blob: 924783deb5119cbca3bb6666e0849441e5bba6e6 [file] [log] [blame]
// Copyright 2018 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <inttypes.h>
#include <limits>
#include <string.h>
#include <utility>
#include <ddk/binding.h>
#include <ddk/debug.h>
#include <ddk/device.h>
#include <ddk/io-buffer.h>
#include <fbl/auto_lock.h>
#include <fbl/unique_ptr.h>
#include <lib/fidl-utils/bind.h>
#include <tee-client-api/tee-client-types.h>
#include "optee-client.h"
#include "optee-controller.h"
namespace optee {
constexpr TEEC_UUID kOpteeOsUuid =
{0x486178E0, 0xE7F8, 0x11E3, {0xBC, 0x5E, 0x00, 0x02, 0xA5, 0xD5, 0xC5, 0x1B}};
static bool IsOpteeApi(const tee_smc::TrustedOsCallUidResult& returned_uid) {
return returned_uid.uid_0_3 == kOpteeApiUid_0 &&
returned_uid.uid_4_7 == kOpteeApiUid_1 &&
returned_uid.uid_8_11 == kOpteeApiUid_2 &&
returned_uid.uid_12_15 == kOpteeApiUid_3;
}
static bool IsOpteeApiRevisionSupported(const tee_smc::TrustedOsCallRevisionResult& returned_rev) {
// The cast is unfortunately necessary to mute a compiler warning about an unsigned expression
// always being greater than 0.
ZX_DEBUG_ASSERT(returned_rev.minor <= std::numeric_limits<int32_t>::max());
return returned_rev.major == kOpteeApiRevisionMajor &&
static_cast<int32_t>(returned_rev.minor) >= static_cast<int32_t>(kOpteeApiRevisionMinor);
}
fuchsia_hardware_tee_DeviceConnector_ops_t OpteeController::kFidlOps = {
fidl::Binder<OpteeController>::BindMember<&OpteeController::ConnectDevice>,
};
zx_status_t OpteeController::ValidateApiUid() const {
static const zx_smc_parameters_t kGetApiFuncCall = tee_smc::CreateSmcFunctionCall(
tee_smc::kTrustedOsCallUidFuncId);
union {
zx_smc_result_t raw;
tee_smc::TrustedOsCallUidResult uid;
} result;
zx_status_t status = zx_smc_call(secure_monitor_, &kGetApiFuncCall, &result.raw);
return status == ZX_OK
? IsOpteeApi(result.uid) ? ZX_OK : ZX_ERR_NOT_FOUND
: status;
}
zx_status_t OpteeController::ValidateApiRevision() const {
static const zx_smc_parameters_t kGetApiRevisionFuncCall = tee_smc::CreateSmcFunctionCall(
tee_smc::kTrustedOsCallRevisionFuncId);
union {
zx_smc_result_t raw;
tee_smc::TrustedOsCallRevisionResult revision;
} result;
zx_status_t status = zx_smc_call(secure_monitor_, &kGetApiRevisionFuncCall, &result.raw);
return status == ZX_OK
? IsOpteeApiRevisionSupported(result.revision) ? ZX_OK : ZX_ERR_NOT_SUPPORTED
: status;
}
zx_status_t OpteeController::GetOsRevision() {
static const zx_smc_parameters_t kGetOsRevisionFuncCall = tee_smc::CreateSmcFunctionCall(
kGetOsRevisionFuncId);
union {
zx_smc_result_t raw;
GetOsRevisionResult revision;
} result;
zx_status_t status = zx_smc_call(secure_monitor_, &kGetOsRevisionFuncCall, &result.raw);
if (status != ZX_OK) {
return status;
}
os_revision_.major = result.revision.major;
os_revision_.minor = result.revision.minor;
return ZX_OK;
}
zx_status_t OpteeController::ExchangeCapabilities() {
uint64_t nonsecure_world_capabilities = 0;
if (zx_system_get_num_cpus() == 1) {
nonsecure_world_capabilities |= kNonSecureCapUniprocessor;
}
const zx_smc_parameters_t func_call =
tee_smc::CreateSmcFunctionCall(kExchangeCapabilitiesFuncId, nonsecure_world_capabilities);
union {
zx_smc_result_t raw;
ExchangeCapabilitiesResult response;
} result;
zx_status_t status = zx_smc_call(secure_monitor_, &func_call, &result.raw);
if (status != ZX_OK) {
return status;
}
if (result.response.status != kReturnOk) {
return ZX_ERR_INTERNAL;
}
secure_world_capabilities_ = result.response.secure_world_capabilities;
return ZX_OK;
}
zx_status_t OpteeController::InitializeSharedMemory() {
zx_paddr_t shared_mem_start;
size_t shared_mem_size;
zx_status_t status = DiscoverSharedMemoryConfig(&shared_mem_start, &shared_mem_size);
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to discover shared memory configuration\n");
return status;
}
static constexpr uint32_t kTeeBtiIndex = 0;
zx::bti bti;
status = pdev_get_bti(&pdev_proto_, kTeeBtiIndex, bti.reset_and_get_address());
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to get bti\n");
return status;
}
// The Secure World memory is located at a fixed physical address in RAM, so we have to request
// the platform device map the physical vmo for us.
// TODO(rjascani): This currently maps the entire range of the Secure OS memory because pdev
// doesn't currently have a way of only mapping a portion of it. OP-TEE tells us exactly the
// physical sub range to use.
static constexpr uint32_t kSecureWorldMemoryMmioIndex = 0;
mmio_buffer_t mmio;
status = pdev_map_mmio_buffer(&pdev_proto_, kSecureWorldMemoryMmioIndex,
ZX_CACHE_POLICY_CACHED, &mmio);
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to map secure world memory\n");
return status;
}
status = SharedMemoryManager::Create(shared_mem_start,
shared_mem_size,
ddk::MmioBuffer(mmio),
std::move(bti),
&shared_memory_manager_);
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to initialize SharedMemoryManager\n");
return status;
}
return status;
}
zx_status_t OpteeController::DiscoverSharedMemoryConfig(zx_paddr_t* out_start_addr,
size_t* out_size) {
static const zx_smc_parameters_t func_call = tee_smc::CreateSmcFunctionCall(
kGetSharedMemConfigFuncId);
union {
zx_smc_result_t raw;
GetSharedMemConfigResult response;
} result;
zx_status_t status = zx_smc_call(secure_monitor_, &func_call, &result.raw);
if (status != ZX_OK) {
return status;
}
if (result.response.status != kReturnOk) {
return ZX_ERR_INTERNAL;
}
*out_start_addr = result.response.start;
*out_size = result.response.size;
return status;
}
zx_status_t OpteeController::Bind() {
zx_status_t status = ZX_ERR_INTERNAL;
status = device_get_protocol(parent(), ZX_PROTOCOL_PDEV, &pdev_proto_);
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to get pdev protocol\n");
return status;
}
static constexpr uint32_t kTrustedOsSmcIndex = 0;
status = pdev_get_smc(&pdev_proto_, kTrustedOsSmcIndex, &secure_monitor_);
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to get secure monitor handle\n");
return status;
}
// TODO(MTWN-140): Remove this once we have a tee core driver that will discover the TEE OS
status = ValidateApiUid();
if (status != ZX_OK) {
zxlogf(ERROR, "optee: API UID does not match\n");
return status;
}
status = ValidateApiRevision();
if (status != ZX_OK) {
zxlogf(ERROR, "optee: API revision not supported\n");
return status;
}
status = GetOsRevision();
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Unable to get Trusted OS revision\n");
return status;
}
status = ExchangeCapabilities();
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Could not exchange capabilities\n");
return status;
}
status = InitializeSharedMemory();
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Could not initialize shared memory\n");
return status;
}
status = DdkAdd("optee-tz");
if (status != ZX_OK) {
zxlogf(ERROR, "optee: Failed to add device\n");
return status;
}
return status;
}
zx_status_t OpteeController::DdkMessage(fidl_msg_t* msg, fidl_txn_t* txn) {
return fuchsia_hardware_tee_DeviceConnector_dispatch(this, txn, msg, &kFidlOps);
}
zx_status_t OpteeController::DdkOpen(zx_device_t** out_dev, uint32_t flags) {
// Do not set out_dev because this Controller will handle the FIDL messages
return ZX_OK;
}
void OpteeController::AddClient(OpteeClient* client) {
fbl::AutoLock lock(&clients_lock_);
clients_.push_back(client);
}
void OpteeController::CloseClients() {
fbl::AutoLock lock(&clients_lock_);
for (auto& client : clients_) {
client.MarkForClosing();
}
}
void OpteeController::DdkUnbind() {
CloseClients();
// Unpublish our device node.
DdkRemove();
}
void OpteeController::DdkRelease() {
// devmgr has given up ownership, so we must clean ourself up.
delete this;
}
zx_status_t OpteeController::ConnectDevice(zx_handle_t service_provider,
zx_handle_t device_request) {
// Create managed versions of the channels
zx::channel service_provider_channel(service_provider);
zx::channel device_request_channel(device_request);
ZX_DEBUG_ASSERT(device_request_channel.is_valid());
// Create a new OpteeClient device and hand off client communication to it.
auto client = std::make_unique<OpteeClient>(this, std::move(service_provider_channel));
// Add child client device and have it immediately start serving device_request
//
// What we really want here is named parameter passing to pass client_remote
zx_status_t status = client->DdkAdd("optee-client", // name
DEVICE_ADD_INSTANCE, // flags
nullptr, // props
0, // prop_count
0, // proto_id
nullptr, // proxy_args
device_request_channel.release() // client_remote
);
if (status != ZX_OK) {
return status;
}
// devmgr is now in charge of the memory for the tee client
OpteeClient* client_ptr = client.release();
AddClient(client_ptr);
return ZX_OK;
}
zx_status_t OpteeController::GetOsInfo(fidl_txn_t* txn) const {
fuchsia_tee_OsInfo os_info;
::memset(&os_info, 0, sizeof(os_info));
os_info.uuid.time_low = kOpteeOsUuid.timeLow;
os_info.uuid.time_mid = kOpteeOsUuid.timeMid;
os_info.uuid.time_hi_and_version = kOpteeOsUuid.timeHiAndVersion;
::memcpy(os_info.uuid.clock_seq_and_node,
kOpteeOsUuid.clockSeqAndNode,
sizeof(os_info.uuid.clock_seq_and_node));
os_info.revision = os_revision_;
os_info.is_global_platform_compliant = true;
return fuchsia_tee_DeviceGetOsInfo_reply(txn, &os_info);
}
void OpteeController::RemoveClient(OpteeClient* client) {
fbl::AutoLock lock(&clients_lock_);
ZX_DEBUG_ASSERT(client != nullptr);
if (client->InContainer()) {
clients_.erase(*client);
}
}
uint32_t OpteeController::CallWithMessage(const optee::Message& message,
RpcHandler rpc_handler) {
uint32_t return_value = tee_smc::kSmc32ReturnUnknownFunction;
union {
zx_smc_parameters_t params;
RpcFunctionResult rpc_result;
} func_call;
func_call.params = tee_smc::CreateSmcFunctionCall(
optee::kCallWithArgFuncId,
static_cast<uint32_t>(message.paddr() >> 32),
static_cast<uint32_t>(message.paddr()));
while (true) {
union {
zx_smc_result_t raw;
CallWithArgResult response;
RpcFunctionArgs rpc_args;
} result;
zx_status_t status = zx_smc_call(secure_monitor_, &func_call.params, &result.raw);
if (status != ZX_OK) {
zxlogf(ERROR, "optee: unable to invoke SMC\n");
return return_value;
}
if (result.response.status == kReturnEThreadLimit) {
// TODO(rjascani): This should actually block until a thread is available. For now,
// just quit.
zxlogf(ERROR, "optee: hit thread limit, need to fix this\n");
break;
} else if (optee::IsReturnRpc(result.response.status)) {
rpc_handler(result.rpc_args, &func_call.rpc_result);
} else {
return_value = result.response.status;
break;
}
}
return return_value;
}
} // namespace optee
extern "C" zx_status_t optee_bind(void* ctx, zx_device_t* parent) {
fbl::AllocChecker ac;
auto tee = fbl::make_unique_checked<::optee::OpteeController>(&ac, parent);
if (!ac.check()) {
return ZX_ERR_NO_MEMORY;
}
auto status = tee->Bind();
if (status == ZX_OK) {
// devmgr is now in charge of the memory for tee
__UNUSED auto ptr = tee.release();
}
return status;
}