tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
authorSumit Garg <sumit.garg@linaro.org>
Mon, 14 Jun 2021 22:33:15 +0000 (17:33 -0500)
committerJens Wiklander <jens.wiklander@linaro.org>
Wed, 21 Jul 2021 05:55:50 +0000 (07:55 +0200)
commit376e4199e327a5cf29b8ec8fb0f64f3d8b429819
tree77dbe6218db409a2179fb212d9ea40270c75c8c9
parentdc7019b7d0e188d4093b34bd0747ed0d668c63bf
tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag

Currently TEE_SHM_DMA_BUF flag has been inappropriately used to not
register shared memory allocated for private usage by underlying TEE
driver: OP-TEE in this case. So rather add a new flag as TEE_SHM_PRIV
that can be utilized by underlying TEE drivers for private allocation
and usage of shared memory.

With this corrected, allow tee_shm_alloc_kernel_buf() to allocate a
shared memory region without the backing of dma-buf.

Cc: stable@vger.kernel.org
Signed-off-by: Sumit Garg <sumit.garg@linaro.org>
Co-developed-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Signed-off-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
Reviewed-by: Sumit Garg <sumit.garg@linaro.org>
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
drivers/tee/optee/call.c
drivers/tee/optee/core.c
drivers/tee/optee/rpc.c
drivers/tee/optee/shm_pool.c
drivers/tee/tee_shm.c
include/linux/tee_drv.h