sandbox.c 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308
  1. // SPDX-License-Identifier: GPL-2.0+
  2. /*
  3. * Copyright (C) 2018 Linaro Limited
  4. */
  5. #include <common.h>
  6. #include <dm.h>
  7. #include <sandboxtee.h>
  8. #include <tee.h>
  9. #include <tee/optee_ta_avb.h>
  10. /*
  11. * The sandbox tee driver tries to emulate a generic Trusted Exectution
  12. * Environment (TEE) with the Trusted Application (TA) OPTEE_TA_AVB
  13. * available.
  14. */
  15. /**
  16. * struct ta_entry - TA entries
  17. * @uuid: UUID of an emulated TA
  18. * @open_session Called when a session is openened to the TA
  19. * @invoke_func Called when a function in the TA is to be invoked
  20. *
  21. * This struct is used to register TAs in this sandbox emulation of a TEE.
  22. */
  23. struct ta_entry {
  24. struct tee_optee_ta_uuid uuid;
  25. u32 (*open_session)(uint num_params, struct tee_param *params);
  26. u32 (*invoke_func)(u32 func, uint num_params, struct tee_param *params);
  27. };
  28. #ifdef CONFIG_OPTEE_TA_AVB
  29. static u32 get_attr(uint n, uint num_params, struct tee_param *params)
  30. {
  31. if (n >= num_params)
  32. return TEE_PARAM_ATTR_TYPE_NONE;
  33. return params[n].attr;
  34. }
  35. static u32 check_params(u8 p0, u8 p1, u8 p2, u8 p3, uint num_params,
  36. struct tee_param *params)
  37. {
  38. u8 p[] = { p0, p1, p2, p3};
  39. uint n;
  40. for (n = 0; n < ARRAY_SIZE(p); n++)
  41. if (p[n] != get_attr(n, num_params, params))
  42. goto bad_params;
  43. for (; n < num_params; n++)
  44. if (get_attr(n, num_params, params))
  45. goto bad_params;
  46. return TEE_SUCCESS;
  47. bad_params:
  48. printf("Bad param attrs\n");
  49. return TEE_ERROR_BAD_PARAMETERS;
  50. }
  51. static u64 ta_avb_rollback_indexes[TA_AVB_MAX_ROLLBACK_LOCATIONS];
  52. static u32 ta_avb_lock_state;
  53. static u32 ta_avb_open_session(uint num_params, struct tee_param *params)
  54. {
  55. /*
  56. * We don't expect additional parameters when opening a session to
  57. * this TA.
  58. */
  59. return check_params(TEE_PARAM_ATTR_TYPE_NONE, TEE_PARAM_ATTR_TYPE_NONE,
  60. TEE_PARAM_ATTR_TYPE_NONE, TEE_PARAM_ATTR_TYPE_NONE,
  61. num_params, params);
  62. }
  63. static u32 ta_avb_invoke_func(u32 func, uint num_params,
  64. struct tee_param *params)
  65. {
  66. u32 res;
  67. uint slot;
  68. u64 val;
  69. switch (func) {
  70. case TA_AVB_CMD_READ_ROLLBACK_INDEX:
  71. res = check_params(TEE_PARAM_ATTR_TYPE_VALUE_INPUT,
  72. TEE_PARAM_ATTR_TYPE_VALUE_OUTPUT,
  73. TEE_PARAM_ATTR_TYPE_NONE,
  74. TEE_PARAM_ATTR_TYPE_NONE,
  75. num_params, params);
  76. if (res)
  77. return res;
  78. slot = params[0].u.value.a;
  79. if (slot >= ARRAY_SIZE(ta_avb_rollback_indexes)) {
  80. printf("Rollback index slot out of bounds %u\n", slot);
  81. return TEE_ERROR_BAD_PARAMETERS;
  82. }
  83. val = ta_avb_rollback_indexes[slot];
  84. params[1].u.value.a = val >> 32;
  85. params[1].u.value.b = val;
  86. return TEE_SUCCESS;
  87. case TA_AVB_CMD_WRITE_ROLLBACK_INDEX:
  88. res = check_params(TEE_PARAM_ATTR_TYPE_VALUE_INPUT,
  89. TEE_PARAM_ATTR_TYPE_VALUE_INPUT,
  90. TEE_PARAM_ATTR_TYPE_NONE,
  91. TEE_PARAM_ATTR_TYPE_NONE,
  92. num_params, params);
  93. if (res)
  94. return res;
  95. slot = params[0].u.value.a;
  96. if (slot >= ARRAY_SIZE(ta_avb_rollback_indexes)) {
  97. printf("Rollback index slot out of bounds %u\n", slot);
  98. return TEE_ERROR_BAD_PARAMETERS;
  99. }
  100. val = (u64)params[1].u.value.a << 32 | params[1].u.value.b;
  101. if (val < ta_avb_rollback_indexes[slot])
  102. return TEE_ERROR_SECURITY;
  103. ta_avb_rollback_indexes[slot] = val;
  104. return TEE_SUCCESS;
  105. case TA_AVB_CMD_READ_LOCK_STATE:
  106. res = check_params(TEE_PARAM_ATTR_TYPE_VALUE_OUTPUT,
  107. TEE_PARAM_ATTR_TYPE_NONE,
  108. TEE_PARAM_ATTR_TYPE_NONE,
  109. TEE_PARAM_ATTR_TYPE_NONE,
  110. num_params, params);
  111. if (res)
  112. return res;
  113. params[0].u.value.a = ta_avb_lock_state;
  114. return TEE_SUCCESS;
  115. case TA_AVB_CMD_WRITE_LOCK_STATE:
  116. res = check_params(TEE_PARAM_ATTR_TYPE_VALUE_INPUT,
  117. TEE_PARAM_ATTR_TYPE_NONE,
  118. TEE_PARAM_ATTR_TYPE_NONE,
  119. TEE_PARAM_ATTR_TYPE_NONE,
  120. num_params, params);
  121. if (res)
  122. return res;
  123. if (ta_avb_lock_state != params[0].u.value.a) {
  124. ta_avb_lock_state = params[0].u.value.a;
  125. memset(ta_avb_rollback_indexes, 0,
  126. sizeof(ta_avb_rollback_indexes));
  127. }
  128. return TEE_SUCCESS;
  129. default:
  130. return TEE_ERROR_NOT_SUPPORTED;
  131. }
  132. }
  133. #endif /*OPTEE_TA_AVB*/
  134. static const struct ta_entry ta_entries[] = {
  135. #ifdef CONFIG_OPTEE_TA_AVB
  136. { .uuid = TA_AVB_UUID,
  137. .open_session = ta_avb_open_session,
  138. .invoke_func = ta_avb_invoke_func,
  139. },
  140. #endif
  141. };
  142. static void sandbox_tee_get_version(struct udevice *dev,
  143. struct tee_version_data *vers)
  144. {
  145. struct tee_version_data v = {
  146. .gen_caps = TEE_GEN_CAP_GP | TEE_GEN_CAP_REG_MEM,
  147. };
  148. *vers = v;
  149. }
  150. static int sandbox_tee_close_session(struct udevice *dev, u32 session)
  151. {
  152. struct sandbox_tee_state *state = dev_get_priv(dev);
  153. if (!state->ta || state->session != session)
  154. return -EINVAL;
  155. state->session = 0;
  156. state->ta = NULL;
  157. return 0;
  158. }
  159. static const struct ta_entry *find_ta_entry(u8 uuid[TEE_UUID_LEN])
  160. {
  161. struct tee_optee_ta_uuid u;
  162. uint n;
  163. tee_optee_ta_uuid_from_octets(&u, uuid);
  164. for (n = 0; n < ARRAY_SIZE(ta_entries); n++)
  165. if (!memcmp(&u, &ta_entries[n].uuid, sizeof(u)))
  166. return ta_entries + n;
  167. return NULL;
  168. }
  169. static int sandbox_tee_open_session(struct udevice *dev,
  170. struct tee_open_session_arg *arg,
  171. uint num_params, struct tee_param *params)
  172. {
  173. struct sandbox_tee_state *state = dev_get_priv(dev);
  174. const struct ta_entry *ta;
  175. if (state->ta) {
  176. printf("A session is already open\n");
  177. return -EBUSY;
  178. }
  179. ta = find_ta_entry(arg->uuid);
  180. if (!ta) {
  181. printf("Cannot find TA\n");
  182. arg->ret = TEE_ERROR_ITEM_NOT_FOUND;
  183. arg->ret_origin = TEE_ORIGIN_TEE;
  184. return 0;
  185. }
  186. arg->ret = ta->open_session(num_params, params);
  187. arg->ret_origin = TEE_ORIGIN_TRUSTED_APP;
  188. if (!arg->ret) {
  189. state->ta = (void *)ta;
  190. state->session = 1;
  191. arg->session = state->session;
  192. } else {
  193. printf("Cannot open session, TA returns error\n");
  194. }
  195. return 0;
  196. }
  197. static int sandbox_tee_invoke_func(struct udevice *dev,
  198. struct tee_invoke_arg *arg,
  199. uint num_params, struct tee_param *params)
  200. {
  201. struct sandbox_tee_state *state = dev_get_priv(dev);
  202. struct ta_entry *ta = state->ta;
  203. if (!arg->session) {
  204. printf("Missing session\n");
  205. return -EINVAL;
  206. }
  207. if (!ta) {
  208. printf("TA session not available\n");
  209. return -EINVAL;
  210. }
  211. if (arg->session != state->session) {
  212. printf("Session mismatch\n");
  213. return -EINVAL;
  214. }
  215. arg->ret = ta->invoke_func(arg->func, num_params, params);
  216. arg->ret_origin = TEE_ORIGIN_TRUSTED_APP;
  217. return 0;
  218. }
  219. static int sandbox_tee_shm_register(struct udevice *dev, struct tee_shm *shm)
  220. {
  221. struct sandbox_tee_state *state = dev_get_priv(dev);
  222. state->num_shms++;
  223. return 0;
  224. }
  225. static int sandbox_tee_shm_unregister(struct udevice *dev, struct tee_shm *shm)
  226. {
  227. struct sandbox_tee_state *state = dev_get_priv(dev);
  228. state->num_shms--;
  229. return 0;
  230. }
  231. static const struct tee_driver_ops sandbox_tee_ops = {
  232. .get_version = sandbox_tee_get_version,
  233. .open_session = sandbox_tee_open_session,
  234. .close_session = sandbox_tee_close_session,
  235. .invoke_func = sandbox_tee_invoke_func,
  236. .shm_register = sandbox_tee_shm_register,
  237. .shm_unregister = sandbox_tee_shm_unregister,
  238. };
  239. static const struct udevice_id sandbox_tee_match[] = {
  240. { .compatible = "sandbox,tee" },
  241. {},
  242. };
  243. U_BOOT_DRIVER(sandbox_tee) = {
  244. .name = "sandbox_tee",
  245. .id = UCLASS_TEE,
  246. .of_match = sandbox_tee_match,
  247. .ops = &sandbox_tee_ops,
  248. .priv_auto_alloc_size = sizeof(struct sandbox_tee_state),
  249. };