bad19e0d04
subsystem as a whole and in OP-TEE in particular. Global Platform TEE specification [1] allows client applications to register part of own memory as a shared buffer between application and TEE. This allows fast zero-copy communication between TEE and REE. But current implementation of TEE in Linux does not support this feature. Also, current implementation of OP-TEE transport uses fixed size pre-shared buffer for all communications with OP-TEE OS. This is okay in the most use cases. But this prevents use of OP-TEE in virtualized environments, because: a) We can't share the same buffer between different virtual machines b) Physically contiguous memory as seen by VM can be non-contiguous in reality (and as seen by OP-TEE OS) due to second stage of MMU translation. c) Size of this pre-shared buffer is limited. So, first part of this pull request adds generic register/unregister interface to tee subsystem. The second part adds necessary features into OP-TEE driver, so it can use not only static pre-shared buffer, but whole RAM to communicate with OP-TEE OS. This change is backwards compatible allowing older secure world or user space to work with newer kernels and vice versa. [1] https://www.globalplatform.org/specificationsdevice.asp -----BEGIN PGP SIGNATURE----- iQI3BAABCgAhBQJaM8X7GhxqZW5zLndpa2xhbmRlckBsaW5hcm8ub3JnAAoJELWw uEGXj+zThYsQAMPsMwvV977gLCnFxSZuIh1qnK5sXabpe4ITVOaUaxyCIoKAcROX exFdo1l+4UrOaEA9o06IROnHczCEz7IvGcPVYCB13tHwyfPsuicrdM0b/hm2Mehx MGYDsm3ZjnUTcZxGMNHYvCunNi84Rt1yOC8Mdx4kPhCI8ZCDqb9pV/Bb5wNLnkXS lXP/+EAkF0ECj88JUhgunkvL96QyK/PROCNUMWansB1RwglvyWy7IS/r03BW9Cpi 4Mtiywmj/KZO9To4LvWhPiX5xvdxe+VxXUD6BW9hVVOxmXGSTEwr9YYr0f7qWH5q HeTLzkOsRQ+uHkaSLZOJ1HkIsP0sYQ7tR6OaipAEMJIN87ktGr45uuxaMnJCV1Z/ tiKkGKJq9VISa7LA0Fv3nLhfYo8/jHiV/dV77FTreHhWimtVl3aiIkon+P/VSA7W Qstkq/v+djZXSmJ+dAcaRdukufWLUB4xhl27isnmaVjToFUHJH36wM9smtgXFygv DL8+5UBgsWPOlpJkIsTD/dwiQK+CeG4/SASgfe5DV7GVh+Z+71E2V40UQ9JoUROa Y33tPFWg07gG3cHAZYugKG2ucf4Yy3GXh5xZnjIq0Ye1U3/TnbK543V1y2N45vx0 xBWJFFh2blKD04QPynBFqKPKNc5d//OgeK3m4PBTYk2GoGIvnc5YxPTq =3iwl -----END PGP SIGNATURE----- Merge tag 'tee-drv-dynamic-shm-for-v4.16' of https://git.linaro.org/people/jens.wiklander/linux-tee into next/drivers Pull "tee dynamic shm for v4.16" from Jens Wiklander: This pull request enables dynamic shared memory support in the TEE subsystem as a whole and in OP-TEE in particular. Global Platform TEE specification [1] allows client applications to register part of own memory as a shared buffer between application and TEE. This allows fast zero-copy communication between TEE and REE. But current implementation of TEE in Linux does not support this feature. Also, current implementation of OP-TEE transport uses fixed size pre-shared buffer for all communications with OP-TEE OS. This is okay in the most use cases. But this prevents use of OP-TEE in virtualized environments, because: a) We can't share the same buffer between different virtual machines b) Physically contiguous memory as seen by VM can be non-contiguous in reality (and as seen by OP-TEE OS) due to second stage of MMU translation. c) Size of this pre-shared buffer is limited. So, first part of this pull request adds generic register/unregister interface to tee subsystem. The second part adds necessary features into OP-TEE driver, so it can use not only static pre-shared buffer, but whole RAM to communicate with OP-TEE OS. This change is backwards compatible allowing older secure world or user space to work with newer kernels and vice versa. [1] https://www.globalplatform.org/specificationsdevice.asp * tag 'tee-drv-dynamic-shm-for-v4.16' of https://git.linaro.org/people/jens.wiklander/linux-tee: tee: shm: inline tee_shm_get_id() tee: use reference counting for tee_context tee: optee: enable dynamic SHM support tee: optee: add optee-specific shared pool implementation tee: optee: store OP-TEE capabilities in private data tee: optee: add registered buffers handling into RPC calls tee: optee: add registered shared parameters handling tee: optee: add shared buffer registration functions tee: optee: add page list manipulation functions tee: optee: Update protocol definitions tee: shm: add page accessor functions tee: shm: add accessors for buffer size and page offset tee: add register user memory tee: flexible shared memory pool creation
198 lines
5.9 KiB
C
198 lines
5.9 KiB
C
/*
|
|
* Copyright (c) 2015, Linaro Limited
|
|
*
|
|
* This software is licensed under the terms of the GNU General Public
|
|
* License version 2, as published by the Free Software Foundation, and
|
|
* may be copied, distributed, and modified under those terms.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
*/
|
|
|
|
#ifndef OPTEE_PRIVATE_H
|
|
#define OPTEE_PRIVATE_H
|
|
|
|
#include <linux/arm-smccc.h>
|
|
#include <linux/semaphore.h>
|
|
#include <linux/tee_drv.h>
|
|
#include <linux/types.h>
|
|
#include "optee_msg.h"
|
|
|
|
#define OPTEE_MAX_ARG_SIZE 1024
|
|
|
|
/* Some Global Platform error codes used in this driver */
|
|
#define TEEC_SUCCESS 0x00000000
|
|
#define TEEC_ERROR_BAD_PARAMETERS 0xFFFF0006
|
|
#define TEEC_ERROR_COMMUNICATION 0xFFFF000E
|
|
#define TEEC_ERROR_OUT_OF_MEMORY 0xFFFF000C
|
|
|
|
#define TEEC_ORIGIN_COMMS 0x00000002
|
|
|
|
typedef void (optee_invoke_fn)(unsigned long, unsigned long, unsigned long,
|
|
unsigned long, unsigned long, unsigned long,
|
|
unsigned long, unsigned long,
|
|
struct arm_smccc_res *);
|
|
|
|
struct optee_call_queue {
|
|
/* Serializes access to this struct */
|
|
struct mutex mutex;
|
|
struct list_head waiters;
|
|
};
|
|
|
|
struct optee_wait_queue {
|
|
/* Serializes access to this struct */
|
|
struct mutex mu;
|
|
struct list_head db;
|
|
};
|
|
|
|
/**
|
|
* struct optee_supp - supplicant synchronization struct
|
|
* @ctx the context of current connected supplicant.
|
|
* if !NULL the supplicant device is available for use,
|
|
* else busy
|
|
* @mutex: held while accessing content of this struct
|
|
* @req_id: current request id if supplicant is doing synchronous
|
|
* communication, else -1
|
|
* @reqs: queued request not yet retrieved by supplicant
|
|
* @idr: IDR holding all requests currently being processed
|
|
* by supplicant
|
|
* @reqs_c: completion used by supplicant when waiting for a
|
|
* request to be queued.
|
|
*/
|
|
struct optee_supp {
|
|
/* Serializes access to this struct */
|
|
struct mutex mutex;
|
|
struct tee_context *ctx;
|
|
|
|
int req_id;
|
|
struct list_head reqs;
|
|
struct idr idr;
|
|
struct completion reqs_c;
|
|
};
|
|
|
|
/**
|
|
* struct optee - main service struct
|
|
* @supp_teedev: supplicant device
|
|
* @teedev: client device
|
|
* @invoke_fn: function to issue smc or hvc
|
|
* @call_queue: queue of threads waiting to call @invoke_fn
|
|
* @wait_queue: queue of threads from secure world waiting for a
|
|
* secure world sync object
|
|
* @supp: supplicant synchronization struct for RPC to supplicant
|
|
* @pool: shared memory pool
|
|
* @memremaped_shm virtual address of memory in shared memory pool
|
|
* @sec_caps: secure world capabilities defined by
|
|
* OPTEE_SMC_SEC_CAP_* in optee_smc.h
|
|
*/
|
|
struct optee {
|
|
struct tee_device *supp_teedev;
|
|
struct tee_device *teedev;
|
|
optee_invoke_fn *invoke_fn;
|
|
struct optee_call_queue call_queue;
|
|
struct optee_wait_queue wait_queue;
|
|
struct optee_supp supp;
|
|
struct tee_shm_pool *pool;
|
|
void *memremaped_shm;
|
|
u32 sec_caps;
|
|
};
|
|
|
|
struct optee_session {
|
|
struct list_head list_node;
|
|
u32 session_id;
|
|
};
|
|
|
|
struct optee_context_data {
|
|
/* Serializes access to this struct */
|
|
struct mutex mutex;
|
|
struct list_head sess_list;
|
|
};
|
|
|
|
struct optee_rpc_param {
|
|
u32 a0;
|
|
u32 a1;
|
|
u32 a2;
|
|
u32 a3;
|
|
u32 a4;
|
|
u32 a5;
|
|
u32 a6;
|
|
u32 a7;
|
|
};
|
|
|
|
/* Holds context that is preserved during one STD call */
|
|
struct optee_call_ctx {
|
|
/* information about pages list used in last allocation */
|
|
void *pages_list;
|
|
size_t num_entries;
|
|
};
|
|
|
|
void optee_handle_rpc(struct tee_context *ctx, struct optee_rpc_param *param,
|
|
struct optee_call_ctx *call_ctx);
|
|
void optee_rpc_finalize_call(struct optee_call_ctx *call_ctx);
|
|
|
|
void optee_wait_queue_init(struct optee_wait_queue *wq);
|
|
void optee_wait_queue_exit(struct optee_wait_queue *wq);
|
|
|
|
u32 optee_supp_thrd_req(struct tee_context *ctx, u32 func, size_t num_params,
|
|
struct tee_param *param);
|
|
|
|
int optee_supp_read(struct tee_context *ctx, void __user *buf, size_t len);
|
|
int optee_supp_write(struct tee_context *ctx, void __user *buf, size_t len);
|
|
void optee_supp_init(struct optee_supp *supp);
|
|
void optee_supp_uninit(struct optee_supp *supp);
|
|
void optee_supp_release(struct optee_supp *supp);
|
|
|
|
int optee_supp_recv(struct tee_context *ctx, u32 *func, u32 *num_params,
|
|
struct tee_param *param);
|
|
int optee_supp_send(struct tee_context *ctx, u32 ret, u32 num_params,
|
|
struct tee_param *param);
|
|
|
|
u32 optee_do_call_with_arg(struct tee_context *ctx, phys_addr_t parg);
|
|
int optee_open_session(struct tee_context *ctx,
|
|
struct tee_ioctl_open_session_arg *arg,
|
|
struct tee_param *param);
|
|
int optee_close_session(struct tee_context *ctx, u32 session);
|
|
int optee_invoke_func(struct tee_context *ctx, struct tee_ioctl_invoke_arg *arg,
|
|
struct tee_param *param);
|
|
int optee_cancel_req(struct tee_context *ctx, u32 cancel_id, u32 session);
|
|
|
|
void optee_enable_shm_cache(struct optee *optee);
|
|
void optee_disable_shm_cache(struct optee *optee);
|
|
|
|
int optee_shm_register(struct tee_context *ctx, struct tee_shm *shm,
|
|
struct page **pages, size_t num_pages);
|
|
int optee_shm_unregister(struct tee_context *ctx, struct tee_shm *shm);
|
|
|
|
int optee_shm_register_supp(struct tee_context *ctx, struct tee_shm *shm,
|
|
struct page **pages, size_t num_pages);
|
|
int optee_shm_unregister_supp(struct tee_context *ctx, struct tee_shm *shm);
|
|
|
|
int optee_from_msg_param(struct tee_param *params, size_t num_params,
|
|
const struct optee_msg_param *msg_params);
|
|
int optee_to_msg_param(struct optee_msg_param *msg_params, size_t num_params,
|
|
const struct tee_param *params);
|
|
|
|
u64 *optee_allocate_pages_list(size_t num_entries);
|
|
void optee_free_pages_list(void *array, size_t num_entries);
|
|
void optee_fill_pages_list(u64 *dst, struct page **pages, int num_pages,
|
|
size_t page_offset);
|
|
|
|
/*
|
|
* Small helpers
|
|
*/
|
|
|
|
static inline void *reg_pair_to_ptr(u32 reg0, u32 reg1)
|
|
{
|
|
return (void *)(unsigned long)(((u64)reg0 << 32) | reg1);
|
|
}
|
|
|
|
static inline void reg_pair_from_64(u32 *reg0, u32 *reg1, u64 val)
|
|
{
|
|
*reg0 = val >> 32;
|
|
*reg1 = val;
|
|
}
|
|
|
|
#endif /*OPTEE_PRIVATE_H*/
|