1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * Secure Element driver for STMicroelectronics NFC NCI chip 4 * 5 * Copyright (C) 2014-2015 STMicroelectronics SAS. All rights reserved. 6 */ 7 8#include <linux/module.h> 9#include <linux/nfc.h> 10#include <linux/delay.h> 11#include <net/nfc/nci.h> 12#include <net/nfc/nci_core.h> 13 14#include "st-nci.h" 15 16struct st_nci_pipe_info { 17 u8 pipe_state; 18 u8 src_host_id; 19 u8 src_gate_id; 20 u8 dst_host_id; 21 u8 dst_gate_id; 22} __packed; 23 24/* Hosts */ 25#define ST_NCI_HOST_CONTROLLER_ID 0x00 26#define ST_NCI_TERMINAL_HOST_ID 0x01 27#define ST_NCI_UICC_HOST_ID 0x02 28#define ST_NCI_ESE_HOST_ID 0xc0 29 30/* Gates */ 31#define ST_NCI_APDU_READER_GATE 0xf0 32#define ST_NCI_CONNECTIVITY_GATE 0x41 33 34/* Pipes */ 35#define ST_NCI_DEVICE_MGNT_PIPE 0x02 36 37/* Connectivity pipe only */ 38#define ST_NCI_SE_COUNT_PIPE_UICC 0x01 39/* Connectivity + APDU Reader pipe */ 40#define ST_NCI_SE_COUNT_PIPE_EMBEDDED 0x02 41 42#define ST_NCI_SE_TO_HOT_PLUG 1000 /* msecs */ 43#define ST_NCI_SE_TO_PIPES 2000 44 45#define ST_NCI_EVT_HOT_PLUG_IS_INHIBITED(x) (x->data[0] & 0x80) 46 47#define NCI_HCI_APDU_PARAM_ATR 0x01 48#define NCI_HCI_ADMIN_PARAM_SESSION_IDENTITY 0x01 49#define NCI_HCI_ADMIN_PARAM_WHITELIST 0x03 50#define NCI_HCI_ADMIN_PARAM_HOST_LIST 0x04 51 52#define ST_NCI_EVT_SE_HARD_RESET 0x20 53#define ST_NCI_EVT_TRANSMIT_DATA 0x10 54#define ST_NCI_EVT_WTX_REQUEST 0x11 55#define ST_NCI_EVT_SE_SOFT_RESET 0x11 56#define ST_NCI_EVT_SE_END_OF_APDU_TRANSFER 0x21 57#define ST_NCI_EVT_HOT_PLUG 0x03 58 59#define ST_NCI_SE_MODE_OFF 0x00 60#define ST_NCI_SE_MODE_ON 0x01 61 62#define ST_NCI_EVT_CONNECTIVITY 0x10 63#define ST_NCI_EVT_TRANSACTION 0x12 64 65#define ST_NCI_DM_GETINFO 0x13 66#define ST_NCI_DM_GETINFO_PIPE_LIST 0x02 67#define ST_NCI_DM_GETINFO_PIPE_INFO 0x01 68#define ST_NCI_DM_PIPE_CREATED 0x02 69#define ST_NCI_DM_PIPE_OPEN 0x04 70#define ST_NCI_DM_RF_ACTIVE 0x80 71#define ST_NCI_DM_DISCONNECT 0x30 72 73#define ST_NCI_DM_IS_PIPE_OPEN(p) \ 74 ((p & 0x0f) == (ST_NCI_DM_PIPE_CREATED | ST_NCI_DM_PIPE_OPEN)) 75 76#define ST_NCI_ATR_DEFAULT_BWI 0x04 77 78/* 79 * WT = 2^BWI/10[s], convert into msecs and add a secure 80 * room by increasing by 2 this timeout 81 */ 82#define ST_NCI_BWI_TO_TIMEOUT(x) ((1 << x) * 200) 83#define ST_NCI_ATR_GET_Y_FROM_TD(x) (x >> 4) 84 85/* If TA is present bit 0 is set */ 86#define ST_NCI_ATR_TA_PRESENT(x) (x & 0x01) 87/* If TB is present bit 1 is set */ 88#define ST_NCI_ATR_TB_PRESENT(x) (x & 0x02) 89 90#define ST_NCI_NUM_DEVICES 256 91 92static DECLARE_BITMAP(dev_mask, ST_NCI_NUM_DEVICES); 93 94/* Here are the mandatory pipe for st_nci */ 95static struct nci_hci_gate st_nci_gates[] = { 96 {NCI_HCI_ADMIN_GATE, NCI_HCI_ADMIN_PIPE, 97 ST_NCI_HOST_CONTROLLER_ID}, 98 {NCI_HCI_LINK_MGMT_GATE, NCI_HCI_LINK_MGMT_PIPE, 99 ST_NCI_HOST_CONTROLLER_ID}, 100 {ST_NCI_DEVICE_MGNT_GATE, ST_NCI_DEVICE_MGNT_PIPE, 101 ST_NCI_HOST_CONTROLLER_ID}, 102 103 {NCI_HCI_IDENTITY_MGMT_GATE, NCI_HCI_INVALID_PIPE, 104 ST_NCI_HOST_CONTROLLER_ID}, 105 106 /* Secure element pipes are created by secure element host */ 107 {ST_NCI_CONNECTIVITY_GATE, NCI_HCI_DO_NOT_OPEN_PIPE, 108 ST_NCI_HOST_CONTROLLER_ID}, 109 {ST_NCI_APDU_READER_GATE, NCI_HCI_DO_NOT_OPEN_PIPE, 110 ST_NCI_HOST_CONTROLLER_ID}, 111}; 112 113static u8 st_nci_se_get_bwi(struct nci_dev *ndev) 114{ 115 int i; 116 u8 td; 117 struct st_nci_info *info = nci_get_drvdata(ndev); 118 119 /* Bits 8 to 5 of the first TB for T=1 encode BWI from zero to nine */ 120 for (i = 1; i < ST_NCI_ESE_MAX_LENGTH; i++) { 121 td = ST_NCI_ATR_GET_Y_FROM_TD(info->se_info.atr[i]); 122 if (ST_NCI_ATR_TA_PRESENT(td)) 123 i++; 124 if (ST_NCI_ATR_TB_PRESENT(td)) { 125 i++; 126 return info->se_info.atr[i] >> 4; 127 } 128 } 129 return ST_NCI_ATR_DEFAULT_BWI; 130} 131 132static void st_nci_se_get_atr(struct nci_dev *ndev) 133{ 134 struct st_nci_info *info = nci_get_drvdata(ndev); 135 int r; 136 struct sk_buff *skb; 137 138 r = nci_hci_get_param(ndev, ST_NCI_APDU_READER_GATE, 139 NCI_HCI_APDU_PARAM_ATR, &skb); 140 if (r < 0) 141 return; 142 143 if (skb->len <= ST_NCI_ESE_MAX_LENGTH) { 144 memcpy(info->se_info.atr, skb->data, skb->len); 145 146 info->se_info.wt_timeout = 147 ST_NCI_BWI_TO_TIMEOUT(st_nci_se_get_bwi(ndev)); 148 } 149 kfree_skb(skb); 150} 151 152int st_nci_hci_load_session(struct nci_dev *ndev) 153{ 154 int i, j, r; 155 struct sk_buff *skb_pipe_list, *skb_pipe_info; 156 struct st_nci_pipe_info *dm_pipe_info; 157 u8 pipe_list[] = { ST_NCI_DM_GETINFO_PIPE_LIST, 158 ST_NCI_TERMINAL_HOST_ID}; 159 u8 pipe_info[] = { ST_NCI_DM_GETINFO_PIPE_INFO, 160 ST_NCI_TERMINAL_HOST_ID, 0}; 161 162 /* On ST_NCI device pipes number are dynamics 163 * If pipes are already created, hci_dev_up will fail. 164 * Doing a clear all pipe is a bad idea because: 165 * - It does useless EEPROM cycling 166 * - It might cause issue for secure elements support 167 * (such as removing connectivity or APDU reader pipe) 168 * A better approach on ST_NCI is to: 169 * - get a pipe list for each host. 170 * (eg: ST_NCI_HOST_CONTROLLER_ID for now). 171 * (TODO Later on UICC HOST and eSE HOST) 172 * - get pipe information 173 * - match retrieved pipe list in st_nci_gates 174 * ST_NCI_DEVICE_MGNT_GATE is a proprietary gate 175 * with ST_NCI_DEVICE_MGNT_PIPE. 176 * Pipe can be closed and need to be open. 177 */ 178 r = nci_hci_connect_gate(ndev, ST_NCI_HOST_CONTROLLER_ID, 179 ST_NCI_DEVICE_MGNT_GATE, 180 ST_NCI_DEVICE_MGNT_PIPE); 181 if (r < 0) 182 return r; 183 184 /* Get pipe list */ 185 r = nci_hci_send_cmd(ndev, ST_NCI_DEVICE_MGNT_GATE, 186 ST_NCI_DM_GETINFO, pipe_list, sizeof(pipe_list), 187 &skb_pipe_list); 188 if (r < 0) 189 return r; 190 191 /* Complete the existing gate_pipe table */ 192 for (i = 0; i < skb_pipe_list->len; i++) { 193 pipe_info[2] = skb_pipe_list->data[i]; 194 r = nci_hci_send_cmd(ndev, ST_NCI_DEVICE_MGNT_GATE, 195 ST_NCI_DM_GETINFO, pipe_info, 196 sizeof(pipe_info), &skb_pipe_info); 197 198 if (r) 199 continue; 200 201 /* 202 * Match pipe ID and gate ID 203 * Output format from ST21NFC_DM_GETINFO is: 204 * - pipe state (1byte) 205 * - source hid (1byte) 206 * - source gid (1byte) 207 * - destination hid (1byte) 208 * - destination gid (1byte) 209 */ 210 dm_pipe_info = (struct st_nci_pipe_info *)skb_pipe_info->data; 211 if (dm_pipe_info->dst_gate_id == ST_NCI_APDU_READER_GATE && 212 dm_pipe_info->src_host_id == ST_NCI_UICC_HOST_ID) { 213 pr_err("Unexpected apdu_reader pipe on host %x\n", 214 dm_pipe_info->src_host_id); 215 kfree_skb(skb_pipe_info); 216 continue; 217 } 218 219 for (j = 3; (j < ARRAY_SIZE(st_nci_gates)) && 220 (st_nci_gates[j].gate != dm_pipe_info->dst_gate_id); j++) 221 ; 222 223 if (j < ARRAY_SIZE(st_nci_gates) && 224 st_nci_gates[j].gate == dm_pipe_info->dst_gate_id && 225 ST_NCI_DM_IS_PIPE_OPEN(dm_pipe_info->pipe_state)) { 226 ndev->hci_dev->init_data.gates[j].pipe = pipe_info[2]; 227 228 ndev->hci_dev->gate2pipe[st_nci_gates[j].gate] = 229 pipe_info[2]; 230 ndev->hci_dev->pipes[pipe_info[2]].gate = 231 st_nci_gates[j].gate; 232 ndev->hci_dev->pipes[pipe_info[2]].host = 233 dm_pipe_info->src_host_id; 234 } 235 kfree_skb(skb_pipe_info); 236 } 237 238 /* 239 * 3 gates have a well known pipe ID. Only NCI_HCI_LINK_MGMT_GATE 240 * is not yet open at this stage. 241 */ 242 r = nci_hci_connect_gate(ndev, ST_NCI_HOST_CONTROLLER_ID, 243 NCI_HCI_LINK_MGMT_GATE, 244 NCI_HCI_LINK_MGMT_PIPE); 245 246 kfree_skb(skb_pipe_list); 247 return r; 248} 249EXPORT_SYMBOL_GPL(st_nci_hci_load_session); 250 251static void st_nci_hci_admin_event_received(struct nci_dev *ndev, 252 u8 event, struct sk_buff *skb) 253{ 254 struct st_nci_info *info = nci_get_drvdata(ndev); 255 256 switch (event) { 257 case ST_NCI_EVT_HOT_PLUG: 258 if (info->se_info.se_active) { 259 if (!ST_NCI_EVT_HOT_PLUG_IS_INHIBITED(skb)) { 260 del_timer_sync(&info->se_info.se_active_timer); 261 info->se_info.se_active = false; 262 complete(&info->se_info.req_completion); 263 } else { 264 mod_timer(&info->se_info.se_active_timer, 265 jiffies + 266 msecs_to_jiffies(ST_NCI_SE_TO_PIPES)); 267 } 268 } 269 break; 270 default: 271 nfc_err(&ndev->nfc_dev->dev, "Unexpected event on admin gate\n"); 272 } 273} 274 275static int st_nci_hci_apdu_reader_event_received(struct nci_dev *ndev, 276 u8 event, 277 struct sk_buff *skb) 278{ 279 int r = 0; 280 struct st_nci_info *info = nci_get_drvdata(ndev); 281 282 pr_debug("apdu reader gate event: %x\n", event); 283 284 switch (event) { 285 case ST_NCI_EVT_TRANSMIT_DATA: 286 del_timer_sync(&info->se_info.bwi_timer); 287 info->se_info.bwi_active = false; 288 info->se_info.cb(info->se_info.cb_context, 289 skb->data, skb->len, 0); 290 break; 291 case ST_NCI_EVT_WTX_REQUEST: 292 mod_timer(&info->se_info.bwi_timer, jiffies + 293 msecs_to_jiffies(info->se_info.wt_timeout)); 294 break; 295 default: 296 nfc_err(&ndev->nfc_dev->dev, "Unexpected event on apdu reader gate\n"); 297 return 1; 298 } 299 300 kfree_skb(skb); 301 return r; 302} 303 304/* 305 * Returns: 306 * <= 0: driver handled the event, skb consumed 307 * 1: driver does not handle the event, please do standard processing 308 */ 309static int st_nci_hci_connectivity_event_received(struct nci_dev *ndev, 310 u8 host, u8 event, 311 struct sk_buff *skb) 312{ 313 int r = 0; 314 struct device *dev = &ndev->nfc_dev->dev; 315 struct nfc_evt_transaction *transaction; 316 317 pr_debug("connectivity gate event: %x\n", event); 318 319 switch (event) { 320 case ST_NCI_EVT_CONNECTIVITY: 321 r = nfc_se_connectivity(ndev->nfc_dev, host); 322 break; 323 case ST_NCI_EVT_TRANSACTION: 324 /* According to specification etsi 102 622 325 * 11.2.2.4 EVT_TRANSACTION Table 52 326 * Description Tag Length 327 * AID 81 5 to 16 328 * PARAMETERS 82 0 to 255 329 */ 330 if (skb->len < NFC_MIN_AID_LENGTH + 2 || 331 skb->data[0] != NFC_EVT_TRANSACTION_AID_TAG) 332 return -EPROTO; 333 334 transaction = devm_kzalloc(dev, skb->len - 2, GFP_KERNEL); 335 if (!transaction) 336 return -ENOMEM; 337 338 transaction->aid_len = skb->data[1]; 339 memcpy(transaction->aid, &skb->data[2], transaction->aid_len); 340 341 /* Check next byte is PARAMETERS tag (82) */ 342 if (skb->data[transaction->aid_len + 2] != 343 NFC_EVT_TRANSACTION_PARAMS_TAG) { 344 devm_kfree(dev, transaction); 345 return -EPROTO; 346 } 347 348 transaction->params_len = skb->data[transaction->aid_len + 3]; 349 memcpy(transaction->params, skb->data + 350 transaction->aid_len + 4, transaction->params_len); 351 352 r = nfc_se_transaction(ndev->nfc_dev, host, transaction); 353 break; 354 default: 355 nfc_err(&ndev->nfc_dev->dev, "Unexpected event on connectivity gate\n"); 356 return 1; 357 } 358 kfree_skb(skb); 359 return r; 360} 361 362void st_nci_hci_event_received(struct nci_dev *ndev, u8 pipe, 363 u8 event, struct sk_buff *skb) 364{ 365 u8 gate = ndev->hci_dev->pipes[pipe].gate; 366 u8 host = ndev->hci_dev->pipes[pipe].host; 367 368 switch (gate) { 369 case NCI_HCI_ADMIN_GATE: 370 st_nci_hci_admin_event_received(ndev, event, skb); 371 break; 372 case ST_NCI_APDU_READER_GATE: 373 st_nci_hci_apdu_reader_event_received(ndev, event, skb); 374 break; 375 case ST_NCI_CONNECTIVITY_GATE: 376 st_nci_hci_connectivity_event_received(ndev, host, event, skb); 377 break; 378 } 379} 380EXPORT_SYMBOL_GPL(st_nci_hci_event_received); 381 382void st_nci_hci_cmd_received(struct nci_dev *ndev, u8 pipe, u8 cmd, 383 struct sk_buff *skb) 384{ 385 struct st_nci_info *info = nci_get_drvdata(ndev); 386 u8 gate = ndev->hci_dev->pipes[pipe].gate; 387 388 pr_debug("cmd: %x\n", cmd); 389 390 switch (cmd) { 391 case NCI_HCI_ANY_OPEN_PIPE: 392 if (gate != ST_NCI_APDU_READER_GATE && 393 ndev->hci_dev->pipes[pipe].host != ST_NCI_UICC_HOST_ID) 394 ndev->hci_dev->count_pipes++; 395 396 if (ndev->hci_dev->count_pipes == 397 ndev->hci_dev->expected_pipes) { 398 del_timer_sync(&info->se_info.se_active_timer); 399 info->se_info.se_active = false; 400 ndev->hci_dev->count_pipes = 0; 401 complete(&info->se_info.req_completion); 402 } 403 break; 404 } 405} 406EXPORT_SYMBOL_GPL(st_nci_hci_cmd_received); 407 408static int st_nci_control_se(struct nci_dev *ndev, u8 se_idx, 409 u8 state) 410{ 411 struct st_nci_info *info = nci_get_drvdata(ndev); 412 int r, i; 413 struct sk_buff *sk_host_list; 414 u8 host_id; 415 416 switch (se_idx) { 417 case ST_NCI_UICC_HOST_ID: 418 ndev->hci_dev->count_pipes = 0; 419 ndev->hci_dev->expected_pipes = ST_NCI_SE_COUNT_PIPE_UICC; 420 break; 421 case ST_NCI_ESE_HOST_ID: 422 ndev->hci_dev->count_pipes = 0; 423 ndev->hci_dev->expected_pipes = ST_NCI_SE_COUNT_PIPE_EMBEDDED; 424 break; 425 default: 426 return -EINVAL; 427 } 428 429 /* 430 * Wait for an EVT_HOT_PLUG in order to 431 * retrieve a relevant host list. 432 */ 433 reinit_completion(&info->se_info.req_completion); 434 r = nci_nfcee_mode_set(ndev, se_idx, state); 435 if (r != NCI_STATUS_OK) 436 return r; 437 438 mod_timer(&info->se_info.se_active_timer, jiffies + 439 msecs_to_jiffies(ST_NCI_SE_TO_HOT_PLUG)); 440 info->se_info.se_active = true; 441 442 /* Ignore return value and check in any case the host_list */ 443 wait_for_completion_interruptible(&info->se_info.req_completion); 444 445 /* There might be some "collision" after receiving a HOT_PLUG event 446 * This may cause the CLF to not answer to the next hci command. 447 * There is no possible synchronization to prevent this. 448 * Adding a small delay is the only way to solve the issue. 449 */ 450 if (info->se_info.se_status->is_ese_present && 451 info->se_info.se_status->is_uicc_present) 452 usleep_range(15000, 20000); 453 454 r = nci_hci_get_param(ndev, NCI_HCI_ADMIN_GATE, 455 NCI_HCI_ADMIN_PARAM_HOST_LIST, &sk_host_list); 456 if (r != NCI_HCI_ANY_OK) 457 return r; 458 459 for (i = 0; i < sk_host_list->len && 460 sk_host_list->data[i] != se_idx; i++) 461 ; 462 host_id = sk_host_list->data[i]; 463 kfree_skb(sk_host_list); 464 if (state == ST_NCI_SE_MODE_ON && host_id == se_idx) 465 return se_idx; 466 else if (state == ST_NCI_SE_MODE_OFF && host_id != se_idx) 467 return se_idx; 468 469 return -1; 470} 471 472int st_nci_disable_se(struct nci_dev *ndev, u32 se_idx) 473{ 474 int r; 475 476 pr_debug("st_nci_disable_se\n"); 477 478 /* 479 * According to upper layer, se_idx == NFC_SE_UICC when 480 * info->se_info.se_status->is_uicc_enable is true should never happen 481 * Same for eSE. 482 */ 483 r = st_nci_control_se(ndev, se_idx, ST_NCI_SE_MODE_OFF); 484 if (r < 0) { 485 /* Do best effort to release SWP */ 486 if (se_idx == NFC_SE_EMBEDDED) { 487 r = nci_hci_send_event(ndev, ST_NCI_APDU_READER_GATE, 488 ST_NCI_EVT_SE_END_OF_APDU_TRANSFER, 489 NULL, 0); 490 } 491 return r; 492 } 493 494 return 0; 495} 496EXPORT_SYMBOL_GPL(st_nci_disable_se); 497 498int st_nci_enable_se(struct nci_dev *ndev, u32 se_idx) 499{ 500 int r; 501 502 pr_debug("st_nci_enable_se\n"); 503 504 /* 505 * According to upper layer, se_idx == NFC_SE_UICC when 506 * info->se_info.se_status->is_uicc_enable is true should never happen. 507 * Same for eSE. 508 */ 509 r = st_nci_control_se(ndev, se_idx, ST_NCI_SE_MODE_ON); 510 if (r == ST_NCI_ESE_HOST_ID) { 511 st_nci_se_get_atr(ndev); 512 r = nci_hci_send_event(ndev, ST_NCI_APDU_READER_GATE, 513 ST_NCI_EVT_SE_SOFT_RESET, NULL, 0); 514 } 515 516 if (r < 0) { 517 /* 518 * The activation procedure failed, the secure element 519 * is not connected. Remove from the list. 520 */ 521 nfc_remove_se(ndev->nfc_dev, se_idx); 522 return r; 523 } 524 525 return 0; 526} 527EXPORT_SYMBOL_GPL(st_nci_enable_se); 528 529static int st_nci_hci_network_init(struct nci_dev *ndev) 530{ 531 struct st_nci_info *info = nci_get_drvdata(ndev); 532 struct core_conn_create_dest_spec_params *dest_params; 533 struct dest_spec_params spec_params; 534 struct nci_conn_info *conn_info; 535 int r, dev_num; 536 537 dest_params = 538 kzalloc(sizeof(struct core_conn_create_dest_spec_params) + 539 sizeof(struct dest_spec_params), GFP_KERNEL); 540 if (dest_params == NULL) { 541 r = -ENOMEM; 542 goto exit; 543 } 544 545 dest_params->type = NCI_DESTINATION_SPECIFIC_PARAM_NFCEE_TYPE; 546 dest_params->length = sizeof(struct dest_spec_params); 547 spec_params.id = ndev->hci_dev->nfcee_id; 548 spec_params.protocol = NCI_NFCEE_INTERFACE_HCI_ACCESS; 549 memcpy(dest_params->value, &spec_params, 550 sizeof(struct dest_spec_params)); 551 r = nci_core_conn_create(ndev, NCI_DESTINATION_NFCEE, 1, 552 sizeof(struct core_conn_create_dest_spec_params) + 553 sizeof(struct dest_spec_params), 554 dest_params); 555 if (r != NCI_STATUS_OK) 556 goto free_dest_params; 557 558 conn_info = ndev->hci_dev->conn_info; 559 if (!conn_info) 560 goto free_dest_params; 561 562 ndev->hci_dev->init_data.gate_count = ARRAY_SIZE(st_nci_gates); 563 memcpy(ndev->hci_dev->init_data.gates, st_nci_gates, 564 sizeof(st_nci_gates)); 565 566 /* 567 * Session id must include the driver name + i2c bus addr 568 * persistent info to discriminate 2 identical chips 569 */ 570 dev_num = find_first_zero_bit(dev_mask, ST_NCI_NUM_DEVICES); 571 if (dev_num >= ST_NCI_NUM_DEVICES) { 572 r = -ENODEV; 573 goto free_dest_params; 574 } 575 576 scnprintf(ndev->hci_dev->init_data.session_id, 577 sizeof(ndev->hci_dev->init_data.session_id), 578 "%s%2x", "ST21BH", dev_num); 579 580 r = nci_hci_dev_session_init(ndev); 581 if (r != NCI_HCI_ANY_OK) 582 goto free_dest_params; 583 584 /* 585 * In factory mode, we prevent secure elements activation 586 * by disabling nfcee on the current HCI connection id. 587 * HCI will be used here only for proprietary commands. 588 */ 589 if (test_bit(ST_NCI_FACTORY_MODE, &info->flags)) 590 r = nci_nfcee_mode_set(ndev, 591 ndev->hci_dev->conn_info->dest_params->id, 592 NCI_NFCEE_DISABLE); 593 else 594 r = nci_nfcee_mode_set(ndev, 595 ndev->hci_dev->conn_info->dest_params->id, 596 NCI_NFCEE_ENABLE); 597 598free_dest_params: 599 kfree(dest_params); 600 601exit: 602 return r; 603} 604 605int st_nci_discover_se(struct nci_dev *ndev) 606{ 607 u8 white_list[2]; 608 int r, wl_size = 0; 609 int se_count = 0; 610 struct st_nci_info *info = nci_get_drvdata(ndev); 611 612 pr_debug("st_nci_discover_se\n"); 613 614 r = st_nci_hci_network_init(ndev); 615 if (r != 0) 616 return r; 617 618 if (test_bit(ST_NCI_FACTORY_MODE, &info->flags)) 619 return 0; 620 621 if (info->se_info.se_status->is_uicc_present) 622 white_list[wl_size++] = ST_NCI_UICC_HOST_ID; 623 if (info->se_info.se_status->is_ese_present) 624 white_list[wl_size++] = ST_NCI_ESE_HOST_ID; 625 626 if (wl_size) { 627 r = nci_hci_set_param(ndev, NCI_HCI_ADMIN_GATE, 628 NCI_HCI_ADMIN_PARAM_WHITELIST, 629 white_list, wl_size); 630 if (r != NCI_HCI_ANY_OK) 631 return r; 632 } 633 634 if (info->se_info.se_status->is_uicc_present) { 635 nfc_add_se(ndev->nfc_dev, ST_NCI_UICC_HOST_ID, NFC_SE_UICC); 636 se_count++; 637 } 638 639 if (info->se_info.se_status->is_ese_present) { 640 nfc_add_se(ndev->nfc_dev, ST_NCI_ESE_HOST_ID, NFC_SE_EMBEDDED); 641 se_count++; 642 } 643 644 return !se_count; 645} 646EXPORT_SYMBOL_GPL(st_nci_discover_se); 647 648int st_nci_se_io(struct nci_dev *ndev, u32 se_idx, 649 u8 *apdu, size_t apdu_length, 650 se_io_cb_t cb, void *cb_context) 651{ 652 struct st_nci_info *info = nci_get_drvdata(ndev); 653 654 pr_debug("\n"); 655 656 switch (se_idx) { 657 case ST_NCI_ESE_HOST_ID: 658 info->se_info.cb = cb; 659 info->se_info.cb_context = cb_context; 660 mod_timer(&info->se_info.bwi_timer, jiffies + 661 msecs_to_jiffies(info->se_info.wt_timeout)); 662 info->se_info.bwi_active = true; 663 return nci_hci_send_event(ndev, ST_NCI_APDU_READER_GATE, 664 ST_NCI_EVT_TRANSMIT_DATA, apdu, 665 apdu_length); 666 default: 667 /* Need to free cb_context here as at the moment we can't 668 * clearly indicate to the caller if the callback function 669 * would be called (and free it) or not. In both cases a 670 * negative value may be returned to the caller. 671 */ 672 kfree(cb_context); 673 return -ENODEV; 674 } 675} 676EXPORT_SYMBOL(st_nci_se_io); 677 678static void st_nci_se_wt_timeout(struct timer_list *t) 679{ 680 /* 681 * No answer from the secure element 682 * within the defined timeout. 683 * Let's send a reset request as recovery procedure. 684 * According to the situation, we first try to send a software reset 685 * to the secure element. If the next command is still not 686 * answering in time, we send to the CLF a secure element hardware 687 * reset request. 688 */ 689 /* hardware reset managed through VCC_UICC_OUT power supply */ 690 u8 param = 0x01; 691 struct st_nci_info *info = from_timer(info, t, se_info.bwi_timer); 692 693 pr_debug("\n"); 694 695 info->se_info.bwi_active = false; 696 697 if (!info->se_info.xch_error) { 698 info->se_info.xch_error = true; 699 nci_hci_send_event(info->ndlc->ndev, ST_NCI_APDU_READER_GATE, 700 ST_NCI_EVT_SE_SOFT_RESET, NULL, 0); 701 } else { 702 info->se_info.xch_error = false; 703 nci_hci_send_event(info->ndlc->ndev, ST_NCI_DEVICE_MGNT_GATE, 704 ST_NCI_EVT_SE_HARD_RESET, ¶m, 1); 705 } 706 info->se_info.cb(info->se_info.cb_context, NULL, 0, -ETIME); 707} 708 709static void st_nci_se_activation_timeout(struct timer_list *t) 710{ 711 struct st_nci_info *info = from_timer(info, t, 712 se_info.se_active_timer); 713 714 pr_debug("\n"); 715 716 info->se_info.se_active = false; 717 718 complete(&info->se_info.req_completion); 719} 720 721int st_nci_se_init(struct nci_dev *ndev, struct st_nci_se_status *se_status) 722{ 723 struct st_nci_info *info = nci_get_drvdata(ndev); 724 725 init_completion(&info->se_info.req_completion); 726 /* initialize timers */ 727 timer_setup(&info->se_info.bwi_timer, st_nci_se_wt_timeout, 0); 728 info->se_info.bwi_active = false; 729 730 timer_setup(&info->se_info.se_active_timer, 731 st_nci_se_activation_timeout, 0); 732 info->se_info.se_active = false; 733 734 info->se_info.xch_error = false; 735 736 info->se_info.wt_timeout = 737 ST_NCI_BWI_TO_TIMEOUT(ST_NCI_ATR_DEFAULT_BWI); 738 739 info->se_info.se_status = se_status; 740 741 return 0; 742} 743EXPORT_SYMBOL(st_nci_se_init); 744 745void st_nci_se_deinit(struct nci_dev *ndev) 746{ 747 struct st_nci_info *info = nci_get_drvdata(ndev); 748 749 if (info->se_info.bwi_active) 750 del_timer_sync(&info->se_info.bwi_timer); 751 if (info->se_info.se_active) 752 del_timer_sync(&info->se_info.se_active_timer); 753 754 info->se_info.se_active = false; 755 info->se_info.bwi_active = false; 756} 757EXPORT_SYMBOL(st_nci_se_deinit); 758 759