162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (c) 2015-2021, Linaro Limited 462306a36Sopenharmony_ci */ 562306a36Sopenharmony_ci#include <linux/device.h> 662306a36Sopenharmony_ci#include <linux/err.h> 762306a36Sopenharmony_ci#include <linux/errno.h> 862306a36Sopenharmony_ci#include <linux/mm.h> 962306a36Sopenharmony_ci#include <linux/slab.h> 1062306a36Sopenharmony_ci#include <linux/tee_drv.h> 1162306a36Sopenharmony_ci#include <linux/types.h> 1262306a36Sopenharmony_ci#include "optee_private.h" 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci#define MAX_ARG_PARAM_COUNT 6 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci/* 1762306a36Sopenharmony_ci * How much memory we allocate for each entry. This doesn't have to be a 1862306a36Sopenharmony_ci * single page, but it makes sense to keep at least keep it as multiples of 1962306a36Sopenharmony_ci * the page size. 2062306a36Sopenharmony_ci */ 2162306a36Sopenharmony_ci#define SHM_ENTRY_SIZE PAGE_SIZE 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci/* 2462306a36Sopenharmony_ci * We need to have a compile time constant to be able to determine the 2562306a36Sopenharmony_ci * maximum needed size of the bit field. 2662306a36Sopenharmony_ci */ 2762306a36Sopenharmony_ci#define MIN_ARG_SIZE OPTEE_MSG_GET_ARG_SIZE(MAX_ARG_PARAM_COUNT) 2862306a36Sopenharmony_ci#define MAX_ARG_COUNT_PER_ENTRY (SHM_ENTRY_SIZE / MIN_ARG_SIZE) 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ci/* 3162306a36Sopenharmony_ci * Shared memory for argument structs are cached here. The number of 3262306a36Sopenharmony_ci * arguments structs that can fit is determined at runtime depending on the 3362306a36Sopenharmony_ci * needed RPC parameter count reported by secure world 3462306a36Sopenharmony_ci * (optee->rpc_param_count). 3562306a36Sopenharmony_ci */ 3662306a36Sopenharmony_cistruct optee_shm_arg_entry { 3762306a36Sopenharmony_ci struct list_head list_node; 3862306a36Sopenharmony_ci struct tee_shm *shm; 3962306a36Sopenharmony_ci DECLARE_BITMAP(map, MAX_ARG_COUNT_PER_ENTRY); 4062306a36Sopenharmony_ci}; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_civoid optee_cq_wait_init(struct optee_call_queue *cq, 4362306a36Sopenharmony_ci struct optee_call_waiter *w) 4462306a36Sopenharmony_ci{ 4562306a36Sopenharmony_ci /* 4662306a36Sopenharmony_ci * We're preparing to make a call to secure world. In case we can't 4762306a36Sopenharmony_ci * allocate a thread in secure world we'll end up waiting in 4862306a36Sopenharmony_ci * optee_cq_wait_for_completion(). 4962306a36Sopenharmony_ci * 5062306a36Sopenharmony_ci * Normally if there's no contention in secure world the call will 5162306a36Sopenharmony_ci * complete and we can cleanup directly with optee_cq_wait_final(). 5262306a36Sopenharmony_ci */ 5362306a36Sopenharmony_ci mutex_lock(&cq->mutex); 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci /* 5662306a36Sopenharmony_ci * We add ourselves to the queue, but we don't wait. This 5762306a36Sopenharmony_ci * guarantees that we don't lose a completion if secure world 5862306a36Sopenharmony_ci * returns busy and another thread just exited and try to complete 5962306a36Sopenharmony_ci * someone. 6062306a36Sopenharmony_ci */ 6162306a36Sopenharmony_ci init_completion(&w->c); 6262306a36Sopenharmony_ci list_add_tail(&w->list_node, &cq->waiters); 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci mutex_unlock(&cq->mutex); 6562306a36Sopenharmony_ci} 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_civoid optee_cq_wait_for_completion(struct optee_call_queue *cq, 6862306a36Sopenharmony_ci struct optee_call_waiter *w) 6962306a36Sopenharmony_ci{ 7062306a36Sopenharmony_ci wait_for_completion(&w->c); 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_ci mutex_lock(&cq->mutex); 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci /* Move to end of list to get out of the way for other waiters */ 7562306a36Sopenharmony_ci list_del(&w->list_node); 7662306a36Sopenharmony_ci reinit_completion(&w->c); 7762306a36Sopenharmony_ci list_add_tail(&w->list_node, &cq->waiters); 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci mutex_unlock(&cq->mutex); 8062306a36Sopenharmony_ci} 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_cistatic void optee_cq_complete_one(struct optee_call_queue *cq) 8362306a36Sopenharmony_ci{ 8462306a36Sopenharmony_ci struct optee_call_waiter *w; 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_ci list_for_each_entry(w, &cq->waiters, list_node) { 8762306a36Sopenharmony_ci if (!completion_done(&w->c)) { 8862306a36Sopenharmony_ci complete(&w->c); 8962306a36Sopenharmony_ci break; 9062306a36Sopenharmony_ci } 9162306a36Sopenharmony_ci } 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_civoid optee_cq_wait_final(struct optee_call_queue *cq, 9562306a36Sopenharmony_ci struct optee_call_waiter *w) 9662306a36Sopenharmony_ci{ 9762306a36Sopenharmony_ci /* 9862306a36Sopenharmony_ci * We're done with the call to secure world. The thread in secure 9962306a36Sopenharmony_ci * world that was used for this call is now available for some 10062306a36Sopenharmony_ci * other task to use. 10162306a36Sopenharmony_ci */ 10262306a36Sopenharmony_ci mutex_lock(&cq->mutex); 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci /* Get out of the list */ 10562306a36Sopenharmony_ci list_del(&w->list_node); 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci /* Wake up one eventual waiting task */ 10862306a36Sopenharmony_ci optee_cq_complete_one(cq); 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci /* 11162306a36Sopenharmony_ci * If we're completed we've got a completion from another task that 11262306a36Sopenharmony_ci * was just done with its call to secure world. Since yet another 11362306a36Sopenharmony_ci * thread now is available in secure world wake up another eventual 11462306a36Sopenharmony_ci * waiting task. 11562306a36Sopenharmony_ci */ 11662306a36Sopenharmony_ci if (completion_done(&w->c)) 11762306a36Sopenharmony_ci optee_cq_complete_one(cq); 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci mutex_unlock(&cq->mutex); 12062306a36Sopenharmony_ci} 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ci/* Requires the filpstate mutex to be held */ 12362306a36Sopenharmony_cistatic struct optee_session *find_session(struct optee_context_data *ctxdata, 12462306a36Sopenharmony_ci u32 session_id) 12562306a36Sopenharmony_ci{ 12662306a36Sopenharmony_ci struct optee_session *sess; 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci list_for_each_entry(sess, &ctxdata->sess_list, list_node) 12962306a36Sopenharmony_ci if (sess->session_id == session_id) 13062306a36Sopenharmony_ci return sess; 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci return NULL; 13362306a36Sopenharmony_ci} 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_civoid optee_shm_arg_cache_init(struct optee *optee, u32 flags) 13662306a36Sopenharmony_ci{ 13762306a36Sopenharmony_ci INIT_LIST_HEAD(&optee->shm_arg_cache.shm_args); 13862306a36Sopenharmony_ci mutex_init(&optee->shm_arg_cache.mutex); 13962306a36Sopenharmony_ci optee->shm_arg_cache.flags = flags; 14062306a36Sopenharmony_ci} 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_civoid optee_shm_arg_cache_uninit(struct optee *optee) 14362306a36Sopenharmony_ci{ 14462306a36Sopenharmony_ci struct list_head *head = &optee->shm_arg_cache.shm_args; 14562306a36Sopenharmony_ci struct optee_shm_arg_entry *entry; 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_ci mutex_destroy(&optee->shm_arg_cache.mutex); 14862306a36Sopenharmony_ci while (!list_empty(head)) { 14962306a36Sopenharmony_ci entry = list_first_entry(head, struct optee_shm_arg_entry, 15062306a36Sopenharmony_ci list_node); 15162306a36Sopenharmony_ci list_del(&entry->list_node); 15262306a36Sopenharmony_ci if (find_first_bit(entry->map, MAX_ARG_COUNT_PER_ENTRY) != 15362306a36Sopenharmony_ci MAX_ARG_COUNT_PER_ENTRY) { 15462306a36Sopenharmony_ci pr_err("Freeing non-free entry\n"); 15562306a36Sopenharmony_ci } 15662306a36Sopenharmony_ci tee_shm_free(entry->shm); 15762306a36Sopenharmony_ci kfree(entry); 15862306a36Sopenharmony_ci } 15962306a36Sopenharmony_ci} 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_cisize_t optee_msg_arg_size(size_t rpc_param_count) 16262306a36Sopenharmony_ci{ 16362306a36Sopenharmony_ci size_t sz = OPTEE_MSG_GET_ARG_SIZE(MAX_ARG_PARAM_COUNT); 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci if (rpc_param_count) 16662306a36Sopenharmony_ci sz += OPTEE_MSG_GET_ARG_SIZE(rpc_param_count); 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci return sz; 16962306a36Sopenharmony_ci} 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci/** 17262306a36Sopenharmony_ci * optee_get_msg_arg() - Provide shared memory for argument struct 17362306a36Sopenharmony_ci * @ctx: Caller TEE context 17462306a36Sopenharmony_ci * @num_params: Number of parameter to store 17562306a36Sopenharmony_ci * @entry_ret: Entry pointer, needed when freeing the buffer 17662306a36Sopenharmony_ci * @shm_ret: Shared memory buffer 17762306a36Sopenharmony_ci * @offs_ret: Offset of argument strut in shared memory buffer 17862306a36Sopenharmony_ci * 17962306a36Sopenharmony_ci * @returns a pointer to the argument struct in memory, else an ERR_PTR 18062306a36Sopenharmony_ci */ 18162306a36Sopenharmony_cistruct optee_msg_arg *optee_get_msg_arg(struct tee_context *ctx, 18262306a36Sopenharmony_ci size_t num_params, 18362306a36Sopenharmony_ci struct optee_shm_arg_entry **entry_ret, 18462306a36Sopenharmony_ci struct tee_shm **shm_ret, 18562306a36Sopenharmony_ci u_int *offs_ret) 18662306a36Sopenharmony_ci{ 18762306a36Sopenharmony_ci struct optee *optee = tee_get_drvdata(ctx->teedev); 18862306a36Sopenharmony_ci size_t sz = optee_msg_arg_size(optee->rpc_param_count); 18962306a36Sopenharmony_ci struct optee_shm_arg_entry *entry; 19062306a36Sopenharmony_ci struct optee_msg_arg *ma; 19162306a36Sopenharmony_ci size_t args_per_entry; 19262306a36Sopenharmony_ci u_long bit; 19362306a36Sopenharmony_ci u_int offs; 19462306a36Sopenharmony_ci void *res; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci if (num_params > MAX_ARG_PARAM_COUNT) 19762306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci if (optee->shm_arg_cache.flags & OPTEE_SHM_ARG_SHARED) 20062306a36Sopenharmony_ci args_per_entry = SHM_ENTRY_SIZE / sz; 20162306a36Sopenharmony_ci else 20262306a36Sopenharmony_ci args_per_entry = 1; 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci mutex_lock(&optee->shm_arg_cache.mutex); 20562306a36Sopenharmony_ci list_for_each_entry(entry, &optee->shm_arg_cache.shm_args, list_node) { 20662306a36Sopenharmony_ci bit = find_first_zero_bit(entry->map, MAX_ARG_COUNT_PER_ENTRY); 20762306a36Sopenharmony_ci if (bit < args_per_entry) 20862306a36Sopenharmony_ci goto have_entry; 20962306a36Sopenharmony_ci } 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci /* 21262306a36Sopenharmony_ci * No entry was found, let's allocate a new. 21362306a36Sopenharmony_ci */ 21462306a36Sopenharmony_ci entry = kzalloc(sizeof(*entry), GFP_KERNEL); 21562306a36Sopenharmony_ci if (!entry) { 21662306a36Sopenharmony_ci res = ERR_PTR(-ENOMEM); 21762306a36Sopenharmony_ci goto out; 21862306a36Sopenharmony_ci } 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci if (optee->shm_arg_cache.flags & OPTEE_SHM_ARG_ALLOC_PRIV) 22162306a36Sopenharmony_ci res = tee_shm_alloc_priv_buf(ctx, SHM_ENTRY_SIZE); 22262306a36Sopenharmony_ci else 22362306a36Sopenharmony_ci res = tee_shm_alloc_kernel_buf(ctx, SHM_ENTRY_SIZE); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci if (IS_ERR(res)) { 22662306a36Sopenharmony_ci kfree(entry); 22762306a36Sopenharmony_ci goto out; 22862306a36Sopenharmony_ci } 22962306a36Sopenharmony_ci entry->shm = res; 23062306a36Sopenharmony_ci list_add(&entry->list_node, &optee->shm_arg_cache.shm_args); 23162306a36Sopenharmony_ci bit = 0; 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_cihave_entry: 23462306a36Sopenharmony_ci offs = bit * sz; 23562306a36Sopenharmony_ci res = tee_shm_get_va(entry->shm, offs); 23662306a36Sopenharmony_ci if (IS_ERR(res)) 23762306a36Sopenharmony_ci goto out; 23862306a36Sopenharmony_ci ma = res; 23962306a36Sopenharmony_ci set_bit(bit, entry->map); 24062306a36Sopenharmony_ci memset(ma, 0, sz); 24162306a36Sopenharmony_ci ma->num_params = num_params; 24262306a36Sopenharmony_ci *entry_ret = entry; 24362306a36Sopenharmony_ci *shm_ret = entry->shm; 24462306a36Sopenharmony_ci *offs_ret = offs; 24562306a36Sopenharmony_ciout: 24662306a36Sopenharmony_ci mutex_unlock(&optee->shm_arg_cache.mutex); 24762306a36Sopenharmony_ci return res; 24862306a36Sopenharmony_ci} 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_ci/** 25162306a36Sopenharmony_ci * optee_free_msg_arg() - Free previsouly obtained shared memory 25262306a36Sopenharmony_ci * @ctx: Caller TEE context 25362306a36Sopenharmony_ci * @entry: Pointer returned when the shared memory was obtained 25462306a36Sopenharmony_ci * @offs: Offset of shared memory buffer to free 25562306a36Sopenharmony_ci * 25662306a36Sopenharmony_ci * This function frees the shared memory obtained with optee_get_msg_arg(). 25762306a36Sopenharmony_ci */ 25862306a36Sopenharmony_civoid optee_free_msg_arg(struct tee_context *ctx, 25962306a36Sopenharmony_ci struct optee_shm_arg_entry *entry, u_int offs) 26062306a36Sopenharmony_ci{ 26162306a36Sopenharmony_ci struct optee *optee = tee_get_drvdata(ctx->teedev); 26262306a36Sopenharmony_ci size_t sz = optee_msg_arg_size(optee->rpc_param_count); 26362306a36Sopenharmony_ci u_long bit; 26462306a36Sopenharmony_ci 26562306a36Sopenharmony_ci if (offs > SHM_ENTRY_SIZE || offs % sz) { 26662306a36Sopenharmony_ci pr_err("Invalid offs %u\n", offs); 26762306a36Sopenharmony_ci return; 26862306a36Sopenharmony_ci } 26962306a36Sopenharmony_ci bit = offs / sz; 27062306a36Sopenharmony_ci 27162306a36Sopenharmony_ci mutex_lock(&optee->shm_arg_cache.mutex); 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_ci if (!test_bit(bit, entry->map)) 27462306a36Sopenharmony_ci pr_err("Bit pos %lu is already free\n", bit); 27562306a36Sopenharmony_ci clear_bit(bit, entry->map); 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_ci mutex_unlock(&optee->shm_arg_cache.mutex); 27862306a36Sopenharmony_ci} 27962306a36Sopenharmony_ci 28062306a36Sopenharmony_ciint optee_open_session(struct tee_context *ctx, 28162306a36Sopenharmony_ci struct tee_ioctl_open_session_arg *arg, 28262306a36Sopenharmony_ci struct tee_param *param) 28362306a36Sopenharmony_ci{ 28462306a36Sopenharmony_ci struct optee *optee = tee_get_drvdata(ctx->teedev); 28562306a36Sopenharmony_ci struct optee_context_data *ctxdata = ctx->data; 28662306a36Sopenharmony_ci struct optee_shm_arg_entry *entry; 28762306a36Sopenharmony_ci struct tee_shm *shm; 28862306a36Sopenharmony_ci struct optee_msg_arg *msg_arg; 28962306a36Sopenharmony_ci struct optee_session *sess = NULL; 29062306a36Sopenharmony_ci uuid_t client_uuid; 29162306a36Sopenharmony_ci u_int offs; 29262306a36Sopenharmony_ci int rc; 29362306a36Sopenharmony_ci 29462306a36Sopenharmony_ci /* +2 for the meta parameters added below */ 29562306a36Sopenharmony_ci msg_arg = optee_get_msg_arg(ctx, arg->num_params + 2, 29662306a36Sopenharmony_ci &entry, &shm, &offs); 29762306a36Sopenharmony_ci if (IS_ERR(msg_arg)) 29862306a36Sopenharmony_ci return PTR_ERR(msg_arg); 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_ci msg_arg->cmd = OPTEE_MSG_CMD_OPEN_SESSION; 30162306a36Sopenharmony_ci msg_arg->cancel_id = arg->cancel_id; 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci /* 30462306a36Sopenharmony_ci * Initialize and add the meta parameters needed when opening a 30562306a36Sopenharmony_ci * session. 30662306a36Sopenharmony_ci */ 30762306a36Sopenharmony_ci msg_arg->params[0].attr = OPTEE_MSG_ATTR_TYPE_VALUE_INPUT | 30862306a36Sopenharmony_ci OPTEE_MSG_ATTR_META; 30962306a36Sopenharmony_ci msg_arg->params[1].attr = OPTEE_MSG_ATTR_TYPE_VALUE_INPUT | 31062306a36Sopenharmony_ci OPTEE_MSG_ATTR_META; 31162306a36Sopenharmony_ci memcpy(&msg_arg->params[0].u.value, arg->uuid, sizeof(arg->uuid)); 31262306a36Sopenharmony_ci msg_arg->params[1].u.value.c = arg->clnt_login; 31362306a36Sopenharmony_ci 31462306a36Sopenharmony_ci rc = tee_session_calc_client_uuid(&client_uuid, arg->clnt_login, 31562306a36Sopenharmony_ci arg->clnt_uuid); 31662306a36Sopenharmony_ci if (rc) 31762306a36Sopenharmony_ci goto out; 31862306a36Sopenharmony_ci export_uuid(msg_arg->params[1].u.octets, &client_uuid); 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci rc = optee->ops->to_msg_param(optee, msg_arg->params + 2, 32162306a36Sopenharmony_ci arg->num_params, param); 32262306a36Sopenharmony_ci if (rc) 32362306a36Sopenharmony_ci goto out; 32462306a36Sopenharmony_ci 32562306a36Sopenharmony_ci sess = kzalloc(sizeof(*sess), GFP_KERNEL); 32662306a36Sopenharmony_ci if (!sess) { 32762306a36Sopenharmony_ci rc = -ENOMEM; 32862306a36Sopenharmony_ci goto out; 32962306a36Sopenharmony_ci } 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_ci if (optee->ops->do_call_with_arg(ctx, shm, offs)) { 33262306a36Sopenharmony_ci msg_arg->ret = TEEC_ERROR_COMMUNICATION; 33362306a36Sopenharmony_ci msg_arg->ret_origin = TEEC_ORIGIN_COMMS; 33462306a36Sopenharmony_ci } 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_ci if (msg_arg->ret == TEEC_SUCCESS) { 33762306a36Sopenharmony_ci /* A new session has been created, add it to the list. */ 33862306a36Sopenharmony_ci sess->session_id = msg_arg->session; 33962306a36Sopenharmony_ci mutex_lock(&ctxdata->mutex); 34062306a36Sopenharmony_ci list_add(&sess->list_node, &ctxdata->sess_list); 34162306a36Sopenharmony_ci mutex_unlock(&ctxdata->mutex); 34262306a36Sopenharmony_ci } else { 34362306a36Sopenharmony_ci kfree(sess); 34462306a36Sopenharmony_ci } 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci if (optee->ops->from_msg_param(optee, param, arg->num_params, 34762306a36Sopenharmony_ci msg_arg->params + 2)) { 34862306a36Sopenharmony_ci arg->ret = TEEC_ERROR_COMMUNICATION; 34962306a36Sopenharmony_ci arg->ret_origin = TEEC_ORIGIN_COMMS; 35062306a36Sopenharmony_ci /* Close session again to avoid leakage */ 35162306a36Sopenharmony_ci optee_close_session(ctx, msg_arg->session); 35262306a36Sopenharmony_ci } else { 35362306a36Sopenharmony_ci arg->session = msg_arg->session; 35462306a36Sopenharmony_ci arg->ret = msg_arg->ret; 35562306a36Sopenharmony_ci arg->ret_origin = msg_arg->ret_origin; 35662306a36Sopenharmony_ci } 35762306a36Sopenharmony_ciout: 35862306a36Sopenharmony_ci optee_free_msg_arg(ctx, entry, offs); 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci return rc; 36162306a36Sopenharmony_ci} 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ciint optee_close_session_helper(struct tee_context *ctx, u32 session) 36462306a36Sopenharmony_ci{ 36562306a36Sopenharmony_ci struct optee *optee = tee_get_drvdata(ctx->teedev); 36662306a36Sopenharmony_ci struct optee_shm_arg_entry *entry; 36762306a36Sopenharmony_ci struct optee_msg_arg *msg_arg; 36862306a36Sopenharmony_ci struct tee_shm *shm; 36962306a36Sopenharmony_ci u_int offs; 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci msg_arg = optee_get_msg_arg(ctx, 0, &entry, &shm, &offs); 37262306a36Sopenharmony_ci if (IS_ERR(msg_arg)) 37362306a36Sopenharmony_ci return PTR_ERR(msg_arg); 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci msg_arg->cmd = OPTEE_MSG_CMD_CLOSE_SESSION; 37662306a36Sopenharmony_ci msg_arg->session = session; 37762306a36Sopenharmony_ci optee->ops->do_call_with_arg(ctx, shm, offs); 37862306a36Sopenharmony_ci 37962306a36Sopenharmony_ci optee_free_msg_arg(ctx, entry, offs); 38062306a36Sopenharmony_ci 38162306a36Sopenharmony_ci return 0; 38262306a36Sopenharmony_ci} 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ciint optee_close_session(struct tee_context *ctx, u32 session) 38562306a36Sopenharmony_ci{ 38662306a36Sopenharmony_ci struct optee_context_data *ctxdata = ctx->data; 38762306a36Sopenharmony_ci struct optee_session *sess; 38862306a36Sopenharmony_ci 38962306a36Sopenharmony_ci /* Check that the session is valid and remove it from the list */ 39062306a36Sopenharmony_ci mutex_lock(&ctxdata->mutex); 39162306a36Sopenharmony_ci sess = find_session(ctxdata, session); 39262306a36Sopenharmony_ci if (sess) 39362306a36Sopenharmony_ci list_del(&sess->list_node); 39462306a36Sopenharmony_ci mutex_unlock(&ctxdata->mutex); 39562306a36Sopenharmony_ci if (!sess) 39662306a36Sopenharmony_ci return -EINVAL; 39762306a36Sopenharmony_ci kfree(sess); 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci return optee_close_session_helper(ctx, session); 40062306a36Sopenharmony_ci} 40162306a36Sopenharmony_ci 40262306a36Sopenharmony_ciint optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg, 40362306a36Sopenharmony_ci struct tee_param *param) 40462306a36Sopenharmony_ci{ 40562306a36Sopenharmony_ci struct optee *optee = tee_get_drvdata(ctx->teedev); 40662306a36Sopenharmony_ci struct optee_context_data *ctxdata = ctx->data; 40762306a36Sopenharmony_ci struct optee_shm_arg_entry *entry; 40862306a36Sopenharmony_ci struct optee_msg_arg *msg_arg; 40962306a36Sopenharmony_ci struct optee_session *sess; 41062306a36Sopenharmony_ci struct tee_shm *shm; 41162306a36Sopenharmony_ci u_int offs; 41262306a36Sopenharmony_ci int rc; 41362306a36Sopenharmony_ci 41462306a36Sopenharmony_ci /* Check that the session is valid */ 41562306a36Sopenharmony_ci mutex_lock(&ctxdata->mutex); 41662306a36Sopenharmony_ci sess = find_session(ctxdata, arg->session); 41762306a36Sopenharmony_ci mutex_unlock(&ctxdata->mutex); 41862306a36Sopenharmony_ci if (!sess) 41962306a36Sopenharmony_ci return -EINVAL; 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci msg_arg = optee_get_msg_arg(ctx, arg->num_params, 42262306a36Sopenharmony_ci &entry, &shm, &offs); 42362306a36Sopenharmony_ci if (IS_ERR(msg_arg)) 42462306a36Sopenharmony_ci return PTR_ERR(msg_arg); 42562306a36Sopenharmony_ci msg_arg->cmd = OPTEE_MSG_CMD_INVOKE_COMMAND; 42662306a36Sopenharmony_ci msg_arg->func = arg->func; 42762306a36Sopenharmony_ci msg_arg->session = arg->session; 42862306a36Sopenharmony_ci msg_arg->cancel_id = arg->cancel_id; 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ci rc = optee->ops->to_msg_param(optee, msg_arg->params, arg->num_params, 43162306a36Sopenharmony_ci param); 43262306a36Sopenharmony_ci if (rc) 43362306a36Sopenharmony_ci goto out; 43462306a36Sopenharmony_ci 43562306a36Sopenharmony_ci if (optee->ops->do_call_with_arg(ctx, shm, offs)) { 43662306a36Sopenharmony_ci msg_arg->ret = TEEC_ERROR_COMMUNICATION; 43762306a36Sopenharmony_ci msg_arg->ret_origin = TEEC_ORIGIN_COMMS; 43862306a36Sopenharmony_ci } 43962306a36Sopenharmony_ci 44062306a36Sopenharmony_ci if (optee->ops->from_msg_param(optee, param, arg->num_params, 44162306a36Sopenharmony_ci msg_arg->params)) { 44262306a36Sopenharmony_ci msg_arg->ret = TEEC_ERROR_COMMUNICATION; 44362306a36Sopenharmony_ci msg_arg->ret_origin = TEEC_ORIGIN_COMMS; 44462306a36Sopenharmony_ci } 44562306a36Sopenharmony_ci 44662306a36Sopenharmony_ci arg->ret = msg_arg->ret; 44762306a36Sopenharmony_ci arg->ret_origin = msg_arg->ret_origin; 44862306a36Sopenharmony_ciout: 44962306a36Sopenharmony_ci optee_free_msg_arg(ctx, entry, offs); 45062306a36Sopenharmony_ci return rc; 45162306a36Sopenharmony_ci} 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ciint optee_cancel_req(struct tee_context *ctx, u32 cancel_id, u32 session) 45462306a36Sopenharmony_ci{ 45562306a36Sopenharmony_ci struct optee *optee = tee_get_drvdata(ctx->teedev); 45662306a36Sopenharmony_ci struct optee_context_data *ctxdata = ctx->data; 45762306a36Sopenharmony_ci struct optee_shm_arg_entry *entry; 45862306a36Sopenharmony_ci struct optee_msg_arg *msg_arg; 45962306a36Sopenharmony_ci struct optee_session *sess; 46062306a36Sopenharmony_ci struct tee_shm *shm; 46162306a36Sopenharmony_ci u_int offs; 46262306a36Sopenharmony_ci 46362306a36Sopenharmony_ci /* Check that the session is valid */ 46462306a36Sopenharmony_ci mutex_lock(&ctxdata->mutex); 46562306a36Sopenharmony_ci sess = find_session(ctxdata, session); 46662306a36Sopenharmony_ci mutex_unlock(&ctxdata->mutex); 46762306a36Sopenharmony_ci if (!sess) 46862306a36Sopenharmony_ci return -EINVAL; 46962306a36Sopenharmony_ci 47062306a36Sopenharmony_ci msg_arg = optee_get_msg_arg(ctx, 0, &entry, &shm, &offs); 47162306a36Sopenharmony_ci if (IS_ERR(msg_arg)) 47262306a36Sopenharmony_ci return PTR_ERR(msg_arg); 47362306a36Sopenharmony_ci 47462306a36Sopenharmony_ci msg_arg->cmd = OPTEE_MSG_CMD_CANCEL; 47562306a36Sopenharmony_ci msg_arg->session = session; 47662306a36Sopenharmony_ci msg_arg->cancel_id = cancel_id; 47762306a36Sopenharmony_ci optee->ops->do_call_with_arg(ctx, shm, offs); 47862306a36Sopenharmony_ci 47962306a36Sopenharmony_ci optee_free_msg_arg(ctx, entry, offs); 48062306a36Sopenharmony_ci return 0; 48162306a36Sopenharmony_ci} 48262306a36Sopenharmony_ci 48362306a36Sopenharmony_cistatic bool is_normal_memory(pgprot_t p) 48462306a36Sopenharmony_ci{ 48562306a36Sopenharmony_ci#if defined(CONFIG_ARM) 48662306a36Sopenharmony_ci return (((pgprot_val(p) & L_PTE_MT_MASK) == L_PTE_MT_WRITEALLOC) || 48762306a36Sopenharmony_ci ((pgprot_val(p) & L_PTE_MT_MASK) == L_PTE_MT_WRITEBACK)); 48862306a36Sopenharmony_ci#elif defined(CONFIG_ARM64) 48962306a36Sopenharmony_ci return (pgprot_val(p) & PTE_ATTRINDX_MASK) == PTE_ATTRINDX(MT_NORMAL); 49062306a36Sopenharmony_ci#else 49162306a36Sopenharmony_ci#error "Unsupported architecture" 49262306a36Sopenharmony_ci#endif 49362306a36Sopenharmony_ci} 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_cistatic int __check_mem_type(struct mm_struct *mm, unsigned long start, 49662306a36Sopenharmony_ci unsigned long end) 49762306a36Sopenharmony_ci{ 49862306a36Sopenharmony_ci struct vm_area_struct *vma; 49962306a36Sopenharmony_ci VMA_ITERATOR(vmi, mm, start); 50062306a36Sopenharmony_ci 50162306a36Sopenharmony_ci for_each_vma_range(vmi, vma, end) { 50262306a36Sopenharmony_ci if (!is_normal_memory(vma->vm_page_prot)) 50362306a36Sopenharmony_ci return -EINVAL; 50462306a36Sopenharmony_ci } 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_ci return 0; 50762306a36Sopenharmony_ci} 50862306a36Sopenharmony_ci 50962306a36Sopenharmony_ciint optee_check_mem_type(unsigned long start, size_t num_pages) 51062306a36Sopenharmony_ci{ 51162306a36Sopenharmony_ci struct mm_struct *mm = current->mm; 51262306a36Sopenharmony_ci int rc; 51362306a36Sopenharmony_ci 51462306a36Sopenharmony_ci /* 51562306a36Sopenharmony_ci * Allow kernel address to register with OP-TEE as kernel 51662306a36Sopenharmony_ci * pages are configured as normal memory only. 51762306a36Sopenharmony_ci */ 51862306a36Sopenharmony_ci if (virt_addr_valid((void *)start) || is_vmalloc_addr((void *)start)) 51962306a36Sopenharmony_ci return 0; 52062306a36Sopenharmony_ci 52162306a36Sopenharmony_ci mmap_read_lock(mm); 52262306a36Sopenharmony_ci rc = __check_mem_type(mm, start, start + num_pages * PAGE_SIZE); 52362306a36Sopenharmony_ci mmap_read_unlock(mm); 52462306a36Sopenharmony_ci 52562306a36Sopenharmony_ci return rc; 52662306a36Sopenharmony_ci} 527