mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
synced 2026-04-25 00:52:45 -04:00
Headers in include/ should be included using the system header #include
syntax.
Fixes: 887a193b4f ("drm/i915/pxp: add huc authentication and loading command")
Cc: Tomas Winkler <tomas.winkler@intel.com>
Cc: Vitaly Lubart <vitaly.lubart@intel.com>
Cc: Daniele Ceraolo Spurio <daniele.ceraolospurio@intel.com>
Cc: Alan Previn <alan.previn.teres.alexis@intel.com>
Signed-off-by: Jani Nikula <jani.nikula@intel.com>
Reviewed-by: Daniele Ceraolo Spurio <daniele.ceraolospurio@intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20221107140454.2680954-1-jani.nikula@intel.com
71 lines
2.0 KiB
C
71 lines
2.0 KiB
C
// SPDX-License-Identifier: MIT
|
|
/*
|
|
* Copyright(c) 2021-2022, Intel Corporation. All rights reserved.
|
|
*/
|
|
|
|
#include <drm/i915_drm.h>
|
|
|
|
#include "i915_drv.h"
|
|
|
|
#include "gem/i915_gem_region.h"
|
|
#include "gt/intel_gt.h"
|
|
|
|
#include "intel_pxp.h"
|
|
#include "intel_pxp_huc.h"
|
|
#include "intel_pxp_tee.h"
|
|
#include "intel_pxp_types.h"
|
|
#include "intel_pxp_tee_interface.h"
|
|
|
|
int intel_pxp_huc_load_and_auth(struct intel_pxp *pxp)
|
|
{
|
|
struct intel_gt *gt = pxp_to_gt(pxp);
|
|
struct intel_huc *huc = >->uc.huc;
|
|
struct pxp_tee_start_huc_auth_in huc_in = {0};
|
|
struct pxp_tee_start_huc_auth_out huc_out = {0};
|
|
dma_addr_t huc_phys_addr;
|
|
u8 client_id = 0;
|
|
u8 fence_id = 0;
|
|
int err;
|
|
|
|
if (!pxp->pxp_component)
|
|
return -ENODEV;
|
|
|
|
huc_phys_addr = i915_gem_object_get_dma_address(huc->fw.obj, 0);
|
|
|
|
/* write the PXP message into the lmem (the sg list) */
|
|
huc_in.header.api_version = PXP_TEE_43_APIVER;
|
|
huc_in.header.command_id = PXP_TEE_43_START_HUC_AUTH;
|
|
huc_in.header.status = 0;
|
|
huc_in.header.buffer_len = sizeof(huc_in.huc_base_address);
|
|
huc_in.huc_base_address = huc_phys_addr;
|
|
|
|
err = intel_pxp_tee_stream_message(pxp, client_id, fence_id,
|
|
&huc_in, sizeof(huc_in),
|
|
&huc_out, sizeof(huc_out));
|
|
if (err < 0) {
|
|
drm_err(>->i915->drm,
|
|
"Failed to send HuC load and auth command to GSC [%d]!\n",
|
|
err);
|
|
return err;
|
|
}
|
|
|
|
/*
|
|
* HuC does sometimes survive suspend/resume (it depends on how "deep"
|
|
* a sleep state the device reaches) so we can end up here on resume
|
|
* with HuC already loaded, in which case the GSC will return
|
|
* PXP_STATUS_OP_NOT_PERMITTED. We can therefore consider the GuC
|
|
* correctly transferred in this scenario; if the same error is ever
|
|
* returned with HuC not loaded we'll still catch it when we check the
|
|
* authentication bit later.
|
|
*/
|
|
if (huc_out.header.status != PXP_STATUS_SUCCESS &&
|
|
huc_out.header.status != PXP_STATUS_OP_NOT_PERMITTED) {
|
|
drm_err(>->i915->drm,
|
|
"HuC load failed with GSC error = 0x%x\n",
|
|
huc_out.header.status);
|
|
return -EPROTO;
|
|
}
|
|
|
|
return 0;
|
|
}
|