Commit Graph

17 Commits

Author SHA1 Message Date
Reut Zysman
60fd58f999 securemsm-kernel: smcinvoke: add forward declaration
Add a forward declaration to avoid compilation errors.

Change-Id: I2b72059a6f739cc89c2da255bba736a2b4a1402a
Signed-off-by: Reut Zysman <quic_rzysman@quicinc.com>
2023-08-09 23:54:33 -07:00
Ravi Kumar Bokka
d927db8e99 securemsm-kernel:Initialize Camera driver structure and fix compilation error
CameraDriver structure initialized explicitly to get version info
and remove INT32_C undefined macro definition to avoid compilation error.

Change-Id: If79a83383634fb379d860746ea3611e46295cd64
Signed-off-by: Ravi Kumar Bokka <quic_c_rbokka@quicinc.com>
2023-07-28 10:20:19 +05:30
Rajat Singh Deepak
e0ce498b3b securemsm-kernel:Expose header to configure FD port to camera kernel
Added a new API dynamicConfigureFDPort to allow secure/non-secure
FD port configuration from camera kernel.

Change-Id: I928d260249ef7bb10c43c125b5bc1c48379d89d4
Signed-off-by: Rajat Singh Deepak <quic_rajatsin@quicinc.com>
2023-07-17 14:26:01 +05:30
qctecmdr
63c2ea5d49 Merge "securemsm-kernel: include/linux: kw fixes" 2023-07-13 17:19:30 -07:00
Spencer Willett
4b2f646c79 securemsm-kernel: include/linux: kw fixes
initialize struct

CRS-Fixed: 3555122

Change-Id: I26ef84bc2bf6c4dbb5bfa754519de57c8d586375
2023-07-10 10:05:18 -07:00
Reut Zysman
aa1d1edbde securemsm-noship: smcinvoke: Rename define
Rename define to avoid definition duplications.

Change-Id: I3b3e87c41a3d2aef2310a1511c54013b3b6bf413
Signed-off-by: Reut Zysman <quic_rzysman@quicinc.com>
2023-06-30 11:18:14 -07:00
Reut Zysman
780711b60c securemsm-kernel: smcinvoke: expand API
Expand SMCInvoke API to support possible
future requirements.

Change-Id: I9f6031751489c43a27afc2860a1cb9f87c7ebb87
Signed-off-by: Reut Zysman <quic_rzysman@quicinc.com>
2023-06-15 07:26:07 -07:00
Gaurav Kashyap
ed0eab9c68 sec-kernel: move uapi securemsm headers to uapi path
Move the securemsm-kernel uapi headers to a uapi include path,
to conform with the uapi requirements.

NOTE: Duplicating qcedev.h & smcinvoke.h temporarily until
clients that manually include the path use the exported headers.

Change-Id: I33d390954ff0e6c721a5fa8256b431020e4f8912
Signed-off-by: Gaurav Kashyap <quic_gaurkash@quicinc.com>
2023-06-05 09:47:37 -07:00
Sarthak Patidar
1efb70736f Misc: hdcp : Add smcinvoke support for hdcp driver
Change-Id: I76b0e8f24df7f3e36288b1383fc7203bb295c181
Signed-off-by:Sarthak Patidar <quic_spatidar@quicinc.com>
2023-05-30 21:33:34 -07:00
Anmolpreet Kaur
50fd822191 securemsm-kernel: smcinvoke: Move TZ min buf size to header file
Move SMCINVOKE_TZ_MIN_BUF_SIZE to header file so that it can
be used by userspace modules.

Change-Id: I1f690c2507c6694175c317fe14fcca21cc907714
2023-03-09 14:42:17 -08:00
Pawan Rai
ca9f562c5a smcinvoke: adci interface adaptation as per QTEE
Adapted the latest IClientEnv adci and other
interface methods from QTEE.
Change-Id: I05730e56d656977fbc53a2d3dedb04426474be1c
2023-01-29 10:58:20 -08:00
Anmolpreet Kaur
1177b17bdb smcinvoke: Handle suspend and resume issues in smcinvoke driver
This change makes changes to smcinvoke driver to handle suspend and resume
scenarios. If the accept thread gets interrupted, do not set the server state
as defunct if the thread is in freezing state, i.e. if the thread is going in
suspend. In such cases, increase timeout of that server so that invoke thread
waits indefinitely for response from userspace until the system resumes back.

Tests:
1. Stability testing has been done on kalama.
2. smcinvoke vendor client testing is done on pineapple.

Change-Id: Iaa7b91d6ed484305349c04468263919e26a3316d
Signed-off-by: Anmolpreet Kaur <quic_anmolpre@quicinc.com>
2023-01-18 17:10:02 +05:30
Pawan Rai
ef2c3ba718 smcinvoke: ADCI changes for SMCInvoke Driver
Change consists creation of ADCI thread at SMCInvoke
driver initialization

 Change consists creation of ADCI thread at SMCInvoke driver initialization
 Following scenario have been tested for this change
  (1) ADCI thread creation and QTEE invocation during driver initialization
  (2) Backward Compatibility - IF ADCI feature is not supported (OBJECT_ERROR_INVALID)
        then exit the ADCI thread gracefully after cleaning up all the resources
  (3) Leak Test: All the resources held by ADCI thread should be released if ADCI feature
      is not supported by QTEE
      (i) adci task_struct state and exit state:
            state =  TASK_RUNNING , exit_state = 0 (While ADCI thread execution)
            state =  TASK_DEAD , exit_state = EXIT_DEAD (During ADCI thread termination)
     (ii) adci task_struct = NULL (fetched based on adci thread_id) which make sure
             task_struct has been deallocated
  (4) SMCInvoke related Test: All the internal(suuported),memobj and cbo testing has been performed.

Change-Id: I2916ce260fae293b88fbc8b9d24baccdee1ea89f
Signed-off-by: Pawan Rai <quic_pawarai@quicinc.com>
2023-01-09 00:50:26 -08:00
Spencer Willett
9cd99dbb79 securemsm-kernel: exposing smcinvoke headers
We are exposing headers present in "include/linux" for the rest of the kernel DLKM's.
Aallow other kernel teams to access these headers.

Change-Id: I19c5591d885c7042ba3acd312ce9cb2bddc995c9
CRS-Fixed: 3338788
2022-12-16 19:07:58 -08:00
Spencer Willett
a785a207a2 Revert "securemsm-kernel: exposing smcinvoke headers"
This reverts commit 796ae71391.

This commit is being reverted due to build conflicts
with other teams

CRS-Fixed: 3354563

Change-Id: I915cc5bd0e718a1b82641ac02d2f0184f2fa1f37
2022-12-06 13:38:24 -08:00
Spencer Willett
796ae71391 securemsm-kernel: exposing smcinvoke headers
We are exposing headers present in "include/linux" for the rest of the kernel DLKM's.
These changes allow for other kernel teams to access these headers.

CRS-Fixed: 3338788

Change-Id: I5926ddeee8541398b32010db0b01af529b19fa3e
2022-11-23 09:49:37 -08:00
Spencer Willett
01bb45918b securemsm-kernel : expose ITrustedCameraDriver header file
expose ITrustedCameraDriver header file to camera so that
camera kernel driver can trigger protect/unprotect call.

CRS-Fixed: 3343680

Change-Id: I011f17a93f9d7c32140835406488def34429f983
2022-11-22 15:09:19 -08:00