linux_dsm_epyc7002/drivers/tee
Sumit Garg d4384d6338 tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
[ Upstream commit 376e4199e327a5cf29b8ec8fb0f64f3d8b429819 ]

Currently TEE_SHM_DMA_BUF flag has been inappropriately used to not
register shared memory allocated for private usage by underlying TEE
driver: OP-TEE in this case. So rather add a new flag as TEE_SHM_PRIV
that can be utilized by underlying TEE drivers for private allocation
and usage of shared memory.

With this corrected, allow tee_shm_alloc_kernel_buf() to allocate a
shared memory region without the backing of dma-buf.

Cc: stable@vger.kernel.org
Signed-off-by: Sumit Garg <sumit.garg@linaro.org>
Co-developed-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Signed-off-by: Tyler Hicks <tyhicks@linux.microsoft.com>
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
Reviewed-by: Sumit Garg <sumit.garg@linaro.org>
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-07-05 18:53:10 +02:00
..
amdtee tee: amdtee: unload TA only when its refcount becomes 0 2021-05-26 12:06:47 +02:00
optee tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag 2024-07-05 18:53:10 +02:00
Kconfig tee: fix crypto select 2020-05-28 12:38:00 +02:00
Makefile init: add dsm gpl source 2024-07-05 18:00:04 +02:00
tee_client_api.h init: add dsm gpl source 2024-07-05 18:00:04 +02:00
tee_core.c init: add dsm gpl source 2024-07-05 18:00:04 +02:00
tee_mem_api.c init: add dsm gpl source 2024-07-05 18:00:04 +02:00
tee_private.h tee: don't assign shm id for private shms 2020-02-28 13:37:42 +01:00
tee_shm_pool.c treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 282 2019-06-05 17:36:37 +02:00
tee_shm.c tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag 2024-07-05 18:53:10 +02:00