blob: a61d2c882ed692ec5bdb16e1eeb6f200dcf4c4ec [file] [log] [blame]
From 3104eb14f62df1c7c4b9038eb914514b0ff371dc Mon Sep 17 00:00:00 2001
From: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
Date: Fri, 14 Jan 2022 18:47:08 +0000
Subject: [PATCH 28/32] ANDROID: trusty: Add trusty-ffa driver
Initial changes related to FFA transport support
- Adds FFA transport descriptor
- Defines Trusty UUID
- Initializes FFA transport does probe, sets ffa_ops
- Defers Trusty probe if ARM FF-A driver is not initialized or
Trusty SP not found.
- Link FF-A device as the supplier for Trusty platform device.
Signed-off-by: Arunachalam Ganapathy <arunachalam.ganapathy@arm.com>
Change-Id: I78f72b85c20e4bad4c24cf0826e96f27dcf2ee1d
Upstream-Status: Pending [Not submitted to upstream yet]
---
drivers/trusty/Makefile | 1 +
drivers/trusty/trusty-ffa.c | 196 ++++++++++++++++++++++++++++++++
drivers/trusty/trusty-ffa.h | 28 +++++
drivers/trusty/trusty-private.h | 1 +
drivers/trusty/trusty.c | 6 +
5 files changed, 232 insertions(+)
create mode 100644 drivers/trusty/trusty-ffa.c
create mode 100644 drivers/trusty/trusty-ffa.h
diff --git a/drivers/trusty/Makefile b/drivers/trusty/Makefile
index fbb53ee93003..797d61bf68ef 100644
--- a/drivers/trusty/Makefile
+++ b/drivers/trusty/Makefile
@@ -6,6 +6,7 @@
obj-$(CONFIG_TRUSTY) += trusty-core.o
trusty-core-objs += trusty.o trusty-mem.o
trusty-core-objs += trusty-smc.o
+trusty-core-objs += trusty-ffa.o
trusty-core-$(CONFIG_ARM) += trusty-smc-arm.o
trusty-core-$(CONFIG_ARM64) += trusty-smc-arm64.o
obj-$(CONFIG_TRUSTY_IRQ) += trusty-irq.o
diff --git a/drivers/trusty/trusty-ffa.c b/drivers/trusty/trusty-ffa.c
new file mode 100644
index 000000000000..c8c16a1fc700
--- /dev/null
+++ b/drivers/trusty/trusty-ffa.c
@@ -0,0 +1,196 @@
+/* SPDX-License-Identifier: GPL-2.0-only */
+/*
+ * Copyright (C) 2022 ARM Ltd.
+ */
+
+#include <linux/platform_device.h>
+#include <linux/slab.h>
+#include <linux/trusty/smcall.h>
+#include <linux/arm_ffa.h>
+#include <linux/trusty/trusty.h>
+
+#include <linux/scatterlist.h>
+#include <linux/dma-mapping.h>
+
+#include "trusty-ffa.h"
+#include "trusty-private.h"
+
+static const struct trusty_mem_ops trusty_ffa_mem_ops = {
+ .desc = &trusty_ffa_transport,
+};
+
+static const struct ffa_device_id trusty_ffa_device_id[] = {
+ /*
+ * Trusty UID: RFC-4122 compliant UUID version 4
+ * 40ee25f0-a2bc-304c-8c4ca173c57d8af1
+ */
+ { UUID_INIT(0x40ee25f0, 0xa2bc, 0x304c,
+ 0x8c, 0x4c, 0xa1, 0x73, 0xc5, 0x7d, 0x8a, 0xf1) },
+ {}
+};
+
+static int trusty_ffa_dev_match(struct device *dev, const void *uuid)
+{
+ struct ffa_device *ffa_dev;
+
+ ffa_dev = to_ffa_dev(dev);
+ if (uuid_equal(&ffa_dev->uuid, uuid))
+ return 1;
+
+ return 0;
+}
+
+static struct ffa_device *trusty_ffa_dev_find(void)
+{
+ const void *data;
+ struct device *dev;
+
+ /* currently only one trusty instance is probed */
+ data = &trusty_ffa_device_id[0].uuid;
+
+ dev = bus_find_device(&ffa_bus_type, NULL, data, trusty_ffa_dev_match);
+ if (dev) {
+ /* drop reference count */
+ put_device(dev);
+ return to_ffa_dev(dev);
+ }
+
+ return NULL;
+}
+
+static int trusty_ffa_link_supplier(struct device *c_dev, struct device *s_dev)
+{
+ if (!c_dev || !s_dev)
+ return -EINVAL;
+
+ if (!device_link_add(c_dev, s_dev, DL_FLAG_AUTOREMOVE_CONSUMER)) {
+ return -ENODEV;
+ }
+
+ return 0;
+}
+
+/*
+ * called from trusty probe
+ */
+static int trusty_ffa_transport_setup(struct device *dev)
+{
+ int rc;
+ struct trusty_state *s = platform_get_drvdata(to_platform_device(dev));
+ struct trusty_ffa_state *ffa_state;
+ struct ffa_device *ffa_dev;
+
+ /* ffa transport not required for lower api versions */
+ if (s->api_version != 0 && s->api_version < TRUSTY_API_VERSION_MEM_OBJ) {
+ return -EINVAL;
+ }
+
+ ffa_dev = trusty_ffa_dev_find();
+ if (!ffa_dev) {
+ dev_dbg(dev, "FFA: Trusty device not found defer probe\n");
+ return -EPROBE_DEFER;
+ }
+
+ ffa_state = ffa_dev_get_drvdata(ffa_dev);
+ if (!ffa_state)
+ return -EINVAL;
+
+ rc = trusty_ffa_link_supplier(dev, &ffa_dev->dev);
+ if (rc != 0)
+ return rc;
+
+ /* FFA used only for memory sharing operations */
+ if (s->api_version == TRUSTY_API_VERSION_MEM_OBJ) {
+ s->ffa = ffa_state;
+ s->mem_ops = &trusty_ffa_mem_ops;
+ return 0;
+ }
+
+ return -EINVAL;
+}
+
+static void trusty_ffa_transport_cleanup(struct device *dev)
+{
+ struct trusty_state *s = platform_get_drvdata(to_platform_device(dev));
+
+ /* ffa transport not setup for lower api versions */
+ if (s->api_version < TRUSTY_API_VERSION_MEM_OBJ) {
+ return;
+ }
+
+ s->ffa = NULL;
+ s->mem_ops = NULL;
+}
+
+static int trusty_ffa_probe(struct ffa_device *ffa_dev)
+{
+ const struct ffa_dev_ops *ffa_ops;
+ struct trusty_ffa_state *s;
+ u32 ffa_drv_version;
+
+ ffa_ops = ffa_dev_ops_get(ffa_dev);
+ if (!ffa_ops) {
+ dev_dbg(&ffa_dev->dev, "ffa_dev_ops_get: failed\n");
+ return -ENOENT;
+ }
+
+ /* check ffa driver version compatibility */
+ ffa_drv_version = ffa_ops->api_version_get();
+ if (TO_TRUSTY_FFA_MAJOR(ffa_drv_version) != TRUSTY_FFA_VERSION_MAJOR ||
+ TO_TRUSTY_FFA_MINOR(ffa_drv_version) < TRUSTY_FFA_VERSION_MINOR)
+ return -EINVAL;
+
+ s = kzalloc(sizeof(*s), GFP_KERNEL);
+ if (!s)
+ return -ENOMEM;
+
+ s->dev = &ffa_dev->dev;
+ s->ops = ffa_ops;
+ mutex_init(&s->share_memory_msg_lock);
+ ffa_dev_set_drvdata(ffa_dev, s);
+
+ ffa_ops->mode_32bit_set(ffa_dev);
+
+ return 0;
+}
+
+static void trusty_ffa_remove(struct ffa_device *ffa_dev)
+{
+ struct trusty_ffa_state *s;
+
+ s = ffa_dev_get_drvdata(ffa_dev);
+
+ mutex_destroy(&s->share_memory_msg_lock);
+ memset(s, 0, sizeof(struct trusty_ffa_state));
+ kfree(s);
+}
+
+static struct ffa_driver trusty_ffa_driver = {
+ .name = "trusty-ffa",
+ .probe = trusty_ffa_probe,
+ .remove = trusty_ffa_remove,
+ .id_table = trusty_ffa_device_id,
+};
+
+static int __init trusty_ffa_transport_init(void)
+{
+ if (IS_REACHABLE(CONFIG_ARM_FFA_TRANSPORT)) {
+ return ffa_register(&trusty_ffa_driver);
+ } else
+ return -ENODEV;
+}
+
+static void __exit trusty_ffa_transport_exit(void)
+{
+ if (IS_REACHABLE(CONFIG_ARM_FFA_TRANSPORT))
+ ffa_unregister(&trusty_ffa_driver);
+}
+
+const struct trusty_transport_desc trusty_ffa_transport = {
+ .name = "ffa",
+ .setup = trusty_ffa_transport_setup,
+ .cleanup = trusty_ffa_transport_cleanup,
+};
+
+module_init(trusty_ffa_transport_init);
+module_exit(trusty_ffa_transport_exit);
diff --git a/drivers/trusty/trusty-ffa.h b/drivers/trusty/trusty-ffa.h
new file mode 100644
index 000000000000..267ca2c5db29
--- /dev/null
+++ b/drivers/trusty/trusty-ffa.h
@@ -0,0 +1,28 @@
+/* SPDX-License-Identifier: GPL-2.0-only */
+/*
+ * Copyright (C) 2022 ARM Ltd.
+ */
+
+#ifndef __LINUX_TRUSTY_FFA_H
+#define __LINUX_TRUSTY_FFA_H
+
+#include <linux/types.h>
+#include <linux/uuid.h>
+#include <linux/arm_ffa.h>
+
+#define TRUSTY_FFA_VERSION_MAJOR (1U)
+#define TRUSTY_FFA_VERSION_MINOR (0U)
+#define TRUSTY_FFA_VERSION_MAJOR_SHIFT (16U)
+#define TRUSTY_FFA_VERSION_MAJOR_MASK (0x7fffU)
+#define TRUSTY_FFA_VERSION_MINOR_SHIFT (0U)
+#define TRUSTY_FFA_VERSION_MINOR_MASK (0U)
+
+#define TO_TRUSTY_FFA_MAJOR(v) \
+ ((u16)((v >> TRUSTY_FFA_VERSION_MAJOR_SHIFT) & \
+ TRUSTY_FFA_VERSION_MAJOR_MASK))
+
+#define TO_TRUSTY_FFA_MINOR(v) \
+ ((u16)((v >> TRUSTY_FFA_VERSION_MINOR_SHIFT) & \
+ TRUSTY_FFA_VERSION_MINOR_MASK))
+
+#endif /* __LINUX_TRUSTY_FFA_H */
diff --git a/drivers/trusty/trusty-private.h b/drivers/trusty/trusty-private.h
index 74b88bb8f83b..2496f397e5d2 100644
--- a/drivers/trusty/trusty-private.h
+++ b/drivers/trusty/trusty-private.h
@@ -73,5 +73,6 @@ int trusty_init_api_version(struct trusty_state *s, struct device *dev,
typedef const struct trusty_transport_desc *trusty_transports_t;
extern const struct trusty_transport_desc trusty_smc_transport;
+extern const struct trusty_transport_desc trusty_ffa_transport;
#endif /* _TRUSTY_PRIVATE_H */
diff --git a/drivers/trusty/trusty.c b/drivers/trusty/trusty.c
index ec0fccfaa24c..4686b0d34f61 100644
--- a/drivers/trusty/trusty.c
+++ b/drivers/trusty/trusty.c
@@ -509,6 +509,11 @@ trusty_transports_setup(const trusty_transports_t *transports,
return -EINVAL;
ret = transport->setup(dev);
+ if (ret == -EPROBE_DEFER) {
+ dev_notice(dev, "transport %s: defer probe\n",
+ transport->name);
+ return ret;
+ }
transports_ret &= ret;
}
@@ -672,6 +677,7 @@ static int trusty_remove(struct platform_device *pdev)
*/
static const trusty_transports_t trusty_transports[] = {
&trusty_smc_transport,
+ &trusty_ffa_transport,
NULL,
};
--
2.30.2