Commit Graph

7 Commits

Author SHA1 Message Date
Reut Zysman
60fd58f999 securemsm-kernel: smcinvoke: add forward declaration
Add a forward declaration to avoid compilation errors.

Change-Id: I2b72059a6f739cc89c2da255bba736a2b4a1402a
Signed-off-by: Reut Zysman <quic_rzysman@quicinc.com>
2023-08-09 23:54:33 -07:00
Sarthak Patidar
1efb70736f Misc: hdcp : Add smcinvoke support for hdcp driver
Change-Id: I76b0e8f24df7f3e36288b1383fc7203bb295c181
Signed-off-by:Sarthak Patidar <quic_spatidar@quicinc.com>
2023-05-30 21:33:34 -07:00
Pawan Rai
ca9f562c5a smcinvoke: adci interface adaptation as per QTEE
Adapted the latest IClientEnv adci and other
interface methods from QTEE.
Change-Id: I05730e56d656977fbc53a2d3dedb04426474be1c
2023-01-29 10:58:20 -08:00
Pawan Rai
ef2c3ba718 smcinvoke: ADCI changes for SMCInvoke Driver
Change consists creation of ADCI thread at SMCInvoke
driver initialization

 Change consists creation of ADCI thread at SMCInvoke driver initialization
 Following scenario have been tested for this change
  (1) ADCI thread creation and QTEE invocation during driver initialization
  (2) Backward Compatibility - IF ADCI feature is not supported (OBJECT_ERROR_INVALID)
        then exit the ADCI thread gracefully after cleaning up all the resources
  (3) Leak Test: All the resources held by ADCI thread should be released if ADCI feature
      is not supported by QTEE
      (i) adci task_struct state and exit state:
            state =  TASK_RUNNING , exit_state = 0 (While ADCI thread execution)
            state =  TASK_DEAD , exit_state = EXIT_DEAD (During ADCI thread termination)
     (ii) adci task_struct = NULL (fetched based on adci thread_id) which make sure
             task_struct has been deallocated
  (4) SMCInvoke related Test: All the internal(suuported),memobj and cbo testing has been performed.

Change-Id: I2916ce260fae293b88fbc8b9d24baccdee1ea89f
Signed-off-by: Pawan Rai <quic_pawarai@quicinc.com>
2023-01-09 00:50:26 -08:00
Spencer Willett
9cd99dbb79 securemsm-kernel: exposing smcinvoke headers
We are exposing headers present in "include/linux" for the rest of the kernel DLKM's.
Aallow other kernel teams to access these headers.

Change-Id: I19c5591d885c7042ba3acd312ce9cb2bddc995c9
CRS-Fixed: 3338788
2022-12-16 19:07:58 -08:00
Spencer Willett
a785a207a2 Revert "securemsm-kernel: exposing smcinvoke headers"
This reverts commit 796ae71391.

This commit is being reverted due to build conflicts
with other teams

CRS-Fixed: 3354563

Change-Id: I915cc5bd0e718a1b82641ac02d2f0184f2fa1f37
2022-12-06 13:38:24 -08:00
Spencer Willett
796ae71391 securemsm-kernel: exposing smcinvoke headers
We are exposing headers present in "include/linux" for the rest of the kernel DLKM's.
These changes allow for other kernel teams to access these headers.

CRS-Fixed: 3338788

Change-Id: I5926ddeee8541398b32010db0b01af529b19fa3e
2022-11-23 09:49:37 -08:00