codec when seeking

    Signed-off-by: Weiguang Kong
    Reviewed-by: Daniel Baluta

    Weiguang Kong
     

05 Oct, 2017

34 commits