162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C) 2019-2021 Linaro Ltd. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Author: 662306a36Sopenharmony_ci * Sumit Garg <sumit.garg@linaro.org> 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci 962306a36Sopenharmony_ci#include <linux/err.h> 1062306a36Sopenharmony_ci#include <linux/key-type.h> 1162306a36Sopenharmony_ci#include <linux/module.h> 1262306a36Sopenharmony_ci#include <linux/slab.h> 1362306a36Sopenharmony_ci#include <linux/string.h> 1462306a36Sopenharmony_ci#include <linux/tee_drv.h> 1562306a36Sopenharmony_ci#include <linux/uuid.h> 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_ci#include <keys/trusted_tee.h> 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci#define DRIVER_NAME "trusted-key-tee" 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci/* 2262306a36Sopenharmony_ci * Get random data for symmetric key 2362306a36Sopenharmony_ci * 2462306a36Sopenharmony_ci * [out] memref[0] Random data 2562306a36Sopenharmony_ci */ 2662306a36Sopenharmony_ci#define TA_CMD_GET_RANDOM 0x0 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_ci/* 2962306a36Sopenharmony_ci * Seal trusted key using hardware unique key 3062306a36Sopenharmony_ci * 3162306a36Sopenharmony_ci * [in] memref[0] Plain key 3262306a36Sopenharmony_ci * [out] memref[1] Sealed key datablob 3362306a36Sopenharmony_ci */ 3462306a36Sopenharmony_ci#define TA_CMD_SEAL 0x1 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ci/* 3762306a36Sopenharmony_ci * Unseal trusted key using hardware unique key 3862306a36Sopenharmony_ci * 3962306a36Sopenharmony_ci * [in] memref[0] Sealed key datablob 4062306a36Sopenharmony_ci * [out] memref[1] Plain key 4162306a36Sopenharmony_ci */ 4262306a36Sopenharmony_ci#define TA_CMD_UNSEAL 0x2 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci/** 4562306a36Sopenharmony_ci * struct trusted_key_tee_private - TEE Trusted key private data 4662306a36Sopenharmony_ci * @dev: TEE based Trusted key device. 4762306a36Sopenharmony_ci * @ctx: TEE context handler. 4862306a36Sopenharmony_ci * @session_id: Trusted key TA session identifier. 4962306a36Sopenharmony_ci * @shm_pool: Memory pool shared with TEE device. 5062306a36Sopenharmony_ci */ 5162306a36Sopenharmony_cistruct trusted_key_tee_private { 5262306a36Sopenharmony_ci struct device *dev; 5362306a36Sopenharmony_ci struct tee_context *ctx; 5462306a36Sopenharmony_ci u32 session_id; 5562306a36Sopenharmony_ci struct tee_shm *shm_pool; 5662306a36Sopenharmony_ci}; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_cistatic struct trusted_key_tee_private pvt_data; 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_ci/* 6162306a36Sopenharmony_ci * Have the TEE seal(encrypt) the symmetric key 6262306a36Sopenharmony_ci */ 6362306a36Sopenharmony_cistatic int trusted_tee_seal(struct trusted_key_payload *p, char *datablob) 6462306a36Sopenharmony_ci{ 6562306a36Sopenharmony_ci int ret; 6662306a36Sopenharmony_ci struct tee_ioctl_invoke_arg inv_arg; 6762306a36Sopenharmony_ci struct tee_param param[4]; 6862306a36Sopenharmony_ci struct tee_shm *reg_shm = NULL; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci memset(&inv_arg, 0, sizeof(inv_arg)); 7162306a36Sopenharmony_ci memset(¶m, 0, sizeof(param)); 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci reg_shm = tee_shm_register_kernel_buf(pvt_data.ctx, p->key, 7462306a36Sopenharmony_ci sizeof(p->key) + sizeof(p->blob)); 7562306a36Sopenharmony_ci if (IS_ERR(reg_shm)) { 7662306a36Sopenharmony_ci dev_err(pvt_data.dev, "shm register failed\n"); 7762306a36Sopenharmony_ci return PTR_ERR(reg_shm); 7862306a36Sopenharmony_ci } 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci inv_arg.func = TA_CMD_SEAL; 8162306a36Sopenharmony_ci inv_arg.session = pvt_data.session_id; 8262306a36Sopenharmony_ci inv_arg.num_params = 4; 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; 8562306a36Sopenharmony_ci param[0].u.memref.shm = reg_shm; 8662306a36Sopenharmony_ci param[0].u.memref.size = p->key_len; 8762306a36Sopenharmony_ci param[0].u.memref.shm_offs = 0; 8862306a36Sopenharmony_ci param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; 8962306a36Sopenharmony_ci param[1].u.memref.shm = reg_shm; 9062306a36Sopenharmony_ci param[1].u.memref.size = sizeof(p->blob); 9162306a36Sopenharmony_ci param[1].u.memref.shm_offs = sizeof(p->key); 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci ret = tee_client_invoke_func(pvt_data.ctx, &inv_arg, param); 9462306a36Sopenharmony_ci if ((ret < 0) || (inv_arg.ret != 0)) { 9562306a36Sopenharmony_ci dev_err(pvt_data.dev, "TA_CMD_SEAL invoke err: %x\n", 9662306a36Sopenharmony_ci inv_arg.ret); 9762306a36Sopenharmony_ci ret = -EFAULT; 9862306a36Sopenharmony_ci } else { 9962306a36Sopenharmony_ci p->blob_len = param[1].u.memref.size; 10062306a36Sopenharmony_ci } 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_ci tee_shm_free(reg_shm); 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci return ret; 10562306a36Sopenharmony_ci} 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci/* 10862306a36Sopenharmony_ci * Have the TEE unseal(decrypt) the symmetric key 10962306a36Sopenharmony_ci */ 11062306a36Sopenharmony_cistatic int trusted_tee_unseal(struct trusted_key_payload *p, char *datablob) 11162306a36Sopenharmony_ci{ 11262306a36Sopenharmony_ci int ret; 11362306a36Sopenharmony_ci struct tee_ioctl_invoke_arg inv_arg; 11462306a36Sopenharmony_ci struct tee_param param[4]; 11562306a36Sopenharmony_ci struct tee_shm *reg_shm = NULL; 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_ci memset(&inv_arg, 0, sizeof(inv_arg)); 11862306a36Sopenharmony_ci memset(¶m, 0, sizeof(param)); 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci reg_shm = tee_shm_register_kernel_buf(pvt_data.ctx, p->key, 12162306a36Sopenharmony_ci sizeof(p->key) + sizeof(p->blob)); 12262306a36Sopenharmony_ci if (IS_ERR(reg_shm)) { 12362306a36Sopenharmony_ci dev_err(pvt_data.dev, "shm register failed\n"); 12462306a36Sopenharmony_ci return PTR_ERR(reg_shm); 12562306a36Sopenharmony_ci } 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci inv_arg.func = TA_CMD_UNSEAL; 12862306a36Sopenharmony_ci inv_arg.session = pvt_data.session_id; 12962306a36Sopenharmony_ci inv_arg.num_params = 4; 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; 13262306a36Sopenharmony_ci param[0].u.memref.shm = reg_shm; 13362306a36Sopenharmony_ci param[0].u.memref.size = p->blob_len; 13462306a36Sopenharmony_ci param[0].u.memref.shm_offs = sizeof(p->key); 13562306a36Sopenharmony_ci param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; 13662306a36Sopenharmony_ci param[1].u.memref.shm = reg_shm; 13762306a36Sopenharmony_ci param[1].u.memref.size = sizeof(p->key); 13862306a36Sopenharmony_ci param[1].u.memref.shm_offs = 0; 13962306a36Sopenharmony_ci 14062306a36Sopenharmony_ci ret = tee_client_invoke_func(pvt_data.ctx, &inv_arg, param); 14162306a36Sopenharmony_ci if ((ret < 0) || (inv_arg.ret != 0)) { 14262306a36Sopenharmony_ci dev_err(pvt_data.dev, "TA_CMD_UNSEAL invoke err: %x\n", 14362306a36Sopenharmony_ci inv_arg.ret); 14462306a36Sopenharmony_ci ret = -EFAULT; 14562306a36Sopenharmony_ci } else { 14662306a36Sopenharmony_ci p->key_len = param[1].u.memref.size; 14762306a36Sopenharmony_ci } 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci tee_shm_free(reg_shm); 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci return ret; 15262306a36Sopenharmony_ci} 15362306a36Sopenharmony_ci 15462306a36Sopenharmony_ci/* 15562306a36Sopenharmony_ci * Have the TEE generate random symmetric key 15662306a36Sopenharmony_ci */ 15762306a36Sopenharmony_cistatic int trusted_tee_get_random(unsigned char *key, size_t key_len) 15862306a36Sopenharmony_ci{ 15962306a36Sopenharmony_ci int ret; 16062306a36Sopenharmony_ci struct tee_ioctl_invoke_arg inv_arg; 16162306a36Sopenharmony_ci struct tee_param param[4]; 16262306a36Sopenharmony_ci struct tee_shm *reg_shm = NULL; 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci memset(&inv_arg, 0, sizeof(inv_arg)); 16562306a36Sopenharmony_ci memset(¶m, 0, sizeof(param)); 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci reg_shm = tee_shm_register_kernel_buf(pvt_data.ctx, key, key_len); 16862306a36Sopenharmony_ci if (IS_ERR(reg_shm)) { 16962306a36Sopenharmony_ci dev_err(pvt_data.dev, "key shm register failed\n"); 17062306a36Sopenharmony_ci return PTR_ERR(reg_shm); 17162306a36Sopenharmony_ci } 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_ci inv_arg.func = TA_CMD_GET_RANDOM; 17462306a36Sopenharmony_ci inv_arg.session = pvt_data.session_id; 17562306a36Sopenharmony_ci inv_arg.num_params = 4; 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; 17862306a36Sopenharmony_ci param[0].u.memref.shm = reg_shm; 17962306a36Sopenharmony_ci param[0].u.memref.size = key_len; 18062306a36Sopenharmony_ci param[0].u.memref.shm_offs = 0; 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci ret = tee_client_invoke_func(pvt_data.ctx, &inv_arg, param); 18362306a36Sopenharmony_ci if ((ret < 0) || (inv_arg.ret != 0)) { 18462306a36Sopenharmony_ci dev_err(pvt_data.dev, "TA_CMD_GET_RANDOM invoke err: %x\n", 18562306a36Sopenharmony_ci inv_arg.ret); 18662306a36Sopenharmony_ci ret = -EFAULT; 18762306a36Sopenharmony_ci } else { 18862306a36Sopenharmony_ci ret = param[0].u.memref.size; 18962306a36Sopenharmony_ci } 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci tee_shm_free(reg_shm); 19262306a36Sopenharmony_ci 19362306a36Sopenharmony_ci return ret; 19462306a36Sopenharmony_ci} 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_cistatic int optee_ctx_match(struct tee_ioctl_version_data *ver, const void *data) 19762306a36Sopenharmony_ci{ 19862306a36Sopenharmony_ci if (ver->impl_id == TEE_IMPL_ID_OPTEE && 19962306a36Sopenharmony_ci ver->gen_caps & TEE_GEN_CAP_REG_MEM) 20062306a36Sopenharmony_ci return 1; 20162306a36Sopenharmony_ci else 20262306a36Sopenharmony_ci return 0; 20362306a36Sopenharmony_ci} 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_cistatic int trusted_key_probe(struct device *dev) 20662306a36Sopenharmony_ci{ 20762306a36Sopenharmony_ci struct tee_client_device *rng_device = to_tee_client_device(dev); 20862306a36Sopenharmony_ci int ret; 20962306a36Sopenharmony_ci struct tee_ioctl_open_session_arg sess_arg; 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci memset(&sess_arg, 0, sizeof(sess_arg)); 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ci pvt_data.ctx = tee_client_open_context(NULL, optee_ctx_match, NULL, 21462306a36Sopenharmony_ci NULL); 21562306a36Sopenharmony_ci if (IS_ERR(pvt_data.ctx)) 21662306a36Sopenharmony_ci return -ENODEV; 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci memcpy(sess_arg.uuid, rng_device->id.uuid.b, TEE_IOCTL_UUID_LEN); 21962306a36Sopenharmony_ci sess_arg.clnt_login = TEE_IOCTL_LOGIN_REE_KERNEL; 22062306a36Sopenharmony_ci sess_arg.num_params = 0; 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci ret = tee_client_open_session(pvt_data.ctx, &sess_arg, NULL); 22362306a36Sopenharmony_ci if ((ret < 0) || (sess_arg.ret != 0)) { 22462306a36Sopenharmony_ci dev_err(dev, "tee_client_open_session failed, err: %x\n", 22562306a36Sopenharmony_ci sess_arg.ret); 22662306a36Sopenharmony_ci ret = -EINVAL; 22762306a36Sopenharmony_ci goto out_ctx; 22862306a36Sopenharmony_ci } 22962306a36Sopenharmony_ci pvt_data.session_id = sess_arg.session; 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ci ret = register_key_type(&key_type_trusted); 23262306a36Sopenharmony_ci if (ret < 0) 23362306a36Sopenharmony_ci goto out_sess; 23462306a36Sopenharmony_ci 23562306a36Sopenharmony_ci pvt_data.dev = dev; 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci return 0; 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ciout_sess: 24062306a36Sopenharmony_ci tee_client_close_session(pvt_data.ctx, pvt_data.session_id); 24162306a36Sopenharmony_ciout_ctx: 24262306a36Sopenharmony_ci tee_client_close_context(pvt_data.ctx); 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_ci return ret; 24562306a36Sopenharmony_ci} 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_cistatic int trusted_key_remove(struct device *dev) 24862306a36Sopenharmony_ci{ 24962306a36Sopenharmony_ci unregister_key_type(&key_type_trusted); 25062306a36Sopenharmony_ci tee_client_close_session(pvt_data.ctx, pvt_data.session_id); 25162306a36Sopenharmony_ci tee_client_close_context(pvt_data.ctx); 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci return 0; 25462306a36Sopenharmony_ci} 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_cistatic const struct tee_client_device_id trusted_key_id_table[] = { 25762306a36Sopenharmony_ci {UUID_INIT(0xf04a0fe7, 0x1f5d, 0x4b9b, 25862306a36Sopenharmony_ci 0xab, 0xf7, 0x61, 0x9b, 0x85, 0xb4, 0xce, 0x8c)}, 25962306a36Sopenharmony_ci {} 26062306a36Sopenharmony_ci}; 26162306a36Sopenharmony_ciMODULE_DEVICE_TABLE(tee, trusted_key_id_table); 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_cistatic struct tee_client_driver trusted_key_driver = { 26462306a36Sopenharmony_ci .id_table = trusted_key_id_table, 26562306a36Sopenharmony_ci .driver = { 26662306a36Sopenharmony_ci .name = DRIVER_NAME, 26762306a36Sopenharmony_ci .bus = &tee_bus_type, 26862306a36Sopenharmony_ci .probe = trusted_key_probe, 26962306a36Sopenharmony_ci .remove = trusted_key_remove, 27062306a36Sopenharmony_ci }, 27162306a36Sopenharmony_ci}; 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_cistatic int trusted_tee_init(void) 27462306a36Sopenharmony_ci{ 27562306a36Sopenharmony_ci return driver_register(&trusted_key_driver.driver); 27662306a36Sopenharmony_ci} 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_cistatic void trusted_tee_exit(void) 27962306a36Sopenharmony_ci{ 28062306a36Sopenharmony_ci driver_unregister(&trusted_key_driver.driver); 28162306a36Sopenharmony_ci} 28262306a36Sopenharmony_ci 28362306a36Sopenharmony_cistruct trusted_key_ops trusted_key_tee_ops = { 28462306a36Sopenharmony_ci .migratable = 0, /* non-migratable */ 28562306a36Sopenharmony_ci .init = trusted_tee_init, 28662306a36Sopenharmony_ci .seal = trusted_tee_seal, 28762306a36Sopenharmony_ci .unseal = trusted_tee_unseal, 28862306a36Sopenharmony_ci .get_random = trusted_tee_get_random, 28962306a36Sopenharmony_ci .exit = trusted_tee_exit, 29062306a36Sopenharmony_ci}; 291