diff options
| author | Alex Deucher <alexander.deucher@amd.com> | 2019-08-07 22:32:46 -0500 | 
|---|---|---|
| committer | Alex Deucher <alexander.deucher@amd.com> | 2020-04-28 16:20:29 -0400 | 
| commit | 4cd24494cc87468145ccacd885446b2fec6cb856 (patch) | |
| tree | 0c4a7acaefd666b7bad86e46862d2984a0317234 /drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c | |
| parent | cb5fae143d79d255251921066dbf8eae16383639 (diff) | |
drm/amdgpu: set TMZ bits in PTEs for secure BO (v4)
If a buffer object is secure, i.e. created with
AMDGPU_GEM_CREATE_ENCRYPTED, then the TMZ bit of
the PTEs that belong the buffer object should be
set.
v1: design and draft the skeletion of TMZ bits setting on PTEs (Alex)
v2: return failure once create secure BO on non-TMZ platform  (Ray)
v3: amdgpu_bo_encrypted() only checks the BO (Luben)
v4: move TMZ flag setting into amdgpu_vm_bo_update  (Christian)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
Reviewed-by: Huang Rui <ray.huang@amd.com>
Signed-off-by: Huang Rui <ray.huang@amd.com>
Signed-off-by: Luben Tuikov <luben.tuikov@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com>
Reviewed-by: Christian König <christian.koenig@amd.com>
Diffstat (limited to 'drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c')
| -rw-r--r-- | drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c | 12 | 
1 files changed, 11 insertions, 1 deletions
| diff --git a/drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c b/drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c index 32f36c940abb..26220ee87291 100644 --- a/drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c +++ b/drivers/gpu/drm/amd/amdgpu/amdgpu_gem.c @@ -233,7 +233,8 @@ int amdgpu_gem_create_ioctl(struct drm_device *dev, void *data,  		      AMDGPU_GEM_CREATE_CPU_GTT_USWC |  		      AMDGPU_GEM_CREATE_VRAM_CLEARED |  		      AMDGPU_GEM_CREATE_VM_ALWAYS_VALID | -		      AMDGPU_GEM_CREATE_EXPLICIT_SYNC)) +		      AMDGPU_GEM_CREATE_EXPLICIT_SYNC | +		      AMDGPU_GEM_CREATE_ENCRYPTED))  		return -EINVAL; @@ -241,6 +242,11 @@ int amdgpu_gem_create_ioctl(struct drm_device *dev, void *data,  	if (args->in.domains & ~AMDGPU_GEM_DOMAIN_MASK)  		return -EINVAL; +	if (!adev->tmz.enabled && (flags & AMDGPU_GEM_CREATE_ENCRYPTED)) { +		DRM_ERROR("Cannot allocate secure buffer while tmz is disabled\n"); +		return -EINVAL; +	} +  	/* create a gem object to contain this object in */  	if (args->in.domains & (AMDGPU_GEM_DOMAIN_GDS |  	    AMDGPU_GEM_DOMAIN_GWS | AMDGPU_GEM_DOMAIN_OA)) { @@ -262,6 +268,10 @@ int amdgpu_gem_create_ioctl(struct drm_device *dev, void *data,  		resv = vm->root.base.bo->tbo.base.resv;  	} +	if (flags & AMDGPU_GEM_CREATE_ENCRYPTED) { +		/* XXX: pad out alignment to meet TMZ requirements */ +	} +  	r = amdgpu_gem_object_create(adev, size, args->in.alignment,  				     (u32)(0xffffffff & args->in.domains),  				     flags, ttm_bo_type_device, resv, &gobj); | 
