From patchwork Mon Jul 26 08:10:39 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jens Wiklander X-Patchwork-Id: 12398797 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, INCLUDES_PULL_REQUEST,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 458CAC4320A for ; Mon, 26 Jul 2021 08:10:43 +0000 (UTC) Received: by mail.kernel.org (Postfix) id 23FD660F9F; Mon, 26 Jul 2021 08:10:43 +0000 (UTC) Received: from mail-lf1-f43.google.com (mail-lf1-f43.google.com [209.85.167.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id E91E260F52 for ; Mon, 26 Jul 2021 08:10:42 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org E91E260F52 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=tempfail smtp.mailfrom=linaro.org Received: by mail-lf1-f43.google.com with SMTP id a26so13879649lfr.11 for ; Mon, 26 Jul 2021 01:10:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=uhBYFS3kcrFSzUp+99m4qpuPqHmdy7DA1vxoHG2YpBo=; b=NMqlYTqW/lndtqqHyPiFLM6rKPoHHYZHYwW7+jnlb6T8g26zSGu5wBdOgmvlgttoD9 ubbH32dNkwfzgC+9alfK8agoc5+COrbTU16cAPLPc333Mldr2cuGOuezk7zKUQO3kGum TJbTAPv4dtvb2SGwq2VENVB9H7UNNgi3tTd1qvmbPAWgURCGGrNAeAs728bElIhjRDps CRqGXwAF5zVT3SWVH68uW9QD5hMaS/Q8opTCkca7GuJIU1QrNYZyrX9L7Akzi8CJva+C 6zl9IGO84AdkjSfN70jgi5fo1Ra+6yy+jIvL2cb2kwAL1LSaLnzmt1iXfDN1tb/vKTi+ 7+fw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=uhBYFS3kcrFSzUp+99m4qpuPqHmdy7DA1vxoHG2YpBo=; b=q7BJ9L039bQ+qfzulqSiwB9hMPyFw78DgCSt7vU/1TpvrmRjmrp4MZpPG7Ook2UEKG qPSQSfoethtnkJGub5OD1J0+6aQ8b2I6RNhYw1b1PP1TrK/JEOLp3P0WmPdc97+yqw0m /C+IfyeNrlwd3tYRiWEMWPpXR2jbhRZfRZau0+mIds0Nm/LdIqQr20gD8OMS/b8bSWVA rh6VJf+oblzw3GsENQ3jbwJAUUr1pkbx+J79R6hABlMN1WvX/kppIS71FfkaDdcILJMr ZoZFp54Zo8YMOU1ka0MSVuWwWSTQnTRasi6Wu2/o1OKCZ2smdLnvMKBHOnXxvpEtGgsH 1BMw== X-Gm-Message-State: AOAM5331PFeIXBU0naTASIdBkFO3FYqXH+pCFrBqLIzltVjxuQukdGLA bNwKfwAbGBxQldphKUr2sd3HfXUu5/hIMg== X-Google-Smtp-Source: ABdhPJzr0Z5y4Twf5n/G2SkMcR8Be0DIW4CEwE7lwxefCBKqF7n4oehjLY7Ar8Nd/ya3HmLfUYdS9w== X-Received: by 2002:ac2:4e09:: with SMTP id e9mr12539781lfr.431.1627287041314; Mon, 26 Jul 2021 01:10:41 -0700 (PDT) Received: from jade (h-94-254-48-165.A175.priv.bahnhof.se. [94.254.48.165]) by smtp.gmail.com with ESMTPSA id t7sm2973379lfc.103.2021.07.26.01.10.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jul 2021 01:10:41 -0700 (PDT) Date: Mon, 26 Jul 2021 10:10:39 +0200 From: Jens Wiklander List-Id: To: arm@kernel.org, soc@kernel.org Cc: op-tee@lists.trustedfirmware.org, Linux Kernel Mailing List , Sumit Garg , Tyler Hicks Subject: [GIT PULL] TEE kexec fixes for v5.14 Message-ID: <20210726081039.GA2482361@jade> MIME-Version: 1.0 Content-Disposition: inline Hello arm-soc maintainers, Please pull these fixes relating to OP-TEE, ftpm (firmware TPM), and tee_bnxt_fw (Broadcom BNXT firmware manager) drivers in kexec and kdump (emergency kexec) based workflows. The two patches "firmware: tee_bnxt: Release TEE shm, session, and context during kexec" and "tpm_ftpm_tee: Free and unregister TEE shared memory during kexec" are acked by their respective maintainers. For more details please see the description of the last patch set https://lore.kernel.org/lkml/20210614223317.999867-1-tyhicks@linux.microsoft.com/ Thanks, Jens The following changes since commit 2734d6c1b1a089fb593ef6a23d4b70903526fe0c: Linux 5.14-rc2 (2021-07-18 14:13:49 -0700) are available in the Git repository at: git://git.linaro.org:/people/jens.wiklander/linux-tee.git tags/tee-kexec-fixes-for-v5.14 for you to fetch changes up to 914ab19e471d8fb535ed50dff108b0a615f3c2d8: firmware: tee_bnxt: Release TEE shm, session, and context during kexec (2021-07-21 07:55:50 +0200) ---------------------------------------------------------------- tee: Improve support for kexec and kdump This fixes several bugs uncovered while exercising the OP-TEE, ftpm (firmware TPM), and tee_bnxt_fw (Broadcom BNXT firmware manager) drivers with kexec and kdump (emergency kexec) based workflows. ---------------------------------------------------------------- Allen Pais (2): optee: fix tee out of memory failure seen during kexec reboot firmware: tee_bnxt: Release TEE shm, session, and context during kexec Jens Wiklander (1): tee: add tee_shm_alloc_kernel_buf() Sumit Garg (1): tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag Tyler Hicks (4): optee: Fix memory leak when failing to register shm pages optee: Refuse to load the driver under the kdump kernel optee: Clear stale cache entries during initialization tpm_ftpm_tee: Free and unregister TEE shared memory during kexec drivers/char/tpm/tpm_ftpm_tee.c | 8 +++--- drivers/firmware/broadcom/tee_bnxt_fw.c | 14 ++++++++--- drivers/tee/optee/call.c | 38 ++++++++++++++++++++++++++--- drivers/tee/optee/core.c | 43 ++++++++++++++++++++++++++++++++- drivers/tee/optee/optee_private.h | 1 + drivers/tee/optee/rpc.c | 5 ++-- drivers/tee/optee/shm_pool.c | 20 ++++++++++++--- drivers/tee/tee_shm.c | 20 ++++++++++++++- include/linux/tee_drv.h | 2 ++ 9 files changed, 132 insertions(+), 19 deletions(-)