4 years ago[FOSS_TLK]security: tlk_driver: Pin user space page(s).
Sharif Inamdar [Tue, 3 Jun 2014 11:09:58 +0000]
[FOSS_TLK]security: tlk_driver: Pin user space page(s).

Pin user space pages based on the type of memory i.e.
read or write.

TE_PARAM_TYPE_MEM_RO or TE_PARAM_TYPE_MEM_RW param
indicates whether the TLK kernel will setup a RO/RW
mapping for the TA to this buffer.

Based on the type of memory we should pin the pages
using get_user_pages() as RO/RW.

Change-Id: Ib937433b64602f10cd1114f19845e9f6b4f8bf06
Signed-off-by: Sharif Inamdar <isharif@nvidia.com>
Reviewed-on: http://git-master/r/754995
Reviewed-by: Automatic_Commit_Validation_User
Reviewed-by: Varun Wadekar <vwadekar@nvidia.com>
Tested-by: Varun Wadekar <vwadekar@nvidia.com>

4 years ago[FOSS_TLK]Revert "security: tlk_driver: delete te_pin_user_pages() and its usage"
Sharif Inamdar [Tue, 3 Jun 2014 04:48:11 +0000]
[FOSS_TLK]Revert "security: tlk_driver: delete te_pin_user_pages() and its usage"

We are reverting this as we want to add support of
te_pin_user_pages(). TA can have dynamic mappings
created as part of an OpenSession or LaunchOperation
command.

If either of these specify a buffer as an argument
(with virt addr and length as params), the TLK kernel
will create a mapping to it. This happens for things
that go between TAs (no pin issue there) and between
the NS and S worlds.

In the case of NS buffers being passed in, we need
phys memory to stay where it is, because the secure
world has a mapping to it that Linux is unaware of,
which is why we pin it.

This reverts commit f4a063081552617e72cbdda5596ae7bd537696f7.

Change-Id: I7676f7786cef469f6cbb39a76a05541b417dc5f7
Signed-off-by: Sharif Inamdar <isharif@nvidia.com>
Reviewed-on: http://git-master/r/754994
Reviewed-by: Automatic_Commit_Validation_User
Reviewed-by: Varun Wadekar <vwadekar@nvidia.com>
Tested-by: Varun Wadekar <vwadekar@nvidia.com>

4 years ago[FOSS_TLK]security: tlk: delete TEGRA_USE_SECURE_KERNEL flag usage
Varun Wadekar [Tue, 30 Sep 2014 11:02:26 +0000]
[FOSS_TLK]security: tlk: delete TEGRA_USE_SECURE_KERNEL flag usage

We no longer use this flag in the kernel.

Change-Id: I6ef2f4eb080f39b09bd79e37739463c5446b59ce
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
Reviewed-on: http://git-master/r/754993
Reviewed-by: Automatic_Commit_Validation_User

4 years ago[FOSS_TLK]tlk_driver: Move all files to security/tlk_driver
Sharif Inamdar [Tue, 9 Jun 2015 05:41:45 +0000]
[FOSS_TLK]tlk_driver: Move all files to security/tlk_driver

Signed-off-by: Sharif Inamdar <isharif@nvidia.com>
Change-Id: Ibd778a4a5f563e187cdf32d953809748be6c256f
Reviewed-on: http://git-master/r/754992
Reviewed-by: Automatic_Commit_Validation_User
Reviewed-by: Varun Wadekar <vwadekar@nvidia.com>
Tested-by: Varun Wadekar <vwadekar@nvidia.com>

5 years agotlk_driver: 5/22 update daily-2014.06.20.0_release-tlk daily-2014.07.14.1_release-tlk daily-2014.07.17.0_release-tlk
Dennis Huang [Thu, 22 May 2014 23:57:28 +0000]
tlk_driver: 5/22 update

- ensure VPR SMC occurs on CPU0
- modify secure storage glue

Change-Id: I309733af47a1fbd4fbf6bdba618f2b1de6c83eb2
Reviewed-on: http://git-master/r/413472
Reviewed-by: Dennis Huang <denhuang@nvidia.com>
Tested-by: Dennis Huang <denhuang@nvidia.com>

5 years agoFirst version
Dennis Huang [Wed, 23 Apr 2014 02:24:15 +0000]
First version

- from: 95fe1e01264bc124b5a60ca6f26261f2660a686e

Change-Id: I4723979fb4c5337ad9aaf4c970a231ab1a3e3a05
Reviewed-on: http://git-master/r/400522
Reviewed-by: Dennis Huang <denhuang@nvidia.com>
Tested-by: Dennis Huang <denhuang@nvidia.com>

5 years agoInitial empty repository
Varun Colbert [Fri, 18 Apr 2014 05:57:39 +0000]
Initial empty repository