kernel-brax3-ubuntu-touch/drivers/misc/mediatek/trusted_mem/tee_devices.c
erascape f319b992b1 kernel-5.15: Initial import brax3 UT kernel
* halium configs enabled

Signed-off-by: erascape <erascape@proton.me>
2025-09-23 15:17:10 +00:00

195 lines
5.5 KiB
C

// SPDX-License-Identifier: GPL-2.0
/*
* Copyright (c) 2019 MediaTek Inc.
*/
#define PR_FMT_HEADER_MUST_BE_INCLUDED_BEFORE_ALL_HDRS
#include "private/tmem_pr_fmt.h" PR_FMT_HEADER_MUST_BE_INCLUDED_BEFORE_ALL_HDRS
#include <linux/errno.h>
#include <linux/fs.h>
#include <linux/init.h>
#include <linux/io.h>
#include <linux/kernel.h>
#include <linux/kthread.h>
#include <linux/module.h>
#include <linux/proc_fs.h>
#include <linux/string.h>
#include <linux/uaccess.h>
#include <linux/unistd.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/sizes.h>
#include <memory_ssmr.h>
#include "private/mld_helper.h"
#include "private/tmem_error.h"
#include "private/tmem_priv.h"
#include "private/tmem_utils.h"
#include "private/tmem_dev_desc.h"
#include "tee_impl/tee_ops.h"
#if IS_ENABLED(CONFIG_MTK_GZ_KREE)
#include "mtee_impl/mtee_invoke.h"
#endif
static struct trusted_mem_configs tee_smem_general_configs = {
.session_keep_alive_enable = false,
.minimal_chunk_size = SZ_64K,
.phys_mem_shift_bits = 6,
.phys_limit_min_alloc_size = (1 << 6),
.min_size_check_enable = false,
.alignment_check_enable = true,
.caps = 0,
};
static struct tmem_device_description tee_smem_devs[] = {
#if IS_ENABLED(CONFIG_MTK_SECURE_MEM_SUPPORT)
{
.kern_tmem_type = TRUSTED_MEM_SVP_REGION,
.tee_smem_type = TEE_SMEM_SVP,
.mtee_chunks_id = MTEE_MCUHNKS_INVALID,
.ssmr_feature_id = SSMR_FEAT_SVP_REGION,
/* clang-format off */
.u_ops_data.tee = {
.tee_cmds[TEE_OP_ALLOC] = CMD_SEC_MEM_ALLOC,
.tee_cmds[TEE_OP_ALLOC_ZERO] = CMD_SEC_MEM_ALLOC_ZERO,
.tee_cmds[TEE_OP_FREE] = CMD_SEC_MEM_UNREF,
.tee_cmds[TEE_OP_REGION_ENABLE] = CMD_SEC_MEM_ENABLE,
.tee_cmds[TEE_OP_REGION_DISABLE] = CMD_SEC_MEM_DISABLE,
},
/* clang-format on */
.notify_remote = false,
.notify_remote_fn = NULL,
.mem_cfg = &tee_smem_general_configs,
.dev_name = "TEE_SVP",
},
#endif
#if IS_ENABLED(CONFIG_MTK_WFD_SMEM_SUPPORT)
{
.kern_tmem_type = TRUSTED_MEM_WFD_REGION,
.tee_smem_type = TEE_SMEM_WFD,
.mtee_chunks_id = MTEE_MCUHNKS_INVALID,
.ssmr_feature_id = SSMR_FEAT_WFD_REGION,
/* clang-format off */
.u_ops_data.tee = {
.tee_cmds[TEE_OP_ALLOC] = CMD_WFD_SMEM_ALLOC,
.tee_cmds[TEE_OP_ALLOC_ZERO] = CMD_WFD_SMEM_ALLOC_ZERO,
.tee_cmds[TEE_OP_FREE] = CMD_WFD_SMEM_UNREF,
.tee_cmds[TEE_OP_REGION_ENABLE] = CMD_WFD_SMEM_ENABLE,
.tee_cmds[TEE_OP_REGION_DISABLE] = CMD_WFD_SMEM_DISABLE,
},
/* clang-format on */
.notify_remote = false,
.notify_remote_fn = NULL,
.mem_cfg = &tee_smem_general_configs,
.dev_name = "TEE_WFD",
},
#endif
#if IS_ENABLED(CONFIG_MTK_SDSP_SHARED_MEM_SUPPORT) && \
IS_ENABLED(CONFIG_MTK_SDSP_SHARED_PERM_VPU_TEE)
{
.kern_tmem_type = TRUSTED_MEM_SDSP_SHARED,
.tee_smem_type = TEE_SMEM_SDSP_SHARED,
.mtee_chunks_id = MTEE_MCHUNKS_SDSP_SHARED_VPU_TEE,
.ssmr_feature_id = SSMR_FEAT_SDSP_TEE_SHAREDMEM,
/* clang-format off */
.u_ops_data.tee = {
.tee_cmds[TEE_OP_ALLOC] = CMD_SDSP_SMEM_ALLOC,
.tee_cmds[TEE_OP_ALLOC_ZERO] = CMD_SDSP_SMEM_ALLOC_ZERO,
.tee_cmds[TEE_OP_FREE] = CMD_SDSP_SMEM_UNREF,
.tee_cmds[TEE_OP_REGION_ENABLE] = CMD_SDSP_SMEM_ENABLE,
.tee_cmds[TEE_OP_REGION_DISABLE] =
CMD_SDSP_SMEM_DISABLE,
},
/* clang-format on */
#if IS_ENABLED(CONFIG_MTK_GZ_KREE)
.notify_remote = true,
.notify_remote_fn = mtee_set_mchunks_region,
#else
.notify_remote = false,
.notify_remote_fn = NULL,
#endif
.mem_cfg = &tee_smem_general_configs,
.dev_name = "TEE_SDSP",
},
#endif
};
#define TEE_SECURE_MEM_DEVICE_COUNT ARRAY_SIZE(tee_smem_devs)
static struct trusted_mem_device *
create_tee_smem_device(enum TRUSTED_MEM_TYPE mem_type,
struct trusted_mem_configs *cfg,
struct tmem_device_description *dev_desc,
u32 ssmr_feat_id, const char *dev_name)
{
int ret = TMEM_OK;
struct trusted_mem_device *t_device;
/* skip svp and wfd when disable svp */
if ((mem_type == TRUSTED_MEM_SVP_REGION || mem_type == TRUSTED_MEM_WFD_REGION) &&
!is_svp_enabled())
return NULL;
/* skip svp or wfd on MTEE */
if ((mem_type == TRUSTED_MEM_SVP_REGION || mem_type == TRUSTED_MEM_WFD_REGION) &&
is_svp_on_mtee())
return NULL;
t_device = create_trusted_mem_device(mem_type, cfg);
if (INVALID(t_device)) {
pr_err("create device failed: %d:%s\n", mem_type, dev_name);
return NULL;
}
#if IS_ENABLED(CONFIG_TRUSTONIC_TEE_SUPPORT) || \
IS_ENABLED(CONFIG_MICROTRUST_TEE_SUPPORT)
get_tee_peer_ops(&t_device->peer_ops);
#endif
t_device->dev_desc = dev_desc;
snprintf(t_device->name, MAX_DEVICE_NAME_LEN, "%s", dev_name);
t_device->ssmr_feature_id = ssmr_feat_id;
t_device->mem_type = mem_type;
ret = register_trusted_mem_device(mem_type, t_device);
if (ret) {
destroy_trusted_mem_device(t_device);
pr_err("register device failed: %d:%s\n", mem_type, dev_name);
return NULL;
}
return t_device;
}
int tee_smem_devs_init(void)
{
struct trusted_mem_device *t_device;
int idx = 0;
pr_info("%s:%d DEVICE COUNT:(%d), MIN CHUNK SIZE: (0x%x)\n", __func__, __LINE__,
(int)TEE_SECURE_MEM_DEVICE_COUNT, tee_smem_general_configs.minimal_chunk_size);
for (idx = 0; idx < TEE_SECURE_MEM_DEVICE_COUNT; idx++) {
t_device = create_tee_smem_device(
tee_smem_devs[idx].kern_tmem_type,
tee_smem_devs[idx].mem_cfg, &tee_smem_devs[idx],
tee_smem_devs[idx].ssmr_feature_id,
tee_smem_devs[idx].dev_name);
if (INVALID(t_device)) {
pr_info("don't create TEE tmem device: %d:%s\n",
tee_smem_devs[idx].kern_tmem_type,
tee_smem_devs[idx].dev_name);
}
}
pr_info("%s:%d (end)\n", __func__, __LINE__);
return TMEM_OK;
}
void tee_smem_devs_exit(void)
{
}