/* * drivers/gpu/ion/ion_secure_cma_heap.c * * Copyright (C) Linaro 2012 * Author: for ST-Ericsson. * Copyright (c) 2013, The Linux Foundation. All rights reserved. * * This software is licensed under the terms of the GNU General Public * License version 2, as published by the Free Software Foundation, and * may be copied, distributed, and modified under those terms. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * */ #include #include #include #include #include #include #include #include #include /* for ion_heap_ops structure */ #include "ion_priv.h" #include "msm/ion_cp_common.h" #define ION_CMA_ALLOCATE_FAILED NULL struct ion_secure_cma_buffer_info { /* * This needs to come first for compatibility with the secure buffer API */ struct ion_cp_buffer secure; void *cpu_addr; dma_addr_t handle; struct sg_table *table; bool is_cached; }; /* * Create scatter-list for the already allocated DMA buffer. * This function could be replace by dma_common_get_sgtable * as soon as it will avalaible. */ int ion_secure_cma_get_sgtable(struct device *dev, struct sg_table *sgt, void *cpu_addr, dma_addr_t handle, size_t size) { struct page *page = phys_to_page(handle); int ret; ret = sg_alloc_table(sgt, 1, GFP_KERNEL); if (unlikely(ret)) return ret; sg_set_page(sgt->sgl, page, PAGE_ALIGN(size), 0); sg_dma_address(sgt->sgl) = handle; return 0; } /* ION CMA heap operations functions */ static struct ion_secure_cma_buffer_info *__ion_secure_cma_allocate( struct ion_heap *heap, struct ion_buffer *buffer, unsigned long len, unsigned long align, unsigned long flags) { struct device *dev = heap->priv; struct ion_secure_cma_buffer_info *info; DEFINE_DMA_ATTRS(attrs); dma_set_attr(DMA_ATTR_NO_KERNEL_MAPPING, &attrs); dev_dbg(dev, "Request buffer allocation len %ld\n", len); info = kzalloc(sizeof(struct ion_secure_cma_buffer_info), GFP_KERNEL); if (!info) { dev_err(dev, "Can't allocate buffer info\n"); return ION_CMA_ALLOCATE_FAILED; } info->cpu_addr = dma_alloc_attrs(dev, len, &(info->handle), 0, &attrs); if (!info->cpu_addr) { dev_err(dev, "Fail to allocate buffer\n"); goto err; } info->table = kmalloc(sizeof(struct sg_table), GFP_KERNEL); if (!info->table) { dev_err(dev, "Fail to allocate sg table\n"); goto err; } ion_secure_cma_get_sgtable(dev, info->table, info->cpu_addr, info->handle, len); info->secure.buffer = info->handle; /* keep this for memory release */ buffer->priv_virt = info; dev_dbg(dev, "Allocate buffer %p\n", buffer); return info; err: kfree(info); return ION_CMA_ALLOCATE_FAILED; } static int ion_secure_cma_allocate(struct ion_heap *heap, struct ion_buffer *buffer, unsigned long len, unsigned long align, unsigned long flags) { unsigned long secure_allocation = flags & ION_FLAG_SECURE; struct ion_secure_cma_buffer_info *buf = NULL; if (!secure_allocation) { pr_err("%s: non-secure allocation disallowed from heap %s %lx\n", __func__, heap->name, flags); return -ENOMEM; } if (ION_IS_CACHED(flags)) { pr_err("%s: cannot allocate cached memory from secure heap %s\n", __func__, heap->name); return -ENOMEM; } buf = __ion_secure_cma_allocate(heap, buffer, len, align, flags); if (buf) { buf->secure.want_delayed_unsecure = 0; atomic_set(&buf->secure.secure_cnt, 0); mutex_init(&buf->secure.lock); buf->secure.is_secure = 1; return 0; } else { return -ENOMEM; } } static void ion_secure_cma_free(struct ion_buffer *buffer) { struct device *dev = buffer->heap->priv; struct ion_secure_cma_buffer_info *info = buffer->priv_virt; dev_dbg(dev, "Release buffer %p\n", buffer); /* release memory */ dma_free_coherent(dev, buffer->size, info->cpu_addr, info->handle); sg_free_table(info->table); /* release sg table */ kfree(info->table); kfree(info); } static int ion_secure_cma_phys(struct ion_heap *heap, struct ion_buffer *buffer, ion_phys_addr_t *addr, size_t *len) { struct device *dev = heap->priv; struct ion_secure_cma_buffer_info *info = buffer->priv_virt; dev_dbg(dev, "Return buffer %p physical address 0x%pa\n", buffer, &info->handle); *addr = info->handle; *len = buffer->size; return 0; } struct sg_table *ion_secure_cma_heap_map_dma(struct ion_heap *heap, struct ion_buffer *buffer) { struct ion_secure_cma_buffer_info *info = buffer->priv_virt; return info->table; } void ion_secure_cma_heap_unmap_dma(struct ion_heap *heap, struct ion_buffer *buffer) { return; } static int ion_secure_cma_mmap(struct ion_heap *mapper, struct ion_buffer *buffer, struct vm_area_struct *vma) { pr_info("%s: mmaping from secure heap %s disallowed\n", __func__, mapper->name); return -EINVAL; } static void *ion_secure_cma_map_kernel(struct ion_heap *heap, struct ion_buffer *buffer) { pr_info("%s: kernel mapping from secure heap %s disallowed\n", __func__, heap->name); return NULL; } static void ion_secure_cma_unmap_kernel(struct ion_heap *heap, struct ion_buffer *buffer) { return; } static int ion_secure_cma_print_debug(struct ion_heap *heap, struct seq_file *s, const struct rb_root *mem_map) { if (mem_map) { struct rb_node *n; seq_printf(s, "\nMemory Map\n"); seq_printf(s, "%16.s %14.s %14.s %14.s\n", "client", "start address", "end address", "size (hex)"); for (n = rb_first(mem_map); n; n = rb_next(n)) { struct mem_map_data *data = rb_entry(n, struct mem_map_data, node); const char *client_name = "(null)"; if (data->client_name) client_name = data->client_name; seq_printf(s, "%16.s %14pa %14pa %14lu (%lx)\n", client_name, &data->addr, &data->addr_end, data->size, data->size); } } return 0; } static struct ion_heap_ops ion_secure_cma_ops = { .allocate = ion_secure_cma_allocate, .free = ion_secure_cma_free, .map_dma = ion_secure_cma_heap_map_dma, .unmap_dma = ion_secure_cma_heap_unmap_dma, .phys = ion_secure_cma_phys, .map_user = ion_secure_cma_mmap, .map_kernel = ion_secure_cma_map_kernel, .unmap_kernel = ion_secure_cma_unmap_kernel, .print_debug = ion_secure_cma_print_debug, .secure_buffer = ion_cp_secure_buffer, .unsecure_buffer = ion_cp_unsecure_buffer, }; struct ion_heap *ion_secure_cma_heap_create(struct ion_platform_heap *data) { struct ion_heap *heap; heap = kzalloc(sizeof(struct ion_heap), GFP_KERNEL); if (!heap) return ERR_PTR(-ENOMEM); heap->ops = &ion_secure_cma_ops; /* set device as private heaps data, later it will be * used to make the link with reserved CMA memory */ heap->priv = data->priv; heap->type = ION_HEAP_TYPE_SECURE_DMA; return heap; } void ion_secure_cma_heap_destroy(struct ion_heap *heap) { kfree(heap); }