tee_core.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063
  1. /*
  2. * Copyright (c) 2015-2016, Linaro Limited
  3. *
  4. * This software is licensed under the terms of the GNU General Public
  5. * License version 2, as published by the Free Software Foundation, and
  6. * may be copied, distributed, and modified under those terms.
  7. *
  8. * This program is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. */
  14. #define pr_fmt(fmt) "%s: " fmt, __func__
  15. #include <linux/cdev.h>
  16. #include <linux/device.h>
  17. #include <linux/fs.h>
  18. #include <linux/idr.h>
  19. #include <linux/module.h>
  20. #include <linux/slab.h>
  21. #include <linux/tee_drv.h>
  22. #include <linux/uaccess.h>
  23. #include "tee_private.h"
  24. #define TEE_NUM_DEVICES 32
  25. #define TEE_IOCTL_PARAM_SIZE(x) (sizeof(struct tee_param) * (x))
  26. /*
  27. * Unprivileged devices in the lower half range and privileged devices in
  28. * the upper half range.
  29. */
  30. static DECLARE_BITMAP(dev_mask, TEE_NUM_DEVICES);
  31. static DEFINE_SPINLOCK(driver_lock);
  32. static struct class *tee_class;
  33. static dev_t tee_devt;
  34. static struct tee_context *teedev_open(struct tee_device *teedev)
  35. {
  36. int rc;
  37. struct tee_context *ctx;
  38. if (!tee_device_get(teedev))
  39. return ERR_PTR(-EINVAL);
  40. ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
  41. if (!ctx) {
  42. rc = -ENOMEM;
  43. goto err;
  44. }
  45. kref_init(&ctx->refcount);
  46. ctx->teedev = teedev;
  47. INIT_LIST_HEAD(&ctx->list_shm);
  48. rc = teedev->desc->ops->open(ctx);
  49. if (rc)
  50. goto err;
  51. return ctx;
  52. err:
  53. kfree(ctx);
  54. tee_device_put(teedev);
  55. return ERR_PTR(rc);
  56. }
  57. void teedev_ctx_get(struct tee_context *ctx)
  58. {
  59. if (ctx->releasing)
  60. return;
  61. kref_get(&ctx->refcount);
  62. }
  63. static void teedev_ctx_release(struct kref *ref)
  64. {
  65. struct tee_context *ctx = container_of(ref, struct tee_context,
  66. refcount);
  67. ctx->releasing = true;
  68. ctx->teedev->desc->ops->release(ctx);
  69. kfree(ctx);
  70. }
  71. void teedev_ctx_put(struct tee_context *ctx)
  72. {
  73. if (ctx->releasing)
  74. return;
  75. kref_put(&ctx->refcount, teedev_ctx_release);
  76. }
  77. static void teedev_close_context(struct tee_context *ctx)
  78. {
  79. tee_device_put(ctx->teedev);
  80. teedev_ctx_put(ctx);
  81. }
  82. static int tee_open(struct inode *inode, struct file *filp)
  83. {
  84. struct tee_context *ctx;
  85. ctx = teedev_open(container_of(inode->i_cdev, struct tee_device, cdev));
  86. if (IS_ERR(ctx))
  87. return PTR_ERR(ctx);
  88. filp->private_data = ctx;
  89. return 0;
  90. }
  91. static int tee_release(struct inode *inode, struct file *filp)
  92. {
  93. teedev_close_context(filp->private_data);
  94. return 0;
  95. }
  96. static int tee_ioctl_version(struct tee_context *ctx,
  97. struct tee_ioctl_version_data __user *uvers)
  98. {
  99. struct tee_ioctl_version_data vers;
  100. ctx->teedev->desc->ops->get_version(ctx->teedev, &vers);
  101. if (ctx->teedev->desc->flags & TEE_DESC_PRIVILEGED)
  102. vers.gen_caps |= TEE_GEN_CAP_PRIVILEGED;
  103. if (copy_to_user(uvers, &vers, sizeof(vers)))
  104. return -EFAULT;
  105. return 0;
  106. }
  107. static int tee_ioctl_shm_alloc(struct tee_context *ctx,
  108. struct tee_ioctl_shm_alloc_data __user *udata)
  109. {
  110. long ret;
  111. struct tee_ioctl_shm_alloc_data data;
  112. struct tee_shm *shm;
  113. if (copy_from_user(&data, udata, sizeof(data)))
  114. return -EFAULT;
  115. /* Currently no input flags are supported */
  116. if (data.flags)
  117. return -EINVAL;
  118. shm = tee_shm_alloc(ctx, data.size, TEE_SHM_MAPPED | TEE_SHM_DMA_BUF);
  119. if (IS_ERR(shm))
  120. return PTR_ERR(shm);
  121. data.id = shm->id;
  122. data.flags = shm->flags;
  123. data.size = shm->size;
  124. if (copy_to_user(udata, &data, sizeof(data)))
  125. ret = -EFAULT;
  126. else
  127. ret = tee_shm_get_fd(shm);
  128. /*
  129. * When user space closes the file descriptor the shared memory
  130. * should be freed or if tee_shm_get_fd() failed then it will
  131. * be freed immediately.
  132. */
  133. tee_shm_put(shm);
  134. return ret;
  135. }
  136. static int
  137. tee_ioctl_shm_register(struct tee_context *ctx,
  138. struct tee_ioctl_shm_register_data __user *udata)
  139. {
  140. long ret;
  141. struct tee_ioctl_shm_register_data data;
  142. struct tee_shm *shm;
  143. if (copy_from_user(&data, udata, sizeof(data)))
  144. return -EFAULT;
  145. /* Currently no input flags are supported */
  146. if (data.flags)
  147. return -EINVAL;
  148. shm = tee_shm_register(ctx, data.addr, data.length,
  149. TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED);
  150. if (IS_ERR(shm))
  151. return PTR_ERR(shm);
  152. data.id = shm->id;
  153. data.flags = shm->flags;
  154. data.length = shm->size;
  155. if (copy_to_user(udata, &data, sizeof(data)))
  156. ret = -EFAULT;
  157. else
  158. ret = tee_shm_get_fd(shm);
  159. /*
  160. * When user space closes the file descriptor the shared memory
  161. * should be freed or if tee_shm_get_fd() failed then it will
  162. * be freed immediately.
  163. */
  164. tee_shm_put(shm);
  165. return ret;
  166. }
  167. static int params_from_user(struct tee_context *ctx, struct tee_param *params,
  168. size_t num_params,
  169. struct tee_ioctl_param __user *uparams)
  170. {
  171. size_t n;
  172. for (n = 0; n < num_params; n++) {
  173. struct tee_shm *shm;
  174. struct tee_ioctl_param ip;
  175. if (copy_from_user(&ip, uparams + n, sizeof(ip)))
  176. return -EFAULT;
  177. /* All unused attribute bits has to be zero */
  178. if (ip.attr & ~TEE_IOCTL_PARAM_ATTR_MASK)
  179. return -EINVAL;
  180. params[n].attr = ip.attr;
  181. switch (ip.attr & TEE_IOCTL_PARAM_ATTR_TYPE_MASK) {
  182. case TEE_IOCTL_PARAM_ATTR_TYPE_NONE:
  183. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT:
  184. break;
  185. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT:
  186. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT:
  187. params[n].u.value.a = ip.a;
  188. params[n].u.value.b = ip.b;
  189. params[n].u.value.c = ip.c;
  190. break;
  191. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT:
  192. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT:
  193. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT:
  194. /*
  195. * If we fail to get a pointer to a shared memory
  196. * object (and increase the ref count) from an
  197. * identifier we return an error. All pointers that
  198. * has been added in params have an increased ref
  199. * count. It's the callers responibility to do
  200. * tee_shm_put() on all resolved pointers.
  201. */
  202. shm = tee_shm_get_from_id(ctx, ip.c);
  203. if (IS_ERR(shm))
  204. return PTR_ERR(shm);
  205. /*
  206. * Ensure offset + size does not overflow offset
  207. * and does not overflow the size of the referred
  208. * shared memory object.
  209. */
  210. if ((ip.a + ip.b) < ip.a ||
  211. (ip.a + ip.b) > shm->size) {
  212. tee_shm_put(shm);
  213. return -EINVAL;
  214. }
  215. params[n].u.memref.shm_offs = ip.a;
  216. params[n].u.memref.size = ip.b;
  217. params[n].u.memref.shm = shm;
  218. break;
  219. default:
  220. /* Unknown attribute */
  221. return -EINVAL;
  222. }
  223. }
  224. return 0;
  225. }
  226. static int params_to_user(struct tee_ioctl_param __user *uparams,
  227. size_t num_params, struct tee_param *params)
  228. {
  229. size_t n;
  230. for (n = 0; n < num_params; n++) {
  231. struct tee_ioctl_param __user *up = uparams + n;
  232. struct tee_param *p = params + n;
  233. switch (p->attr) {
  234. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT:
  235. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT:
  236. if (put_user(p->u.value.a, &up->a) ||
  237. put_user(p->u.value.b, &up->b) ||
  238. put_user(p->u.value.c, &up->c))
  239. return -EFAULT;
  240. break;
  241. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT:
  242. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT:
  243. if (put_user((u64)p->u.memref.size, &up->b))
  244. return -EFAULT;
  245. default:
  246. break;
  247. }
  248. }
  249. return 0;
  250. }
  251. static int tee_ioctl_open_session(struct tee_context *ctx,
  252. struct tee_ioctl_buf_data __user *ubuf)
  253. {
  254. int rc;
  255. size_t n;
  256. struct tee_ioctl_buf_data buf;
  257. struct tee_ioctl_open_session_arg __user *uarg;
  258. struct tee_ioctl_open_session_arg arg;
  259. struct tee_ioctl_param __user *uparams = NULL;
  260. struct tee_param *params = NULL;
  261. bool have_session = false;
  262. if (!ctx->teedev->desc->ops->open_session)
  263. return -EINVAL;
  264. if (copy_from_user(&buf, ubuf, sizeof(buf)))
  265. return -EFAULT;
  266. if (buf.buf_len > TEE_MAX_ARG_SIZE ||
  267. buf.buf_len < sizeof(struct tee_ioctl_open_session_arg))
  268. return -EINVAL;
  269. uarg = u64_to_user_ptr(buf.buf_ptr);
  270. if (copy_from_user(&arg, uarg, sizeof(arg)))
  271. return -EFAULT;
  272. if (sizeof(arg) + TEE_IOCTL_PARAM_SIZE(arg.num_params) != buf.buf_len)
  273. return -EINVAL;
  274. if (arg.num_params) {
  275. params = kcalloc(arg.num_params, sizeof(struct tee_param),
  276. GFP_KERNEL);
  277. if (!params)
  278. return -ENOMEM;
  279. uparams = uarg->params;
  280. rc = params_from_user(ctx, params, arg.num_params, uparams);
  281. if (rc)
  282. goto out;
  283. }
  284. rc = ctx->teedev->desc->ops->open_session(ctx, &arg, params);
  285. if (rc)
  286. goto out;
  287. have_session = true;
  288. if (put_user(arg.session, &uarg->session) ||
  289. put_user(arg.ret, &uarg->ret) ||
  290. put_user(arg.ret_origin, &uarg->ret_origin)) {
  291. rc = -EFAULT;
  292. goto out;
  293. }
  294. rc = params_to_user(uparams, arg.num_params, params);
  295. out:
  296. /*
  297. * If we've succeeded to open the session but failed to communicate
  298. * it back to user space, close the session again to avoid leakage.
  299. */
  300. if (rc && have_session && ctx->teedev->desc->ops->close_session)
  301. ctx->teedev->desc->ops->close_session(ctx, arg.session);
  302. if (params) {
  303. /* Decrease ref count for all valid shared memory pointers */
  304. for (n = 0; n < arg.num_params; n++)
  305. if (tee_param_is_memref(params + n) &&
  306. params[n].u.memref.shm)
  307. tee_shm_put(params[n].u.memref.shm);
  308. kfree(params);
  309. }
  310. return rc;
  311. }
  312. static int tee_ioctl_invoke(struct tee_context *ctx,
  313. struct tee_ioctl_buf_data __user *ubuf)
  314. {
  315. int rc;
  316. size_t n;
  317. struct tee_ioctl_buf_data buf;
  318. struct tee_ioctl_invoke_arg __user *uarg;
  319. struct tee_ioctl_invoke_arg arg;
  320. struct tee_ioctl_param __user *uparams = NULL;
  321. struct tee_param *params = NULL;
  322. if (!ctx->teedev->desc->ops->invoke_func)
  323. return -EINVAL;
  324. if (copy_from_user(&buf, ubuf, sizeof(buf)))
  325. return -EFAULT;
  326. if (buf.buf_len > TEE_MAX_ARG_SIZE ||
  327. buf.buf_len < sizeof(struct tee_ioctl_invoke_arg))
  328. return -EINVAL;
  329. uarg = u64_to_user_ptr(buf.buf_ptr);
  330. if (copy_from_user(&arg, uarg, sizeof(arg)))
  331. return -EFAULT;
  332. if (sizeof(arg) + TEE_IOCTL_PARAM_SIZE(arg.num_params) != buf.buf_len)
  333. return -EINVAL;
  334. if (arg.num_params) {
  335. params = kcalloc(arg.num_params, sizeof(struct tee_param),
  336. GFP_KERNEL);
  337. if (!params)
  338. return -ENOMEM;
  339. uparams = uarg->params;
  340. rc = params_from_user(ctx, params, arg.num_params, uparams);
  341. if (rc)
  342. goto out;
  343. }
  344. rc = ctx->teedev->desc->ops->invoke_func(ctx, &arg, params);
  345. if (rc)
  346. goto out;
  347. if (put_user(arg.ret, &uarg->ret) ||
  348. put_user(arg.ret_origin, &uarg->ret_origin)) {
  349. rc = -EFAULT;
  350. goto out;
  351. }
  352. rc = params_to_user(uparams, arg.num_params, params);
  353. out:
  354. if (params) {
  355. /* Decrease ref count for all valid shared memory pointers */
  356. for (n = 0; n < arg.num_params; n++)
  357. if (tee_param_is_memref(params + n) &&
  358. params[n].u.memref.shm)
  359. tee_shm_put(params[n].u.memref.shm);
  360. kfree(params);
  361. }
  362. return rc;
  363. }
  364. static int tee_ioctl_cancel(struct tee_context *ctx,
  365. struct tee_ioctl_cancel_arg __user *uarg)
  366. {
  367. struct tee_ioctl_cancel_arg arg;
  368. if (!ctx->teedev->desc->ops->cancel_req)
  369. return -EINVAL;
  370. if (copy_from_user(&arg, uarg, sizeof(arg)))
  371. return -EFAULT;
  372. return ctx->teedev->desc->ops->cancel_req(ctx, arg.cancel_id,
  373. arg.session);
  374. }
  375. static int
  376. tee_ioctl_close_session(struct tee_context *ctx,
  377. struct tee_ioctl_close_session_arg __user *uarg)
  378. {
  379. struct tee_ioctl_close_session_arg arg;
  380. if (!ctx->teedev->desc->ops->close_session)
  381. return -EINVAL;
  382. if (copy_from_user(&arg, uarg, sizeof(arg)))
  383. return -EFAULT;
  384. return ctx->teedev->desc->ops->close_session(ctx, arg.session);
  385. }
  386. static int params_to_supp(struct tee_context *ctx,
  387. struct tee_ioctl_param __user *uparams,
  388. size_t num_params, struct tee_param *params)
  389. {
  390. size_t n;
  391. for (n = 0; n < num_params; n++) {
  392. struct tee_ioctl_param ip;
  393. struct tee_param *p = params + n;
  394. ip.attr = p->attr;
  395. switch (p->attr & TEE_IOCTL_PARAM_ATTR_TYPE_MASK) {
  396. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT:
  397. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT:
  398. ip.a = p->u.value.a;
  399. ip.b = p->u.value.b;
  400. ip.c = p->u.value.c;
  401. break;
  402. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT:
  403. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT:
  404. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT:
  405. ip.b = p->u.memref.size;
  406. if (!p->u.memref.shm) {
  407. ip.a = 0;
  408. ip.c = (u64)-1; /* invalid shm id */
  409. break;
  410. }
  411. ip.a = p->u.memref.shm_offs;
  412. ip.c = p->u.memref.shm->id;
  413. break;
  414. default:
  415. ip.a = 0;
  416. ip.b = 0;
  417. ip.c = 0;
  418. break;
  419. }
  420. if (copy_to_user(uparams + n, &ip, sizeof(ip)))
  421. return -EFAULT;
  422. }
  423. return 0;
  424. }
  425. static int tee_ioctl_supp_recv(struct tee_context *ctx,
  426. struct tee_ioctl_buf_data __user *ubuf)
  427. {
  428. int rc;
  429. struct tee_ioctl_buf_data buf;
  430. struct tee_iocl_supp_recv_arg __user *uarg;
  431. struct tee_param *params;
  432. u32 num_params;
  433. u32 func;
  434. if (!ctx->teedev->desc->ops->supp_recv)
  435. return -EINVAL;
  436. if (copy_from_user(&buf, ubuf, sizeof(buf)))
  437. return -EFAULT;
  438. if (buf.buf_len > TEE_MAX_ARG_SIZE ||
  439. buf.buf_len < sizeof(struct tee_iocl_supp_recv_arg))
  440. return -EINVAL;
  441. uarg = u64_to_user_ptr(buf.buf_ptr);
  442. if (get_user(num_params, &uarg->num_params))
  443. return -EFAULT;
  444. if (sizeof(*uarg) + TEE_IOCTL_PARAM_SIZE(num_params) != buf.buf_len)
  445. return -EINVAL;
  446. params = kcalloc(num_params, sizeof(struct tee_param), GFP_KERNEL);
  447. if (!params)
  448. return -ENOMEM;
  449. rc = params_from_user(ctx, params, num_params, uarg->params);
  450. if (rc)
  451. goto out;
  452. rc = ctx->teedev->desc->ops->supp_recv(ctx, &func, &num_params, params);
  453. if (rc)
  454. goto out;
  455. if (put_user(func, &uarg->func) ||
  456. put_user(num_params, &uarg->num_params)) {
  457. rc = -EFAULT;
  458. goto out;
  459. }
  460. rc = params_to_supp(ctx, uarg->params, num_params, params);
  461. out:
  462. kfree(params);
  463. return rc;
  464. }
  465. static int params_from_supp(struct tee_param *params, size_t num_params,
  466. struct tee_ioctl_param __user *uparams)
  467. {
  468. size_t n;
  469. for (n = 0; n < num_params; n++) {
  470. struct tee_param *p = params + n;
  471. struct tee_ioctl_param ip;
  472. if (copy_from_user(&ip, uparams + n, sizeof(ip)))
  473. return -EFAULT;
  474. /* All unused attribute bits has to be zero */
  475. if (ip.attr & ~TEE_IOCTL_PARAM_ATTR_MASK)
  476. return -EINVAL;
  477. p->attr = ip.attr;
  478. switch (ip.attr & TEE_IOCTL_PARAM_ATTR_TYPE_MASK) {
  479. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT:
  480. case TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT:
  481. /* Only out and in/out values can be updated */
  482. p->u.value.a = ip.a;
  483. p->u.value.b = ip.b;
  484. p->u.value.c = ip.c;
  485. break;
  486. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT:
  487. case TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT:
  488. /*
  489. * Only the size of the memref can be updated.
  490. * Since we don't have access to the original
  491. * parameters here, only store the supplied size.
  492. * The driver will copy the updated size into the
  493. * original parameters.
  494. */
  495. p->u.memref.shm = NULL;
  496. p->u.memref.shm_offs = 0;
  497. p->u.memref.size = ip.b;
  498. break;
  499. default:
  500. memset(&p->u, 0, sizeof(p->u));
  501. break;
  502. }
  503. }
  504. return 0;
  505. }
  506. static int tee_ioctl_supp_send(struct tee_context *ctx,
  507. struct tee_ioctl_buf_data __user *ubuf)
  508. {
  509. long rc;
  510. struct tee_ioctl_buf_data buf;
  511. struct tee_iocl_supp_send_arg __user *uarg;
  512. struct tee_param *params;
  513. u32 num_params;
  514. u32 ret;
  515. /* Not valid for this driver */
  516. if (!ctx->teedev->desc->ops->supp_send)
  517. return -EINVAL;
  518. if (copy_from_user(&buf, ubuf, sizeof(buf)))
  519. return -EFAULT;
  520. if (buf.buf_len > TEE_MAX_ARG_SIZE ||
  521. buf.buf_len < sizeof(struct tee_iocl_supp_send_arg))
  522. return -EINVAL;
  523. uarg = u64_to_user_ptr(buf.buf_ptr);
  524. if (get_user(ret, &uarg->ret) ||
  525. get_user(num_params, &uarg->num_params))
  526. return -EFAULT;
  527. if (sizeof(*uarg) + TEE_IOCTL_PARAM_SIZE(num_params) > buf.buf_len)
  528. return -EINVAL;
  529. params = kcalloc(num_params, sizeof(struct tee_param), GFP_KERNEL);
  530. if (!params)
  531. return -ENOMEM;
  532. rc = params_from_supp(params, num_params, uarg->params);
  533. if (rc)
  534. goto out;
  535. rc = ctx->teedev->desc->ops->supp_send(ctx, ret, num_params, params);
  536. out:
  537. kfree(params);
  538. return rc;
  539. }
  540. static long tee_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
  541. {
  542. struct tee_context *ctx = filp->private_data;
  543. void __user *uarg = (void __user *)arg;
  544. switch (cmd) {
  545. case TEE_IOC_VERSION:
  546. return tee_ioctl_version(ctx, uarg);
  547. case TEE_IOC_SHM_ALLOC:
  548. return tee_ioctl_shm_alloc(ctx, uarg);
  549. case TEE_IOC_SHM_REGISTER:
  550. return tee_ioctl_shm_register(ctx, uarg);
  551. case TEE_IOC_OPEN_SESSION:
  552. return tee_ioctl_open_session(ctx, uarg);
  553. case TEE_IOC_INVOKE:
  554. return tee_ioctl_invoke(ctx, uarg);
  555. case TEE_IOC_CANCEL:
  556. return tee_ioctl_cancel(ctx, uarg);
  557. case TEE_IOC_CLOSE_SESSION:
  558. return tee_ioctl_close_session(ctx, uarg);
  559. case TEE_IOC_SUPPL_RECV:
  560. return tee_ioctl_supp_recv(ctx, uarg);
  561. case TEE_IOC_SUPPL_SEND:
  562. return tee_ioctl_supp_send(ctx, uarg);
  563. default:
  564. return -EINVAL;
  565. }
  566. }
  567. static const struct file_operations tee_fops = {
  568. .owner = THIS_MODULE,
  569. .open = tee_open,
  570. .release = tee_release,
  571. .unlocked_ioctl = tee_ioctl,
  572. .compat_ioctl = tee_ioctl,
  573. };
  574. static void tee_release_device(struct device *dev)
  575. {
  576. struct tee_device *teedev = container_of(dev, struct tee_device, dev);
  577. spin_lock(&driver_lock);
  578. clear_bit(teedev->id, dev_mask);
  579. spin_unlock(&driver_lock);
  580. mutex_destroy(&teedev->mutex);
  581. idr_destroy(&teedev->idr);
  582. kfree(teedev);
  583. }
  584. /**
  585. * tee_device_alloc() - Allocate a new struct tee_device instance
  586. * @teedesc: Descriptor for this driver
  587. * @dev: Parent device for this device
  588. * @pool: Shared memory pool, NULL if not used
  589. * @driver_data: Private driver data for this device
  590. *
  591. * Allocates a new struct tee_device instance. The device is
  592. * removed by tee_device_unregister().
  593. *
  594. * @returns a pointer to a 'struct tee_device' or an ERR_PTR on failure
  595. */
  596. struct tee_device *tee_device_alloc(const struct tee_desc *teedesc,
  597. struct device *dev,
  598. struct tee_shm_pool *pool,
  599. void *driver_data)
  600. {
  601. struct tee_device *teedev;
  602. void *ret;
  603. int rc, max_id;
  604. int offs = 0;
  605. if (!teedesc || !teedesc->name || !teedesc->ops ||
  606. !teedesc->ops->get_version || !teedesc->ops->open ||
  607. !teedesc->ops->release || !pool)
  608. return ERR_PTR(-EINVAL);
  609. teedev = kzalloc(sizeof(*teedev), GFP_KERNEL);
  610. if (!teedev) {
  611. ret = ERR_PTR(-ENOMEM);
  612. goto err;
  613. }
  614. max_id = TEE_NUM_DEVICES / 2;
  615. if (teedesc->flags & TEE_DESC_PRIVILEGED) {
  616. offs = TEE_NUM_DEVICES / 2;
  617. max_id = TEE_NUM_DEVICES;
  618. }
  619. spin_lock(&driver_lock);
  620. teedev->id = find_next_zero_bit(dev_mask, max_id, offs);
  621. if (teedev->id < max_id)
  622. set_bit(teedev->id, dev_mask);
  623. spin_unlock(&driver_lock);
  624. if (teedev->id >= max_id) {
  625. ret = ERR_PTR(-ENOMEM);
  626. goto err;
  627. }
  628. snprintf(teedev->name, sizeof(teedev->name), "tee%s%d",
  629. teedesc->flags & TEE_DESC_PRIVILEGED ? "priv" : "",
  630. teedev->id - offs);
  631. teedev->dev.class = tee_class;
  632. teedev->dev.release = tee_release_device;
  633. teedev->dev.parent = dev;
  634. teedev->dev.devt = MKDEV(MAJOR(tee_devt), teedev->id);
  635. rc = dev_set_name(&teedev->dev, "%s", teedev->name);
  636. if (rc) {
  637. ret = ERR_PTR(rc);
  638. goto err_devt;
  639. }
  640. cdev_init(&teedev->cdev, &tee_fops);
  641. teedev->cdev.owner = teedesc->owner;
  642. teedev->cdev.kobj.parent = &teedev->dev.kobj;
  643. dev_set_drvdata(&teedev->dev, driver_data);
  644. device_initialize(&teedev->dev);
  645. /* 1 as tee_device_unregister() does one final tee_device_put() */
  646. teedev->num_users = 1;
  647. init_completion(&teedev->c_no_users);
  648. mutex_init(&teedev->mutex);
  649. idr_init(&teedev->idr);
  650. teedev->desc = teedesc;
  651. teedev->pool = pool;
  652. return teedev;
  653. err_devt:
  654. unregister_chrdev_region(teedev->dev.devt, 1);
  655. err:
  656. pr_err("could not register %s driver\n",
  657. teedesc->flags & TEE_DESC_PRIVILEGED ? "privileged" : "client");
  658. if (teedev && teedev->id < TEE_NUM_DEVICES) {
  659. spin_lock(&driver_lock);
  660. clear_bit(teedev->id, dev_mask);
  661. spin_unlock(&driver_lock);
  662. }
  663. kfree(teedev);
  664. return ret;
  665. }
  666. EXPORT_SYMBOL_GPL(tee_device_alloc);
  667. static ssize_t implementation_id_show(struct device *dev,
  668. struct device_attribute *attr, char *buf)
  669. {
  670. struct tee_device *teedev = container_of(dev, struct tee_device, dev);
  671. struct tee_ioctl_version_data vers;
  672. teedev->desc->ops->get_version(teedev, &vers);
  673. return scnprintf(buf, PAGE_SIZE, "%d\n", vers.impl_id);
  674. }
  675. static DEVICE_ATTR_RO(implementation_id);
  676. static struct attribute *tee_dev_attrs[] = {
  677. &dev_attr_implementation_id.attr,
  678. NULL
  679. };
  680. static const struct attribute_group tee_dev_group = {
  681. .attrs = tee_dev_attrs,
  682. };
  683. /**
  684. * tee_device_register() - Registers a TEE device
  685. * @teedev: Device to register
  686. *
  687. * tee_device_unregister() need to be called to remove the @teedev if
  688. * this function fails.
  689. *
  690. * @returns < 0 on failure
  691. */
  692. int tee_device_register(struct tee_device *teedev)
  693. {
  694. int rc;
  695. if (teedev->flags & TEE_DEVICE_FLAG_REGISTERED) {
  696. dev_err(&teedev->dev, "attempt to register twice\n");
  697. return -EINVAL;
  698. }
  699. rc = cdev_add(&teedev->cdev, teedev->dev.devt, 1);
  700. if (rc) {
  701. dev_err(&teedev->dev,
  702. "unable to cdev_add() %s, major %d, minor %d, err=%d\n",
  703. teedev->name, MAJOR(teedev->dev.devt),
  704. MINOR(teedev->dev.devt), rc);
  705. return rc;
  706. }
  707. rc = device_add(&teedev->dev);
  708. if (rc) {
  709. dev_err(&teedev->dev,
  710. "unable to device_add() %s, major %d, minor %d, err=%d\n",
  711. teedev->name, MAJOR(teedev->dev.devt),
  712. MINOR(teedev->dev.devt), rc);
  713. goto err_device_add;
  714. }
  715. rc = sysfs_create_group(&teedev->dev.kobj, &tee_dev_group);
  716. if (rc) {
  717. dev_err(&teedev->dev,
  718. "failed to create sysfs attributes, err=%d\n", rc);
  719. goto err_sysfs_create_group;
  720. }
  721. teedev->flags |= TEE_DEVICE_FLAG_REGISTERED;
  722. return 0;
  723. err_sysfs_create_group:
  724. device_del(&teedev->dev);
  725. err_device_add:
  726. cdev_del(&teedev->cdev);
  727. return rc;
  728. }
  729. EXPORT_SYMBOL_GPL(tee_device_register);
  730. void tee_device_put(struct tee_device *teedev)
  731. {
  732. mutex_lock(&teedev->mutex);
  733. /* Shouldn't put in this state */
  734. if (!WARN_ON(!teedev->desc)) {
  735. teedev->num_users--;
  736. if (!teedev->num_users) {
  737. teedev->desc = NULL;
  738. complete(&teedev->c_no_users);
  739. }
  740. }
  741. mutex_unlock(&teedev->mutex);
  742. }
  743. bool tee_device_get(struct tee_device *teedev)
  744. {
  745. mutex_lock(&teedev->mutex);
  746. if (!teedev->desc) {
  747. mutex_unlock(&teedev->mutex);
  748. return false;
  749. }
  750. teedev->num_users++;
  751. mutex_unlock(&teedev->mutex);
  752. return true;
  753. }
  754. /**
  755. * tee_device_unregister() - Removes a TEE device
  756. * @teedev: Device to unregister
  757. *
  758. * This function should be called to remove the @teedev even if
  759. * tee_device_register() hasn't been called yet. Does nothing if
  760. * @teedev is NULL.
  761. */
  762. void tee_device_unregister(struct tee_device *teedev)
  763. {
  764. if (!teedev)
  765. return;
  766. if (teedev->flags & TEE_DEVICE_FLAG_REGISTERED) {
  767. sysfs_remove_group(&teedev->dev.kobj, &tee_dev_group);
  768. cdev_del(&teedev->cdev);
  769. device_del(&teedev->dev);
  770. }
  771. tee_device_put(teedev);
  772. wait_for_completion(&teedev->c_no_users);
  773. /*
  774. * No need to take a mutex any longer now since teedev->desc was
  775. * set to NULL before teedev->c_no_users was completed.
  776. */
  777. teedev->pool = NULL;
  778. put_device(&teedev->dev);
  779. }
  780. EXPORT_SYMBOL_GPL(tee_device_unregister);
  781. /**
  782. * tee_get_drvdata() - Return driver_data pointer
  783. * @teedev: Device containing the driver_data pointer
  784. * @returns the driver_data pointer supplied to tee_register().
  785. */
  786. void *tee_get_drvdata(struct tee_device *teedev)
  787. {
  788. return dev_get_drvdata(&teedev->dev);
  789. }
  790. EXPORT_SYMBOL_GPL(tee_get_drvdata);
  791. struct match_dev_data {
  792. struct tee_ioctl_version_data *vers;
  793. const void *data;
  794. int (*match)(struct tee_ioctl_version_data *, const void *);
  795. };
  796. static int match_dev(struct device *dev, const void *data)
  797. {
  798. const struct match_dev_data *match_data = data;
  799. struct tee_device *teedev = container_of(dev, struct tee_device, dev);
  800. teedev->desc->ops->get_version(teedev, match_data->vers);
  801. return match_data->match(match_data->vers, match_data->data);
  802. }
  803. struct tee_context *
  804. tee_client_open_context(struct tee_context *start,
  805. int (*match)(struct tee_ioctl_version_data *,
  806. const void *),
  807. const void *data, struct tee_ioctl_version_data *vers)
  808. {
  809. struct device *dev = NULL;
  810. struct device *put_dev = NULL;
  811. struct tee_context *ctx = NULL;
  812. struct tee_ioctl_version_data v;
  813. struct match_dev_data match_data = { vers ? vers : &v, data, match };
  814. if (start)
  815. dev = &start->teedev->dev;
  816. do {
  817. dev = class_find_device(tee_class, dev, &match_data, match_dev);
  818. if (!dev) {
  819. ctx = ERR_PTR(-ENOENT);
  820. break;
  821. }
  822. put_device(put_dev);
  823. put_dev = dev;
  824. ctx = teedev_open(container_of(dev, struct tee_device, dev));
  825. } while (IS_ERR(ctx) && PTR_ERR(ctx) != -ENOMEM);
  826. put_device(put_dev);
  827. return ctx;
  828. }
  829. EXPORT_SYMBOL_GPL(tee_client_open_context);
  830. void tee_client_close_context(struct tee_context *ctx)
  831. {
  832. teedev_close_context(ctx);
  833. }
  834. EXPORT_SYMBOL_GPL(tee_client_close_context);
  835. void tee_client_get_version(struct tee_context *ctx,
  836. struct tee_ioctl_version_data *vers)
  837. {
  838. ctx->teedev->desc->ops->get_version(ctx->teedev, vers);
  839. }
  840. EXPORT_SYMBOL_GPL(tee_client_get_version);
  841. int tee_client_open_session(struct tee_context *ctx,
  842. struct tee_ioctl_open_session_arg *arg,
  843. struct tee_param *param)
  844. {
  845. if (!ctx->teedev->desc->ops->open_session)
  846. return -EINVAL;
  847. return ctx->teedev->desc->ops->open_session(ctx, arg, param);
  848. }
  849. EXPORT_SYMBOL_GPL(tee_client_open_session);
  850. int tee_client_close_session(struct tee_context *ctx, u32 session)
  851. {
  852. if (!ctx->teedev->desc->ops->close_session)
  853. return -EINVAL;
  854. return ctx->teedev->desc->ops->close_session(ctx, session);
  855. }
  856. EXPORT_SYMBOL_GPL(tee_client_close_session);
  857. int tee_client_invoke_func(struct tee_context *ctx,
  858. struct tee_ioctl_invoke_arg *arg,
  859. struct tee_param *param)
  860. {
  861. if (!ctx->teedev->desc->ops->invoke_func)
  862. return -EINVAL;
  863. return ctx->teedev->desc->ops->invoke_func(ctx, arg, param);
  864. }
  865. EXPORT_SYMBOL_GPL(tee_client_invoke_func);
  866. static int __init tee_init(void)
  867. {
  868. int rc;
  869. tee_class = class_create(THIS_MODULE, "tee");
  870. if (IS_ERR(tee_class)) {
  871. pr_err("couldn't create class\n");
  872. return PTR_ERR(tee_class);
  873. }
  874. rc = alloc_chrdev_region(&tee_devt, 0, TEE_NUM_DEVICES, "tee");
  875. if (rc) {
  876. pr_err("failed to allocate char dev region\n");
  877. class_destroy(tee_class);
  878. tee_class = NULL;
  879. }
  880. return rc;
  881. }
  882. static void __exit tee_exit(void)
  883. {
  884. class_destroy(tee_class);
  885. tee_class = NULL;
  886. unregister_chrdev_region(tee_devt, TEE_NUM_DEVICES);
  887. }
  888. subsys_initcall(tee_init);
  889. module_exit(tee_exit);
  890. MODULE_AUTHOR("Linaro");
  891. MODULE_DESCRIPTION("TEE Driver");
  892. MODULE_VERSION("1.0");
  893. MODULE_LICENSE("GPL v2");