Merge tag 'block-5.11-2021-01-10' of git://git.kernel.dk/linux-block
[linux/fpc-iii.git] / drivers / tee / amdtee / core.c
blob8a6a8f30bb427ab060b4a132c1cbd0af06f1184a
1 // SPDX-License-Identifier: MIT
2 /*
3 * Copyright 2019 Advanced Micro Devices, Inc.
4 */
6 #include <linux/errno.h>
7 #include <linux/io.h>
8 #include <linux/module.h>
9 #include <linux/slab.h>
10 #include <linux/string.h>
11 #include <linux/device.h>
12 #include <linux/tee_drv.h>
13 #include <linux/types.h>
14 #include <linux/mm.h>
15 #include <linux/uaccess.h>
16 #include <linux/firmware.h>
17 #include "amdtee_private.h"
18 #include "../tee_private.h"
19 #include <linux/psp-tee.h>
21 static struct amdtee_driver_data *drv_data;
22 static DEFINE_MUTEX(session_list_mutex);
24 static void amdtee_get_version(struct tee_device *teedev,
25 struct tee_ioctl_version_data *vers)
27 struct tee_ioctl_version_data v = {
28 .impl_id = TEE_IMPL_ID_AMDTEE,
29 .impl_caps = 0,
30 .gen_caps = TEE_GEN_CAP_GP,
32 *vers = v;
35 static int amdtee_open(struct tee_context *ctx)
37 struct amdtee_context_data *ctxdata;
39 ctxdata = kzalloc(sizeof(*ctxdata), GFP_KERNEL);
40 if (!ctxdata)
41 return -ENOMEM;
43 INIT_LIST_HEAD(&ctxdata->sess_list);
44 INIT_LIST_HEAD(&ctxdata->shm_list);
45 mutex_init(&ctxdata->shm_mutex);
47 ctx->data = ctxdata;
48 return 0;
51 static void release_session(struct amdtee_session *sess)
53 int i;
55 /* Close any open session */
56 for (i = 0; i < TEE_NUM_SESSIONS; ++i) {
57 /* Check if session entry 'i' is valid */
58 if (!test_bit(i, sess->sess_mask))
59 continue;
61 handle_close_session(sess->ta_handle, sess->session_info[i]);
64 /* Unload Trusted Application once all sessions are closed */
65 handle_unload_ta(sess->ta_handle);
66 kfree(sess);
69 static void amdtee_release(struct tee_context *ctx)
71 struct amdtee_context_data *ctxdata = ctx->data;
73 if (!ctxdata)
74 return;
76 while (true) {
77 struct amdtee_session *sess;
79 sess = list_first_entry_or_null(&ctxdata->sess_list,
80 struct amdtee_session,
81 list_node);
83 if (!sess)
84 break;
86 list_del(&sess->list_node);
87 release_session(sess);
89 mutex_destroy(&ctxdata->shm_mutex);
90 kfree(ctxdata);
92 ctx->data = NULL;
95 /**
96 * alloc_session() - Allocate a session structure
97 * @ctxdata: TEE Context data structure
98 * @session: Session ID for which 'struct amdtee_session' structure is to be
99 * allocated.
101 * Scans the TEE context's session list to check if TA is already loaded in to
102 * TEE. If yes, returns the 'session' structure for that TA. Else allocates,
103 * initializes a new 'session' structure and adds it to context's session list.
105 * The caller must hold a mutex.
107 * Returns:
108 * 'struct amdtee_session *' on success and NULL on failure.
110 static struct amdtee_session *alloc_session(struct amdtee_context_data *ctxdata,
111 u32 session)
113 struct amdtee_session *sess;
114 u32 ta_handle = get_ta_handle(session);
116 /* Scan session list to check if TA is already loaded in to TEE */
117 list_for_each_entry(sess, &ctxdata->sess_list, list_node)
118 if (sess->ta_handle == ta_handle) {
119 kref_get(&sess->refcount);
120 return sess;
123 /* Allocate a new session and add to list */
124 sess = kzalloc(sizeof(*sess), GFP_KERNEL);
125 if (sess) {
126 sess->ta_handle = ta_handle;
127 kref_init(&sess->refcount);
128 spin_lock_init(&sess->lock);
129 list_add(&sess->list_node, &ctxdata->sess_list);
132 return sess;
135 /* Requires mutex to be held */
136 static struct amdtee_session *find_session(struct amdtee_context_data *ctxdata,
137 u32 session)
139 u32 ta_handle = get_ta_handle(session);
140 u32 index = get_session_index(session);
141 struct amdtee_session *sess;
143 if (index >= TEE_NUM_SESSIONS)
144 return NULL;
146 list_for_each_entry(sess, &ctxdata->sess_list, list_node)
147 if (ta_handle == sess->ta_handle &&
148 test_bit(index, sess->sess_mask))
149 return sess;
151 return NULL;
154 u32 get_buffer_id(struct tee_shm *shm)
156 struct amdtee_context_data *ctxdata = shm->ctx->data;
157 struct amdtee_shm_data *shmdata;
158 u32 buf_id = 0;
160 mutex_lock(&ctxdata->shm_mutex);
161 list_for_each_entry(shmdata, &ctxdata->shm_list, shm_node)
162 if (shmdata->kaddr == shm->kaddr) {
163 buf_id = shmdata->buf_id;
164 break;
166 mutex_unlock(&ctxdata->shm_mutex);
168 return buf_id;
171 static DEFINE_MUTEX(drv_mutex);
172 static int copy_ta_binary(struct tee_context *ctx, void *ptr, void **ta,
173 size_t *ta_size)
175 const struct firmware *fw;
176 char fw_name[TA_PATH_MAX];
177 struct {
178 u32 lo;
179 u16 mid;
180 u16 hi_ver;
181 u8 seq_n[8];
182 } *uuid = ptr;
183 int n, rc = 0;
185 n = snprintf(fw_name, TA_PATH_MAX,
186 "%s/%08x-%04x-%04x-%02x%02x%02x%02x%02x%02x%02x%02x.bin",
187 TA_LOAD_PATH, uuid->lo, uuid->mid, uuid->hi_ver,
188 uuid->seq_n[0], uuid->seq_n[1],
189 uuid->seq_n[2], uuid->seq_n[3],
190 uuid->seq_n[4], uuid->seq_n[5],
191 uuid->seq_n[6], uuid->seq_n[7]);
192 if (n < 0 || n >= TA_PATH_MAX) {
193 pr_err("failed to get firmware name\n");
194 return -EINVAL;
197 mutex_lock(&drv_mutex);
198 n = request_firmware(&fw, fw_name, &ctx->teedev->dev);
199 if (n) {
200 pr_err("failed to load firmware %s\n", fw_name);
201 rc = -ENOMEM;
202 goto unlock;
205 *ta_size = roundup(fw->size, PAGE_SIZE);
206 *ta = (void *)__get_free_pages(GFP_KERNEL, get_order(*ta_size));
207 if (IS_ERR(*ta)) {
208 pr_err("%s: get_free_pages failed 0x%llx\n", __func__,
209 (u64)*ta);
210 rc = -ENOMEM;
211 goto rel_fw;
214 memcpy(*ta, fw->data, fw->size);
215 rel_fw:
216 release_firmware(fw);
217 unlock:
218 mutex_unlock(&drv_mutex);
219 return rc;
222 static void destroy_session(struct kref *ref)
224 struct amdtee_session *sess = container_of(ref, struct amdtee_session,
225 refcount);
227 /* Unload the TA from TEE */
228 handle_unload_ta(sess->ta_handle);
229 mutex_lock(&session_list_mutex);
230 list_del(&sess->list_node);
231 mutex_unlock(&session_list_mutex);
232 kfree(sess);
235 int amdtee_open_session(struct tee_context *ctx,
236 struct tee_ioctl_open_session_arg *arg,
237 struct tee_param *param)
239 struct amdtee_context_data *ctxdata = ctx->data;
240 struct amdtee_session *sess = NULL;
241 u32 session_info;
242 size_t ta_size;
243 int rc, i;
244 void *ta;
246 if (arg->clnt_login != TEE_IOCTL_LOGIN_PUBLIC) {
247 pr_err("unsupported client login method\n");
248 return -EINVAL;
251 rc = copy_ta_binary(ctx, &arg->uuid[0], &ta, &ta_size);
252 if (rc) {
253 pr_err("failed to copy TA binary\n");
254 return rc;
257 /* Load the TA binary into TEE environment */
258 handle_load_ta(ta, ta_size, arg);
259 if (arg->ret != TEEC_SUCCESS)
260 goto out;
262 mutex_lock(&session_list_mutex);
263 sess = alloc_session(ctxdata, arg->session);
264 mutex_unlock(&session_list_mutex);
266 if (!sess) {
267 rc = -ENOMEM;
268 goto out;
271 /* Find an empty session index for the given TA */
272 spin_lock(&sess->lock);
273 i = find_first_zero_bit(sess->sess_mask, TEE_NUM_SESSIONS);
274 if (i < TEE_NUM_SESSIONS)
275 set_bit(i, sess->sess_mask);
276 spin_unlock(&sess->lock);
278 if (i >= TEE_NUM_SESSIONS) {
279 pr_err("reached maximum session count %d\n", TEE_NUM_SESSIONS);
280 kref_put(&sess->refcount, destroy_session);
281 rc = -ENOMEM;
282 goto out;
285 /* Open session with loaded TA */
286 handle_open_session(arg, &session_info, param);
287 if (arg->ret != TEEC_SUCCESS) {
288 pr_err("open_session failed %d\n", arg->ret);
289 spin_lock(&sess->lock);
290 clear_bit(i, sess->sess_mask);
291 spin_unlock(&sess->lock);
292 kref_put(&sess->refcount, destroy_session);
293 goto out;
296 sess->session_info[i] = session_info;
297 set_session_id(sess->ta_handle, i, &arg->session);
298 out:
299 free_pages((u64)ta, get_order(ta_size));
300 return rc;
303 int amdtee_close_session(struct tee_context *ctx, u32 session)
305 struct amdtee_context_data *ctxdata = ctx->data;
306 u32 i, ta_handle, session_info;
307 struct amdtee_session *sess;
309 pr_debug("%s: sid = 0x%x\n", __func__, session);
312 * Check that the session is valid and clear the session
313 * usage bit
315 mutex_lock(&session_list_mutex);
316 sess = find_session(ctxdata, session);
317 if (sess) {
318 ta_handle = get_ta_handle(session);
319 i = get_session_index(session);
320 session_info = sess->session_info[i];
321 spin_lock(&sess->lock);
322 clear_bit(i, sess->sess_mask);
323 spin_unlock(&sess->lock);
325 mutex_unlock(&session_list_mutex);
327 if (!sess)
328 return -EINVAL;
330 /* Close the session */
331 handle_close_session(ta_handle, session_info);
333 kref_put(&sess->refcount, destroy_session);
335 return 0;
338 int amdtee_map_shmem(struct tee_shm *shm)
340 struct amdtee_context_data *ctxdata;
341 struct amdtee_shm_data *shmnode;
342 struct shmem_desc shmem;
343 int rc, count;
344 u32 buf_id;
346 if (!shm)
347 return -EINVAL;
349 shmnode = kmalloc(sizeof(*shmnode), GFP_KERNEL);
350 if (!shmnode)
351 return -ENOMEM;
353 count = 1;
354 shmem.kaddr = shm->kaddr;
355 shmem.size = shm->size;
358 * Send a MAP command to TEE and get the corresponding
359 * buffer Id
361 rc = handle_map_shmem(count, &shmem, &buf_id);
362 if (rc) {
363 pr_err("map_shmem failed: ret = %d\n", rc);
364 kfree(shmnode);
365 return rc;
368 shmnode->kaddr = shm->kaddr;
369 shmnode->buf_id = buf_id;
370 ctxdata = shm->ctx->data;
371 mutex_lock(&ctxdata->shm_mutex);
372 list_add(&shmnode->shm_node, &ctxdata->shm_list);
373 mutex_unlock(&ctxdata->shm_mutex);
375 pr_debug("buf_id :[%x] kaddr[%p]\n", shmnode->buf_id, shmnode->kaddr);
377 return 0;
380 void amdtee_unmap_shmem(struct tee_shm *shm)
382 struct amdtee_context_data *ctxdata;
383 struct amdtee_shm_data *shmnode;
384 u32 buf_id;
386 if (!shm)
387 return;
389 buf_id = get_buffer_id(shm);
390 /* Unmap the shared memory from TEE */
391 handle_unmap_shmem(buf_id);
393 ctxdata = shm->ctx->data;
394 mutex_lock(&ctxdata->shm_mutex);
395 list_for_each_entry(shmnode, &ctxdata->shm_list, shm_node)
396 if (buf_id == shmnode->buf_id) {
397 list_del(&shmnode->shm_node);
398 kfree(shmnode);
399 break;
401 mutex_unlock(&ctxdata->shm_mutex);
404 int amdtee_invoke_func(struct tee_context *ctx,
405 struct tee_ioctl_invoke_arg *arg,
406 struct tee_param *param)
408 struct amdtee_context_data *ctxdata = ctx->data;
409 struct amdtee_session *sess;
410 u32 i, session_info;
412 /* Check that the session is valid */
413 mutex_lock(&session_list_mutex);
414 sess = find_session(ctxdata, arg->session);
415 if (sess) {
416 i = get_session_index(arg->session);
417 session_info = sess->session_info[i];
419 mutex_unlock(&session_list_mutex);
421 if (!sess)
422 return -EINVAL;
424 handle_invoke_cmd(arg, session_info, param);
426 return 0;
429 int amdtee_cancel_req(struct tee_context *ctx, u32 cancel_id, u32 session)
431 return -EINVAL;
434 static const struct tee_driver_ops amdtee_ops = {
435 .get_version = amdtee_get_version,
436 .open = amdtee_open,
437 .release = amdtee_release,
438 .open_session = amdtee_open_session,
439 .close_session = amdtee_close_session,
440 .invoke_func = amdtee_invoke_func,
441 .cancel_req = amdtee_cancel_req,
444 static const struct tee_desc amdtee_desc = {
445 .name = DRIVER_NAME "-clnt",
446 .ops = &amdtee_ops,
447 .owner = THIS_MODULE,
450 static int __init amdtee_driver_init(void)
452 struct tee_device *teedev;
453 struct tee_shm_pool *pool;
454 struct amdtee *amdtee;
455 int rc;
457 rc = psp_check_tee_status();
458 if (rc) {
459 pr_err("amd-tee driver: tee not present\n");
460 return rc;
463 drv_data = kzalloc(sizeof(*drv_data), GFP_KERNEL);
464 if (!drv_data)
465 return -ENOMEM;
467 amdtee = kzalloc(sizeof(*amdtee), GFP_KERNEL);
468 if (!amdtee) {
469 rc = -ENOMEM;
470 goto err_kfree_drv_data;
473 pool = amdtee_config_shm();
474 if (IS_ERR(pool)) {
475 pr_err("shared pool configuration error\n");
476 rc = PTR_ERR(pool);
477 goto err_kfree_amdtee;
480 teedev = tee_device_alloc(&amdtee_desc, NULL, pool, amdtee);
481 if (IS_ERR(teedev)) {
482 rc = PTR_ERR(teedev);
483 goto err_free_pool;
485 amdtee->teedev = teedev;
487 rc = tee_device_register(amdtee->teedev);
488 if (rc)
489 goto err_device_unregister;
491 amdtee->pool = pool;
493 drv_data->amdtee = amdtee;
495 pr_info("amd-tee driver initialization successful\n");
496 return 0;
498 err_device_unregister:
499 tee_device_unregister(amdtee->teedev);
501 err_free_pool:
502 tee_shm_pool_free(pool);
504 err_kfree_amdtee:
505 kfree(amdtee);
507 err_kfree_drv_data:
508 kfree(drv_data);
509 drv_data = NULL;
511 pr_err("amd-tee driver initialization failed\n");
512 return rc;
514 module_init(amdtee_driver_init);
516 static void __exit amdtee_driver_exit(void)
518 struct amdtee *amdtee;
520 if (!drv_data || !drv_data->amdtee)
521 return;
523 amdtee = drv_data->amdtee;
525 tee_device_unregister(amdtee->teedev);
526 tee_shm_pool_free(amdtee->pool);
528 module_exit(amdtee_driver_exit);
530 MODULE_AUTHOR(DRIVER_AUTHOR);
531 MODULE_DESCRIPTION("AMD-TEE driver");
532 MODULE_VERSION("1.0");
533 MODULE_LICENSE("Dual MIT/GPL");