Before passing 'start' to find_vma() we need to remove
tags from it to get sane results.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/call.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c
index a5afbe6dee68..61420395137b
Hello Jens,
Jens Wiklander writes:
> On Mon, Oct 12, 2020 at 11:26 AM Volodymyr Babchuk
> wrote:
>>
>> Before passing 'start' to find_vma() we need to remove
>> tags from it to get sane results.
>>
>> Signed-off-by: Volodymyr Babchuk
>> ---
>
Hi Sumit,
On Fri, 15 May 2020 at 07:55, Sumit Garg wrote:
>
> Hi Volodymyr,
>
> On Fri, 15 May 2020 at 06:32, Volodymyr Babchuk
> wrote:
> >
> > Hi Sumit,
> >
> > On Thu, 14 May 2020 at 08:38, Sumit Garg wrote:
> > >
> > > Hi Volod
Hi Sumit,
On Thu, 14 May 2020 at 08:38, Sumit Garg wrote:
>
> Hi Volodymyr,
>
> On Thu, 14 May 2020 at 06:48, Volodymyr Babchuk
> wrote:
> >
> > Hi Sumit,
> >
> > On Wed, 13 May 2020 at 11:24, Sumit Garg wrote:
> > >
> > > Hi Volodymyr,
Hi Sumit,
On Wed, 13 May 2020 at 11:24, Sumit Garg wrote:
>
> Hi Volodymyr,
>
> On Wed, 13 May 2020 at 13:30, Jens Wiklander
> wrote:
> >
> > Hi Volodymyr,
> >
> > On Wed, May 13, 2020 at 2:36 AM Volodymyr Babchuk
> > wrote:
> > >
of termination driver
initialization.
Signed-off-by: Volodymyr Babchuk
---
resend: fixed email in s-o-b tag. Sorry for the noise
drivers/tee/optee/core.c | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c
index 34409c916882
of termination driver
initialization.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/core.c | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee/core.c
index 34409c916882..a053930032f2 100644
--- a/drivers/tee/optee/core.c
+++ b
From: Volodymyr Babchuk
On virtualized systems it is possible that OP-TEE will provide
only dynamic shared memory support. So it is fine to boot
without static SHM enabled if dymanic one is supported.
Signed-off-by: Volodymyr Babchuk
---
Changes from V2:
- rebased onto upstream
drivers
From: Volodymyr Babchuk
On virtualized systems it is possible that OP-TEE will provide
only dynamic shared memory support. So it is fine to boot
without static SHM enabled if dymanic one is supported.
Signed-off-by: Volodymyr Babchuk
---
Changes from v1:
Patch is now can be applied
From: Volodymyr Babchuk
On virtualized systems it is possible that OP-TEE will provide
only dynamic shared memory support. So it is fine to boot
without static SHM enabled if dymanic one is supported.
Signed-off-by: Volodymyr Babchuk
---
Changes from v1:
Patch is now can be applied
From: Volodymyr Babchuk
On virtualized systems it is possible that OP-TEE will provide
only dynamic shared memory support. So it is fine to boot
without static SHM enabled if dymanic one is supported.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/core.c | 83
From: Volodymyr Babchuk
On virtualized systems it is possible that OP-TEE will provide
only dynamic shared memory support. So it is fine to boot
without static SHM enabled if dymanic one is supported.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/core.c | 83
Wiklander <jens.wiklan...@linaro.org>
Reviewed-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
--
WBR Volodymyr Babchuk aka lorc [+380976646013]
mailto: vlad.babc...@gmail.com
via get_dma_buf().
>
> This code can only be triggered on ARM systems that use Linaro's OP-TEE.
>
> Fixes: 967c9cca2cc5 ("tee: generic TEE subsystem")
> Signed-off-by: Jann Horn
> Signed-off-by: Jens Wiklander
Reviewed-by: Volodymyr Babchuk
--
WBR Volodymyr Babchuk aka lorc [+380976646013]
mailto: vlad.babc...@gmail.com
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Hello all,
This is resend of OP-TEE dynamic SHM series. No changes
from last time. Correct version is used in the subject.
---
Changes from v1:
* Added support for 16K and 64K pages. Elaborated commit messages
* More minor c
From: Volodymyr Babchuk
Hello all,
This is resend of OP-TEE dynamic SHM series. No changes
from last time. Correct version is used in the subject.
---
Changes from v1:
* Added support for 16K and 64K pages. Elaborated commit messages
* More minor changes are described in corresponding
;
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_private.h | 57 +---
drivers/tee/tee_shm.c | 8 +--
drivers/tee/tee_shm_pool.c | 165 -
include/linux/tee_drv.h| 91 +
4
From: Jens Wiklander <jens.wiklan...@linaro.org>
Added new ioctl to allow users register own buffers as a shared memory.
Signed-off-by: Jens Wiklander <jens.wiklan...@linaro.org>
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_core.c | 41 +
From: Jens Wiklander
Makes creation of shm pools more flexible by adding new more primitive
functions to allocate a shm pool. This makes it easier to add driver
specific shm pool management.
Signed-off-by: Jens Wiklander
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_private.h | 57
From: Jens Wiklander
Added new ioctl to allow users register own buffers as a shared memory.
Signed-off-by: Jens Wiklander
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_core.c | 41 +-
drivers/tee/tee_shm.c| 205 +--
include
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
These functions will be used to pass information about shared
buffers to OP-TEE. ABI between Linux and OP-TEE is defined
in optee_msg.h and optee_smc.h.
optee_msg.h defines OPTEE_MSG_ATTR_NONCONTIG attribute
for shared memory refe
From: Volodymyr Babchuk
These functions will be used to pass information about shared
buffers to OP-TEE. ABI between Linux and OP-TEE is defined
in optee_msg.h and optee_smc.h.
optee_msg.h defines OPTEE_MSG_ATTR_NONCONTIG attribute
for shared memory references and describes how such references
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
With latest changes to OP-TEE we can use any buffers as a shared memory.
Thus, it is possible for supplicant to provide part of own memory
when OP-TEE asks to allocate a shared buffer.
This patch adds support for such feature into RPC ha
From: Volodymyr Babchuk
With latest changes to OP-TEE we can use any buffers as a shared memory.
Thus, it is possible for supplicant to provide part of own memory
when OP-TEE asks to allocate a shared buffer.
This patch adds support for such feature into RPC handling code.
Now when OP-TEE asks
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Now, when struct tee_shm is defined in public header,
we can inline small getter functions like this one.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_shm.c | 11 ---
include/linux/te
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This is simple pool that uses kernel page allocator. This pool can be
used in case OP-TEE supports dynamic shared memory.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/optee/Makefile | 1 +
drive
From: Volodymyr Babchuk
Now, when struct tee_shm is defined in public header,
we can inline small getter functions like this one.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_shm.c | 11 ---
include/linux/tee_drv.h | 5 -
2 files changed, 4 insertions(+), 12 deletions
From: Volodymyr Babchuk
This is simple pool that uses kernel page allocator. This pool can be
used in case OP-TEE supports dynamic shared memory.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/Makefile | 1 +
drivers/tee/optee/shm_pool.c | 75
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Those capabilities will be used in subsequent patches.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/optee/core.c | 1 +
drivers/tee/optee/optee_private.h | 3 +++
2 files changed, 4 insertions(+)
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
We need to ensure that tee_context is present until last
shared buffer will be freed.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_core.c| 40 +++-
drivers/tee/t
From: Volodymyr Babchuk
Those capabilities will be used in subsequent patches.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/core.c | 1 +
drivers/tee/optee/optee_private.h | 3 +++
2 files changed, 4 insertions(+)
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee
From: Volodymyr Babchuk
We need to ensure that tee_context is present until last
shared buffer will be freed.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_core.c| 40 +++-
drivers/tee/tee_private.h | 3 +++
drivers/tee/tee_shm.c | 7
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
There were changes in REE<->OP-TEE ABI recently.
Now ABI allows us to pass non-contiguous memory buffers as list of
pages to OP-TEE. This can be achieved by using new parameter attribute
OPTEE_MSG_ATTR_NONCONTIG.
OP-TEE also is able to
From: Volodymyr Babchuk
There were changes in REE<->OP-TEE ABI recently.
Now ABI allows us to pass non-contiguous memory buffers as list of
pages to OP-TEE. This can be achieved by using new parameter attribute
OPTEE_MSG_ATTR_NONCONTIG.
OP-TEE also is able to use all non-secure RAM for
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Previous patches added various features that are needed for dynamic SHM.
Dynamic SHM allows Normal World to share any buffers with OP-TEE.
While original design suggested to use pre-allocated region (usually of
1M to 2M of size), this new ap
From: Volodymyr Babchuk
Previous patches added various features that are needed for dynamic SHM.
Dynamic SHM allows Normal World to share any buffers with OP-TEE.
While original design suggested to use pre-allocated region (usually of
1M to 2M of size), this new approach allows to use all non
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Now, when client applications can register own shared buffers in OP-TEE,
we need to extend ABI for parameter passing to/from OP-TEE.
So, if OP-TEE core detects that parameter belongs to registered shared
memory, it will use corresponding par
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
In order to register a shared buffer in TEE, we need accessor
function that return list of pages for that buffer.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
include/linux/tee_drv.h | 13 +
1 file
From: Volodymyr Babchuk
In order to register a shared buffer in TEE, we need accessor
function that return list of pages for that buffer.
Signed-off-by: Volodymyr Babchuk
---
include/linux/tee_drv.h | 13 +
1 file changed, 13 insertions(+)
diff --git a/include/linux/tee_drv.h b
From: Volodymyr Babchuk
Now, when client applications can register own shared buffers in OP-TEE,
we need to extend ABI for parameter passing to/from OP-TEE.
So, if OP-TEE core detects that parameter belongs to registered shared
memory, it will use corresponding parameter attribute.
Signed-off
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This change adds ops for shm_(un)register functions in tee interface.
Client application can use these functions to (un)register an own shared
buffer in OP-TEE address space. This allows zero copy data sharing between
Normal and Secure
From: Volodymyr Babchuk
This change adds ops for shm_(un)register functions in tee interface.
Client application can use these functions to (un)register an own shared
buffer in OP-TEE address space. This allows zero copy data sharing between
Normal and Secure Worlds.
Please note that while
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
These two function will be needed for shared memory registration in OP-TEE
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
include/linux/tee_drv.h | 20
1 file changed, 20 insertions(+)
diff --g
From: Volodymyr Babchuk
These two function will be needed for shared memory registration in OP-TEE
Signed-off-by: Volodymyr Babchuk
---
include/linux/tee_drv.h | 20
1 file changed, 20 insertions(+)
diff --git a/include/linux/tee_drv.h b/include/linux/tee_drv.h
index
Hello all,
I'm terribly sorry. This is v2 patches, but I forgot to change subject.
I think I'll leave this as, because I don't want to spam mailing lists
with this series again.
Or should I resend exactly this patches with right subject?
Hello all,
I'm terribly sorry. This is v2 patches, but I forgot to change subject.
I think I'll leave this as, because I don't want to spam mailing lists
with this series again.
Or should I resend exactly this patches with right subject?
From: Jens Wiklander <jens.wiklan...@linaro.org>
Added new ioctl to allow users register own buffers as a shared memory.
Signed-off-by: Jens Wiklander <jens.wiklan...@linaro.org>
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
* Removed dev_err() in cases when t
From: Jens Wiklander
Added new ioctl to allow users register own buffers as a shared memory.
Signed-off-by: Jens Wiklander
Signed-off-by: Volodymyr Babchuk
---
* Removed dev_err() in cases when this is not exactly an error
* tee_shm_register() return ENOTSUPP in cases when registration
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Now, when struct tee_shm is defined in public header,
we can inline small getter functions like this one.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
* Previously this patch moved tee_shm_is_registered() also
From: Volodymyr Babchuk
Now, when struct tee_shm is defined in public header,
we can inline small getter functions like this one.
Signed-off-by: Volodymyr Babchuk
---
* Previously this patch moved tee_shm_is_registered() also,
but now it is declared as inline in the same patch
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
We need to ensure that tee_context is present until last
shared buffer will be freed.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_core.c| 40 +++-
drivers/tee/t
From: Volodymyr Babchuk
We need to ensure that tee_context is present until last
shared buffer will be freed.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_core.c| 40 +++-
drivers/tee/tee_private.h | 3 +++
drivers/tee/tee_shm.c | 7
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This is simple pool that uses kernel page allocator. This pool can be
used in case OP-TEE supports dynamic shared memory.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/optee/Makefile | 1 +
drive
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Previous patches added various features that are needed for dynamic SHM.
Dynamic SHM allows Normal World to share any buffers with OP-TEE.
While original design suggested to use pre-allocated region (usually of
1M to 2M of size), this new ap
From: Volodymyr Babchuk
This is simple pool that uses kernel page allocator. This pool can be
used in case OP-TEE supports dynamic shared memory.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/Makefile | 1 +
drivers/tee/optee/shm_pool.c | 75
From: Volodymyr Babchuk
Previous patches added various features that are needed for dynamic SHM.
Dynamic SHM allows Normal World to share any buffers with OP-TEE.
While original design suggested to use pre-allocated region (usually of
1M to 2M of size), this new approach allows to use all non
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
With latest changes to OP-TEE we can use any buffers as a shared memory.
Thus, it is possible for supplicant to provide part of own memory
when OP-TEE asks to allocate a shared buffer.
This patch adds support for such feature into RPC ha
From: Volodymyr Babchuk
With latest changes to OP-TEE we can use any buffers as a shared memory.
Thus, it is possible for supplicant to provide part of own memory
when OP-TEE asks to allocate a shared buffer.
This patch adds support for such feature into RPC handling code.
Now when OP-TEE asks
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Those capabilities will be used in subsequent patches.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/optee/core.c | 1 +
drivers/tee/optee/optee_private.h | 3 +++
2 files changed, 4 insertions(+)
From: Volodymyr Babchuk
Those capabilities will be used in subsequent patches.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/core.c | 1 +
drivers/tee/optee/optee_private.h | 3 +++
2 files changed, 4 insertions(+)
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This change adds ops for shm_(un)register functions in tee interface.
Client application can use these functions to (un)register an own shared
buffer in OP-TEE address space. This allows zero copy data sharing between
Normal and Secure
From: Volodymyr Babchuk
This change adds ops for shm_(un)register functions in tee interface.
Client application can use these functions to (un)register an own shared
buffer in OP-TEE address space. This allows zero copy data sharing between
Normal and Secure Worlds.
Please note that while
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Now, when client applications can register own shared buffers in OP-TEE,
we need to extend ABI for parameter passing to/from OP-TEE.
So, if OP-TEE core detects that parameter belongs to registered shared
memory, it will use corresponding par
From: Volodymyr Babchuk
Now, when client applications can register own shared buffers in OP-TEE,
we need to extend ABI for parameter passing to/from OP-TEE.
So, if OP-TEE core detects that parameter belongs to registered shared
memory, it will use corresponding parameter attribute.
Signed-off
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Changes from v1:
* Added support for 16K and 64K pages.
* Elaborated commit messages
* More minor changes are described in corresponding patches.
While this patches are necessary for use OP-TEE in virualized envir
;
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_private.h | 57 +---
drivers/tee/tee_shm.c | 8 +--
drivers/tee/tee_shm_pool.c | 165 -
include/linux/tee_drv.h| 91 +
4
From: Volodymyr Babchuk
Changes from v1:
* Added support for 16K and 64K pages.
* Elaborated commit messages
* More minor changes are described in corresponding patches.
While this patches are necessary for use OP-TEE in virualized environment,
they are not sufficient. Stuart Yoder
From: Jens Wiklander
Makes creation of shm pools more flexible by adding new more primitive
functions to allocate a shm pool. This makes it easier to add driver
specific shm pool management.
Signed-off-by: Jens Wiklander
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_private.h | 57
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
In order to register a shared buffer in TEE, we need accessor
function that return list of pages for that buffer.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
* Removed check for validity of num_pages pointer. A
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
There were changes in REE<->OP-TEE ABI recently.
Now ABI allows us to pass non-contiguous memory buffers as list of
pages to OP-TEE. This can be achieved by using new parameter attribute
OPTEE_MSG_ATTR_NONCONTIG.
OP-TEE also is able to
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
These functions will be used to pass information about shared
buffers to OP-TEE. ABI between Linux and OP-TEE is defined
in optee_msg.h and optee_smc.h.
optee_msg.h defines OPTEE_MSG_ATTR_NONCONTIG attribute
for shared memory refe
From: Volodymyr Babchuk
There were changes in REE<->OP-TEE ABI recently.
Now ABI allows us to pass non-contiguous memory buffers as list of
pages to OP-TEE. This can be achieved by using new parameter attribute
OPTEE_MSG_ATTR_NONCONTIG.
OP-TEE also is able to use all non-secure RAM for
From: Volodymyr Babchuk
These functions will be used to pass information about shared
buffers to OP-TEE. ABI between Linux and OP-TEE is defined
in optee_msg.h and optee_smc.h.
optee_msg.h defines OPTEE_MSG_ATTR_NONCONTIG attribute
for shared memory references and describes how such references
From: Volodymyr Babchuk
In order to register a shared buffer in TEE, we need accessor
function that return list of pages for that buffer.
Signed-off-by: Volodymyr Babchuk
---
* Removed check for validity of num_pages pointer. As Yury Norov pointed,
this check can lead to mistakes
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
These two function will be needed for shared memory registration in OP-TEE
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
include/linux/tee_drv.h | 20
1 file changed, 20 insertions(+)
diff --g
From: Volodymyr Babchuk
These two function will be needed for shared memory registration in OP-TEE
Signed-off-by: Volodymyr Babchuk
---
include/linux/tee_drv.h | 20
1 file changed, 20 insertions(+)
diff --git a/include/linux/tee_drv.h b/include/linux/tee_drv.h
index
Hello Stuart,
On 03.10.17 19:05, Stuart Yoder wrote:
On 9/28/17 1:03 PM, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This patch series enables dynamic shared memory support in the TEE
subsystem as a whole and in OP-TEE in particular.
Global Platfo
Hello Stuart,
On 03.10.17 19:05, Stuart Yoder wrote:
On 9/28/17 1:03 PM, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk
This patch series enables dynamic shared memory support in the TEE
subsystem as a whole and in OP-TEE in particular.
Global Platform TEE specification [1] allows
On 29.09.17 16:06, Mark Rutland wrote:
On Thu, Sep 28, 2017 at 09:04:04PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This change adds ops for shm_(un)register functions in tee interface.
Client application can use these functions to (un)register
On 29.09.17 16:06, Mark Rutland wrote:
On Thu, Sep 28, 2017 at 09:04:04PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk
This change adds ops for shm_(un)register functions in tee interface.
Client application can use these functions to (un)register an own shared
buffer in OP-TEE
On 29.09.17 13:53, Mark Rutland wrote:
On Thu, Sep 28, 2017 at 09:03:59PM +0300, Volodymyr Babchuk wrote:
+static int
+tee_ioctl_shm_register(struct tee_context *ctx,
+ struct tee_ioctl_shm_register_data __user *udata)
+{
+ long ret;
+ struct
On 29.09.17 13:53, Mark Rutland wrote:
On Thu, Sep 28, 2017 at 09:03:59PM +0300, Volodymyr Babchuk wrote:
+static int
+tee_ioctl_shm_register(struct tee_context *ctx,
+ struct tee_ioctl_shm_register_data __user *udata)
+{
+ long ret;
+ struct
Hello Mark,
On 29.09.17 13:31, Mark Rutland wrote:
Hi,
On Thu, Sep 28, 2017 at 09:03:57PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This patch series enables dynamic shared memory support in the TEE
subsystem as a whole and in OP-TEE in part
Hello Mark,
On 29.09.17 13:31, Mark Rutland wrote:
Hi,
On Thu, Sep 28, 2017 at 09:03:57PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk
This patch series enables dynamic shared memory support in the TEE
subsystem as a whole and in OP-TEE in particular.
Global Platform TEE
On 29.09.17 03:23, Yury Norov wrote:
On Thu, Sep 28, 2017 at 09:04:03PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
These functions will be used to pass information about shared
buffers to OP-TEE.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@
On 29.09.17 03:23, Yury Norov wrote:
On Thu, Sep 28, 2017 at 09:04:03PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk
These functions will be used to pass information about shared
buffers to OP-TEE.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/call.c | 48
Hi Yury,
On 29.09.17 01:14, Yury Norov wrote:
Hi Volodymyr,
On Thu, Sep 28, 2017 at 09:04:01PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
In order to register a shared buffer in TEE, we need accessor
function that return list of pages for that
Hi Yury,
On 29.09.17 01:14, Yury Norov wrote:
Hi Volodymyr,
On Thu, Sep 28, 2017 at 09:04:01PM +0300, Volodymyr Babchuk wrote:
From: Volodymyr Babchuk
In order to register a shared buffer in TEE, we need accessor
function that return list of pages for that buffer.
Signed-off-by: Volodymyr
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
We need to ensure that tee_context is present until last
shared buffer will be freed.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_core.c| 40 +++-
drivers/tee/t
From: Volodymyr Babchuk
We need to ensure that tee_context is present until last
shared buffer will be freed.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_core.c| 40 +++-
drivers/tee/tee_private.h | 3 +++
drivers/tee/tee_shm.c | 7
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Now, when struct tee_shm is defined in public header,
we can inline small getter functions.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/tee_shm.c | 17 -
include/linux/tee_drv.h | 10 +
From: Volodymyr Babchuk
Now, when struct tee_shm is defined in public header,
we can inline small getter functions.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/tee_shm.c | 17 -
include/linux/tee_drv.h | 10 --
2 files changed, 8 insertions(+), 19 deletions
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Previous patches added various features that are needed for dynamic SHM.
Dynamic SHM allows Normal World to share any buffers with OP-TEE.
While original design suggested to use pre-allocated region (usually of
1M to 2M of size), this new ap
From: Volodymyr Babchuk
Previous patches added various features that are needed for dynamic SHM.
Dynamic SHM allows Normal World to share any buffers with OP-TEE.
While original design suggested to use pre-allocated region (usually of
1M to 2M of size), this new approach allows to use all non
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
This is simple pool that uses kernel page allocator. This pool can be
used in case OP-TEE supports dynamic shared memory.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/optee/Makefile | 1 +
drive
From: Volodymyr Babchuk
This is simple pool that uses kernel page allocator. This pool can be
used in case OP-TEE supports dynamic shared memory.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/Makefile | 1 +
drivers/tee/optee/shm_pool.c | 75
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Those capabilities will be used in subsequent patches.
Signed-off-by: Volodymyr Babchuk <vlad.babc...@gmail.com>
---
drivers/tee/optee/core.c | 1 +
drivers/tee/optee/optee_private.h | 3 +++
2 files changed, 4 insertions(+)
From: Volodymyr Babchuk
Those capabilities will be used in subsequent patches.
Signed-off-by: Volodymyr Babchuk
---
drivers/tee/optee/core.c | 1 +
drivers/tee/optee/optee_private.h | 3 +++
2 files changed, 4 insertions(+)
diff --git a/drivers/tee/optee/core.c b/drivers/tee/optee
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
With latest changes to OP-TEE we can use any buffers as a shared memory.
Thus, it is possible for supplicant to provide part of own memory
when OP-TEE asks to allocate a shared buffer.
This patch adds support for such feature into RPC ha
From: Volodymyr Babchuk <vlad.babc...@gmail.com>
Now, when client applications can register own shared buffers in OP-TEE,
we need to extend ABI for parameter passing to/from OP-TEE.
So, if OP-TEE core detects that parameter belongs to registered shared
memory, it will use corresponding par
1 - 100 of 122 matches
Mail list logo