qseecom.c 264 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952895389548955895689578958895989608961896289638964896589668967896889698970897189728973897489758976897789788979898089818982898389848985898689878988898989908991899289938994899589968997899889999000900190029003900490059006900790089009901090119012901390149015901690179018901990209021902290239024902590269027902890299030903190329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790989099910091019102910391049105910691079108910991109111911291139114911591169117911891199120912191229123912491259126912791289129913091319132913391349135913691379138913991409141914291439144914591469147914891499150915191529153915491559156915791589159916091619162916391649165916691679168916991709171917291739174917591769177917891799180918191829183918491859186918791889189919091919192919391949195919691979198919992009201920292039204920592069207920892099210921192129213921492159216921792189219922092219222922392249225922692279228922992309231923292339234923592369237923892399240924192429243924492459246924792489249925092519252925392549255925692579258925992609261926292639264926592669267926892699270927192729273927492759276927792789279928092819282928392849285928692879288928992909291929292939294929592969297929892999300930193029303930493059306930793089309931093119312931393149315931693179318931993209321932293239324932593269327932893299330933193329333933493359336933793389339934093419342934393449345934693479348934993509351935293539354935593569357935893599360936193629363936493659366936793689369937093719372937393749375937693779378937993809381938293839384938593869387938893899390939193929393939493959396939793989399940094019402940394049405940694079408940994109411941294139414941594169417941894199420942194229423942494259426942794289429943094319432943394349435943694379438943994409441944294439444944594469447944894499450945194529453945494559456945794589459946094619462946394649465946694679468946994709471947294739474947594769477947894799480948194829483948494859486948794889489949094919492949394949495949694979498949995009501950295039504950595069507950895099510951195129513951495159516951795189519952095219522952395249525952695279528952995309531953295339534953595369537953895399540954195429543954495459546954795489549955095519552955395549555955695579558955995609561956295639564956595669567956895699570957195729573957495759576957795789579958095819582958395849585958695879588958995909591959295939594959595969597959895999600960196029603960496059606960796089609961096119612961396149615961696179618961996209621962296239624962596269627962896299630963196329633963496359636963796389639964096419642964396449645964696479648964996509651965296539654965596569657965896599660966196629663966496659666966796689669967096719672967396749675967696779678967996809681968296839684968596869687968896899690969196929693969496959696969796989699970097019702970397049705970697079708970997109711971297139714971597169717971897199720972197229723972497259726972797289729973097319732973397349735973697379738973997409741974297439744974597469747974897499750975197529753975497559756975797589759976097619762976397649765976697679768976997709771977297739774977597769777977897799780978197829783978497859786978797889789
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * QTI Secure Execution Environment Communicator (QSEECOM) driver
  4. *
  5. * Copyright (c) 2012-2021, The Linux Foundation. All rights reserved.
  6. * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved.
  7. */
  8. #define pr_fmt(fmt) "QSEECOM: %s: " fmt, __func__
  9. #include <linux/kernel.h>
  10. #include <linux/slab.h>
  11. #include <linux/module.h>
  12. #include <linux/fs.h>
  13. #include <linux/platform_device.h>
  14. #include <linux/debugfs.h>
  15. #include <linux/cdev.h>
  16. #include <linux/uaccess.h>
  17. #include <linux/sched.h>
  18. #include <linux/list.h>
  19. #include <linux/mutex.h>
  20. #include <linux/io.h>
  21. #include <linux/dma-buf.h>
  22. #include <linux/ion.h>
  23. #include <linux/msm_ion.h>
  24. #include <linux/types.h>
  25. #include <linux/clk.h>
  26. #include <linux/elf.h>
  27. #include <linux/firmware.h>
  28. #include <linux/freezer.h>
  29. #include <linux/scatterlist.h>
  30. #include <linux/regulator/consumer.h>
  31. #include <linux/dma-mapping.h>
  32. #include <soc/qcom/qseecom_scm.h>
  33. #include <asm/cacheflush.h>
  34. #include <linux/delay.h>
  35. #include <linux/signal.h>
  36. #include <linux/compat.h>
  37. #include <linux/kthread.h>
  38. #include <linux/dma-map-ops.h>
  39. #include <linux/cma.h>
  40. #include <linux/of_platform.h>
  41. #include <linux/interconnect.h>
  42. #include <linux/of_reserved_mem.h>
  43. #include <linux/qtee_shmbridge.h>
  44. #include <linux/mem-buf.h>
  45. #include <linux/version.h>
  46. #include "linux/qseecom_api.h"
  47. #include "ice.h"
  48. #if IS_ENABLED(CONFIG_QSEECOM_PROXY)
  49. #include <linux/qseecom_kernel.h>
  50. #include "misc/qseecom_priv.h"
  51. #else
  52. #include "misc/qseecom_kernel.h"
  53. #endif
  54. #include "misc/qseecomi.h"
  55. #if (LINUX_VERSION_CODE <= KERNEL_VERSION(6,0,0))
  56. #define KERNEL_VERSION_LEGACY
  57. #endif
  58. #define QSEECOM_DEV "qseecom"
  59. #define QSEOS_VERSION_14 0x14
  60. #define QSEEE_VERSION_00 0x400000
  61. #define QSEE_VERSION_01 0x401000
  62. #define QSEE_VERSION_02 0x402000
  63. #define QSEE_VERSION_03 0x403000
  64. #define QSEE_VERSION_04 0x404000
  65. #define QSEE_VERSION_05 0x405000
  66. #define QSEE_VERSION_20 0x800000
  67. #define QSEE_VERSION_40 0x1000000 /* TZ.BF.4.0 */
  68. #define QSEE_CE_CLK_100MHZ 100000000
  69. #define CE_CLK_DIV 1000000
  70. #define QSEECOM_MAX_SG_ENTRY 4096
  71. #define QSEECOM_SG_ENTRY_MSG_BUF_SZ_64BIT \
  72. (QSEECOM_MAX_SG_ENTRY * SG_ENTRY_SZ_64BIT)
  73. #define QSEECOM_INVALID_KEY_ID 0xff
  74. /* Save partition image hash for authentication check */
  75. #define SCM_SAVE_PARTITION_HASH_ID 0x01
  76. /* Check if enterprise security is activate */
  77. #define SCM_IS_ACTIVATED_ID 0x02
  78. /* Encrypt/Decrypt Data Integrity Partition (DIP) for MDTP */
  79. #define SCM_MDTP_CIPHER_DIP 0x01
  80. /* Maximum Allowed Size (128K) of Data Integrity Partition (DIP) for MDTP */
  81. #define MAX_DIP 0x20000
  82. #define RPMB_SERVICE 0x2000
  83. #define SSD_SERVICE 0x3000
  84. #define QSEECOM_SEND_CMD_CRYPTO_TIMEOUT 2000
  85. #define QSEECOM_LOAD_APP_CRYPTO_TIMEOUT 2000
  86. #define TWO 2
  87. #define QSEECOM_UFS_ICE_CE_NUM 10
  88. #define QSEECOM_SDCC_ICE_CE_NUM 20
  89. #define QSEECOM_ICE_FDE_KEY_INDEX 0
  90. #define PHY_ADDR_4G (1ULL<<32)
  91. #define QSEECOM_STATE_NOT_READY 0
  92. #define QSEECOM_STATE_SUSPEND 1
  93. #define QSEECOM_STATE_READY 2
  94. #define QSEECOM_ICE_FDE_KEY_SIZE_MASK 2
  95. /*
  96. * default ce info unit to 0 for
  97. * services which
  98. * support only single instance.
  99. * Most of services are in this category.
  100. */
  101. #define DEFAULT_CE_INFO_UNIT 0
  102. #define DEFAULT_NUM_CE_INFO_UNIT 1
  103. #define FDE_FLAG_POS 4
  104. #define ENABLE_KEY_WRAP_IN_KS (1 << FDE_FLAG_POS)
  105. /*
  106. * sg list buf format version
  107. * 1: Legacy format to support only 512 SG list entries
  108. * 2: new format to support > 512 entries
  109. */
  110. #define QSEECOM_SG_LIST_BUF_FORMAT_VERSION_1 1
  111. #define QSEECOM_SG_LIST_BUF_FORMAT_VERSION_2 2
  112. struct qseecom_sg_list_buf_hdr_64bit {
  113. struct qseecom_sg_entry_64bit blank_entry; /* must be all 0 */
  114. __u32 version; /* sg list buf format version */
  115. __u64 new_buf_phys_addr; /* PA of new buffer */
  116. __u32 nents_total; /* Total number of SG entries */
  117. } __packed;
  118. #define QSEECOM_SG_LIST_BUF_HDR_SZ_64BIT \
  119. sizeof(struct qseecom_sg_list_buf_hdr_64bit)
  120. #define MAX_CE_PIPE_PAIR_PER_UNIT 3
  121. #define INVALID_CE_INFO_UNIT_NUM 0xffffffff
  122. #define CE_PIPE_PAIR_USE_TYPE_FDE 0
  123. #define CE_PIPE_PAIR_USE_TYPE_PFE 1
  124. #define SG_ENTRY_SZ sizeof(struct qseecom_sg_entry)
  125. #define SG_ENTRY_SZ_64BIT sizeof(struct qseecom_sg_entry_64bit)
  126. enum qseecom_bandwidth_request_mode {
  127. INACTIVE = 0,
  128. LOW,
  129. MEDIUM,
  130. HIGH,
  131. };
  132. enum qseecom_clk_definitions {
  133. CLK_DFAB = 0,
  134. CLK_SFPB,
  135. };
  136. enum qseecom_ice_key_size_type {
  137. QSEECOM_ICE_FDE_KEY_SIZE_16_BYTE =
  138. (0 << QSEECOM_ICE_FDE_KEY_SIZE_MASK),
  139. QSEECOM_ICE_FDE_KEY_SIZE_32_BYTE =
  140. (1 << QSEECOM_ICE_FDE_KEY_SIZE_MASK),
  141. QSEE_ICE_FDE_KEY_SIZE_UNDEFINED =
  142. (0xF << QSEECOM_ICE_FDE_KEY_SIZE_MASK),
  143. };
  144. enum qseecom_client_handle_type {
  145. QSEECOM_CLIENT_APP = 1,
  146. QSEECOM_LISTENER_SERVICE,
  147. QSEECOM_SECURE_SERVICE,
  148. QSEECOM_GENERIC,
  149. QSEECOM_UNAVAILABLE_CLIENT_APP,
  150. };
  151. enum qseecom_ce_hw_instance {
  152. CLK_QSEE = 0,
  153. CLK_CE_DRV,
  154. CLK_INVALID,
  155. };
  156. enum qseecom_cache_ops {
  157. QSEECOM_CACHE_CLEAN,
  158. QSEECOM_CACHE_INVALIDATE,
  159. };
  160. enum qseecom_listener_unregister_kthread_state {
  161. LSNR_UNREG_KT_SLEEP = 0,
  162. LSNR_UNREG_KT_WAKEUP,
  163. };
  164. enum qseecom_unload_app_kthread_state {
  165. UNLOAD_APP_KT_SLEEP = 0,
  166. UNLOAD_APP_KT_WAKEUP,
  167. };
  168. static DEFINE_MUTEX(qsee_bw_mutex);
  169. static DEFINE_MUTEX(app_access_lock);
  170. static DEFINE_MUTEX(clk_access_lock);
  171. static DEFINE_MUTEX(listener_access_lock);
  172. static DEFINE_MUTEX(unload_app_pending_list_lock);
  173. struct sglist_info {
  174. uint32_t indexAndFlags;
  175. uint32_t sizeOrCount;
  176. };
  177. /*
  178. * The 31st bit indicates only one or multiple physical address inside
  179. * the request buffer. If it is set, the index locates a single physical addr
  180. * inside the request buffer, and `sizeOrCount` is the size of the memory being
  181. * shared at that physical address.
  182. * Otherwise, the index locates an array of {start, len} pairs (a
  183. * "scatter/gather list"), and `sizeOrCount` gives the number of entries in
  184. * that array.
  185. *
  186. * The 30th bit indicates 64 or 32bit address; when it is set, physical addr
  187. * and scatter gather entry sizes are 64-bit values. Otherwise, 32-bit values.
  188. *
  189. * The bits [0:29] of `indexAndFlags` hold an offset into the request buffer.
  190. */
  191. #define SGLISTINFO_SET_INDEX_FLAG(c, s, i) \
  192. ((uint32_t)(((c & 1) << 31) | ((s & 1) << 30) | (i & 0x3fffffff)))
  193. #define SGLISTINFO_TABLE_SIZE (sizeof(struct sglist_info) * MAX_ION_FD)
  194. #define FEATURE_ID_WHITELIST 15 /*whitelist feature id*/
  195. #define MAKE_WHITELIST_VERSION(major, minor, patch) \
  196. (((major & 0x3FF) << 22) | ((minor & 0x3FF) << 12) | (patch & 0xFFF))
  197. #define MAKE_NULL(sgt, attach, dmabuf) do {\
  198. sgt = NULL;\
  199. attach = NULL;\
  200. dmabuf = NULL;\
  201. } while (0)
  202. struct qseecom_registered_listener_list {
  203. struct list_head list;
  204. struct qseecom_register_listener_req svc;
  205. void *user_virt_sb_base;
  206. struct dma_buf *dmabuf;
  207. struct dma_buf_attachment *attach;
  208. struct sg_table *sgt;
  209. u8 *sb_virt;
  210. phys_addr_t sb_phys;
  211. size_t sb_length;
  212. wait_queue_head_t rcv_req_wq;
  213. /* rcv_req_flag: 0: ready and empty; 1: received req */
  214. int rcv_req_flag;
  215. int send_resp_flag;
  216. bool listener_in_use;
  217. /* wq for thread blocked on this listener*/
  218. wait_queue_head_t listener_block_app_wq;
  219. struct sglist_info *sglistinfo_ptr;
  220. struct qtee_shm sglistinfo_shm;
  221. uint32_t sglist_cnt;
  222. int abort;
  223. bool unregister_pending;
  224. };
  225. struct qseecom_unregister_pending_list {
  226. struct list_head list;
  227. struct qseecom_dev_handle *data;
  228. };
  229. struct qseecom_registered_app_list {
  230. struct list_head list;
  231. u32 app_id;
  232. u32 ref_cnt;
  233. char app_name[MAX_APP_NAME_SIZE];
  234. u32 app_arch;
  235. bool app_blocked;
  236. u32 check_block;
  237. u32 blocked_on_listener_id;
  238. };
  239. struct qseecom_registered_kclient_list {
  240. struct list_head list;
  241. struct qseecom_handle *handle;
  242. };
  243. struct qseecom_ce_info_use {
  244. unsigned char handle[MAX_CE_INFO_HANDLE_SIZE];
  245. unsigned int unit_num;
  246. unsigned int num_ce_pipe_entries;
  247. struct qseecom_ce_pipe_entry *ce_pipe_entry;
  248. bool alloc;
  249. uint32_t type;
  250. };
  251. struct ce_hw_usage_info {
  252. uint32_t qsee_ce_hw_instance;
  253. uint32_t num_fde;
  254. struct qseecom_ce_info_use *fde;
  255. uint32_t num_pfe;
  256. struct qseecom_ce_info_use *pfe;
  257. };
  258. struct qseecom_clk {
  259. enum qseecom_ce_hw_instance instance;
  260. struct clk *ce_core_clk;
  261. struct clk *ce_clk;
  262. struct clk *ce_core_src_clk;
  263. struct clk *ce_bus_clk;
  264. uint32_t clk_access_cnt;
  265. };
  266. struct qseecom_control {
  267. struct list_head registered_listener_list_head;
  268. struct list_head registered_app_list_head;
  269. spinlock_t registered_app_list_lock;
  270. struct list_head registered_kclient_list_head;
  271. spinlock_t registered_kclient_list_lock;
  272. wait_queue_head_t send_resp_wq;
  273. int send_resp_flag;
  274. uint32_t qseos_version;
  275. uint32_t qsee_version;
  276. struct device *pdev; /* class_dev */
  277. struct device *dev; /* platform_dev->dev */
  278. struct class *driver_class;
  279. dev_t qseecom_device_no;
  280. bool whitelist_support;
  281. bool commonlib_loaded;
  282. bool commonlib64_loaded;
  283. struct ce_hw_usage_info ce_info;
  284. int qsee_bw_count;
  285. int qsee_sfpb_bw_count;
  286. uint32_t qsee_perf_client;
  287. struct icc_path *icc_path;
  288. uint32_t avg_bw;
  289. uint32_t peak_bw;
  290. struct qseecom_clk qsee;
  291. struct qseecom_clk ce_drv;
  292. bool support_bus_scaling;
  293. bool support_fde;
  294. bool support_pfe;
  295. bool fde_key_size;
  296. uint32_t cumulative_mode;
  297. enum qseecom_bandwidth_request_mode current_mode;
  298. struct timer_list bw_scale_down_timer;
  299. struct work_struct bw_inactive_req_ws;
  300. struct cdev cdev;
  301. bool timer_running;
  302. bool no_clock_support;
  303. unsigned int ce_opp_freq_hz;
  304. bool appsbl_qseecom_support;
  305. uint32_t qsee_reentrancy_support;
  306. bool enable_key_wrap_in_ks;
  307. uint32_t app_block_ref_cnt;
  308. wait_queue_head_t app_block_wq;
  309. atomic_t qseecom_state;
  310. int is_apps_region_protected;
  311. bool smcinvoke_support;
  312. uint64_t qseecom_bridge_handle;
  313. uint64_t ta_bridge_handle;
  314. uint64_t user_contig_bridge_handle;
  315. struct list_head unregister_lsnr_pending_list_head;
  316. wait_queue_head_t register_lsnr_pending_wq;
  317. struct task_struct *unregister_lsnr_kthread_task;
  318. wait_queue_head_t unregister_lsnr_kthread_wq;
  319. atomic_t unregister_lsnr_kthread_state;
  320. struct list_head unload_app_pending_list_head;
  321. struct task_struct *unload_app_kthread_task;
  322. wait_queue_head_t unload_app_kthread_wq;
  323. atomic_t unload_app_kthread_state;
  324. bool no_user_contig_mem_support;
  325. };
  326. struct qseecom_unload_app_pending_list {
  327. struct list_head list;
  328. struct qseecom_dev_handle *data;
  329. };
  330. struct qseecom_sec_buf_fd_info {
  331. bool is_sec_buf_fd;
  332. size_t size;
  333. void *vbase;
  334. phys_addr_t pbase;
  335. struct qtee_shm shm;
  336. };
  337. struct qseecom_param_memref {
  338. uint32_t buffer;
  339. uint32_t size;
  340. };
  341. struct qseecom_client_handle {
  342. u32 app_id;
  343. struct dma_buf *dmabuf;
  344. struct dma_buf_attachment *attach;
  345. struct sg_table *sgt;
  346. u8 *sb_virt;
  347. phys_addr_t sb_phys;
  348. size_t sb_length;
  349. unsigned long user_virt_sb_base;
  350. char app_name[MAX_APP_NAME_SIZE];
  351. u32 app_arch;
  352. struct qseecom_sec_buf_fd_info sec_buf_fd[MAX_ION_FD];
  353. bool from_smcinvoke;
  354. struct qtee_shm shm; /* kernel client's shm for req/rsp buf */
  355. bool unload_pending;
  356. bool from_loadapp;
  357. };
  358. struct qseecom_listener_handle {
  359. u32 id;
  360. bool unregister_pending;
  361. bool release_called;
  362. };
  363. static struct qseecom_control qseecom;
  364. struct qseecom_dev_handle {
  365. enum qseecom_client_handle_type type;
  366. union {
  367. struct qseecom_client_handle client;
  368. struct qseecom_listener_handle listener;
  369. };
  370. bool released;
  371. int abort;
  372. wait_queue_head_t abort_wq;
  373. atomic_t ioctl_count;
  374. bool perf_enabled;
  375. bool fast_load_enabled;
  376. enum qseecom_bandwidth_request_mode mode;
  377. struct sglist_info *sglistinfo_ptr;
  378. struct qtee_shm sglistinfo_shm;
  379. uint32_t sglist_cnt;
  380. bool use_legacy_cmd;
  381. };
  382. struct qseecom_key_id_usage_desc {
  383. uint8_t desc[QSEECOM_KEY_ID_SIZE];
  384. };
  385. struct qseecom_crypto_info {
  386. unsigned int unit_num;
  387. unsigned int ce;
  388. unsigned int pipe_pair;
  389. };
  390. static struct qseecom_key_id_usage_desc key_id_array[] = {
  391. {
  392. .desc = "Undefined Usage Index",
  393. },
  394. {
  395. .desc = "Full Disk Encryption",
  396. },
  397. {
  398. .desc = "Per File Encryption",
  399. },
  400. {
  401. .desc = "UFS ICE Full Disk Encryption",
  402. },
  403. {
  404. .desc = "SDCC ICE Full Disk Encryption",
  405. },
  406. };
  407. /* Function proto types */
  408. static int qsee_vote_for_clock(struct qseecom_dev_handle *, int32_t);
  409. static void qsee_disable_clock_vote(struct qseecom_dev_handle *, int32_t);
  410. static int __qseecom_enable_clk(enum qseecom_ce_hw_instance ce);
  411. static void __qseecom_disable_clk(enum qseecom_ce_hw_instance ce);
  412. static int __qseecom_init_clk(enum qseecom_ce_hw_instance ce);
  413. static int qseecom_load_commonlib_image(struct qseecom_dev_handle *data,
  414. char *cmnlib_name);
  415. static int qseecom_enable_ice_setup(int usage);
  416. static int qseecom_disable_ice_setup(int usage);
  417. static void __qseecom_reentrancy_check_if_no_app_blocked(uint32_t smc_id);
  418. static int qseecom_get_ce_info(struct qseecom_dev_handle *data,
  419. void __user *argp);
  420. static int qseecom_free_ce_info(struct qseecom_dev_handle *data,
  421. void __user *argp);
  422. static int qseecom_query_ce_info(struct qseecom_dev_handle *data,
  423. void __user *argp);
  424. static int __qseecom_unload_app(struct qseecom_dev_handle *data,
  425. uint32_t app_id);
  426. static int __maybe_unused get_qseecom_keymaster_status(char *str)
  427. {
  428. get_option(&str, &qseecom.is_apps_region_protected);
  429. return 1;
  430. }
  431. __setup("androidboot.keymaster=", get_qseecom_keymaster_status);
  432. static int __qseecom_alloc_coherent_buf(
  433. uint32_t size, u8 **vaddr, phys_addr_t *paddr);
  434. static void __qseecom_free_coherent_buf(uint32_t size,
  435. u8 *vaddr, phys_addr_t paddr);
  436. #define QSEECOM_SCM_EBUSY_WAIT_MS 30
  437. #define QSEECOM_SCM_EBUSY_MAX_RETRY 67
  438. #define QSEE_RESULT_FAIL_APP_BUSY 315
  439. static int __qseecom_scm_call2_locked(uint32_t smc_id, struct qseecom_scm_desc *desc)
  440. {
  441. int ret = 0;
  442. int retry_count = 0;
  443. do {
  444. ret = qcom_scm_qseecom_call(smc_id, desc, false);
  445. if ((ret == -EBUSY) || (desc && (desc->ret[0] == -QSEE_RESULT_FAIL_APP_BUSY))) {
  446. mutex_unlock(&app_access_lock);
  447. msleep(QSEECOM_SCM_EBUSY_WAIT_MS);
  448. mutex_lock(&app_access_lock);
  449. }
  450. if (retry_count == 33)
  451. pr_warn("secure world has been busy for 1 second!\n");
  452. } while (((ret == -EBUSY) || (desc && (desc->ret[0] == -QSEE_RESULT_FAIL_APP_BUSY))) &&
  453. (retry_count++ < QSEECOM_SCM_EBUSY_MAX_RETRY));
  454. return ret;
  455. }
  456. static char *__qseecom_alloc_tzbuf(uint32_t size,
  457. phys_addr_t *pa, struct qtee_shm *shm)
  458. {
  459. char *tzbuf = NULL;
  460. int ret = qtee_shmbridge_allocate_shm(size, shm);
  461. if (ret)
  462. return NULL;
  463. tzbuf = shm->vaddr;
  464. memset(tzbuf, 0, size);
  465. *pa = shm->paddr;
  466. return tzbuf;
  467. }
  468. static void __qseecom_free_tzbuf(struct qtee_shm *shm)
  469. {
  470. qtee_shmbridge_free_shm(shm);
  471. }
  472. static int qseecom_scm_call2(uint32_t svc_id, uint32_t tz_cmd_id,
  473. const void *req_buf, void *resp_buf)
  474. {
  475. int ret = 0;
  476. uint32_t smc_id = 0;
  477. uint32_t qseos_cmd_id = 0;
  478. struct qseecom_scm_desc desc = {0};
  479. struct qseecom_command_scm_resp *scm_resp = NULL;
  480. struct qtee_shm shm = {0};
  481. phys_addr_t pa;
  482. if (!req_buf || !resp_buf) {
  483. pr_err("Invalid buffer pointer\n");
  484. return -EINVAL;
  485. }
  486. qseos_cmd_id = *(uint32_t *)req_buf;
  487. scm_resp = (struct qseecom_command_scm_resp *)resp_buf;
  488. switch (svc_id) {
  489. case SCM_SVC_INFO: {
  490. if (tz_cmd_id == 3) {
  491. smc_id = TZ_INFO_GET_FEATURE_VERSION_ID;
  492. desc.arginfo = TZ_INFO_GET_FEATURE_VERSION_ID_PARAM_ID;
  493. desc.args[0] = *(uint32_t *)req_buf;
  494. } else {
  495. pr_err("Unsupported svc_id %d, tz_cmd_id %d\n",
  496. svc_id, tz_cmd_id);
  497. return -EINVAL;
  498. }
  499. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  500. break;
  501. }
  502. case SCM_SVC_ES: {
  503. switch (tz_cmd_id) {
  504. case SCM_SAVE_PARTITION_HASH_ID: {
  505. u32 tzbuflen = PAGE_ALIGN(SHA256_DIGEST_LENGTH);
  506. struct qseecom_save_partition_hash_req *p_hash_req =
  507. (struct qseecom_save_partition_hash_req *)
  508. req_buf;
  509. char *tzbuf = __qseecom_alloc_tzbuf(
  510. tzbuflen, &pa, &shm);
  511. if (!tzbuf)
  512. return -ENOMEM;
  513. memset(tzbuf, 0, tzbuflen);
  514. memcpy(tzbuf, p_hash_req->digest,
  515. SHA256_DIGEST_LENGTH);
  516. qtee_shmbridge_flush_shm_buf(&shm);
  517. smc_id = TZ_ES_SAVE_PARTITION_HASH_ID;
  518. desc.arginfo = TZ_ES_SAVE_PARTITION_HASH_ID_PARAM_ID;
  519. desc.args[0] = p_hash_req->partition_id;
  520. desc.args[1] = pa;
  521. desc.args[2] = SHA256_DIGEST_LENGTH;
  522. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  523. __qseecom_free_tzbuf(&shm);
  524. break;
  525. }
  526. default: {
  527. pr_err("tz_cmd_id %d is not supported\n", tz_cmd_id);
  528. ret = -EINVAL;
  529. break;
  530. }
  531. } /* end of switch (tz_cmd_id) */
  532. break;
  533. } /* end of case SCM_SVC_ES */
  534. case SCM_SVC_TZSCHEDULER: {
  535. switch (qseos_cmd_id) {
  536. case QSEOS_APP_START_COMMAND: {
  537. struct qseecom_load_app_ireq *req;
  538. struct qseecom_load_app_64bit_ireq *req_64bit;
  539. smc_id = TZ_OS_APP_START_ID;
  540. desc.arginfo = TZ_OS_APP_START_ID_PARAM_ID;
  541. if (qseecom.qsee_version < QSEE_VERSION_40) {
  542. req = (struct qseecom_load_app_ireq *)req_buf;
  543. desc.args[0] = req->mdt_len;
  544. desc.args[1] = req->img_len;
  545. desc.args[2] = req->phy_addr;
  546. } else {
  547. req_64bit =
  548. (struct qseecom_load_app_64bit_ireq *)
  549. req_buf;
  550. desc.args[0] = req_64bit->mdt_len;
  551. desc.args[1] = req_64bit->img_len;
  552. desc.args[2] = req_64bit->phy_addr;
  553. }
  554. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  555. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  556. break;
  557. }
  558. case QSEOS_APP_SHUTDOWN_COMMAND: {
  559. struct qseecom_unload_app_ireq *req;
  560. req = (struct qseecom_unload_app_ireq *)req_buf;
  561. smc_id = TZ_OS_APP_SHUTDOWN_ID;
  562. desc.arginfo = TZ_OS_APP_SHUTDOWN_ID_PARAM_ID;
  563. desc.args[0] = req->app_id;
  564. ret = qcom_scm_qseecom_call(smc_id, &desc, true);
  565. break;
  566. }
  567. case QSEOS_APP_LOOKUP_COMMAND: {
  568. struct qseecom_check_app_ireq *req;
  569. u32 tzbuflen = PAGE_ALIGN(sizeof(req->app_name));
  570. char *tzbuf = __qseecom_alloc_tzbuf(
  571. tzbuflen, &pa, &shm);
  572. if (!tzbuf)
  573. return -ENOMEM;
  574. req = (struct qseecom_check_app_ireq *)req_buf;
  575. pr_debug("Lookup app_name = %s\n", req->app_name);
  576. strlcpy(tzbuf, req->app_name, sizeof(req->app_name));
  577. qtee_shmbridge_flush_shm_buf(&shm);
  578. smc_id = TZ_OS_APP_LOOKUP_ID;
  579. desc.arginfo = TZ_OS_APP_LOOKUP_ID_PARAM_ID;
  580. desc.args[0] = pa;
  581. desc.args[1] = strlen(req->app_name);
  582. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  583. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  584. __qseecom_free_tzbuf(&shm);
  585. break;
  586. }
  587. case QSEOS_APP_REGION_NOTIFICATION: {
  588. struct qsee_apps_region_info_ireq *req;
  589. struct qsee_apps_region_info_64bit_ireq *req_64bit;
  590. smc_id = TZ_OS_APP_REGION_NOTIFICATION_ID;
  591. desc.arginfo =
  592. TZ_OS_APP_REGION_NOTIFICATION_ID_PARAM_ID;
  593. if (qseecom.qsee_version < QSEE_VERSION_40) {
  594. req = (struct qsee_apps_region_info_ireq *)
  595. req_buf;
  596. desc.args[0] = req->addr;
  597. desc.args[1] = req->size;
  598. } else {
  599. req_64bit =
  600. (struct qsee_apps_region_info_64bit_ireq *)
  601. req_buf;
  602. desc.args[0] = req_64bit->addr;
  603. desc.args[1] = req_64bit->size;
  604. }
  605. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  606. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  607. break;
  608. }
  609. case QSEOS_LOAD_SERV_IMAGE_COMMAND: {
  610. struct qseecom_load_lib_image_ireq *req;
  611. struct qseecom_load_lib_image_64bit_ireq *req_64bit;
  612. smc_id = TZ_OS_LOAD_SERVICES_IMAGE_ID;
  613. desc.arginfo = TZ_OS_LOAD_SERVICES_IMAGE_ID_PARAM_ID;
  614. if (qseecom.qsee_version < QSEE_VERSION_40) {
  615. req = (struct qseecom_load_lib_image_ireq *)
  616. req_buf;
  617. desc.args[0] = req->mdt_len;
  618. desc.args[1] = req->img_len;
  619. desc.args[2] = req->phy_addr;
  620. } else {
  621. req_64bit =
  622. (struct qseecom_load_lib_image_64bit_ireq *)
  623. req_buf;
  624. desc.args[0] = req_64bit->mdt_len;
  625. desc.args[1] = req_64bit->img_len;
  626. desc.args[2] = req_64bit->phy_addr;
  627. }
  628. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  629. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  630. break;
  631. }
  632. case QSEOS_UNLOAD_SERV_IMAGE_COMMAND: {
  633. smc_id = TZ_OS_UNLOAD_SERVICES_IMAGE_ID;
  634. desc.arginfo = TZ_OS_UNLOAD_SERVICES_IMAGE_ID_PARAM_ID;
  635. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  636. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  637. break;
  638. }
  639. case QSEOS_REGISTER_LISTENER: {
  640. struct qseecom_register_listener_ireq *req;
  641. struct qseecom_register_listener_64bit_ireq *req_64bit;
  642. desc.arginfo =
  643. TZ_OS_REGISTER_LISTENER_ID_PARAM_ID;
  644. if (qseecom.qsee_version < QSEE_VERSION_40) {
  645. req = (struct qseecom_register_listener_ireq *)
  646. req_buf;
  647. desc.args[0] = req->listener_id;
  648. desc.args[1] = req->sb_ptr;
  649. desc.args[2] = req->sb_len;
  650. } else {
  651. req_64bit =
  652. (struct qseecom_register_listener_64bit_ireq *)
  653. req_buf;
  654. desc.args[0] = req_64bit->listener_id;
  655. desc.args[1] = req_64bit->sb_ptr;
  656. desc.args[2] = req_64bit->sb_len;
  657. }
  658. qseecom.smcinvoke_support = true;
  659. smc_id = TZ_OS_REGISTER_LISTENER_SMCINVOKE_ID;
  660. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  661. if (ret == -EIO) {
  662. /* smcinvoke is not supported */
  663. qseecom.smcinvoke_support = false;
  664. smc_id = TZ_OS_REGISTER_LISTENER_ID;
  665. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  666. }
  667. break;
  668. }
  669. case QSEOS_DEREGISTER_LISTENER: {
  670. struct qseecom_unregister_listener_ireq *req;
  671. req = (struct qseecom_unregister_listener_ireq *)
  672. req_buf;
  673. smc_id = TZ_OS_DEREGISTER_LISTENER_ID;
  674. desc.arginfo = TZ_OS_DEREGISTER_LISTENER_ID_PARAM_ID;
  675. desc.args[0] = req->listener_id;
  676. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  677. break;
  678. }
  679. case QSEOS_LISTENER_DATA_RSP_COMMAND: {
  680. struct qseecom_client_listener_data_irsp *req;
  681. req = (struct qseecom_client_listener_data_irsp *)
  682. req_buf;
  683. smc_id = TZ_OS_LISTENER_RESPONSE_HANDLER_ID;
  684. desc.arginfo =
  685. TZ_OS_LISTENER_RESPONSE_HANDLER_ID_PARAM_ID;
  686. desc.args[0] = req->listener_id;
  687. desc.args[1] = req->status;
  688. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  689. break;
  690. }
  691. case QSEOS_LISTENER_DATA_RSP_COMMAND_WHITELIST: {
  692. struct qseecom_client_listener_data_irsp *req;
  693. struct qseecom_client_listener_data_64bit_irsp *req_64;
  694. smc_id =
  695. TZ_OS_LISTENER_RESPONSE_HANDLER_WITH_WHITELIST_ID;
  696. desc.arginfo =
  697. TZ_OS_LISTENER_RESPONSE_HANDLER_WITH_WHITELIST_PARAM_ID;
  698. if (qseecom.qsee_version < QSEE_VERSION_40) {
  699. req =
  700. (struct qseecom_client_listener_data_irsp *)
  701. req_buf;
  702. desc.args[0] = req->listener_id;
  703. desc.args[1] = req->status;
  704. desc.args[2] = req->sglistinfo_ptr;
  705. desc.args[3] = req->sglistinfo_len;
  706. } else {
  707. req_64 =
  708. (struct qseecom_client_listener_data_64bit_irsp *)
  709. req_buf;
  710. desc.args[0] = req_64->listener_id;
  711. desc.args[1] = req_64->status;
  712. desc.args[2] = req_64->sglistinfo_ptr;
  713. desc.args[3] = req_64->sglistinfo_len;
  714. }
  715. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  716. break;
  717. }
  718. case QSEOS_LOAD_EXTERNAL_ELF_COMMAND: {
  719. struct qseecom_load_app_ireq *req;
  720. struct qseecom_load_app_64bit_ireq *req_64bit;
  721. smc_id = TZ_OS_LOAD_EXTERNAL_IMAGE_ID;
  722. desc.arginfo = TZ_OS_LOAD_SERVICES_IMAGE_ID_PARAM_ID;
  723. if (qseecom.qsee_version < QSEE_VERSION_40) {
  724. req = (struct qseecom_load_app_ireq *)req_buf;
  725. desc.args[0] = req->mdt_len;
  726. desc.args[1] = req->img_len;
  727. desc.args[2] = req->phy_addr;
  728. } else {
  729. req_64bit =
  730. (struct qseecom_load_app_64bit_ireq *)req_buf;
  731. desc.args[0] = req_64bit->mdt_len;
  732. desc.args[1] = req_64bit->img_len;
  733. desc.args[2] = req_64bit->phy_addr;
  734. }
  735. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  736. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  737. break;
  738. }
  739. case QSEOS_UNLOAD_EXTERNAL_ELF_COMMAND: {
  740. smc_id = TZ_OS_UNLOAD_EXTERNAL_IMAGE_ID;
  741. desc.arginfo = TZ_OS_UNLOAD_SERVICES_IMAGE_ID_PARAM_ID;
  742. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  743. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  744. break;
  745. }
  746. case QSEOS_CLIENT_SEND_DATA_COMMAND: {
  747. struct qseecom_client_send_data_ireq *req;
  748. struct qseecom_client_send_data_64bit_ireq *req_64bit;
  749. smc_id = TZ_APP_QSAPP_SEND_DATA_ID;
  750. desc.arginfo = TZ_APP_QSAPP_SEND_DATA_ID_PARAM_ID;
  751. if (qseecom.qsee_version < QSEE_VERSION_40) {
  752. req = (struct qseecom_client_send_data_ireq *)
  753. req_buf;
  754. desc.args[0] = req->app_id;
  755. desc.args[1] = req->req_ptr;
  756. desc.args[2] = req->req_len;
  757. desc.args[3] = req->rsp_ptr;
  758. desc.args[4] = req->rsp_len;
  759. } else {
  760. req_64bit =
  761. (struct qseecom_client_send_data_64bit_ireq *)
  762. req_buf;
  763. desc.args[0] = req_64bit->app_id;
  764. desc.args[1] = req_64bit->req_ptr;
  765. desc.args[2] = req_64bit->req_len;
  766. desc.args[3] = req_64bit->rsp_ptr;
  767. desc.args[4] = req_64bit->rsp_len;
  768. }
  769. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  770. break;
  771. }
  772. case QSEOS_CLIENT_SEND_DATA_COMMAND_WHITELIST: {
  773. struct qseecom_client_send_data_ireq *req;
  774. struct qseecom_client_send_data_64bit_ireq *req_64bit;
  775. smc_id = TZ_APP_QSAPP_SEND_DATA_WITH_WHITELIST_ID;
  776. desc.arginfo =
  777. TZ_APP_QSAPP_SEND_DATA_WITH_WHITELIST_ID_PARAM_ID;
  778. if (qseecom.qsee_version < QSEE_VERSION_40) {
  779. req = (struct qseecom_client_send_data_ireq *)
  780. req_buf;
  781. desc.args[0] = req->app_id;
  782. desc.args[1] = req->req_ptr;
  783. desc.args[2] = req->req_len;
  784. desc.args[3] = req->rsp_ptr;
  785. desc.args[4] = req->rsp_len;
  786. desc.args[5] = req->sglistinfo_ptr;
  787. desc.args[6] = req->sglistinfo_len;
  788. } else {
  789. req_64bit =
  790. (struct qseecom_client_send_data_64bit_ireq *)
  791. req_buf;
  792. desc.args[0] = req_64bit->app_id;
  793. desc.args[1] = req_64bit->req_ptr;
  794. desc.args[2] = req_64bit->req_len;
  795. desc.args[3] = req_64bit->rsp_ptr;
  796. desc.args[4] = req_64bit->rsp_len;
  797. desc.args[5] = req_64bit->sglistinfo_ptr;
  798. desc.args[6] = req_64bit->sglistinfo_len;
  799. }
  800. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  801. break;
  802. }
  803. case QSEOS_RPMB_PROVISION_KEY_COMMAND: {
  804. struct qseecom_client_send_service_ireq *req;
  805. req = (struct qseecom_client_send_service_ireq *)
  806. req_buf;
  807. smc_id = TZ_OS_RPMB_PROVISION_KEY_ID;
  808. desc.arginfo = TZ_OS_RPMB_PROVISION_KEY_ID_PARAM_ID;
  809. desc.args[0] = req->key_type;
  810. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  811. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  812. break;
  813. }
  814. case QSEOS_RPMB_ERASE_COMMAND: {
  815. smc_id = TZ_OS_RPMB_ERASE_ID;
  816. desc.arginfo = TZ_OS_RPMB_ERASE_ID_PARAM_ID;
  817. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  818. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  819. break;
  820. }
  821. case QSEOS_RPMB_CHECK_PROV_STATUS_COMMAND: {
  822. smc_id = TZ_OS_RPMB_CHECK_PROV_STATUS_ID;
  823. desc.arginfo = TZ_OS_RPMB_CHECK_PROV_STATUS_ID_PARAM_ID;
  824. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  825. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  826. break;
  827. }
  828. case QSEOS_DIAG_FUSE_REQ_CMD:
  829. case QSEOS_DIAG_FUSE_REQ_RSP_CMD: {
  830. struct qseecom_client_send_fsm_diag_req *req;
  831. smc_id = TZ_SECBOOT_GET_FUSE_INFO;
  832. desc.arginfo = TZ_SECBOOT_GET_FUSE_INFO_PARAM_ID;
  833. req = (struct qseecom_client_send_fsm_diag_req *) req_buf;
  834. desc.args[0] = req->req_ptr;
  835. desc.args[1] = req->req_len;
  836. desc.args[2] = req->rsp_ptr;
  837. desc.args[3] = req->rsp_len;
  838. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  839. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  840. break;
  841. }
  842. case QSEOS_GENERATE_KEY: {
  843. u32 tzbuflen = PAGE_ALIGN(sizeof
  844. (struct qseecom_key_generate_ireq) -
  845. sizeof(uint32_t));
  846. char *tzbuf = __qseecom_alloc_tzbuf(
  847. tzbuflen, &pa, &shm);
  848. if (!tzbuf)
  849. return -ENOMEM;
  850. memset(tzbuf, 0, tzbuflen);
  851. memcpy(tzbuf, req_buf + sizeof(uint32_t),
  852. (sizeof(struct qseecom_key_generate_ireq) -
  853. sizeof(uint32_t)));
  854. qtee_shmbridge_flush_shm_buf(&shm);
  855. smc_id = TZ_OS_KS_GEN_KEY_ID;
  856. desc.arginfo = TZ_OS_KS_GEN_KEY_ID_PARAM_ID;
  857. desc.args[0] = pa;
  858. desc.args[1] = tzbuflen;
  859. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  860. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  861. __qseecom_free_tzbuf(&shm);
  862. break;
  863. }
  864. case QSEOS_DELETE_KEY: {
  865. u32 tzbuflen = PAGE_ALIGN(sizeof
  866. (struct qseecom_key_delete_ireq) -
  867. sizeof(uint32_t));
  868. char *tzbuf = __qseecom_alloc_tzbuf(
  869. tzbuflen, &pa, &shm);
  870. if (!tzbuf)
  871. return -ENOMEM;
  872. memset(tzbuf, 0, tzbuflen);
  873. memcpy(tzbuf, req_buf + sizeof(uint32_t),
  874. (sizeof(struct qseecom_key_delete_ireq) -
  875. sizeof(uint32_t)));
  876. qtee_shmbridge_flush_shm_buf(&shm);
  877. smc_id = TZ_OS_KS_DEL_KEY_ID;
  878. desc.arginfo = TZ_OS_KS_DEL_KEY_ID_PARAM_ID;
  879. desc.args[0] = pa;
  880. desc.args[1] = tzbuflen;
  881. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  882. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  883. __qseecom_free_tzbuf(&shm);
  884. break;
  885. }
  886. case QSEOS_SET_KEY: {
  887. u32 tzbuflen = PAGE_ALIGN(sizeof
  888. (struct qseecom_key_select_ireq) -
  889. sizeof(uint32_t));
  890. char *tzbuf = __qseecom_alloc_tzbuf(
  891. tzbuflen, &pa, &shm);
  892. if (!tzbuf)
  893. return -ENOMEM;
  894. memset(tzbuf, 0, tzbuflen);
  895. memcpy(tzbuf, req_buf + sizeof(uint32_t),
  896. (sizeof(struct qseecom_key_select_ireq) -
  897. sizeof(uint32_t)));
  898. qtee_shmbridge_flush_shm_buf(&shm);
  899. smc_id = TZ_OS_KS_SET_PIPE_KEY_ID;
  900. desc.arginfo = TZ_OS_KS_SET_PIPE_KEY_ID_PARAM_ID;
  901. desc.args[0] = pa;
  902. desc.args[1] = tzbuflen;
  903. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  904. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  905. __qseecom_free_tzbuf(&shm);
  906. break;
  907. }
  908. case QSEOS_UPDATE_KEY_USERINFO: {
  909. u32 tzbuflen = PAGE_ALIGN(sizeof
  910. (struct qseecom_key_userinfo_update_ireq) -
  911. sizeof(uint32_t));
  912. char *tzbuf = __qseecom_alloc_tzbuf(
  913. tzbuflen, &pa, &shm);
  914. if (!tzbuf)
  915. return -ENOMEM;
  916. memset(tzbuf, 0, tzbuflen);
  917. memcpy(tzbuf, req_buf + sizeof(uint32_t), (sizeof
  918. (struct qseecom_key_userinfo_update_ireq) -
  919. sizeof(uint32_t)));
  920. qtee_shmbridge_flush_shm_buf(&shm);
  921. smc_id = TZ_OS_KS_UPDATE_KEY_ID;
  922. desc.arginfo = TZ_OS_KS_UPDATE_KEY_ID_PARAM_ID;
  923. desc.args[0] = pa;
  924. desc.args[1] = tzbuflen;
  925. __qseecom_reentrancy_check_if_no_app_blocked(smc_id);
  926. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  927. __qseecom_free_tzbuf(&shm);
  928. break;
  929. }
  930. case QSEOS_TEE_OPEN_SESSION: {
  931. struct qseecom_qteec_ireq *req;
  932. struct qseecom_qteec_64bit_ireq *req_64bit;
  933. smc_id = TZ_APP_GPAPP_OPEN_SESSION_ID;
  934. desc.arginfo = TZ_APP_GPAPP_OPEN_SESSION_ID_PARAM_ID;
  935. if (qseecom.qsee_version < QSEE_VERSION_40) {
  936. req = (struct qseecom_qteec_ireq *)req_buf;
  937. desc.args[0] = req->app_id;
  938. desc.args[1] = req->req_ptr;
  939. desc.args[2] = req->req_len;
  940. desc.args[3] = req->resp_ptr;
  941. desc.args[4] = req->resp_len;
  942. } else {
  943. req_64bit = (struct qseecom_qteec_64bit_ireq *)
  944. req_buf;
  945. desc.args[0] = req_64bit->app_id;
  946. desc.args[1] = req_64bit->req_ptr;
  947. desc.args[2] = req_64bit->req_len;
  948. desc.args[3] = req_64bit->resp_ptr;
  949. desc.args[4] = req_64bit->resp_len;
  950. }
  951. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  952. break;
  953. }
  954. case QSEOS_TEE_OPEN_SESSION_WHITELIST: {
  955. struct qseecom_qteec_ireq *req;
  956. struct qseecom_qteec_64bit_ireq *req_64bit;
  957. smc_id = TZ_APP_GPAPP_OPEN_SESSION_WITH_WHITELIST_ID;
  958. desc.arginfo =
  959. TZ_APP_GPAPP_OPEN_SESSION_WITH_WHITELIST_ID_PARAM_ID;
  960. if (qseecom.qsee_version < QSEE_VERSION_40) {
  961. req = (struct qseecom_qteec_ireq *)req_buf;
  962. desc.args[0] = req->app_id;
  963. desc.args[1] = req->req_ptr;
  964. desc.args[2] = req->req_len;
  965. desc.args[3] = req->resp_ptr;
  966. desc.args[4] = req->resp_len;
  967. desc.args[5] = req->sglistinfo_ptr;
  968. desc.args[6] = req->sglistinfo_len;
  969. } else {
  970. req_64bit = (struct qseecom_qteec_64bit_ireq *)
  971. req_buf;
  972. desc.args[0] = req_64bit->app_id;
  973. desc.args[1] = req_64bit->req_ptr;
  974. desc.args[2] = req_64bit->req_len;
  975. desc.args[3] = req_64bit->resp_ptr;
  976. desc.args[4] = req_64bit->resp_len;
  977. desc.args[5] = req_64bit->sglistinfo_ptr;
  978. desc.args[6] = req_64bit->sglistinfo_len;
  979. }
  980. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  981. break;
  982. }
  983. case QSEOS_TEE_INVOKE_COMMAND: {
  984. struct qseecom_qteec_ireq *req;
  985. struct qseecom_qteec_64bit_ireq *req_64bit;
  986. smc_id = TZ_APP_GPAPP_INVOKE_COMMAND_ID;
  987. desc.arginfo = TZ_APP_GPAPP_INVOKE_COMMAND_ID_PARAM_ID;
  988. if (qseecom.qsee_version < QSEE_VERSION_40) {
  989. req = (struct qseecom_qteec_ireq *)req_buf;
  990. desc.args[0] = req->app_id;
  991. desc.args[1] = req->req_ptr;
  992. desc.args[2] = req->req_len;
  993. desc.args[3] = req->resp_ptr;
  994. desc.args[4] = req->resp_len;
  995. } else {
  996. req_64bit = (struct qseecom_qteec_64bit_ireq *)
  997. req_buf;
  998. desc.args[0] = req_64bit->app_id;
  999. desc.args[1] = req_64bit->req_ptr;
  1000. desc.args[2] = req_64bit->req_len;
  1001. desc.args[3] = req_64bit->resp_ptr;
  1002. desc.args[4] = req_64bit->resp_len;
  1003. }
  1004. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  1005. break;
  1006. }
  1007. case QSEOS_TEE_INVOKE_COMMAND_WHITELIST: {
  1008. struct qseecom_qteec_ireq *req;
  1009. struct qseecom_qteec_64bit_ireq *req_64bit;
  1010. smc_id = TZ_APP_GPAPP_INVOKE_COMMAND_WITH_WHITELIST_ID;
  1011. desc.arginfo =
  1012. TZ_APP_GPAPP_INVOKE_COMMAND_WITH_WHITELIST_ID_PARAM_ID;
  1013. if (qseecom.qsee_version < QSEE_VERSION_40) {
  1014. req = (struct qseecom_qteec_ireq *)req_buf;
  1015. desc.args[0] = req->app_id;
  1016. desc.args[1] = req->req_ptr;
  1017. desc.args[2] = req->req_len;
  1018. desc.args[3] = req->resp_ptr;
  1019. desc.args[4] = req->resp_len;
  1020. desc.args[5] = req->sglistinfo_ptr;
  1021. desc.args[6] = req->sglistinfo_len;
  1022. } else {
  1023. req_64bit = (struct qseecom_qteec_64bit_ireq *)
  1024. req_buf;
  1025. desc.args[0] = req_64bit->app_id;
  1026. desc.args[1] = req_64bit->req_ptr;
  1027. desc.args[2] = req_64bit->req_len;
  1028. desc.args[3] = req_64bit->resp_ptr;
  1029. desc.args[4] = req_64bit->resp_len;
  1030. desc.args[5] = req_64bit->sglistinfo_ptr;
  1031. desc.args[6] = req_64bit->sglistinfo_len;
  1032. }
  1033. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  1034. break;
  1035. }
  1036. case QSEOS_TEE_CLOSE_SESSION: {
  1037. struct qseecom_qteec_ireq *req;
  1038. struct qseecom_qteec_64bit_ireq *req_64bit;
  1039. smc_id = TZ_APP_GPAPP_CLOSE_SESSION_ID;
  1040. desc.arginfo = TZ_APP_GPAPP_CLOSE_SESSION_ID_PARAM_ID;
  1041. if (qseecom.qsee_version < QSEE_VERSION_40) {
  1042. req = (struct qseecom_qteec_ireq *)req_buf;
  1043. desc.args[0] = req->app_id;
  1044. desc.args[1] = req->req_ptr;
  1045. desc.args[2] = req->req_len;
  1046. desc.args[3] = req->resp_ptr;
  1047. desc.args[4] = req->resp_len;
  1048. } else {
  1049. req_64bit = (struct qseecom_qteec_64bit_ireq *)
  1050. req_buf;
  1051. desc.args[0] = req_64bit->app_id;
  1052. desc.args[1] = req_64bit->req_ptr;
  1053. desc.args[2] = req_64bit->req_len;
  1054. desc.args[3] = req_64bit->resp_ptr;
  1055. desc.args[4] = req_64bit->resp_len;
  1056. }
  1057. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  1058. break;
  1059. }
  1060. case QSEOS_TEE_REQUEST_CANCELLATION: {
  1061. struct qseecom_qteec_ireq *req;
  1062. struct qseecom_qteec_64bit_ireq *req_64bit;
  1063. smc_id = TZ_APP_GPAPP_REQUEST_CANCELLATION_ID;
  1064. desc.arginfo =
  1065. TZ_APP_GPAPP_REQUEST_CANCELLATION_ID_PARAM_ID;
  1066. if (qseecom.qsee_version < QSEE_VERSION_40) {
  1067. req = (struct qseecom_qteec_ireq *)req_buf;
  1068. desc.args[0] = req->app_id;
  1069. desc.args[1] = req->req_ptr;
  1070. desc.args[2] = req->req_len;
  1071. desc.args[3] = req->resp_ptr;
  1072. desc.args[4] = req->resp_len;
  1073. } else {
  1074. req_64bit = (struct qseecom_qteec_64bit_ireq *)
  1075. req_buf;
  1076. desc.args[0] = req_64bit->app_id;
  1077. desc.args[1] = req_64bit->req_ptr;
  1078. desc.args[2] = req_64bit->req_len;
  1079. desc.args[3] = req_64bit->resp_ptr;
  1080. desc.args[4] = req_64bit->resp_len;
  1081. }
  1082. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  1083. break;
  1084. }
  1085. case QSEOS_CONTINUE_BLOCKED_REQ_COMMAND: {
  1086. struct qseecom_continue_blocked_request_ireq *req =
  1087. (struct qseecom_continue_blocked_request_ireq *)
  1088. req_buf;
  1089. if (qseecom.smcinvoke_support)
  1090. smc_id =
  1091. TZ_OS_CONTINUE_BLOCKED_REQUEST_SMCINVOKE_ID;
  1092. else
  1093. smc_id = TZ_OS_CONTINUE_BLOCKED_REQUEST_ID;
  1094. desc.arginfo =
  1095. TZ_OS_CONTINUE_BLOCKED_REQUEST_ID_PARAM_ID;
  1096. desc.args[0] = req->app_or_session_id;
  1097. ret = __qseecom_scm_call2_locked(smc_id, &desc);
  1098. break;
  1099. }
  1100. default: {
  1101. pr_err("qseos_cmd_id %d is not supported.\n",
  1102. qseos_cmd_id);
  1103. ret = -EINVAL;
  1104. break;
  1105. }
  1106. } /*end of switch (qsee_cmd_id) */
  1107. break;
  1108. } /*end of case SCM_SVC_TZSCHEDULER*/
  1109. default: {
  1110. pr_err("svc_id 0x%x is not supported.\n", svc_id);
  1111. ret = -EINVAL;
  1112. break;
  1113. }
  1114. } /*end of switch svc_id */
  1115. scm_resp->result = desc.ret[0];
  1116. scm_resp->resp_type = desc.ret[1];
  1117. scm_resp->data = desc.ret[2];
  1118. pr_debug("svc_id = 0x%x, tz_cmd_id = 0x%x, qseos_cmd_id = 0x%x, smc_id = 0x%x, param_id = 0x%x\n",
  1119. svc_id, tz_cmd_id, qseos_cmd_id, smc_id, desc.arginfo);
  1120. pr_debug("scm_resp->result = 0x%x, scm_resp->resp_type = 0x%x, scm_resp->data = 0x%x\n",
  1121. scm_resp->result, scm_resp->resp_type, scm_resp->data);
  1122. return ret;
  1123. }
  1124. static int qseecom_scm_call(u32 svc_id, u32 tz_cmd_id, const void *cmd_buf,
  1125. size_t cmd_len, void *resp_buf, size_t resp_len)
  1126. {
  1127. return qseecom_scm_call2(svc_id, tz_cmd_id, cmd_buf, resp_buf);
  1128. }
  1129. static struct qseecom_registered_listener_list *__qseecom_find_svc(
  1130. int32_t listener_id)
  1131. {
  1132. struct qseecom_registered_listener_list *entry = NULL;
  1133. list_for_each_entry(entry,
  1134. &qseecom.registered_listener_list_head, list) {
  1135. if (entry->svc.listener_id == listener_id)
  1136. break;
  1137. }
  1138. if ((entry != NULL) && (entry->svc.listener_id != listener_id)) {
  1139. pr_debug("Service id: %u is not found\n", listener_id);
  1140. return NULL;
  1141. }
  1142. return entry;
  1143. }
  1144. static int qseecom_dmabuf_cache_operations(struct dma_buf *dmabuf,
  1145. enum qseecom_cache_ops cache_op)
  1146. {
  1147. int ret = 0;
  1148. if (!dmabuf) {
  1149. pr_err("dmabuf is NULL\n");
  1150. ret = -EINVAL;
  1151. goto exit;
  1152. }
  1153. switch (cache_op) {
  1154. case QSEECOM_CACHE_CLEAN: /* Doing CLEAN and INVALIDATE */
  1155. dma_buf_begin_cpu_access(dmabuf, DMA_BIDIRECTIONAL);
  1156. dma_buf_end_cpu_access(dmabuf, DMA_BIDIRECTIONAL);
  1157. break;
  1158. case QSEECOM_CACHE_INVALIDATE:
  1159. dma_buf_begin_cpu_access(dmabuf, DMA_TO_DEVICE);
  1160. dma_buf_end_cpu_access(dmabuf, DMA_FROM_DEVICE);
  1161. break;
  1162. default:
  1163. pr_err("cache (%d) operation not supported\n",
  1164. cache_op);
  1165. ret = -EINVAL;
  1166. goto exit;
  1167. }
  1168. exit:
  1169. return ret;
  1170. }
  1171. static int qseecom_destroy_bridge_callback(void *dtor_data)
  1172. {
  1173. int ret = 0;
  1174. uint64_t handle = (uint64_t)dtor_data;
  1175. pr_debug("to destroy shm bridge %lld\n", handle);
  1176. ret = qtee_shmbridge_deregister(handle);
  1177. if (ret) {
  1178. pr_err("failed to destroy shm bridge %lld\n", handle);
  1179. return ret;
  1180. }
  1181. return ret;
  1182. }
  1183. static int qseecom_create_bridge_for_secbuf(int ion_fd, struct dma_buf *dmabuf,
  1184. struct sg_table *sgt)
  1185. {
  1186. int ret = 0;
  1187. phys_addr_t phys;
  1188. size_t size = 0;
  1189. uint64_t handle = 0;
  1190. int tz_perm = PERM_READ|PERM_WRITE;
  1191. uint32_t *vmid_list;
  1192. uint32_t *perms_list;
  1193. uint32_t nelems = 0;
  1194. struct scatterlist *sg = sgt->sgl;
  1195. if (!qtee_shmbridge_is_enabled())
  1196. return 0;
  1197. phys = sg_phys(sg);
  1198. size = sg->length;
  1199. ret = qtee_shmbridge_query(phys);
  1200. if (ret) {
  1201. pr_debug("bridge exists\n");
  1202. return 0;
  1203. }
  1204. if (mem_buf_dma_buf_exclusive_owner(dmabuf) || (sgt->nents != 1)) {
  1205. pr_debug("just create bridge for contiguous secure buf\n");
  1206. return 0;
  1207. }
  1208. ret = mem_buf_dma_buf_copy_vmperm(dmabuf, (int **)&vmid_list,
  1209. (int **)&perms_list, (int *)&nelems);
  1210. if (ret) {
  1211. pr_err("mem_buf_dma_buf_copy_vmperm failure, err=%d\n", ret);
  1212. return ret;
  1213. }
  1214. ret = qtee_shmbridge_register(phys, size, vmid_list, perms_list, nelems,
  1215. tz_perm, &handle);
  1216. if (ret && ret != -EEXIST) {
  1217. pr_err("creation of shm bridge failed with ret: %d\n",
  1218. ret);
  1219. goto exit;
  1220. }
  1221. pr_debug("created shm bridge %lld\n", handle);
  1222. mem_buf_dma_buf_set_destructor(dmabuf, qseecom_destroy_bridge_callback,
  1223. (void *)handle);
  1224. exit:
  1225. kfree(perms_list);
  1226. kfree(vmid_list);
  1227. return ret;
  1228. }
  1229. static int qseecom_dmabuf_map(int ion_fd, struct sg_table **sgt,
  1230. struct dma_buf_attachment **attach,
  1231. struct dma_buf **dmabuf)
  1232. {
  1233. struct dma_buf *new_dma_buf = NULL;
  1234. struct dma_buf_attachment *new_attach = NULL;
  1235. struct sg_table *new_sgt = NULL;
  1236. int ret = 0;
  1237. new_dma_buf = dma_buf_get(ion_fd);
  1238. if (IS_ERR_OR_NULL(new_dma_buf)) {
  1239. pr_err("dma_buf_get() for ion_fd %d failed\n", ion_fd);
  1240. ret = -ENOMEM;
  1241. goto err;
  1242. }
  1243. new_attach = dma_buf_attach(new_dma_buf, qseecom.dev);
  1244. if (IS_ERR_OR_NULL(new_attach)) {
  1245. pr_err("dma_buf_attach() for ion_fd %d failed\n", ion_fd);
  1246. ret = -ENOMEM;
  1247. goto err_put;
  1248. }
  1249. new_sgt = dma_buf_map_attachment(new_attach, DMA_BIDIRECTIONAL);
  1250. if (IS_ERR_OR_NULL(new_sgt)) {
  1251. ret = PTR_ERR(new_sgt);
  1252. pr_err("dma_buf_map_attachment for ion_fd %d failed ret = %d\n",
  1253. ion_fd, ret);
  1254. goto err_detach;
  1255. }
  1256. ret = qseecom_create_bridge_for_secbuf(ion_fd, new_dma_buf, new_sgt);
  1257. if (ret) {
  1258. pr_err("failed to create bridge for fd %d\n", ion_fd);
  1259. goto err_unmap_attachment;
  1260. }
  1261. *sgt = new_sgt;
  1262. *attach = new_attach;
  1263. *dmabuf = new_dma_buf;
  1264. return ret;
  1265. err_unmap_attachment:
  1266. dma_buf_unmap_attachment(new_attach, new_sgt, DMA_BIDIRECTIONAL);
  1267. err_detach:
  1268. dma_buf_detach(new_dma_buf, new_attach);
  1269. err_put:
  1270. dma_buf_put(new_dma_buf);
  1271. err:
  1272. return ret;
  1273. }
  1274. static void qseecom_dmabuf_unmap(struct sg_table *sgt,
  1275. struct dma_buf_attachment *attach,
  1276. struct dma_buf *dmabuf)
  1277. {
  1278. dma_buf_unmap_attachment(attach, sgt, DMA_BIDIRECTIONAL);
  1279. dma_buf_detach(dmabuf, attach);
  1280. dma_buf_put(dmabuf);
  1281. }
  1282. /* convert ion_fd to phys_adds and virt_addr*/
  1283. static int qseecom_vaddr_map(int ion_fd,
  1284. phys_addr_t *paddr, void **vaddr,
  1285. struct sg_table **sgt,
  1286. struct dma_buf_attachment **attach,
  1287. size_t *sb_length, struct dma_buf **dmabuf)
  1288. {
  1289. struct dma_buf *new_dma_buf = NULL;
  1290. struct dma_buf_attachment *new_attach = NULL;
  1291. #ifdef KERNEL_VERSION_LEGACY
  1292. struct dma_buf_map new_dma_buf_map = {0};
  1293. #else
  1294. struct iosys_map new_dma_buf_map = {0};
  1295. #endif
  1296. struct sg_table *new_sgt = NULL;
  1297. void *new_va = NULL;
  1298. int ret = 0;
  1299. ret = qseecom_dmabuf_map(ion_fd, &new_sgt, &new_attach, &new_dma_buf);
  1300. if (ret) {
  1301. pr_err("qseecom_dmabuf_map for ion_fd %d failed ret = %d\n",
  1302. ion_fd, ret);
  1303. goto err;
  1304. }
  1305. ret = 0;
  1306. *paddr = sg_dma_address(new_sgt->sgl);
  1307. *sb_length = new_sgt->sgl->length;
  1308. dma_buf_begin_cpu_access(new_dma_buf, DMA_BIDIRECTIONAL);
  1309. ret = dma_buf_vmap(new_dma_buf, &new_dma_buf_map);
  1310. new_va = ret ? NULL : new_dma_buf_map.vaddr;
  1311. if (!new_va) {
  1312. pr_err("dma_buf_vmap failed\n");
  1313. ret = -ENOMEM;
  1314. goto err_unmap;
  1315. }
  1316. *dmabuf = new_dma_buf;
  1317. *attach = new_attach;
  1318. *sgt = new_sgt;
  1319. *vaddr = new_va;
  1320. return ret;
  1321. err_unmap:
  1322. dma_buf_end_cpu_access(new_dma_buf, DMA_BIDIRECTIONAL);
  1323. qseecom_dmabuf_unmap(new_sgt, new_attach, new_dma_buf);
  1324. MAKE_NULL(*sgt, *attach, *dmabuf);
  1325. err:
  1326. return ret;
  1327. }
  1328. static void qseecom_vaddr_unmap(void *vaddr, struct sg_table *sgt,
  1329. struct dma_buf_attachment *attach,
  1330. struct dma_buf *dmabuf)
  1331. {
  1332. #ifdef KERNEL_VERSION_LEGACY
  1333. struct dma_buf_map dmabufmap = DMA_BUF_MAP_INIT_VADDR(vaddr);
  1334. #else
  1335. struct iosys_map dmabufmap = IOSYS_MAP_INIT_VADDR(vaddr);
  1336. #endif
  1337. if (!dmabuf || !vaddr || !sgt || !attach)
  1338. return;
  1339. pr_err("Trying to unmap vaddr");
  1340. dma_buf_vunmap(dmabuf, &dmabufmap);
  1341. dma_buf_end_cpu_access(dmabuf, DMA_BIDIRECTIONAL);
  1342. qseecom_dmabuf_unmap(sgt, attach, dmabuf);
  1343. }
  1344. static int __qseecom_set_sb_memory(struct qseecom_registered_listener_list *svc,
  1345. struct qseecom_dev_handle *handle,
  1346. struct qseecom_register_listener_req *listener)
  1347. {
  1348. int ret = 0;
  1349. struct qseecom_register_listener_ireq req;
  1350. struct qseecom_register_listener_64bit_ireq req_64bit;
  1351. struct qseecom_command_scm_resp resp;
  1352. void *cmd_buf = NULL;
  1353. size_t cmd_len;
  1354. ret = qseecom_vaddr_map(listener->ifd_data_fd,
  1355. &svc->sb_phys, (void **)&svc->sb_virt,
  1356. &svc->sgt, &svc->attach,
  1357. &svc->sb_length, &svc->dmabuf);
  1358. if (ret) {
  1359. pr_err("failed to convert ion_fd %d for lsnr %d with err: %d\n",
  1360. listener->ifd_data_fd, svc->svc.listener_id, ret);
  1361. return -EINVAL;
  1362. }
  1363. if (qseecom.qsee_version < QSEE_VERSION_40) {
  1364. req.qsee_cmd_id = QSEOS_REGISTER_LISTENER;
  1365. req.listener_id = svc->svc.listener_id;
  1366. req.sb_len = svc->sb_length;
  1367. req.sb_ptr = (uint32_t)svc->sb_phys;
  1368. cmd_buf = (void *)&req;
  1369. cmd_len = sizeof(struct qseecom_register_listener_ireq);
  1370. } else {
  1371. req_64bit.qsee_cmd_id = QSEOS_REGISTER_LISTENER;
  1372. req_64bit.listener_id = svc->svc.listener_id;
  1373. req_64bit.sb_len = svc->sb_length;
  1374. req_64bit.sb_ptr = (uint64_t)svc->sb_phys;
  1375. cmd_buf = (void *)&req_64bit;
  1376. cmd_len = sizeof(struct qseecom_register_listener_64bit_ireq);
  1377. }
  1378. resp.result = QSEOS_RESULT_INCOMPLETE;
  1379. mutex_unlock(&listener_access_lock);
  1380. mutex_lock(&app_access_lock);
  1381. __qseecom_reentrancy_check_if_no_app_blocked(
  1382. TZ_OS_REGISTER_LISTENER_SMCINVOKE_ID);
  1383. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, cmd_buf, cmd_len,
  1384. &resp, sizeof(resp));
  1385. mutex_unlock(&app_access_lock);
  1386. mutex_lock(&listener_access_lock);
  1387. if (ret) {
  1388. pr_err("qseecom_scm_call failed with err: %d\n", ret);
  1389. ret = -EINVAL;
  1390. goto err;
  1391. }
  1392. if (resp.result != QSEOS_RESULT_SUCCESS) {
  1393. pr_err("Error SB registration req: resp.result = %d\n",
  1394. resp.result);
  1395. ret = -EPERM;
  1396. goto err;
  1397. }
  1398. return 0;
  1399. err:
  1400. if (svc->dmabuf) {
  1401. qseecom_vaddr_unmap(svc->sb_virt, svc->sgt, svc->attach,
  1402. svc->dmabuf);
  1403. MAKE_NULL(svc->sgt, svc->attach, svc->dmabuf);
  1404. }
  1405. return ret;
  1406. }
  1407. static int qseecom_register_listener(struct qseecom_dev_handle *data,
  1408. void __user *argp)
  1409. {
  1410. int ret = 0;
  1411. struct qseecom_register_listener_req rcvd_lstnr;
  1412. struct qseecom_registered_listener_list *new_entry;
  1413. struct qseecom_registered_listener_list *ptr_svc;
  1414. ret = copy_from_user(&rcvd_lstnr, argp, sizeof(rcvd_lstnr));
  1415. if (ret) {
  1416. pr_err("copy_from_user failed\n");
  1417. return ret;
  1418. }
  1419. if (!access_ok((void __user *)rcvd_lstnr.virt_sb_base,
  1420. rcvd_lstnr.sb_size))
  1421. return -EFAULT;
  1422. ptr_svc = __qseecom_find_svc(rcvd_lstnr.listener_id);
  1423. if (ptr_svc) {
  1424. if (!ptr_svc->unregister_pending) {
  1425. pr_err("Service %d is not unique\n",
  1426. rcvd_lstnr.listener_id);
  1427. data->released = true;
  1428. return -EBUSY;
  1429. } else {
  1430. /*wait until listener is unregistered*/
  1431. pr_debug("register %d has to wait\n",
  1432. rcvd_lstnr.listener_id);
  1433. mutex_unlock(&listener_access_lock);
  1434. ret = wait_event_interruptible(
  1435. qseecom.register_lsnr_pending_wq,
  1436. list_empty(
  1437. &qseecom.unregister_lsnr_pending_list_head));
  1438. if (ret) {
  1439. pr_err("interrupted register_pending_wq %d\n",
  1440. rcvd_lstnr.listener_id);
  1441. mutex_lock(&listener_access_lock);
  1442. return -ERESTARTSYS;
  1443. }
  1444. mutex_lock(&listener_access_lock);
  1445. }
  1446. }
  1447. new_entry = kzalloc(sizeof(*new_entry), GFP_KERNEL);
  1448. if (!new_entry)
  1449. return -ENOMEM;
  1450. memcpy(&new_entry->svc, &rcvd_lstnr, sizeof(rcvd_lstnr));
  1451. new_entry->rcv_req_flag = 0;
  1452. new_entry->sglistinfo_ptr =
  1453. (struct sglist_info *)__qseecom_alloc_tzbuf(
  1454. sizeof(struct sglist_info) * MAX_ION_FD,
  1455. &new_entry->sglistinfo_shm.paddr,
  1456. &new_entry->sglistinfo_shm);
  1457. if (!new_entry->sglistinfo_ptr) {
  1458. kfree(new_entry);
  1459. return -ENOMEM;
  1460. }
  1461. new_entry->svc.listener_id = rcvd_lstnr.listener_id;
  1462. new_entry->sb_length = rcvd_lstnr.sb_size;
  1463. new_entry->user_virt_sb_base = rcvd_lstnr.virt_sb_base;
  1464. if (__qseecom_set_sb_memory(new_entry, data, &rcvd_lstnr)) {
  1465. pr_err("qseecom_set_sb_memory failed for listener %d, size %d\n",
  1466. rcvd_lstnr.listener_id, rcvd_lstnr.sb_size);
  1467. __qseecom_free_tzbuf(&new_entry->sglistinfo_shm);
  1468. kfree_sensitive(new_entry);
  1469. return -ENOMEM;
  1470. }
  1471. init_waitqueue_head(&new_entry->rcv_req_wq);
  1472. init_waitqueue_head(&new_entry->listener_block_app_wq);
  1473. new_entry->send_resp_flag = 0;
  1474. new_entry->listener_in_use = false;
  1475. list_add_tail(&new_entry->list, &qseecom.registered_listener_list_head);
  1476. data->listener.id = rcvd_lstnr.listener_id;
  1477. pr_debug("Service %d is registered\n", rcvd_lstnr.listener_id);
  1478. return ret;
  1479. }
  1480. static int __qseecom_unregister_listener(struct qseecom_dev_handle *data,
  1481. struct qseecom_registered_listener_list *ptr_svc)
  1482. {
  1483. int ret = 0;
  1484. struct qseecom_register_listener_ireq req;
  1485. struct qseecom_command_scm_resp resp;
  1486. req.qsee_cmd_id = QSEOS_DEREGISTER_LISTENER;
  1487. req.listener_id = data->listener.id;
  1488. resp.result = QSEOS_RESULT_INCOMPLETE;
  1489. mutex_unlock(&listener_access_lock);
  1490. mutex_lock(&app_access_lock);
  1491. __qseecom_reentrancy_check_if_no_app_blocked(
  1492. TZ_OS_DEREGISTER_LISTENER_ID);
  1493. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, &req,
  1494. sizeof(req), &resp, sizeof(resp));
  1495. mutex_unlock(&app_access_lock);
  1496. mutex_lock(&listener_access_lock);
  1497. if (ret) {
  1498. pr_err("scm_call() failed with err: %d (lstnr id=%d)\n",
  1499. ret, data->listener.id);
  1500. return ret;
  1501. }
  1502. if (resp.result != QSEOS_RESULT_SUCCESS) {
  1503. pr_err("Failed resp.result=%d,(lstnr id=%d)\n",
  1504. resp.result, data->listener.id);
  1505. ret = -EPERM;
  1506. goto exit;
  1507. }
  1508. while (atomic_read(&data->ioctl_count) > 1) {
  1509. if (wait_event_interruptible(data->abort_wq,
  1510. atomic_read(&data->ioctl_count) <= 1)) {
  1511. pr_err("Interrupted from abort\n");
  1512. ret = -ERESTARTSYS;
  1513. }
  1514. }
  1515. exit:
  1516. if (ptr_svc->dmabuf) {
  1517. qseecom_vaddr_unmap(ptr_svc->sb_virt,
  1518. ptr_svc->sgt, ptr_svc->attach, ptr_svc->dmabuf);
  1519. MAKE_NULL(ptr_svc->sgt, ptr_svc->attach, ptr_svc->dmabuf);
  1520. }
  1521. __qseecom_free_tzbuf(&ptr_svc->sglistinfo_shm);
  1522. list_del(&ptr_svc->list);
  1523. kfree_sensitive(ptr_svc);
  1524. data->released = true;
  1525. pr_debug("Service %d is unregistered\n", data->listener.id);
  1526. return ret;
  1527. }
  1528. static int qseecom_unregister_listener(struct qseecom_dev_handle *data)
  1529. {
  1530. struct qseecom_registered_listener_list *ptr_svc = NULL;
  1531. struct qseecom_unregister_pending_list *entry = NULL;
  1532. if (data->released) {
  1533. pr_err("Don't unregister lsnr %d\n", data->listener.id);
  1534. return -EINVAL;
  1535. }
  1536. ptr_svc = __qseecom_find_svc(data->listener.id);
  1537. if (!ptr_svc) {
  1538. pr_err("Unregiser invalid listener ID %d\n", data->listener.id);
  1539. return -ENODATA;
  1540. }
  1541. /* stop CA thread waiting for listener response */
  1542. ptr_svc->abort = 1;
  1543. wake_up_interruptible_all(&qseecom.send_resp_wq);
  1544. /* stop listener thread waiting for listener request */
  1545. data->abort = 1;
  1546. wake_up_all(&ptr_svc->rcv_req_wq);
  1547. /* return directly if pending*/
  1548. if (ptr_svc->unregister_pending)
  1549. return 0;
  1550. /*add unregistration into pending list*/
  1551. entry = kzalloc(sizeof(*entry), GFP_KERNEL);
  1552. if (!entry)
  1553. return -ENOMEM;
  1554. entry->data = data;
  1555. list_add_tail(&entry->list,
  1556. &qseecom.unregister_lsnr_pending_list_head);
  1557. ptr_svc->unregister_pending = true;
  1558. pr_debug("unregister %d pending\n", data->listener.id);
  1559. return 0;
  1560. }
  1561. static void __qseecom_processing_pending_lsnr_unregister(void)
  1562. {
  1563. struct qseecom_unregister_pending_list *entry = NULL;
  1564. struct qseecom_registered_listener_list *ptr_svc = NULL;
  1565. struct list_head *pos;
  1566. int ret = 0;
  1567. mutex_lock(&listener_access_lock);
  1568. while (!list_empty(&qseecom.unregister_lsnr_pending_list_head)) {
  1569. pos = qseecom.unregister_lsnr_pending_list_head.next;
  1570. entry = list_entry(pos,
  1571. struct qseecom_unregister_pending_list, list);
  1572. if (entry && entry->data) {
  1573. pr_debug("process pending unregister %d\n",
  1574. entry->data->listener.id);
  1575. /* don't process the entry if qseecom_release is not called*/
  1576. if (!entry->data->listener.release_called) {
  1577. list_del(pos);
  1578. list_add_tail(&entry->list,
  1579. &qseecom.unregister_lsnr_pending_list_head);
  1580. break;
  1581. }
  1582. ptr_svc = __qseecom_find_svc(
  1583. entry->data->listener.id);
  1584. if (ptr_svc) {
  1585. ret = __qseecom_unregister_listener(
  1586. entry->data, ptr_svc);
  1587. if (ret) {
  1588. pr_debug("unregister %d pending again\n",
  1589. entry->data->listener.id);
  1590. mutex_unlock(&listener_access_lock);
  1591. return;
  1592. }
  1593. } else
  1594. pr_err("invalid listener %d\n",
  1595. entry->data->listener.id);
  1596. __qseecom_free_tzbuf(&entry->data->sglistinfo_shm);
  1597. kfree_sensitive(entry->data);
  1598. }
  1599. list_del(pos);
  1600. kfree_sensitive(entry);
  1601. }
  1602. mutex_unlock(&listener_access_lock);
  1603. wake_up_interruptible(&qseecom.register_lsnr_pending_wq);
  1604. }
  1605. static void __wakeup_unregister_listener_kthread(void)
  1606. {
  1607. atomic_set(&qseecom.unregister_lsnr_kthread_state,
  1608. LSNR_UNREG_KT_WAKEUP);
  1609. wake_up_interruptible(&qseecom.unregister_lsnr_kthread_wq);
  1610. }
  1611. static int __qseecom_unregister_listener_kthread_func(void *data)
  1612. {
  1613. while (!kthread_should_stop()) {
  1614. wait_event_interruptible(
  1615. qseecom.unregister_lsnr_kthread_wq,
  1616. atomic_read(&qseecom.unregister_lsnr_kthread_state)
  1617. == LSNR_UNREG_KT_WAKEUP);
  1618. pr_debug("kthread to unregister listener is called %d\n",
  1619. atomic_read(&qseecom.unregister_lsnr_kthread_state));
  1620. __qseecom_processing_pending_lsnr_unregister();
  1621. atomic_set(&qseecom.unregister_lsnr_kthread_state,
  1622. LSNR_UNREG_KT_SLEEP);
  1623. }
  1624. pr_warn("kthread to unregister listener stopped\n");
  1625. return 0;
  1626. }
  1627. static int qseecom_bus_scale_update_request(
  1628. int client, int mode)
  1629. {
  1630. pr_debug("client %d, mode %d\n", client, mode);
  1631. /*TODO: get ab/ib from device tree for different mode*/
  1632. if (!mode)
  1633. return icc_set_bw(qseecom.icc_path, 0, 0);
  1634. else
  1635. return icc_set_bw(qseecom.icc_path,
  1636. qseecom.avg_bw, qseecom.peak_bw);
  1637. }
  1638. static int __qseecom_set_msm_bus_request(uint32_t mode)
  1639. {
  1640. int ret = 0;
  1641. struct qseecom_clk *qclk;
  1642. qclk = &qseecom.qsee;
  1643. if (qclk->ce_core_src_clk != NULL) {
  1644. if (mode == INACTIVE) {
  1645. __qseecom_disable_clk(CLK_QSEE);
  1646. } else {
  1647. ret = __qseecom_enable_clk(CLK_QSEE);
  1648. if (ret)
  1649. pr_err("CLK enabling failed (%d) MODE (%d)\n",
  1650. ret, mode);
  1651. }
  1652. }
  1653. if ((!ret) && (qseecom.current_mode != mode)) {
  1654. ret = qseecom_bus_scale_update_request(
  1655. qseecom.qsee_perf_client, mode);
  1656. if (ret) {
  1657. pr_err("Bandwidth req failed(%d) MODE (%d)\n",
  1658. ret, mode);
  1659. if (qclk->ce_core_src_clk != NULL) {
  1660. if (mode == INACTIVE) {
  1661. ret = __qseecom_enable_clk(CLK_QSEE);
  1662. if (ret)
  1663. pr_err("CLK enable failed\n");
  1664. } else
  1665. __qseecom_disable_clk(CLK_QSEE);
  1666. }
  1667. }
  1668. qseecom.current_mode = mode;
  1669. }
  1670. return ret;
  1671. }
  1672. static void qseecom_bw_inactive_req_work(struct work_struct *work)
  1673. {
  1674. mutex_lock(&app_access_lock);
  1675. mutex_lock(&qsee_bw_mutex);
  1676. if (qseecom.timer_running)
  1677. __qseecom_set_msm_bus_request(INACTIVE);
  1678. pr_debug("current_mode = %d, cumulative_mode = %d\n",
  1679. qseecom.current_mode, qseecom.cumulative_mode);
  1680. qseecom.timer_running = false;
  1681. mutex_unlock(&qsee_bw_mutex);
  1682. mutex_unlock(&app_access_lock);
  1683. }
  1684. static void qseecom_scale_bus_bandwidth_timer_callback(struct timer_list *data)
  1685. {
  1686. schedule_work(&qseecom.bw_inactive_req_ws);
  1687. }
  1688. static int __qseecom_decrease_clk_ref_count(enum qseecom_ce_hw_instance ce)
  1689. {
  1690. struct qseecom_clk *qclk;
  1691. int ret = 0;
  1692. mutex_lock(&clk_access_lock);
  1693. if (ce == CLK_QSEE)
  1694. qclk = &qseecom.qsee;
  1695. else
  1696. qclk = &qseecom.ce_drv;
  1697. if (qclk->clk_access_cnt > 0) {
  1698. qclk->clk_access_cnt--;
  1699. } else {
  1700. pr_err("Invalid clock ref count %d\n", qclk->clk_access_cnt);
  1701. ret = -EINVAL;
  1702. }
  1703. mutex_unlock(&clk_access_lock);
  1704. return ret;
  1705. }
  1706. static int qseecom_scale_bus_bandwidth_timer(uint32_t mode)
  1707. {
  1708. int32_t ret = 0;
  1709. int32_t request_mode = INACTIVE;
  1710. mutex_lock(&qsee_bw_mutex);
  1711. if (mode == 0) {
  1712. if (qseecom.cumulative_mode > MEDIUM)
  1713. request_mode = HIGH;
  1714. else
  1715. request_mode = qseecom.cumulative_mode;
  1716. } else {
  1717. request_mode = mode;
  1718. }
  1719. ret = __qseecom_set_msm_bus_request(request_mode);
  1720. if (ret) {
  1721. pr_err("set msm bus request failed (%d),request_mode (%d)\n",
  1722. ret, request_mode);
  1723. goto err_scale_timer;
  1724. }
  1725. if (qseecom.timer_running) {
  1726. ret = __qseecom_decrease_clk_ref_count(CLK_QSEE);
  1727. if (ret) {
  1728. pr_err("Failed to decrease clk ref count.\n");
  1729. goto err_scale_timer;
  1730. }
  1731. del_timer_sync(&(qseecom.bw_scale_down_timer));
  1732. qseecom.timer_running = false;
  1733. }
  1734. err_scale_timer:
  1735. mutex_unlock(&qsee_bw_mutex);
  1736. return ret;
  1737. }
  1738. static int qseecom_unregister_bus_bandwidth_needs(
  1739. struct qseecom_dev_handle *data)
  1740. {
  1741. qseecom.cumulative_mode -= data->mode;
  1742. data->mode = INACTIVE;
  1743. return 0;
  1744. }
  1745. static int __qseecom_register_bus_bandwidth_needs(
  1746. struct qseecom_dev_handle *data, uint32_t request_mode)
  1747. {
  1748. if (data->mode == INACTIVE) {
  1749. qseecom.cumulative_mode += request_mode;
  1750. data->mode = request_mode;
  1751. } else {
  1752. if (data->mode != request_mode) {
  1753. qseecom.cumulative_mode -= data->mode;
  1754. qseecom.cumulative_mode += request_mode;
  1755. data->mode = request_mode;
  1756. }
  1757. }
  1758. return 0;
  1759. }
  1760. static int qseecom_perf_enable(struct qseecom_dev_handle *data)
  1761. {
  1762. int ret = 0;
  1763. ret = qsee_vote_for_clock(data, CLK_DFAB);
  1764. if (ret) {
  1765. pr_err("Failed to vote for DFAB clock with err %d\n", ret);
  1766. goto perf_enable_exit;
  1767. }
  1768. ret = qsee_vote_for_clock(data, CLK_SFPB);
  1769. if (ret) {
  1770. qsee_disable_clock_vote(data, CLK_DFAB);
  1771. pr_err("Failed to vote for SFPB clock with err %d\n", ret);
  1772. goto perf_enable_exit;
  1773. }
  1774. perf_enable_exit:
  1775. return ret;
  1776. }
  1777. static void __qseecom_add_bw_scale_down_timer(uint32_t duration)
  1778. {
  1779. if (qseecom.no_clock_support)
  1780. return;
  1781. mutex_lock(&qsee_bw_mutex);
  1782. qseecom.bw_scale_down_timer.expires = jiffies +
  1783. msecs_to_jiffies(duration);
  1784. mod_timer(&(qseecom.bw_scale_down_timer),
  1785. qseecom.bw_scale_down_timer.expires);
  1786. qseecom.timer_running = true;
  1787. mutex_unlock(&qsee_bw_mutex);
  1788. }
  1789. static void __qseecom_disable_clk_scale_down(struct qseecom_dev_handle *data)
  1790. {
  1791. if (!qseecom.support_bus_scaling)
  1792. qsee_disable_clock_vote(data, CLK_SFPB);
  1793. else
  1794. __qseecom_add_bw_scale_down_timer(
  1795. QSEECOM_LOAD_APP_CRYPTO_TIMEOUT);
  1796. }
  1797. static int __qseecom_enable_clk_scale_up(struct qseecom_dev_handle *data)
  1798. {
  1799. int ret = 0;
  1800. if (qseecom.support_bus_scaling) {
  1801. ret = qseecom_scale_bus_bandwidth_timer(MEDIUM);
  1802. if (ret)
  1803. pr_err("Failed to set bw MEDIUM.\n");
  1804. } else {
  1805. ret = qsee_vote_for_clock(data, CLK_SFPB);
  1806. if (ret)
  1807. pr_err("Fail vote for clk SFPB ret %d\n", ret);
  1808. }
  1809. return ret;
  1810. }
  1811. static int qseecom_set_client_mem_param(struct qseecom_dev_handle *data,
  1812. void __user *argp)
  1813. {
  1814. int32_t ret;
  1815. struct qseecom_set_sb_mem_param_req req;
  1816. size_t len;
  1817. /* Copy the relevant information needed for loading the image */
  1818. if (copy_from_user(&req, (void __user *)argp, sizeof(req)))
  1819. return -EFAULT;
  1820. if ((req.ifd_data_fd <= 0) || (req.virt_sb_base == NULL) ||
  1821. (req.sb_len == 0)) {
  1822. pr_err("Invalid input(s)ion_fd(%d), sb_len(%d), vaddr(0x%pK)\n",
  1823. req.ifd_data_fd, req.sb_len, req.virt_sb_base);
  1824. return -EFAULT;
  1825. }
  1826. if (!access_ok((void __user *)req.virt_sb_base,
  1827. req.sb_len))
  1828. return -EFAULT;
  1829. ret = qseecom_vaddr_map(req.ifd_data_fd, &data->client.sb_phys,
  1830. (void **)&data->client.sb_virt,
  1831. &data->client.sgt, &data->client.attach,
  1832. &len, &data->client.dmabuf);
  1833. if (ret) {
  1834. pr_err("failed to convert ion_fd %d for lsnr %d with err: %d\n",
  1835. req.ifd_data_fd, data->client.app_id, ret);
  1836. return -EINVAL;
  1837. }
  1838. if (len < req.sb_len) {
  1839. pr_err("Requested length (0x%x) is > allocated (%zu)\n",
  1840. req.sb_len, len);
  1841. ret = -EINVAL;
  1842. goto exit;
  1843. }
  1844. data->client.sb_length = req.sb_len;
  1845. data->client.user_virt_sb_base = (uintptr_t)req.virt_sb_base;
  1846. return ret;
  1847. exit:
  1848. if (data->client.dmabuf) {
  1849. qseecom_vaddr_unmap(data->client.sb_virt, data->client.sgt,
  1850. data->client.attach, data->client.dmabuf);
  1851. MAKE_NULL(data->client.sgt,
  1852. data->client.attach, data->client.dmabuf);
  1853. }
  1854. return ret;
  1855. }
  1856. static int __qseecom_listener_has_sent_rsp(struct qseecom_dev_handle *data,
  1857. struct qseecom_registered_listener_list *ptr_svc)
  1858. {
  1859. int ret;
  1860. ret = (qseecom.send_resp_flag != 0);
  1861. return ret || data->abort || ptr_svc->abort;
  1862. }
  1863. static int __qseecom_reentrancy_listener_has_sent_rsp(
  1864. struct qseecom_dev_handle *data,
  1865. struct qseecom_registered_listener_list *ptr_svc)
  1866. {
  1867. int ret;
  1868. ret = (ptr_svc->send_resp_flag != 0);
  1869. return ret || data->abort || ptr_svc->abort;
  1870. }
  1871. static void __qseecom_clean_listener_sglistinfo(
  1872. struct qseecom_registered_listener_list *ptr_svc)
  1873. {
  1874. if (ptr_svc->sglist_cnt) {
  1875. memset(ptr_svc->sglistinfo_ptr, 0,
  1876. SGLISTINFO_TABLE_SIZE);
  1877. ptr_svc->sglist_cnt = 0;
  1878. }
  1879. }
  1880. static int __qseecom_process_incomplete_cmd(struct qseecom_dev_handle *data,
  1881. struct qseecom_command_scm_resp *resp)
  1882. {
  1883. int ret = 0;
  1884. int rc = 0;
  1885. uint32_t lstnr;
  1886. struct qseecom_client_listener_data_irsp send_data_rsp = {0};
  1887. struct qseecom_client_listener_data_64bit_irsp send_data_rsp_64bit
  1888. = {0};
  1889. struct qseecom_registered_listener_list *ptr_svc = NULL;
  1890. sigset_t new_sigset;
  1891. uint32_t status;
  1892. void *cmd_buf = NULL;
  1893. size_t cmd_len;
  1894. struct sglist_info *table = NULL;
  1895. qseecom.app_block_ref_cnt++;
  1896. while (resp->result == QSEOS_RESULT_INCOMPLETE) {
  1897. lstnr = resp->data;
  1898. /*
  1899. * Wake up blocking lsitener service with the lstnr id
  1900. */
  1901. mutex_lock(&listener_access_lock);
  1902. list_for_each_entry(ptr_svc,
  1903. &qseecom.registered_listener_list_head, list) {
  1904. if (ptr_svc->svc.listener_id == lstnr) {
  1905. ptr_svc->listener_in_use = true;
  1906. ptr_svc->rcv_req_flag = 1;
  1907. ret = qseecom_dmabuf_cache_operations(
  1908. ptr_svc->dmabuf,
  1909. QSEECOM_CACHE_INVALIDATE);
  1910. if (ret) {
  1911. rc = -EINVAL;
  1912. status = QSEOS_RESULT_FAILURE;
  1913. goto err_resp;
  1914. }
  1915. wake_up_interruptible(&ptr_svc->rcv_req_wq);
  1916. break;
  1917. }
  1918. }
  1919. if (ptr_svc == NULL) {
  1920. pr_err("Listener Svc %d does not exist\n", lstnr);
  1921. rc = -EINVAL;
  1922. status = QSEOS_RESULT_FAILURE;
  1923. goto err_resp;
  1924. }
  1925. if (!ptr_svc->dmabuf) {
  1926. pr_err("Client dmabuf is not initialized\n");
  1927. rc = -EINVAL;
  1928. status = QSEOS_RESULT_FAILURE;
  1929. goto err_resp;
  1930. }
  1931. if (ptr_svc->svc.listener_id != lstnr) {
  1932. pr_err("Service %d does not exist\n",
  1933. lstnr);
  1934. rc = -ERESTARTSYS;
  1935. ptr_svc = NULL;
  1936. status = QSEOS_RESULT_FAILURE;
  1937. goto err_resp;
  1938. }
  1939. if (ptr_svc->abort == 1) {
  1940. pr_debug("Service %d abort %d\n",
  1941. lstnr, ptr_svc->abort);
  1942. rc = -ENODEV;
  1943. status = QSEOS_RESULT_FAILURE;
  1944. goto err_resp;
  1945. }
  1946. pr_debug("waking up rcv_req_wq and waiting for send_resp_wq\n");
  1947. /* initialize the new signal mask with all signals*/
  1948. sigfillset(&new_sigset);
  1949. /* block all signals */
  1950. mutex_unlock(&listener_access_lock);
  1951. do {
  1952. /*
  1953. * When reentrancy is not supported, check global
  1954. * send_resp_flag; otherwise, check this listener's
  1955. * send_resp_flag.
  1956. */
  1957. if (!qseecom.qsee_reentrancy_support &&
  1958. !wait_event_interruptible(qseecom.send_resp_wq,
  1959. __qseecom_listener_has_sent_rsp(
  1960. data, ptr_svc))) {
  1961. break;
  1962. }
  1963. if (qseecom.qsee_reentrancy_support &&
  1964. !wait_event_interruptible(qseecom.send_resp_wq,
  1965. __qseecom_reentrancy_listener_has_sent_rsp(
  1966. data, ptr_svc))) {
  1967. break;
  1968. }
  1969. } while (1);
  1970. mutex_lock(&listener_access_lock);
  1971. /* restore signal mask */
  1972. if (data->abort || ptr_svc->abort) {
  1973. pr_err("Abort clnt %d waiting on lstnr svc %d, ret %d\n",
  1974. data->client.app_id, lstnr, ret);
  1975. rc = -ENODEV;
  1976. status = QSEOS_RESULT_FAILURE;
  1977. } else {
  1978. status = QSEOS_RESULT_SUCCESS;
  1979. }
  1980. err_resp:
  1981. qseecom.send_resp_flag = 0;
  1982. if (ptr_svc) {
  1983. ptr_svc->send_resp_flag = 0;
  1984. table = ptr_svc->sglistinfo_ptr;
  1985. }
  1986. if (qseecom.qsee_version < QSEE_VERSION_40) {
  1987. send_data_rsp.listener_id = lstnr;
  1988. send_data_rsp.status = status;
  1989. if (table) {
  1990. send_data_rsp.sglistinfo_ptr =
  1991. (uint32_t)virt_to_phys(table);
  1992. send_data_rsp.sglistinfo_len =
  1993. SGLISTINFO_TABLE_SIZE;
  1994. qtee_shmbridge_flush_shm_buf(
  1995. &ptr_svc->sglistinfo_shm);
  1996. }
  1997. cmd_buf = (void *)&send_data_rsp;
  1998. cmd_len = sizeof(send_data_rsp);
  1999. } else {
  2000. send_data_rsp_64bit.listener_id = lstnr;
  2001. send_data_rsp_64bit.status = status;
  2002. if (table) {
  2003. send_data_rsp_64bit.sglistinfo_ptr =
  2004. virt_to_phys(table);
  2005. send_data_rsp_64bit.sglistinfo_len =
  2006. SGLISTINFO_TABLE_SIZE;
  2007. qtee_shmbridge_flush_shm_buf(
  2008. &ptr_svc->sglistinfo_shm);
  2009. }
  2010. cmd_buf = (void *)&send_data_rsp_64bit;
  2011. cmd_len = sizeof(send_data_rsp_64bit);
  2012. }
  2013. if (!qseecom.whitelist_support || table == NULL)
  2014. *(uint32_t *)cmd_buf = QSEOS_LISTENER_DATA_RSP_COMMAND;
  2015. else
  2016. *(uint32_t *)cmd_buf =
  2017. QSEOS_LISTENER_DATA_RSP_COMMAND_WHITELIST;
  2018. if ((lstnr == RPMB_SERVICE) || (lstnr == SSD_SERVICE)) {
  2019. ret = __qseecom_enable_clk(CLK_QSEE);
  2020. if (ret)
  2021. goto exit;
  2022. }
  2023. if (ptr_svc) {
  2024. ret = qseecom_dmabuf_cache_operations(ptr_svc->dmabuf,
  2025. QSEECOM_CACHE_CLEAN);
  2026. if (ret)
  2027. goto exit;
  2028. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  2029. cmd_buf, cmd_len, resp, sizeof(*resp));
  2030. ptr_svc->listener_in_use = false;
  2031. __qseecom_clean_listener_sglistinfo(ptr_svc);
  2032. if (ret) {
  2033. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  2034. ret, data->client.app_id);
  2035. goto exit;
  2036. }
  2037. } else {
  2038. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  2039. cmd_buf, cmd_len, resp, sizeof(*resp));
  2040. if (ret) {
  2041. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  2042. ret, data->client.app_id);
  2043. goto exit;
  2044. }
  2045. }
  2046. pr_debug("resp status %d, res= %d, app_id = %d, lstr = %d\n",
  2047. status, resp->result, data->client.app_id, lstnr);
  2048. if ((resp->result != QSEOS_RESULT_SUCCESS) &&
  2049. (resp->result != QSEOS_RESULT_INCOMPLETE)) {
  2050. pr_err("fail:resp res= %d,app_id = %d,lstr = %d\n",
  2051. resp->result, data->client.app_id, lstnr);
  2052. ret = -EINVAL;
  2053. }
  2054. exit:
  2055. mutex_unlock(&listener_access_lock);
  2056. if ((lstnr == RPMB_SERVICE) || (lstnr == SSD_SERVICE))
  2057. __qseecom_disable_clk(CLK_QSEE);
  2058. }
  2059. qseecom.app_block_ref_cnt--;
  2060. wake_up_interruptible_all(&qseecom.app_block_wq);
  2061. if (rc)
  2062. return rc;
  2063. return ret;
  2064. }
  2065. static int __qseecom_process_reentrancy_blocked_on_listener(
  2066. struct qseecom_command_scm_resp *resp,
  2067. struct qseecom_registered_app_list *ptr_app,
  2068. struct qseecom_dev_handle *data)
  2069. {
  2070. struct qseecom_registered_listener_list *list_ptr;
  2071. int ret = 0;
  2072. struct qseecom_continue_blocked_request_ireq ireq;
  2073. struct qseecom_command_scm_resp continue_resp;
  2074. unsigned int session_id;
  2075. sigset_t new_sigset;
  2076. unsigned long flags;
  2077. bool found_app = false;
  2078. struct qseecom_registered_app_list dummy_app_entry = { {NULL} };
  2079. if (!resp || !data) {
  2080. pr_err("invalid resp or data pointer\n");
  2081. ret = -EINVAL;
  2082. goto exit;
  2083. }
  2084. /* find app_id & img_name from list */
  2085. if (!ptr_app) {
  2086. if (data->client.from_smcinvoke || data->client.from_loadapp) {
  2087. pr_debug("This request is from %s\n",
  2088. (data->client.from_smcinvoke ? "smcinvoke" : "load_app"));
  2089. ptr_app = &dummy_app_entry;
  2090. ptr_app->app_id = data->client.app_id;
  2091. } else {
  2092. spin_lock_irqsave(&qseecom.registered_app_list_lock,
  2093. flags);
  2094. list_for_each_entry(ptr_app,
  2095. &qseecom.registered_app_list_head, list) {
  2096. if ((ptr_app->app_id == data->client.app_id) &&
  2097. (!strcmp(ptr_app->app_name,
  2098. data->client.app_name))) {
  2099. found_app = true;
  2100. break;
  2101. }
  2102. }
  2103. spin_unlock_irqrestore(
  2104. &qseecom.registered_app_list_lock, flags);
  2105. if (!found_app) {
  2106. pr_err("app_id %d (%s) is not found\n",
  2107. data->client.app_id,
  2108. (char *)data->client.app_name);
  2109. ret = -ENOENT;
  2110. goto exit;
  2111. }
  2112. }
  2113. }
  2114. do {
  2115. session_id = resp->resp_type;
  2116. mutex_lock(&listener_access_lock);
  2117. list_ptr = __qseecom_find_svc(resp->data);
  2118. if (!list_ptr) {
  2119. pr_err("Invalid listener ID %d\n", resp->data);
  2120. ret = -ENODATA;
  2121. mutex_unlock(&listener_access_lock);
  2122. goto exit;
  2123. }
  2124. ptr_app->blocked_on_listener_id = resp->data;
  2125. pr_warn("Lsntr %d in_use %d, block session(%d) app(%d)\n",
  2126. resp->data, list_ptr->listener_in_use,
  2127. session_id, data->client.app_id);
  2128. /* sleep until listener is available */
  2129. sigfillset(&new_sigset);
  2130. do {
  2131. qseecom.app_block_ref_cnt++;
  2132. ptr_app->app_blocked = true;
  2133. mutex_unlock(&listener_access_lock);
  2134. mutex_unlock(&app_access_lock);
  2135. wait_event_interruptible(
  2136. list_ptr->listener_block_app_wq,
  2137. !list_ptr->listener_in_use);
  2138. mutex_lock(&app_access_lock);
  2139. mutex_lock(&listener_access_lock);
  2140. ptr_app->app_blocked = false;
  2141. qseecom.app_block_ref_cnt--;
  2142. } while (list_ptr->listener_in_use);
  2143. ptr_app->blocked_on_listener_id = 0;
  2144. pr_warn("Lsntr %d is available, unblock session(%d) app(%d)\n",
  2145. resp->data, session_id, data->client.app_id);
  2146. /* notify TZ that listener is available */
  2147. ireq.qsee_cmd_id = QSEOS_CONTINUE_BLOCKED_REQ_COMMAND;
  2148. if (qseecom.smcinvoke_support)
  2149. ireq.app_or_session_id = session_id;
  2150. else
  2151. ireq.app_or_session_id = data->client.app_id;
  2152. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  2153. &ireq, sizeof(ireq),
  2154. &continue_resp, sizeof(continue_resp));
  2155. if (ret && qseecom.smcinvoke_support) {
  2156. /* retry with legacy cmd */
  2157. pr_warn("falling back to legacy method\n");
  2158. qseecom.smcinvoke_support = false;
  2159. ireq.app_or_session_id = data->client.app_id;
  2160. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  2161. &ireq, sizeof(ireq),
  2162. &continue_resp, sizeof(continue_resp));
  2163. qseecom.smcinvoke_support = true;
  2164. if (ret) {
  2165. pr_err("unblock app %d or session %d fail\n",
  2166. data->client.app_id, session_id);
  2167. mutex_unlock(&listener_access_lock);
  2168. goto exit;
  2169. }
  2170. }
  2171. mutex_unlock(&listener_access_lock);
  2172. resp->result = continue_resp.result;
  2173. resp->resp_type = continue_resp.resp_type;
  2174. resp->data = continue_resp.data;
  2175. pr_err("unblock resp = %d\n", resp->result);
  2176. } while (resp->result == QSEOS_RESULT_BLOCKED_ON_LISTENER);
  2177. if (resp->result != QSEOS_RESULT_INCOMPLETE) {
  2178. pr_err("Unexpected unblock resp %d\n", resp->result);
  2179. ret = -EINVAL;
  2180. }
  2181. exit:
  2182. return ret;
  2183. }
  2184. static int __qseecom_reentrancy_process_incomplete_cmd(
  2185. struct qseecom_dev_handle *data,
  2186. struct qseecom_command_scm_resp *resp)
  2187. {
  2188. int ret = 0;
  2189. int rc = 0;
  2190. uint32_t lstnr;
  2191. struct qseecom_client_listener_data_irsp send_data_rsp = {0};
  2192. struct qseecom_client_listener_data_64bit_irsp send_data_rsp_64bit
  2193. = {0};
  2194. struct qseecom_registered_listener_list *ptr_svc = NULL;
  2195. sigset_t new_sigset;
  2196. uint32_t status;
  2197. void *cmd_buf = NULL;
  2198. size_t cmd_len;
  2199. struct sglist_info *table = NULL;
  2200. while (ret == 0 && resp->result == QSEOS_RESULT_INCOMPLETE) {
  2201. lstnr = resp->data;
  2202. /*
  2203. * Wake up blocking lsitener service with the lstnr id
  2204. */
  2205. mutex_lock(&listener_access_lock);
  2206. list_for_each_entry(ptr_svc,
  2207. &qseecom.registered_listener_list_head, list) {
  2208. if (ptr_svc->svc.listener_id == lstnr) {
  2209. ptr_svc->listener_in_use = true;
  2210. ptr_svc->rcv_req_flag = 1;
  2211. ret = qseecom_dmabuf_cache_operations(
  2212. ptr_svc->dmabuf,
  2213. QSEECOM_CACHE_INVALIDATE);
  2214. if (ret) {
  2215. rc = -EINVAL;
  2216. status = QSEOS_RESULT_FAILURE;
  2217. goto err_resp;
  2218. }
  2219. wake_up_interruptible(&ptr_svc->rcv_req_wq);
  2220. break;
  2221. }
  2222. }
  2223. if (ptr_svc == NULL) {
  2224. pr_err("Listener Svc %d does not exist\n", lstnr);
  2225. rc = -EINVAL;
  2226. status = QSEOS_RESULT_FAILURE;
  2227. goto err_resp;
  2228. }
  2229. if (!ptr_svc->dmabuf) {
  2230. pr_err("Client dmabuf is not initialized\n");
  2231. rc = -EINVAL;
  2232. status = QSEOS_RESULT_FAILURE;
  2233. goto err_resp;
  2234. }
  2235. if (ptr_svc->svc.listener_id != lstnr) {
  2236. pr_err("Service %d does not exist\n",
  2237. lstnr);
  2238. rc = -ERESTARTSYS;
  2239. ptr_svc = NULL;
  2240. table = NULL;
  2241. status = QSEOS_RESULT_FAILURE;
  2242. goto err_resp;
  2243. }
  2244. if (ptr_svc->abort == 1) {
  2245. pr_debug("Service %d abort %d\n",
  2246. lstnr, ptr_svc->abort);
  2247. rc = -ENODEV;
  2248. status = QSEOS_RESULT_FAILURE;
  2249. goto err_resp;
  2250. }
  2251. pr_debug("waking up rcv_req_wq and waiting for send_resp_wq\n");
  2252. /* initialize the new signal mask with all signals*/
  2253. sigfillset(&new_sigset);
  2254. /* block all signals */
  2255. /* unlock mutex btw waking listener and sleep-wait */
  2256. mutex_unlock(&listener_access_lock);
  2257. mutex_unlock(&app_access_lock);
  2258. do {
  2259. if (!wait_event_interruptible(qseecom.send_resp_wq,
  2260. __qseecom_reentrancy_listener_has_sent_rsp(
  2261. data, ptr_svc))) {
  2262. break;
  2263. }
  2264. } while (1);
  2265. /* lock mutex again after resp sent */
  2266. mutex_lock(&app_access_lock);
  2267. mutex_lock(&listener_access_lock);
  2268. ptr_svc->send_resp_flag = 0;
  2269. qseecom.send_resp_flag = 0;
  2270. /* restore signal mask */
  2271. if (data->abort || ptr_svc->abort) {
  2272. pr_err("Abort clnt %d waiting on lstnr svc %d, ret %d\n",
  2273. data->client.app_id, lstnr, ret);
  2274. rc = -ENODEV;
  2275. status = QSEOS_RESULT_FAILURE;
  2276. } else {
  2277. status = QSEOS_RESULT_SUCCESS;
  2278. }
  2279. err_resp:
  2280. if (ptr_svc)
  2281. table = ptr_svc->sglistinfo_ptr;
  2282. if (qseecom.qsee_version < QSEE_VERSION_40) {
  2283. send_data_rsp.listener_id = lstnr;
  2284. send_data_rsp.status = status;
  2285. if (table) {
  2286. send_data_rsp.sglistinfo_ptr =
  2287. (uint32_t)virt_to_phys(table);
  2288. send_data_rsp.sglistinfo_len =
  2289. SGLISTINFO_TABLE_SIZE;
  2290. qtee_shmbridge_flush_shm_buf(
  2291. &ptr_svc->sglistinfo_shm);
  2292. }
  2293. cmd_buf = (void *)&send_data_rsp;
  2294. cmd_len = sizeof(send_data_rsp);
  2295. } else {
  2296. send_data_rsp_64bit.listener_id = lstnr;
  2297. send_data_rsp_64bit.status = status;
  2298. if (table) {
  2299. send_data_rsp_64bit.sglistinfo_ptr =
  2300. virt_to_phys(table);
  2301. send_data_rsp_64bit.sglistinfo_len =
  2302. SGLISTINFO_TABLE_SIZE;
  2303. qtee_shmbridge_flush_shm_buf(
  2304. &ptr_svc->sglistinfo_shm);
  2305. }
  2306. cmd_buf = (void *)&send_data_rsp_64bit;
  2307. cmd_len = sizeof(send_data_rsp_64bit);
  2308. }
  2309. if (!qseecom.whitelist_support || table == NULL)
  2310. *(uint32_t *)cmd_buf = QSEOS_LISTENER_DATA_RSP_COMMAND;
  2311. else
  2312. *(uint32_t *)cmd_buf =
  2313. QSEOS_LISTENER_DATA_RSP_COMMAND_WHITELIST;
  2314. if (lstnr == RPMB_SERVICE) {
  2315. ret = __qseecom_enable_clk(CLK_QSEE);
  2316. if (ret)
  2317. goto exit;
  2318. }
  2319. if (ptr_svc) {
  2320. ret = qseecom_dmabuf_cache_operations(ptr_svc->dmabuf,
  2321. QSEECOM_CACHE_CLEAN);
  2322. if (ret)
  2323. goto exit;
  2324. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  2325. cmd_buf, cmd_len, resp, sizeof(*resp));
  2326. ptr_svc->listener_in_use = false;
  2327. __qseecom_clean_listener_sglistinfo(ptr_svc);
  2328. wake_up_interruptible(&ptr_svc->listener_block_app_wq);
  2329. if (ret) {
  2330. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  2331. ret, data->client.app_id);
  2332. goto exit;
  2333. }
  2334. } else {
  2335. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  2336. cmd_buf, cmd_len, resp, sizeof(*resp));
  2337. if (ret) {
  2338. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  2339. ret, data->client.app_id);
  2340. goto exit;
  2341. }
  2342. }
  2343. switch (resp->result) {
  2344. case QSEOS_RESULT_BLOCKED_ON_LISTENER:
  2345. pr_warn("send lsr %d rsp, but app %d block on lsr %d\n",
  2346. lstnr, data->client.app_id, resp->data);
  2347. if (lstnr == resp->data) {
  2348. pr_err("lstnr %d should not be blocked!\n",
  2349. lstnr);
  2350. ret = -EINVAL;
  2351. goto exit;
  2352. }
  2353. mutex_unlock(&listener_access_lock);
  2354. ret = __qseecom_process_reentrancy_blocked_on_listener(
  2355. resp, NULL, data);
  2356. mutex_lock(&listener_access_lock);
  2357. if (ret) {
  2358. pr_err("failed to process App(%d) %s blocked on listener %d\n",
  2359. data->client.app_id,
  2360. data->client.app_name, resp->data);
  2361. goto exit;
  2362. }
  2363. fallthrough;
  2364. case QSEOS_RESULT_SUCCESS:
  2365. break;
  2366. case QSEOS_RESULT_INCOMPLETE:
  2367. break;
  2368. case QSEOS_RESULT_CBACK_REQUEST:
  2369. pr_warn("get cback req app_id = %d, resp->data = %d\n",
  2370. data->client.app_id, resp->data);
  2371. resp->resp_type = SMCINVOKE_RESULT_INBOUND_REQ_NEEDED;
  2372. break;
  2373. default:
  2374. pr_err("fail:resp res= %d,app_id = %d,lstr = %d\n",
  2375. resp->result, data->client.app_id, lstnr);
  2376. ret = -EINVAL;
  2377. goto exit;
  2378. }
  2379. exit:
  2380. mutex_unlock(&listener_access_lock);
  2381. if (lstnr == RPMB_SERVICE)
  2382. __qseecom_disable_clk(CLK_QSEE);
  2383. }
  2384. if (rc)
  2385. return rc;
  2386. return ret;
  2387. }
  2388. /*
  2389. * QSEE doesn't support OS level cmds reentrancy until RE phase-3,
  2390. * and QSEE OS level scm_call cmds will fail if there is any blocked TZ app.
  2391. * So, needs to first check if no app blocked before sending OS level scm call,
  2392. * then wait until all apps are unblocked.
  2393. */
  2394. static void __qseecom_reentrancy_check_if_no_app_blocked(uint32_t smc_id)
  2395. {
  2396. if (qseecom.qsee_reentrancy_support > QSEE_REENTRANCY_PHASE_0 &&
  2397. qseecom.qsee_reentrancy_support < QSEE_REENTRANCY_PHASE_3 &&
  2398. IS_OWNER_TRUSTED_OS(TZ_SYSCALL_OWNER_ID(smc_id))) {
  2399. /* thread sleep until this app unblocked */
  2400. while (qseecom.app_block_ref_cnt > 0) {
  2401. mutex_unlock(&app_access_lock);
  2402. wait_event_interruptible(qseecom.app_block_wq,
  2403. (!qseecom.app_block_ref_cnt));
  2404. mutex_lock(&app_access_lock);
  2405. }
  2406. }
  2407. }
  2408. /*
  2409. * scm_call of send data will fail if this TA is blocked or there are more
  2410. * than one TA requesting listener services; So, first check to see if need
  2411. * to wait.
  2412. */
  2413. static void __qseecom_reentrancy_check_if_this_app_blocked(
  2414. struct qseecom_registered_app_list *ptr_app)
  2415. {
  2416. if (qseecom.qsee_reentrancy_support) {
  2417. ptr_app->check_block++;
  2418. while (ptr_app->app_blocked || qseecom.app_block_ref_cnt > 1) {
  2419. /* thread sleep until this app unblocked */
  2420. mutex_unlock(&app_access_lock);
  2421. wait_event_interruptible(qseecom.app_block_wq,
  2422. (!ptr_app->app_blocked &&
  2423. qseecom.app_block_ref_cnt <= 1));
  2424. mutex_lock(&app_access_lock);
  2425. }
  2426. ptr_app->check_block--;
  2427. }
  2428. }
  2429. static int __qseecom_check_app_exists(struct qseecom_check_app_ireq req,
  2430. uint32_t *app_id)
  2431. {
  2432. int32_t ret;
  2433. struct qseecom_command_scm_resp resp;
  2434. bool found_app = false;
  2435. struct qseecom_registered_app_list *entry = NULL;
  2436. unsigned long flags = 0;
  2437. if (!app_id) {
  2438. pr_err("Null pointer to app_id\n");
  2439. return -EINVAL;
  2440. }
  2441. *app_id = 0;
  2442. /* check if app exists and has been registered locally */
  2443. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  2444. list_for_each_entry(entry,
  2445. &qseecom.registered_app_list_head, list) {
  2446. if (!strcmp(entry->app_name, req.app_name)) {
  2447. found_app = true;
  2448. break;
  2449. }
  2450. }
  2451. spin_unlock_irqrestore(&qseecom.registered_app_list_lock, flags);
  2452. if (found_app) {
  2453. pr_debug("Found app with id %d\n", entry->app_id);
  2454. *app_id = entry->app_id;
  2455. return 0;
  2456. }
  2457. memset((void *)&resp, 0, sizeof(resp));
  2458. /* SCM_CALL to check if app_id for the mentioned app exists */
  2459. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, &req,
  2460. sizeof(struct qseecom_check_app_ireq),
  2461. &resp, sizeof(resp));
  2462. if (ret) {
  2463. pr_err("scm_call to check if app is already loaded failed\n");
  2464. return -EINVAL;
  2465. }
  2466. if (resp.result == QSEOS_RESULT_FAILURE)
  2467. return 0;
  2468. switch (resp.resp_type) {
  2469. /*qsee returned listener type response */
  2470. case QSEOS_LISTENER_ID:
  2471. pr_err("resp type is of listener type instead of app\n");
  2472. return -EINVAL;
  2473. case QSEOS_APP_ID:
  2474. *app_id = resp.data;
  2475. return 0;
  2476. default:
  2477. pr_err("invalid resp type (%d) from qsee\n",
  2478. resp.resp_type);
  2479. return -ENODEV;
  2480. }
  2481. }
  2482. static int qseecom_load_app(struct qseecom_dev_handle *data, void __user *argp)
  2483. {
  2484. struct qseecom_registered_app_list *entry = NULL;
  2485. unsigned long flags = 0;
  2486. u32 app_id = 0;
  2487. struct qseecom_load_img_req load_img_req;
  2488. int32_t ret = 0;
  2489. phys_addr_t pa = 0;
  2490. void *vaddr = NULL;
  2491. struct dma_buf_attachment *attach = NULL;
  2492. struct dma_buf *dmabuf = NULL;
  2493. struct sg_table *sgt = NULL;
  2494. size_t len;
  2495. struct qseecom_command_scm_resp resp;
  2496. struct qseecom_check_app_ireq req;
  2497. struct qseecom_load_app_ireq load_req;
  2498. struct qseecom_load_app_64bit_ireq load_req_64bit;
  2499. void *cmd_buf = NULL;
  2500. size_t cmd_len;
  2501. bool first_time = false;
  2502. /* Copy the relevant information needed for loading the image */
  2503. if (copy_from_user(&load_img_req,
  2504. (void __user *)argp,
  2505. sizeof(struct qseecom_load_img_req))) {
  2506. pr_err("copy_from_user failed\n");
  2507. return -EFAULT;
  2508. }
  2509. /* Check and load cmnlib */
  2510. if (qseecom.qsee_version > QSEEE_VERSION_00) {
  2511. if (!qseecom.commonlib_loaded &&
  2512. load_img_req.app_arch == ELFCLASS32) {
  2513. ret = qseecom_load_commonlib_image(data, "cmnlib");
  2514. if (ret) {
  2515. pr_err("failed to load cmnlib\n");
  2516. return -EIO;
  2517. }
  2518. qseecom.commonlib_loaded = true;
  2519. pr_debug("cmnlib is loaded\n");
  2520. }
  2521. if (!qseecom.commonlib64_loaded &&
  2522. load_img_req.app_arch == ELFCLASS64) {
  2523. ret = qseecom_load_commonlib_image(data, "cmnlib64");
  2524. if (ret) {
  2525. pr_err("failed to load cmnlib64\n");
  2526. return -EIO;
  2527. }
  2528. qseecom.commonlib64_loaded = true;
  2529. pr_debug("cmnlib64 is loaded\n");
  2530. }
  2531. }
  2532. if (qseecom.support_bus_scaling) {
  2533. mutex_lock(&qsee_bw_mutex);
  2534. ret = __qseecom_register_bus_bandwidth_needs(data, MEDIUM);
  2535. mutex_unlock(&qsee_bw_mutex);
  2536. if (ret)
  2537. return ret;
  2538. }
  2539. /* Vote for the SFPB clock */
  2540. ret = __qseecom_enable_clk_scale_up(data);
  2541. if (ret)
  2542. goto enable_clk_err;
  2543. req.qsee_cmd_id = QSEOS_APP_LOOKUP_COMMAND;
  2544. load_img_req.img_name[MAX_APP_NAME_SIZE-1] = '\0';
  2545. strlcpy(req.app_name, load_img_req.img_name, MAX_APP_NAME_SIZE);
  2546. ret = __qseecom_check_app_exists(req, &app_id);
  2547. if (ret < 0)
  2548. goto checkapp_err;
  2549. if (app_id) {
  2550. pr_debug("App id %d (%s) already exists\n", app_id,
  2551. (char *)(req.app_name));
  2552. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  2553. list_for_each_entry(entry,
  2554. &qseecom.registered_app_list_head, list){
  2555. if (entry->app_id == app_id) {
  2556. if (entry->ref_cnt == U32_MAX) {
  2557. pr_err("App %d (%s) ref_cnt overflow\n",
  2558. app_id, req.app_name);
  2559. ret = -EINVAL;
  2560. goto loadapp_err;
  2561. }
  2562. entry->ref_cnt++;
  2563. break;
  2564. }
  2565. }
  2566. spin_unlock_irqrestore(
  2567. &qseecom.registered_app_list_lock, flags);
  2568. ret = 0;
  2569. } else {
  2570. first_time = true;
  2571. pr_warn("App (%s) does'nt exist, loading apps for first time\n",
  2572. (char *)(load_img_req.img_name));
  2573. ret = qseecom_vaddr_map(load_img_req.ifd_data_fd,
  2574. &pa, &vaddr, &sgt, &attach, &len, &dmabuf);
  2575. if (ret) {
  2576. pr_err("Ion client could not retrieve the handle\n");
  2577. ret = -ENOMEM;
  2578. goto loadapp_err;
  2579. }
  2580. if (load_img_req.mdt_len > len || load_img_req.img_len > len) {
  2581. pr_err("ion len %zu is smaller than mdt_len %u or img_len %u\n",
  2582. len, load_img_req.mdt_len,
  2583. load_img_req.img_len);
  2584. ret = -EINVAL;
  2585. goto loadapp_err;
  2586. }
  2587. /* Populate the structure for sending scm call to load image */
  2588. if (qseecom.qsee_version < QSEE_VERSION_40) {
  2589. load_req.qsee_cmd_id = QSEOS_APP_START_COMMAND;
  2590. load_req.mdt_len = load_img_req.mdt_len;
  2591. load_req.img_len = load_img_req.img_len;
  2592. strlcpy(load_req.app_name, load_img_req.img_name,
  2593. MAX_APP_NAME_SIZE);
  2594. load_req.phy_addr = (uint32_t)pa;
  2595. cmd_buf = (void *)&load_req;
  2596. cmd_len = sizeof(struct qseecom_load_app_ireq);
  2597. } else {
  2598. load_req_64bit.qsee_cmd_id = QSEOS_APP_START_COMMAND;
  2599. load_req_64bit.mdt_len = load_img_req.mdt_len;
  2600. load_req_64bit.img_len = load_img_req.img_len;
  2601. strlcpy(load_req_64bit.app_name, load_img_req.img_name,
  2602. MAX_APP_NAME_SIZE);
  2603. load_req_64bit.phy_addr = (uint64_t)pa;
  2604. cmd_buf = (void *)&load_req_64bit;
  2605. cmd_len = sizeof(struct qseecom_load_app_64bit_ireq);
  2606. }
  2607. ret = qseecom_dmabuf_cache_operations(dmabuf,
  2608. QSEECOM_CACHE_CLEAN);
  2609. if (ret) {
  2610. pr_err("cache operation failed %d\n", ret);
  2611. goto loadapp_err;
  2612. }
  2613. /* SCM_CALL to load the app and get the app_id back */
  2614. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, cmd_buf,
  2615. cmd_len, &resp, sizeof(resp));
  2616. if (ret) {
  2617. pr_err("scm_call to load app failed\n");
  2618. ret = -EINVAL;
  2619. goto loadapp_err;
  2620. }
  2621. ret = qseecom_dmabuf_cache_operations(dmabuf,
  2622. QSEECOM_CACHE_INVALIDATE);
  2623. if (ret) {
  2624. pr_err("cache operation failed %d\n", ret);
  2625. goto loadapp_err;
  2626. }
  2627. do {
  2628. if (resp.result == QSEOS_RESULT_FAILURE) {
  2629. pr_err("scm_call rsp.result is QSEOS_RESULT_FAILURE\n");
  2630. ret = -EFAULT;
  2631. goto loadapp_err;
  2632. }
  2633. if (resp.result == QSEOS_RESULT_INCOMPLETE) {
  2634. ret = __qseecom_process_incomplete_cmd(data, &resp);
  2635. if (ret) {
  2636. /* TZ has created app_id, need to unload it */
  2637. pr_err("incomp_cmd err %d, %d, unload %d %s\n",
  2638. ret, resp.result, resp.data,
  2639. load_img_req.img_name);
  2640. __qseecom_unload_app(data, resp.data);
  2641. ret = -EFAULT;
  2642. goto loadapp_err;
  2643. }
  2644. }
  2645. if (resp.result == QSEOS_RESULT_BLOCKED_ON_LISTENER) {
  2646. pr_err("load app blocked on listener\n");
  2647. data->client.app_id = resp.result;
  2648. data->client.from_loadapp = true;
  2649. ret = __qseecom_process_reentrancy_blocked_on_listener(&resp,
  2650. NULL, data);
  2651. if (ret) {
  2652. pr_err("load app fail proc block on listener,ret :%d\n",
  2653. ret);
  2654. ret = -EFAULT;
  2655. goto loadapp_err;
  2656. }
  2657. }
  2658. } while ((resp.result == QSEOS_RESULT_BLOCKED_ON_LISTENER) ||
  2659. (resp.result == QSEOS_RESULT_INCOMPLETE));
  2660. if (resp.result != QSEOS_RESULT_SUCCESS) {
  2661. pr_err("scm_call failed resp.result unknown, %d\n",
  2662. resp.result);
  2663. ret = -EFAULT;
  2664. goto loadapp_err;
  2665. }
  2666. app_id = resp.data;
  2667. entry = kmalloc(sizeof(*entry), GFP_KERNEL);
  2668. if (!entry) {
  2669. ret = -ENOMEM;
  2670. goto loadapp_err;
  2671. }
  2672. entry->app_id = app_id;
  2673. entry->ref_cnt = 1;
  2674. entry->app_arch = load_img_req.app_arch;
  2675. /*
  2676. * keymaster app may be first loaded as "keymaste" by qseecomd,
  2677. * and then used as "keymaster" on some targets. To avoid app
  2678. * name checking error, register "keymaster" into app_list and
  2679. * thread private data.
  2680. */
  2681. if (!strcmp(load_img_req.img_name, "keymaste"))
  2682. strlcpy(entry->app_name, "keymaster",
  2683. MAX_APP_NAME_SIZE);
  2684. else
  2685. strlcpy(entry->app_name, load_img_req.img_name,
  2686. MAX_APP_NAME_SIZE);
  2687. entry->app_blocked = false;
  2688. entry->blocked_on_listener_id = 0;
  2689. entry->check_block = 0;
  2690. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  2691. list_add_tail(&entry->list, &qseecom.registered_app_list_head);
  2692. spin_unlock_irqrestore(&qseecom.registered_app_list_lock,
  2693. flags);
  2694. pr_warn("App with id %u (%s) now loaded\n", app_id,
  2695. (char *)(load_img_req.img_name));
  2696. }
  2697. data->client.app_id = app_id;
  2698. data->client.app_arch = load_img_req.app_arch;
  2699. if (!strcmp(load_img_req.img_name, "keymaste"))
  2700. strlcpy(data->client.app_name, "keymaster", MAX_APP_NAME_SIZE);
  2701. else
  2702. strlcpy(data->client.app_name, load_img_req.img_name,
  2703. MAX_APP_NAME_SIZE);
  2704. load_img_req.app_id = app_id;
  2705. if (copy_to_user(argp, &load_img_req, sizeof(load_img_req))) {
  2706. pr_err("copy_to_user failed\n");
  2707. ret = -EFAULT;
  2708. if (first_time) {
  2709. spin_lock_irqsave(
  2710. &qseecom.registered_app_list_lock, flags);
  2711. list_del(&entry->list);
  2712. spin_unlock_irqrestore(
  2713. &qseecom.registered_app_list_lock, flags);
  2714. kfree_sensitive(entry);
  2715. }
  2716. }
  2717. loadapp_err:
  2718. if (dmabuf) {
  2719. qseecom_vaddr_unmap(vaddr, sgt, attach, dmabuf);
  2720. MAKE_NULL(sgt, attach, dmabuf);
  2721. }
  2722. checkapp_err:
  2723. __qseecom_disable_clk_scale_down(data);
  2724. enable_clk_err:
  2725. if (qseecom.support_bus_scaling) {
  2726. mutex_lock(&qsee_bw_mutex);
  2727. qseecom_unregister_bus_bandwidth_needs(data);
  2728. mutex_unlock(&qsee_bw_mutex);
  2729. }
  2730. return ret;
  2731. }
  2732. static int __qseecom_cleanup_app(struct qseecom_dev_handle *data)
  2733. {
  2734. int ret = 0; /* Set unload app */
  2735. wake_up_all(&qseecom.send_resp_wq);
  2736. if (qseecom.qsee_reentrancy_support)
  2737. mutex_unlock(&app_access_lock);
  2738. while (atomic_read(&data->ioctl_count) > 1) {
  2739. if (wait_event_interruptible(data->abort_wq,
  2740. atomic_read(&data->ioctl_count) <= 1)) {
  2741. pr_err("Interrupted from abort\n");
  2742. ret = -ERESTARTSYS;
  2743. break;
  2744. }
  2745. }
  2746. if (qseecom.qsee_reentrancy_support)
  2747. mutex_lock(&app_access_lock);
  2748. return ret;
  2749. }
  2750. static int __qseecom_unload_app(struct qseecom_dev_handle *data,
  2751. uint32_t app_id)
  2752. {
  2753. struct qseecom_unload_app_ireq req;
  2754. struct qseecom_command_scm_resp resp;
  2755. int ret = 0;
  2756. /* Populate the structure for sending scm call to load image */
  2757. req.qsee_cmd_id = QSEOS_APP_SHUTDOWN_COMMAND;
  2758. req.app_id = app_id;
  2759. /* SCM_CALL to unload the app */
  2760. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, &req,
  2761. sizeof(struct qseecom_unload_app_ireq),
  2762. &resp, sizeof(resp));
  2763. if (ret) {
  2764. pr_err("scm_call to unload app (id = %d) failed ret: %d\n",
  2765. app_id, ret);
  2766. return ret;
  2767. }
  2768. do {
  2769. switch (resp.result) {
  2770. case QSEOS_RESULT_SUCCESS:
  2771. pr_warn("App (%d) is unloaded\n", app_id);
  2772. break;
  2773. case QSEOS_RESULT_INCOMPLETE:
  2774. ret = __qseecom_process_incomplete_cmd(data, &resp);
  2775. if (ret)
  2776. pr_err("unload app %d fail proc incom cmd: %d,%d,%d\n",
  2777. app_id, ret, resp.result, resp.data);
  2778. else
  2779. pr_warn("App (%d) is unloaded\n", app_id);
  2780. break;
  2781. case QSEOS_RESULT_FAILURE:
  2782. pr_err("app (%d) unload_failed!!\n", app_id);
  2783. ret = -EFAULT;
  2784. break;
  2785. case QSEOS_RESULT_BLOCKED_ON_LISTENER:
  2786. pr_err("unload app (%d) blocked on listener\n", app_id);
  2787. ret = __qseecom_process_reentrancy_blocked_on_listener(&resp, NULL, data);
  2788. if (ret) {
  2789. pr_err("unload app fail proc block on listener cmd,ret :%d\n",
  2790. ret);
  2791. ret = -EFAULT;
  2792. }
  2793. break;
  2794. default:
  2795. pr_err("unload app %d get unknown resp.result %d\n",
  2796. app_id, resp.result);
  2797. ret = -EFAULT;
  2798. break;
  2799. }
  2800. } while ((resp.result == QSEOS_RESULT_INCOMPLETE) ||
  2801. (resp.result == QSEOS_RESULT_BLOCKED_ON_LISTENER));
  2802. return ret;
  2803. }
  2804. static int qseecom_unload_app(struct qseecom_dev_handle *data,
  2805. bool app_crash)
  2806. {
  2807. unsigned long flags;
  2808. int ret = 0;
  2809. struct qseecom_registered_app_list *ptr_app = NULL;
  2810. bool found_app = false;
  2811. if (!data) {
  2812. pr_err("Invalid/uninitialized device handle\n");
  2813. return -EINVAL;
  2814. }
  2815. pr_debug("unload app %d(%s), app_crash flag %d\n", data->client.app_id,
  2816. data->client.app_name, app_crash);
  2817. if (!memcmp(data->client.app_name, "keymaste", strlen("keymaste"))) {
  2818. pr_debug("Do not unload keymaster app from tz\n");
  2819. goto unload_exit;
  2820. }
  2821. ret = __qseecom_cleanup_app(data);
  2822. if (ret && !app_crash) {
  2823. pr_err("cleanup app failed, pending ioctl:%d\n", data->ioctl_count);
  2824. return ret;
  2825. }
  2826. __qseecom_reentrancy_check_if_no_app_blocked(TZ_OS_APP_SHUTDOWN_ID);
  2827. /* ignore app_id 0, it happens when close qseecom_fd if load app fail*/
  2828. if (!data->client.app_id)
  2829. goto unload_exit;
  2830. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  2831. list_for_each_entry(ptr_app, &qseecom.registered_app_list_head,
  2832. list) {
  2833. if ((ptr_app->app_id == data->client.app_id) &&
  2834. (!strcmp(ptr_app->app_name, data->client.app_name))) {
  2835. pr_debug("unload app %d (%s), ref_cnt %d\n",
  2836. ptr_app->app_id, ptr_app->app_name,
  2837. ptr_app->ref_cnt);
  2838. ptr_app->ref_cnt--;
  2839. found_app = true;
  2840. break;
  2841. }
  2842. }
  2843. spin_unlock_irqrestore(&qseecom.registered_app_list_lock,
  2844. flags);
  2845. if (!found_app) {
  2846. pr_err("Cannot find app with id = %d (%s)\n",
  2847. data->client.app_id, data->client.app_name);
  2848. ret = -EINVAL;
  2849. goto unload_exit;
  2850. }
  2851. if (!ptr_app->ref_cnt) {
  2852. ret = __qseecom_unload_app(data, data->client.app_id);
  2853. if (ret == -EBUSY) {
  2854. /*
  2855. * If unload failed due to EBUSY, don't free mem
  2856. * just restore app ref_cnt and return -EBUSY
  2857. */
  2858. pr_warn("unload ta %d(%s) EBUSY\n",
  2859. data->client.app_id, data->client.app_name);
  2860. ptr_app->ref_cnt++;
  2861. return ret;
  2862. }
  2863. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  2864. list_del(&ptr_app->list);
  2865. spin_unlock_irqrestore(&qseecom.registered_app_list_lock,
  2866. flags);
  2867. kfree_sensitive(ptr_app);
  2868. }
  2869. unload_exit:
  2870. if (data->client.dmabuf) {
  2871. qseecom_vaddr_unmap(data->client.sb_virt, data->client.sgt,
  2872. data->client.attach, data->client.dmabuf);
  2873. MAKE_NULL(data->client.sgt,
  2874. data->client.attach, data->client.dmabuf);
  2875. }
  2876. data->released = true;
  2877. return ret;
  2878. }
  2879. static int qseecom_prepare_unload_app(struct qseecom_dev_handle *data)
  2880. {
  2881. struct qseecom_unload_app_pending_list *entry = NULL;
  2882. pr_debug("prepare to unload app(%d)(%s), pending %d\n",
  2883. data->client.app_id, data->client.app_name,
  2884. data->client.unload_pending);
  2885. if (data->client.unload_pending)
  2886. return 0;
  2887. entry = kzalloc(sizeof(*entry), GFP_KERNEL);
  2888. if (!entry)
  2889. return -ENOMEM;
  2890. entry->data = data;
  2891. list_add_tail(&entry->list,
  2892. &qseecom.unload_app_pending_list_head);
  2893. data->client.unload_pending = true;
  2894. pr_debug("unload ta %d pending\n", data->client.app_id);
  2895. return 0;
  2896. }
  2897. static void __wakeup_unload_app_kthread(void)
  2898. {
  2899. atomic_set(&qseecom.unload_app_kthread_state,
  2900. UNLOAD_APP_KT_WAKEUP);
  2901. wake_up_interruptible(&qseecom.unload_app_kthread_wq);
  2902. }
  2903. static bool __qseecom_find_pending_unload_app(uint32_t app_id, char *app_name)
  2904. {
  2905. struct qseecom_unload_app_pending_list *entry = NULL;
  2906. bool found = false;
  2907. mutex_lock(&unload_app_pending_list_lock);
  2908. list_for_each_entry(entry, &qseecom.unload_app_pending_list_head,
  2909. list) {
  2910. if ((entry->data->client.app_id == app_id) &&
  2911. (!strcmp(entry->data->client.app_name, app_name))) {
  2912. found = true;
  2913. break;
  2914. }
  2915. }
  2916. mutex_unlock(&unload_app_pending_list_lock);
  2917. return found;
  2918. }
  2919. static void __qseecom_processing_pending_unload_app(void)
  2920. {
  2921. struct qseecom_unload_app_pending_list *entry = NULL;
  2922. struct list_head *pos;
  2923. int ret = 0;
  2924. mutex_lock(&unload_app_pending_list_lock);
  2925. while (!list_empty(&qseecom.unload_app_pending_list_head)) {
  2926. pos = qseecom.unload_app_pending_list_head.next;
  2927. entry = list_entry(pos,
  2928. struct qseecom_unload_app_pending_list, list);
  2929. if (entry && entry->data) {
  2930. pr_debug("process pending unload app %d (%s)\n",
  2931. entry->data->client.app_id,
  2932. entry->data->client.app_name);
  2933. mutex_unlock(&unload_app_pending_list_lock);
  2934. mutex_lock(&app_access_lock);
  2935. ret = qseecom_unload_app(entry->data, true);
  2936. if (ret)
  2937. pr_err("unload app %d pending failed %d\n",
  2938. entry->data->client.app_id, ret);
  2939. mutex_unlock(&app_access_lock);
  2940. mutex_lock(&unload_app_pending_list_lock);
  2941. __qseecom_free_tzbuf(&entry->data->sglistinfo_shm);
  2942. kfree_sensitive(entry->data);
  2943. }
  2944. list_del(pos);
  2945. kfree_sensitive(entry);
  2946. }
  2947. mutex_unlock(&unload_app_pending_list_lock);
  2948. }
  2949. static int __qseecom_unload_app_kthread_func(void *data)
  2950. {
  2951. while (!kthread_should_stop()) {
  2952. wait_event_interruptible(
  2953. qseecom.unload_app_kthread_wq,
  2954. atomic_read(&qseecom.unload_app_kthread_state)
  2955. == UNLOAD_APP_KT_WAKEUP);
  2956. pr_debug("kthread to unload app is called, state %d\n",
  2957. atomic_read(&qseecom.unload_app_kthread_state));
  2958. __qseecom_processing_pending_unload_app();
  2959. atomic_set(&qseecom.unload_app_kthread_state,
  2960. UNLOAD_APP_KT_SLEEP);
  2961. }
  2962. pr_warn("kthread to unload app stopped\n");
  2963. return 0;
  2964. }
  2965. static phys_addr_t __qseecom_uvirt_to_kphys(struct qseecom_dev_handle *data,
  2966. unsigned long virt)
  2967. {
  2968. return data->client.sb_phys + (virt - data->client.user_virt_sb_base);
  2969. }
  2970. static uintptr_t __qseecom_uvirt_to_kvirt(struct qseecom_dev_handle *data,
  2971. unsigned long virt)
  2972. {
  2973. return (uintptr_t)data->client.sb_virt +
  2974. (virt - data->client.user_virt_sb_base);
  2975. }
  2976. static int __qseecom_process_rpmb_svc_cmd(struct qseecom_dev_handle *data_ptr,
  2977. struct qseecom_send_svc_cmd_req *req_ptr,
  2978. struct qseecom_client_send_service_ireq *send_svc_ireq_ptr)
  2979. {
  2980. int ret = 0;
  2981. void *req_buf = NULL;
  2982. if ((req_ptr == NULL) || (send_svc_ireq_ptr == NULL)) {
  2983. pr_err("Error with pointer: req_ptr = %pK, send_svc_ptr = %pK\n",
  2984. req_ptr, send_svc_ireq_ptr);
  2985. return -EINVAL;
  2986. }
  2987. /* Clients need to ensure req_buf is at base offset of shared buffer */
  2988. if ((uintptr_t)req_ptr->cmd_req_buf !=
  2989. data_ptr->client.user_virt_sb_base) {
  2990. pr_err("cmd buf not pointing to base offset of shared buffer\n");
  2991. return -EINVAL;
  2992. }
  2993. if (data_ptr->client.sb_length <
  2994. sizeof(struct qseecom_rpmb_provision_key)) {
  2995. pr_err("shared buffer is too small to hold key type\n");
  2996. return -EINVAL;
  2997. }
  2998. req_buf = data_ptr->client.sb_virt;
  2999. send_svc_ireq_ptr->qsee_cmd_id = req_ptr->cmd_id;
  3000. send_svc_ireq_ptr->key_type =
  3001. ((struct qseecom_rpmb_provision_key *)req_buf)->key_type;
  3002. send_svc_ireq_ptr->req_len = req_ptr->cmd_req_len;
  3003. send_svc_ireq_ptr->rsp_ptr = (uint32_t)(__qseecom_uvirt_to_kphys(
  3004. data_ptr, (uintptr_t)req_ptr->resp_buf));
  3005. send_svc_ireq_ptr->rsp_len = req_ptr->resp_len;
  3006. return ret;
  3007. }
  3008. static int __qseecom_process_fsm_key_svc_cmd(
  3009. struct qseecom_dev_handle *data_ptr,
  3010. struct qseecom_send_svc_cmd_req *req_ptr,
  3011. struct qseecom_client_send_fsm_diag_req *send_svc_ireq_ptr)
  3012. {
  3013. int ret = 0;
  3014. uint32_t reqd_len_sb_in = 0;
  3015. if ((req_ptr == NULL) || (send_svc_ireq_ptr == NULL)) {
  3016. pr_err("Error with pointer: req_ptr = %pK, send_svc_ptr = %pK\n",
  3017. req_ptr, send_svc_ireq_ptr);
  3018. return -EINVAL;
  3019. }
  3020. reqd_len_sb_in = req_ptr->cmd_req_len + req_ptr->resp_len;
  3021. if (reqd_len_sb_in > data_ptr->client.sb_length) {
  3022. pr_err("Not enough memory to fit cmd_buf and resp_buf.\n");
  3023. pr_err("Required: %u, Available: %zu\n",
  3024. reqd_len_sb_in, data_ptr->client.sb_length);
  3025. return -ENOMEM;
  3026. }
  3027. send_svc_ireq_ptr->qsee_cmd_id = req_ptr->cmd_id;
  3028. send_svc_ireq_ptr->req_len = req_ptr->cmd_req_len;
  3029. send_svc_ireq_ptr->rsp_ptr = (uint32_t)(__qseecom_uvirt_to_kphys(
  3030. data_ptr, (uintptr_t)req_ptr->resp_buf));
  3031. send_svc_ireq_ptr->rsp_len = req_ptr->resp_len;
  3032. send_svc_ireq_ptr->req_ptr = (uint32_t)(__qseecom_uvirt_to_kphys(
  3033. data_ptr, (uintptr_t)req_ptr->cmd_req_buf));
  3034. return ret;
  3035. }
  3036. static int __validate_send_service_cmd_inputs(struct qseecom_dev_handle *data,
  3037. struct qseecom_send_svc_cmd_req *req)
  3038. {
  3039. if (!req || !req->resp_buf || !req->cmd_req_buf) {
  3040. pr_err("req or cmd buffer or response buffer is null\n");
  3041. return -EINVAL;
  3042. }
  3043. if (!data || !data->client.sb_virt) {
  3044. pr_err("Client or client buf is not initialized\n");
  3045. return -EINVAL;
  3046. }
  3047. if (data->client.sb_virt == NULL) {
  3048. pr_err("sb_virt null\n");
  3049. return -EINVAL;
  3050. }
  3051. if (data->client.user_virt_sb_base == 0) {
  3052. pr_err("user_virt_sb_base is null\n");
  3053. return -EINVAL;
  3054. }
  3055. if (data->client.sb_length == 0) {
  3056. pr_err("sb_length is 0\n");
  3057. return -EINVAL;
  3058. }
  3059. if (((uintptr_t)req->cmd_req_buf <
  3060. data->client.user_virt_sb_base) ||
  3061. ((uintptr_t)req->cmd_req_buf >=
  3062. (data->client.user_virt_sb_base + data->client.sb_length))) {
  3063. pr_err("cmd buffer address not within shared bufffer\n");
  3064. return -EINVAL;
  3065. }
  3066. if (((uintptr_t)req->resp_buf <
  3067. data->client.user_virt_sb_base) ||
  3068. ((uintptr_t)req->resp_buf >=
  3069. (data->client.user_virt_sb_base + data->client.sb_length))) {
  3070. pr_err("response buffer address not within shared bufffer\n");
  3071. return -EINVAL;
  3072. }
  3073. if ((req->cmd_req_len == 0) || (req->resp_len == 0) ||
  3074. (req->cmd_req_len > data->client.sb_length) ||
  3075. (req->resp_len > data->client.sb_length)) {
  3076. pr_err("cmd buf length or response buf length not valid\n");
  3077. return -EINVAL;
  3078. }
  3079. if (req->cmd_req_len > UINT_MAX - req->resp_len) {
  3080. pr_err("Integer overflow detected in req_len & rsp_len\n");
  3081. return -EINVAL;
  3082. }
  3083. if ((req->cmd_req_len + req->resp_len) > data->client.sb_length) {
  3084. pr_debug("Not enough memory to fit cmd_buf.\n");
  3085. pr_debug("resp_buf. Required: %u, Available: %zu\n",
  3086. (req->cmd_req_len + req->resp_len),
  3087. data->client.sb_length);
  3088. return -ENOMEM;
  3089. }
  3090. if ((uintptr_t)req->cmd_req_buf > (ULONG_MAX - req->cmd_req_len)) {
  3091. pr_err("Integer overflow in req_len & cmd_req_buf\n");
  3092. return -EINVAL;
  3093. }
  3094. if ((uintptr_t)req->resp_buf > (ULONG_MAX - req->resp_len)) {
  3095. pr_err("Integer overflow in resp_len & resp_buf\n");
  3096. return -EINVAL;
  3097. }
  3098. if (data->client.user_virt_sb_base >
  3099. (ULONG_MAX - data->client.sb_length)) {
  3100. pr_err("Integer overflow in user_virt_sb_base & sb_length\n");
  3101. return -EINVAL;
  3102. }
  3103. if ((((uintptr_t)req->cmd_req_buf + req->cmd_req_len) >
  3104. ((uintptr_t)data->client.user_virt_sb_base +
  3105. data->client.sb_length)) ||
  3106. (((uintptr_t)req->resp_buf + req->resp_len) >
  3107. ((uintptr_t)data->client.user_virt_sb_base +
  3108. data->client.sb_length))) {
  3109. pr_err("cmd buf or resp buf is out of shared buffer region\n");
  3110. return -EINVAL;
  3111. }
  3112. return 0;
  3113. }
  3114. static int qseecom_send_service_cmd(struct qseecom_dev_handle *data,
  3115. void __user *argp)
  3116. {
  3117. int ret = 0;
  3118. struct qseecom_client_send_service_ireq send_svc_ireq;
  3119. struct qseecom_client_send_fsm_diag_req send_fsm_diag_svc_ireq;
  3120. struct qseecom_command_scm_resp resp;
  3121. struct qseecom_send_svc_cmd_req req;
  3122. void *send_req_ptr;
  3123. size_t req_buf_size;
  3124. /*struct qseecom_command_scm_resp resp;*/
  3125. if (copy_from_user(&req,
  3126. (void __user *)argp,
  3127. sizeof(req))) {
  3128. pr_err("copy_from_user failed\n");
  3129. return -EFAULT;
  3130. }
  3131. if (__validate_send_service_cmd_inputs(data, &req))
  3132. return -EINVAL;
  3133. data->type = QSEECOM_SECURE_SERVICE;
  3134. switch (req.cmd_id) {
  3135. case QSEOS_RPMB_PROVISION_KEY_COMMAND:
  3136. case QSEOS_RPMB_ERASE_COMMAND:
  3137. case QSEOS_RPMB_CHECK_PROV_STATUS_COMMAND:
  3138. send_req_ptr = &send_svc_ireq;
  3139. req_buf_size = sizeof(send_svc_ireq);
  3140. if (__qseecom_process_rpmb_svc_cmd(data, &req,
  3141. send_req_ptr))
  3142. return -EINVAL;
  3143. break;
  3144. case QSEOS_FSM_LTEOTA_REQ_CMD:
  3145. case QSEOS_FSM_LTEOTA_REQ_RSP_CMD:
  3146. case QSEOS_FSM_IKE_REQ_CMD:
  3147. case QSEOS_FSM_IKE_REQ_RSP_CMD:
  3148. case QSEOS_FSM_OEM_FUSE_WRITE_ROW:
  3149. case QSEOS_FSM_OEM_FUSE_READ_ROW:
  3150. case QSEOS_FSM_ENCFS_REQ_CMD:
  3151. case QSEOS_FSM_ENCFS_REQ_RSP_CMD:
  3152. case QSEOS_DIAG_FUSE_REQ_CMD:
  3153. case QSEOS_DIAG_FUSE_REQ_RSP_CMD:
  3154. send_req_ptr = &send_fsm_diag_svc_ireq;
  3155. req_buf_size = sizeof(send_fsm_diag_svc_ireq);
  3156. if (__qseecom_process_fsm_key_svc_cmd(data, &req,
  3157. send_req_ptr))
  3158. return -EINVAL;
  3159. break;
  3160. default:
  3161. pr_err("Unsupported cmd_id %d\n", req.cmd_id);
  3162. return -EINVAL;
  3163. }
  3164. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  3165. QSEECOM_CACHE_CLEAN);
  3166. if (ret) {
  3167. pr_err("cache operation failed %d\n", ret);
  3168. return ret;
  3169. }
  3170. if (qseecom.support_bus_scaling) {
  3171. ret = qseecom_scale_bus_bandwidth_timer(HIGH);
  3172. if (ret) {
  3173. pr_err("Fail to set bw HIGH\n");
  3174. return ret;
  3175. }
  3176. } else {
  3177. ret = qseecom_perf_enable(data);
  3178. if (ret) {
  3179. pr_err("Failed to vote for clocks with err %d\n", ret);
  3180. return ret;
  3181. }
  3182. }
  3183. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  3184. (const void *)send_req_ptr,
  3185. req_buf_size, &resp, sizeof(resp));
  3186. if (ret) {
  3187. pr_err("qseecom_scm_call failed with err: %d\n", ret);
  3188. goto exit;
  3189. }
  3190. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  3191. QSEECOM_CACHE_INVALIDATE);
  3192. if (ret) {
  3193. pr_err("cache operation failed %d\n", ret);
  3194. goto exit;
  3195. }
  3196. switch (resp.result) {
  3197. case QSEOS_RESULT_SUCCESS:
  3198. break;
  3199. case QSEOS_RESULT_INCOMPLETE:
  3200. pr_debug("qseos_result_incomplete\n");
  3201. ret = __qseecom_process_incomplete_cmd(data, &resp);
  3202. if (ret) {
  3203. pr_err("process_incomplete_cmd fail with result: %d\n",
  3204. resp.result);
  3205. }
  3206. if (req.cmd_id == QSEOS_RPMB_CHECK_PROV_STATUS_COMMAND) {
  3207. pr_warn("RPMB key status is 0x%x\n", resp.result);
  3208. if (put_user(resp.result,
  3209. (uint32_t __user *)req.resp_buf)) {
  3210. ret = -EINVAL;
  3211. goto exit;
  3212. }
  3213. ret = 0;
  3214. }
  3215. break;
  3216. case QSEOS_RESULT_FAILURE:
  3217. pr_err("scm call failed with resp.result: %d\n", resp.result);
  3218. ret = -EINVAL;
  3219. break;
  3220. default:
  3221. pr_err("Response result %d not supported\n",
  3222. resp.result);
  3223. ret = -EINVAL;
  3224. break;
  3225. }
  3226. exit:
  3227. if (!qseecom.support_bus_scaling) {
  3228. qsee_disable_clock_vote(data, CLK_DFAB);
  3229. qsee_disable_clock_vote(data, CLK_SFPB);
  3230. } else {
  3231. __qseecom_add_bw_scale_down_timer(
  3232. QSEECOM_SEND_CMD_CRYPTO_TIMEOUT);
  3233. }
  3234. return ret;
  3235. }
  3236. static int __validate_send_cmd_inputs(struct qseecom_dev_handle *data,
  3237. struct qseecom_send_cmd_req *req)
  3238. {
  3239. if (!data || !data->client.sb_virt) {
  3240. pr_err("Client or client buf is not initialized\n");
  3241. return -EINVAL;
  3242. }
  3243. if (((req->resp_buf == NULL) && (req->resp_len != 0)) ||
  3244. (req->cmd_req_buf == NULL)) {
  3245. pr_err("cmd buffer or response buffer is null\n");
  3246. return -EINVAL;
  3247. }
  3248. if (((uintptr_t)req->cmd_req_buf <
  3249. data->client.user_virt_sb_base) ||
  3250. ((uintptr_t)req->cmd_req_buf >=
  3251. (data->client.user_virt_sb_base + data->client.sb_length))) {
  3252. pr_err("cmd buffer address not within shared bufffer\n");
  3253. return -EINVAL;
  3254. }
  3255. if (((uintptr_t)req->resp_buf <
  3256. data->client.user_virt_sb_base) ||
  3257. ((uintptr_t)req->resp_buf >=
  3258. (data->client.user_virt_sb_base + data->client.sb_length))) {
  3259. pr_err("response buffer address not within shared bufffer\n");
  3260. return -EINVAL;
  3261. }
  3262. if ((req->cmd_req_len == 0) ||
  3263. (req->cmd_req_len > data->client.sb_length) ||
  3264. (req->resp_len > data->client.sb_length)) {
  3265. pr_err("cmd buf length or response buf length not valid\n");
  3266. return -EINVAL;
  3267. }
  3268. if (req->cmd_req_len > UINT_MAX - req->resp_len) {
  3269. pr_err("Integer overflow detected in req_len & rsp_len\n");
  3270. return -EINVAL;
  3271. }
  3272. if ((req->cmd_req_len + req->resp_len) > data->client.sb_length) {
  3273. pr_debug("Not enough memory to fit cmd_buf.\n");
  3274. pr_debug("resp_buf. Required: %u, Available: %zu\n",
  3275. (req->cmd_req_len + req->resp_len),
  3276. data->client.sb_length);
  3277. return -ENOMEM;
  3278. }
  3279. if ((uintptr_t)req->cmd_req_buf > (ULONG_MAX - req->cmd_req_len)) {
  3280. pr_err("Integer overflow in req_len & cmd_req_buf\n");
  3281. return -EINVAL;
  3282. }
  3283. if ((uintptr_t)req->resp_buf > (ULONG_MAX - req->resp_len)) {
  3284. pr_err("Integer overflow in resp_len & resp_buf\n");
  3285. return -EINVAL;
  3286. }
  3287. if (data->client.user_virt_sb_base >
  3288. (ULONG_MAX - data->client.sb_length)) {
  3289. pr_err("Integer overflow in user_virt_sb_base & sb_length\n");
  3290. return -EINVAL;
  3291. }
  3292. if ((((uintptr_t)req->cmd_req_buf + req->cmd_req_len) >
  3293. ((uintptr_t)data->client.user_virt_sb_base +
  3294. data->client.sb_length)) ||
  3295. (((uintptr_t)req->resp_buf + req->resp_len) >
  3296. ((uintptr_t)data->client.user_virt_sb_base +
  3297. data->client.sb_length))) {
  3298. pr_err("cmd buf or resp buf is out of shared buffer region\n");
  3299. return -EINVAL;
  3300. }
  3301. return 0;
  3302. }
  3303. static int __qseecom_process_reentrancy(struct qseecom_command_scm_resp *resp,
  3304. struct qseecom_registered_app_list *ptr_app,
  3305. struct qseecom_dev_handle *data)
  3306. {
  3307. int ret = 0;
  3308. switch (resp->result) {
  3309. case QSEOS_RESULT_BLOCKED_ON_LISTENER:
  3310. pr_warn("App(%d) %s is blocked on listener %d\n",
  3311. data->client.app_id, data->client.app_name,
  3312. resp->data);
  3313. ret = __qseecom_process_reentrancy_blocked_on_listener(
  3314. resp, ptr_app, data);
  3315. if (ret) {
  3316. pr_err("failed to process App(%d) %s is blocked on listener %d\n",
  3317. data->client.app_id, data->client.app_name, resp->data);
  3318. return ret;
  3319. }
  3320. fallthrough;
  3321. /* fall through to process incomplete request */
  3322. case QSEOS_RESULT_INCOMPLETE:
  3323. qseecom.app_block_ref_cnt++;
  3324. ptr_app->app_blocked = true;
  3325. ret = __qseecom_reentrancy_process_incomplete_cmd(data, resp);
  3326. ptr_app->app_blocked = false;
  3327. qseecom.app_block_ref_cnt--;
  3328. wake_up_interruptible_all(&qseecom.app_block_wq);
  3329. if (ret)
  3330. pr_err("process_incomplete_cmd failed err: %d\n",
  3331. ret);
  3332. return ret;
  3333. case QSEOS_RESULT_SUCCESS:
  3334. return ret;
  3335. default:
  3336. pr_err("Response result %d not supported\n",
  3337. resp->result);
  3338. return -EINVAL;
  3339. }
  3340. return ret;
  3341. }
  3342. static int __qseecom_send_cmd(struct qseecom_dev_handle *data,
  3343. struct qseecom_send_cmd_req *req,
  3344. bool is_phys_adr)
  3345. {
  3346. int ret = 0;
  3347. u32 reqd_len_sb_in = 0;
  3348. struct qseecom_client_send_data_ireq send_data_req = {0};
  3349. struct qseecom_client_send_data_64bit_ireq send_data_req_64bit = {0};
  3350. struct qseecom_command_scm_resp resp;
  3351. unsigned long flags;
  3352. struct qseecom_registered_app_list *ptr_app;
  3353. bool found_app = false;
  3354. void *cmd_buf = NULL;
  3355. size_t cmd_len;
  3356. reqd_len_sb_in = req->cmd_req_len + req->resp_len;
  3357. /* find app_id & img_name from list */
  3358. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  3359. list_for_each_entry(ptr_app, &qseecom.registered_app_list_head,
  3360. list) {
  3361. if ((ptr_app->app_id == data->client.app_id) &&
  3362. (!strcmp(ptr_app->app_name, data->client.app_name))) {
  3363. found_app = true;
  3364. break;
  3365. }
  3366. }
  3367. spin_unlock_irqrestore(&qseecom.registered_app_list_lock, flags);
  3368. if (!found_app) {
  3369. pr_err("app_id %d (%s) is not found\n", data->client.app_id,
  3370. (char *)data->client.app_name);
  3371. return -ENOENT;
  3372. }
  3373. if (__qseecom_find_pending_unload_app(data->client.app_id,
  3374. data->client.app_name)) {
  3375. pr_err("app %d (%s) unload is pending\n",
  3376. data->client.app_id, data->client.app_name);
  3377. return -ENOENT;
  3378. }
  3379. if (qseecom.qsee_version < QSEE_VERSION_40) {
  3380. send_data_req.app_id = data->client.app_id;
  3381. if (!is_phys_adr) {
  3382. send_data_req.req_ptr =
  3383. (uint32_t)(__qseecom_uvirt_to_kphys
  3384. (data, (uintptr_t)req->cmd_req_buf));
  3385. send_data_req.rsp_ptr =
  3386. (uint32_t)(__qseecom_uvirt_to_kphys(
  3387. data, (uintptr_t)req->resp_buf));
  3388. } else {
  3389. send_data_req.req_ptr = (uint32_t)(uintptr_t)req->cmd_req_buf;
  3390. send_data_req.rsp_ptr = (uint32_t)(uintptr_t)req->resp_buf;
  3391. }
  3392. send_data_req.req_len = req->cmd_req_len;
  3393. send_data_req.rsp_len = req->resp_len;
  3394. send_data_req.sglistinfo_ptr =
  3395. (uint32_t)data->sglistinfo_shm.paddr;
  3396. send_data_req.sglistinfo_len = SGLISTINFO_TABLE_SIZE;
  3397. qtee_shmbridge_flush_shm_buf(&data->sglistinfo_shm);
  3398. cmd_buf = (void *)&send_data_req;
  3399. cmd_len = sizeof(struct qseecom_client_send_data_ireq);
  3400. } else {
  3401. send_data_req_64bit.app_id = data->client.app_id;
  3402. if (!is_phys_adr) {
  3403. send_data_req_64bit.req_ptr =
  3404. __qseecom_uvirt_to_kphys(data,
  3405. (uintptr_t)req->cmd_req_buf);
  3406. send_data_req_64bit.rsp_ptr =
  3407. __qseecom_uvirt_to_kphys(data,
  3408. (uintptr_t)req->resp_buf);
  3409. } else {
  3410. send_data_req_64bit.req_ptr =
  3411. (uintptr_t)req->cmd_req_buf;
  3412. send_data_req_64bit.rsp_ptr =
  3413. (uintptr_t)req->resp_buf;
  3414. }
  3415. send_data_req_64bit.req_len = req->cmd_req_len;
  3416. send_data_req_64bit.rsp_len = req->resp_len;
  3417. /* check if 32bit app's phys_addr region is under 4GB.*/
  3418. if ((data->client.app_arch == ELFCLASS32) &&
  3419. ((send_data_req_64bit.req_ptr >=
  3420. PHY_ADDR_4G - send_data_req_64bit.req_len) ||
  3421. (send_data_req_64bit.rsp_ptr >=
  3422. PHY_ADDR_4G - send_data_req_64bit.rsp_len))){
  3423. pr_err("32bit app %s PA exceeds 4G: req_ptr=%llx, req_len=%x, rsp_ptr=%llx, rsp_len=%x\n",
  3424. data->client.app_name,
  3425. send_data_req_64bit.req_ptr,
  3426. send_data_req_64bit.req_len,
  3427. send_data_req_64bit.rsp_ptr,
  3428. send_data_req_64bit.rsp_len);
  3429. return -EFAULT;
  3430. }
  3431. send_data_req_64bit.sglistinfo_ptr =
  3432. (uint64_t)data->sglistinfo_shm.paddr;
  3433. send_data_req_64bit.sglistinfo_len = SGLISTINFO_TABLE_SIZE;
  3434. qtee_shmbridge_flush_shm_buf(&data->sglistinfo_shm);
  3435. cmd_buf = (void *)&send_data_req_64bit;
  3436. cmd_len = sizeof(struct qseecom_client_send_data_64bit_ireq);
  3437. }
  3438. if (!qseecom.whitelist_support || data->use_legacy_cmd)
  3439. *(uint32_t *)cmd_buf = QSEOS_CLIENT_SEND_DATA_COMMAND;
  3440. else
  3441. *(uint32_t *)cmd_buf = QSEOS_CLIENT_SEND_DATA_COMMAND_WHITELIST;
  3442. if (data->client.dmabuf) {
  3443. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  3444. QSEECOM_CACHE_CLEAN);
  3445. if (ret) {
  3446. pr_err("cache operation failed %d\n", ret);
  3447. return ret;
  3448. }
  3449. }
  3450. __qseecom_reentrancy_check_if_this_app_blocked(ptr_app);
  3451. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  3452. cmd_buf, cmd_len,
  3453. &resp, sizeof(resp));
  3454. if (ret) {
  3455. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  3456. ret, data->client.app_id);
  3457. goto exit;
  3458. }
  3459. if (qseecom.qsee_reentrancy_support) {
  3460. ret = __qseecom_process_reentrancy(&resp, ptr_app, data);
  3461. if (ret)
  3462. goto exit;
  3463. } else {
  3464. if (resp.result == QSEOS_RESULT_INCOMPLETE) {
  3465. ret = __qseecom_process_incomplete_cmd(data, &resp);
  3466. if (ret) {
  3467. pr_err("process_incomplete_cmd failed err: %d\n",
  3468. ret);
  3469. goto exit;
  3470. }
  3471. } else {
  3472. if (resp.result != QSEOS_RESULT_SUCCESS) {
  3473. pr_err("Response result %d not supported\n",
  3474. resp.result);
  3475. ret = -EINVAL;
  3476. goto exit;
  3477. }
  3478. }
  3479. }
  3480. if (data->client.dmabuf) {
  3481. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  3482. QSEECOM_CACHE_INVALIDATE);
  3483. if (ret) {
  3484. pr_err("cache operation failed %d\n", ret);
  3485. goto exit;
  3486. }
  3487. }
  3488. exit:
  3489. return ret;
  3490. }
  3491. static int qseecom_send_cmd(struct qseecom_dev_handle *data, void __user *argp)
  3492. {
  3493. int ret = 0;
  3494. struct qseecom_send_cmd_req req;
  3495. ret = copy_from_user(&req, argp, sizeof(req));
  3496. if (ret) {
  3497. pr_err("copy_from_user failed\n");
  3498. return ret;
  3499. }
  3500. if (__validate_send_cmd_inputs(data, &req))
  3501. return -EINVAL;
  3502. ret = __qseecom_send_cmd(data, &req, false);
  3503. return ret;
  3504. }
  3505. static int __boundary_checks_offset(struct qseecom_send_modfd_cmd_req *req,
  3506. struct qseecom_send_modfd_listener_resp *lstnr_resp,
  3507. struct qseecom_dev_handle *data, int i, size_t size)
  3508. {
  3509. char *curr_field = NULL;
  3510. char *temp_field = NULL;
  3511. int j = 0;
  3512. if ((data->type != QSEECOM_LISTENER_SERVICE) &&
  3513. (req->ifd_data[i].fd > 0)) {
  3514. if ((req->cmd_req_len < size) ||
  3515. (req->ifd_data[i].cmd_buf_offset >
  3516. req->cmd_req_len - size)) {
  3517. pr_err("Invalid offset (req len) 0x%x\n",
  3518. req->ifd_data[i].cmd_buf_offset);
  3519. return -EINVAL;
  3520. }
  3521. curr_field = (char *) (req->cmd_req_buf +
  3522. req->ifd_data[i].cmd_buf_offset);
  3523. for (j = 0; j < MAX_ION_FD; j++) {
  3524. if ((req->ifd_data[j].fd > 0) && i != j) {
  3525. temp_field = (char *) (req->cmd_req_buf +
  3526. req->ifd_data[j].cmd_buf_offset);
  3527. if (temp_field >= curr_field && temp_field <
  3528. (curr_field + size)) {
  3529. pr_err("Invalid field offset 0x%x\n",
  3530. req->ifd_data[i].cmd_buf_offset);
  3531. return -EINVAL;
  3532. }
  3533. }
  3534. }
  3535. } else if ((data->type == QSEECOM_LISTENER_SERVICE) &&
  3536. (lstnr_resp->ifd_data[i].fd > 0)) {
  3537. if ((lstnr_resp->resp_len < size) ||
  3538. (lstnr_resp->ifd_data[i].cmd_buf_offset >
  3539. lstnr_resp->resp_len - size)) {
  3540. pr_err("Invalid offset (lstnr resp len) 0x%x\n",
  3541. lstnr_resp->ifd_data[i].cmd_buf_offset);
  3542. return -EINVAL;
  3543. }
  3544. curr_field = (char *) (lstnr_resp->resp_buf_ptr +
  3545. lstnr_resp->ifd_data[i].cmd_buf_offset);
  3546. for (j = 0; j < MAX_ION_FD; j++) {
  3547. if ((lstnr_resp->ifd_data[j].fd > 0) && i != j) {
  3548. temp_field = (char *) lstnr_resp->resp_buf_ptr +
  3549. lstnr_resp->ifd_data[j].cmd_buf_offset;
  3550. if (temp_field >= curr_field && temp_field <
  3551. (curr_field + size)) {
  3552. pr_err("Invalid lstnr field offset 0x%x\n",
  3553. lstnr_resp->ifd_data[i].cmd_buf_offset);
  3554. return -EINVAL;
  3555. }
  3556. }
  3557. }
  3558. }
  3559. return 0;
  3560. }
  3561. static int __qseecom_update_cmd_buf(void *msg, bool cleanup,
  3562. struct qseecom_dev_handle *data)
  3563. {
  3564. char *field;
  3565. int ret = 0;
  3566. int i = 0;
  3567. uint32_t len = 0;
  3568. struct scatterlist *sg;
  3569. struct qseecom_send_modfd_cmd_req *req = NULL;
  3570. struct qseecom_send_modfd_listener_resp *lstnr_resp = NULL;
  3571. struct qseecom_registered_listener_list *this_lstnr = NULL;
  3572. uint32_t offset;
  3573. struct sg_table *sg_ptr = NULL;
  3574. int ion_fd = -1;
  3575. struct dma_buf *dmabuf = NULL;
  3576. struct dma_buf_attachment *attach = NULL;
  3577. if ((data->type != QSEECOM_LISTENER_SERVICE) &&
  3578. (data->type != QSEECOM_CLIENT_APP))
  3579. return -EFAULT;
  3580. if (msg == NULL) {
  3581. pr_err("Invalid address\n");
  3582. return -EINVAL;
  3583. }
  3584. if (data->type == QSEECOM_LISTENER_SERVICE) {
  3585. lstnr_resp = (struct qseecom_send_modfd_listener_resp *)msg;
  3586. this_lstnr = __qseecom_find_svc(data->listener.id);
  3587. if (IS_ERR_OR_NULL(this_lstnr)) {
  3588. pr_err("Invalid listener ID\n");
  3589. return -ENOMEM;
  3590. }
  3591. } else {
  3592. req = (struct qseecom_send_modfd_cmd_req *)msg;
  3593. }
  3594. for (i = 0; i < MAX_ION_FD; i++) {
  3595. if ((data->type != QSEECOM_LISTENER_SERVICE) &&
  3596. (req->ifd_data[i].fd > 0)) {
  3597. ion_fd = req->ifd_data[i].fd;
  3598. field = (char *) req->cmd_req_buf +
  3599. req->ifd_data[i].cmd_buf_offset;
  3600. } else if ((data->type == QSEECOM_LISTENER_SERVICE) &&
  3601. (lstnr_resp->ifd_data[i].fd > 0)) {
  3602. ion_fd = lstnr_resp->ifd_data[i].fd;
  3603. field = lstnr_resp->resp_buf_ptr +
  3604. lstnr_resp->ifd_data[i].cmd_buf_offset;
  3605. } else {
  3606. continue;
  3607. }
  3608. /* Populate the cmd data structure with the phys_addr */
  3609. ret = qseecom_dmabuf_map(ion_fd, &sg_ptr, &attach, &dmabuf);
  3610. if (ret) {
  3611. pr_err("IOn client could not retrieve sg table\n");
  3612. goto err;
  3613. }
  3614. if (sg_ptr->nents == 0) {
  3615. pr_err("Num of scattered entries is 0\n");
  3616. goto err;
  3617. }
  3618. if (sg_ptr->nents > QSEECOM_MAX_SG_ENTRY) {
  3619. pr_err("Num of scattered entries\n");
  3620. pr_err(" (%d) is greater than max supported %d\n",
  3621. sg_ptr->nents, QSEECOM_MAX_SG_ENTRY);
  3622. goto err;
  3623. }
  3624. sg = sg_ptr->sgl;
  3625. if (sg_ptr->nents == 1) {
  3626. uint32_t *update;
  3627. if (__boundary_checks_offset(req, lstnr_resp, data, i, sizeof(uint32_t)))
  3628. goto err;
  3629. if ((data->type == QSEECOM_CLIENT_APP &&
  3630. (data->client.app_arch == ELFCLASS32 ||
  3631. data->client.app_arch == ELFCLASS64)) ||
  3632. (data->type == QSEECOM_LISTENER_SERVICE)) {
  3633. /*
  3634. * Check if sg list phy add region is under 4GB
  3635. */
  3636. if ((qseecom.qsee_version >= QSEE_VERSION_40) &&
  3637. (!cleanup) &&
  3638. ((uint64_t)sg_dma_address(sg_ptr->sgl)
  3639. >= PHY_ADDR_4G - sg->length)) {
  3640. pr_err("App %s sgl PA exceeds 4G: phy_addr=%pKad, len=%x\n",
  3641. data->client.app_name,
  3642. &(sg_dma_address(sg_ptr->sgl)),
  3643. sg->length);
  3644. goto err;
  3645. }
  3646. update = (uint32_t *) field;
  3647. *update = cleanup ? 0 :
  3648. (uint32_t)sg_dma_address(sg_ptr->sgl);
  3649. } else {
  3650. pr_err("QSEE app arch %u is not supported\n",
  3651. data->client.app_arch);
  3652. goto err;
  3653. }
  3654. len += (uint32_t)sg->length;
  3655. } else {
  3656. struct qseecom_sg_entry *update;
  3657. int j = 0;
  3658. if (__boundary_checks_offset(req, lstnr_resp, data, i,
  3659. (SG_ENTRY_SZ * sg_ptr->nents)))
  3660. goto err;
  3661. if ((data->type == QSEECOM_CLIENT_APP &&
  3662. (data->client.app_arch == ELFCLASS32 ||
  3663. data->client.app_arch == ELFCLASS64)) ||
  3664. (data->type == QSEECOM_LISTENER_SERVICE)) {
  3665. update = (struct qseecom_sg_entry *)field;
  3666. for (j = 0; j < sg_ptr->nents; j++) {
  3667. /*
  3668. * Check if sg list PA is under 4GB
  3669. */
  3670. if ((qseecom.qsee_version >=
  3671. QSEE_VERSION_40) &&
  3672. (!cleanup) &&
  3673. ((uint64_t)(sg_dma_address(sg))
  3674. >= PHY_ADDR_4G - sg->length)) {
  3675. pr_err("App %s sgl PA exceeds 4G: phy_addr=%pKad, len=%x\n",
  3676. data->client.app_name,
  3677. &(sg_dma_address(sg)),
  3678. sg->length);
  3679. goto err;
  3680. }
  3681. update->phys_addr = cleanup ? 0 :
  3682. (uint32_t)sg_dma_address(sg);
  3683. update->len = cleanup ? 0 : sg->length;
  3684. update++;
  3685. len += sg->length;
  3686. sg = sg_next(sg);
  3687. }
  3688. } else {
  3689. pr_err("QSEE app arch %u is not supported\n",
  3690. data->client.app_arch);
  3691. goto err;
  3692. }
  3693. }
  3694. if (cleanup) {
  3695. ret = qseecom_dmabuf_cache_operations(dmabuf,
  3696. QSEECOM_CACHE_INVALIDATE);
  3697. if (ret) {
  3698. pr_err("cache operation failed %d\n", ret);
  3699. goto err;
  3700. }
  3701. } else {
  3702. ret = qseecom_dmabuf_cache_operations(dmabuf,
  3703. QSEECOM_CACHE_CLEAN);
  3704. if (ret) {
  3705. pr_err("cache operation failed %d\n", ret);
  3706. goto err;
  3707. }
  3708. if (data->type == QSEECOM_CLIENT_APP) {
  3709. offset = req->ifd_data[i].cmd_buf_offset;
  3710. data->sglistinfo_ptr[i].indexAndFlags =
  3711. SGLISTINFO_SET_INDEX_FLAG(
  3712. (sg_ptr->nents == 1), 0, offset);
  3713. data->sglistinfo_ptr[i].sizeOrCount =
  3714. (sg_ptr->nents == 1) ?
  3715. sg->length : sg_ptr->nents;
  3716. data->sglist_cnt = i + 1;
  3717. } else {
  3718. offset = (lstnr_resp->ifd_data[i].cmd_buf_offset
  3719. + (uintptr_t)lstnr_resp->resp_buf_ptr -
  3720. (uintptr_t)this_lstnr->sb_virt);
  3721. this_lstnr->sglistinfo_ptr[i].indexAndFlags =
  3722. SGLISTINFO_SET_INDEX_FLAG(
  3723. (sg_ptr->nents == 1), 0, offset);
  3724. this_lstnr->sglistinfo_ptr[i].sizeOrCount =
  3725. (sg_ptr->nents == 1) ?
  3726. sg->length : sg_ptr->nents;
  3727. this_lstnr->sglist_cnt = i + 1;
  3728. }
  3729. }
  3730. /* Deallocate the kbuf */
  3731. qseecom_dmabuf_unmap(sg_ptr, attach, dmabuf);
  3732. sg_ptr = NULL;
  3733. dmabuf = NULL;
  3734. attach = NULL;
  3735. }
  3736. return ret;
  3737. err:
  3738. if (!IS_ERR_OR_NULL(sg_ptr)) {
  3739. qseecom_dmabuf_unmap(sg_ptr, attach, dmabuf);
  3740. MAKE_NULL(sg_ptr, attach, dmabuf);
  3741. }
  3742. return -ENOMEM;
  3743. }
  3744. static int __qseecom_allocate_sg_list_buffer(struct qseecom_dev_handle *data,
  3745. char *field, uint32_t fd_idx, struct sg_table *sg_ptr)
  3746. {
  3747. struct scatterlist *sg = sg_ptr->sgl;
  3748. struct qseecom_sg_entry_64bit *sg_entry;
  3749. struct qseecom_sg_list_buf_hdr_64bit *buf_hdr;
  3750. void *buf;
  3751. uint i;
  3752. size_t size;
  3753. dma_addr_t coh_pmem;
  3754. if (fd_idx >= MAX_ION_FD) {
  3755. pr_err("fd_idx [%d] is invalid\n", fd_idx);
  3756. return -ENOMEM;
  3757. }
  3758. buf_hdr = (struct qseecom_sg_list_buf_hdr_64bit *)field;
  3759. memset((void *)buf_hdr, 0, QSEECOM_SG_LIST_BUF_HDR_SZ_64BIT);
  3760. /* Allocate a contiguous kernel buffer */
  3761. size = sg_ptr->nents * SG_ENTRY_SZ_64BIT;
  3762. size = (size + PAGE_SIZE) & PAGE_MASK;
  3763. buf = dma_alloc_coherent(qseecom.dev,
  3764. size, &coh_pmem, GFP_KERNEL);
  3765. if (buf == NULL)
  3766. return -ENOMEM;
  3767. /* update qseecom_sg_list_buf_hdr_64bit */
  3768. buf_hdr->version = QSEECOM_SG_LIST_BUF_FORMAT_VERSION_2;
  3769. buf_hdr->new_buf_phys_addr = coh_pmem;
  3770. buf_hdr->nents_total = sg_ptr->nents;
  3771. /* save the left sg entries into new allocated buf */
  3772. sg_entry = (struct qseecom_sg_entry_64bit *)buf;
  3773. for (i = 0; i < sg_ptr->nents; i++) {
  3774. sg_entry->phys_addr = (uint64_t)sg_dma_address(sg);
  3775. sg_entry->len = sg->length;
  3776. sg_entry++;
  3777. sg = sg_next(sg);
  3778. }
  3779. data->client.sec_buf_fd[fd_idx].is_sec_buf_fd = true;
  3780. data->client.sec_buf_fd[fd_idx].vbase = buf;
  3781. data->client.sec_buf_fd[fd_idx].pbase = coh_pmem;
  3782. data->client.sec_buf_fd[fd_idx].size = size;
  3783. return 0;
  3784. }
  3785. static int __qseecom_update_cmd_buf_64(void *msg, bool cleanup,
  3786. struct qseecom_dev_handle *data)
  3787. {
  3788. char *field;
  3789. int ret = 0;
  3790. int i = 0;
  3791. uint32_t len = 0;
  3792. struct scatterlist *sg;
  3793. struct qseecom_send_modfd_cmd_req *req = NULL;
  3794. struct qseecom_send_modfd_listener_resp *lstnr_resp = NULL;
  3795. struct qseecom_registered_listener_list *this_lstnr = NULL;
  3796. uint32_t offset;
  3797. struct sg_table *sg_ptr;
  3798. int ion_fd = -1;
  3799. struct dma_buf *dmabuf = NULL;
  3800. struct dma_buf_attachment *attach = NULL;
  3801. if ((data->type != QSEECOM_LISTENER_SERVICE) &&
  3802. (data->type != QSEECOM_CLIENT_APP))
  3803. return -EFAULT;
  3804. if (msg == NULL) {
  3805. pr_err("Invalid address\n");
  3806. return -EINVAL;
  3807. }
  3808. if (data->type == QSEECOM_LISTENER_SERVICE) {
  3809. lstnr_resp = (struct qseecom_send_modfd_listener_resp *)msg;
  3810. this_lstnr = __qseecom_find_svc(data->listener.id);
  3811. if (IS_ERR_OR_NULL(this_lstnr)) {
  3812. pr_err("Invalid listener ID\n");
  3813. return -ENOMEM;
  3814. }
  3815. } else {
  3816. req = (struct qseecom_send_modfd_cmd_req *)msg;
  3817. }
  3818. for (i = 0; i < MAX_ION_FD; i++) {
  3819. if ((data->type != QSEECOM_LISTENER_SERVICE) &&
  3820. (req->ifd_data[i].fd > 0)) {
  3821. ion_fd = req->ifd_data[i].fd;
  3822. field = (char *) req->cmd_req_buf +
  3823. req->ifd_data[i].cmd_buf_offset;
  3824. } else if ((data->type == QSEECOM_LISTENER_SERVICE) &&
  3825. (lstnr_resp->ifd_data[i].fd > 0)) {
  3826. ion_fd = lstnr_resp->ifd_data[i].fd;
  3827. field = lstnr_resp->resp_buf_ptr +
  3828. lstnr_resp->ifd_data[i].cmd_buf_offset;
  3829. } else {
  3830. continue;
  3831. }
  3832. /* Populate the cmd data structure with the phys_addr */
  3833. ret = qseecom_dmabuf_map(ion_fd, &sg_ptr, &attach, &dmabuf);
  3834. if (ret) {
  3835. pr_err("IOn client could not retrieve sg table\n");
  3836. goto err;
  3837. }
  3838. if (sg_ptr->nents == 0) {
  3839. pr_err("Num of scattered entries is 0\n");
  3840. goto err;
  3841. }
  3842. if (sg_ptr->nents > QSEECOM_MAX_SG_ENTRY) {
  3843. pr_warn("Num of scattered entries\n");
  3844. pr_warn(" (%d) is greater than %d\n",
  3845. sg_ptr->nents, QSEECOM_MAX_SG_ENTRY);
  3846. if (cleanup) {
  3847. if (data->client.sec_buf_fd[i].is_sec_buf_fd &&
  3848. data->client.sec_buf_fd[i].vbase)
  3849. dma_free_coherent(qseecom.dev,
  3850. data->client.sec_buf_fd[i].size,
  3851. data->client.sec_buf_fd[i].vbase,
  3852. data->client.sec_buf_fd[i].pbase);
  3853. } else {
  3854. ret = __qseecom_allocate_sg_list_buffer(data,
  3855. field, i, sg_ptr);
  3856. if (ret) {
  3857. pr_err("Failed to allocate sg list buffer\n");
  3858. goto err;
  3859. }
  3860. }
  3861. len = QSEECOM_SG_LIST_BUF_HDR_SZ_64BIT;
  3862. sg = sg_ptr->sgl;
  3863. goto cleanup;
  3864. }
  3865. sg = sg_ptr->sgl;
  3866. if (sg_ptr->nents == 1) {
  3867. uint64_t *update_64bit;
  3868. if (__boundary_checks_offset(req, lstnr_resp, data, i, sizeof(uint64_t)))
  3869. goto err;
  3870. /* 64bit app uses 64bit address */
  3871. update_64bit = (uint64_t *) field;
  3872. *update_64bit = cleanup ? 0 :
  3873. (uint64_t)sg_dma_address(sg_ptr->sgl);
  3874. len += (uint32_t)sg->length;
  3875. } else {
  3876. struct qseecom_sg_entry_64bit *update_64bit;
  3877. int j = 0;
  3878. if (__boundary_checks_offset(req, lstnr_resp, data, i,
  3879. (SG_ENTRY_SZ_64BIT * sg_ptr->nents)))
  3880. goto err;
  3881. /* 64bit app uses 64bit address */
  3882. update_64bit = (struct qseecom_sg_entry_64bit *)field;
  3883. for (j = 0; j < sg_ptr->nents; j++) {
  3884. update_64bit->phys_addr = cleanup ? 0 :
  3885. (uint64_t)sg_dma_address(sg);
  3886. update_64bit->len = cleanup ? 0 :
  3887. (uint32_t)sg->length;
  3888. update_64bit++;
  3889. len += sg->length;
  3890. sg = sg_next(sg);
  3891. }
  3892. }
  3893. cleanup:
  3894. if (cleanup) {
  3895. ret = qseecom_dmabuf_cache_operations(dmabuf,
  3896. QSEECOM_CACHE_INVALIDATE);
  3897. if (ret) {
  3898. pr_err("cache operation failed %d\n", ret);
  3899. goto err;
  3900. }
  3901. } else {
  3902. ret = qseecom_dmabuf_cache_operations(dmabuf,
  3903. QSEECOM_CACHE_CLEAN);
  3904. if (ret) {
  3905. pr_err("cache operation failed %d\n", ret);
  3906. goto err;
  3907. }
  3908. if (data->type == QSEECOM_CLIENT_APP) {
  3909. offset = req->ifd_data[i].cmd_buf_offset;
  3910. data->sglistinfo_ptr[i].indexAndFlags =
  3911. SGLISTINFO_SET_INDEX_FLAG(
  3912. (sg_ptr->nents == 1), 1, offset);
  3913. data->sglistinfo_ptr[i].sizeOrCount =
  3914. (sg_ptr->nents == 1) ?
  3915. sg->length : sg_ptr->nents;
  3916. data->sglist_cnt = i + 1;
  3917. } else {
  3918. offset = (lstnr_resp->ifd_data[i].cmd_buf_offset
  3919. + (uintptr_t)lstnr_resp->resp_buf_ptr -
  3920. (uintptr_t)this_lstnr->sb_virt);
  3921. this_lstnr->sglistinfo_ptr[i].indexAndFlags =
  3922. SGLISTINFO_SET_INDEX_FLAG(
  3923. (sg_ptr->nents == 1), 1, offset);
  3924. this_lstnr->sglistinfo_ptr[i].sizeOrCount =
  3925. (sg_ptr->nents == 1) ?
  3926. sg->length : sg_ptr->nents;
  3927. this_lstnr->sglist_cnt = i + 1;
  3928. }
  3929. }
  3930. /* unmap the dmabuf */
  3931. qseecom_dmabuf_unmap(sg_ptr, attach, dmabuf);
  3932. sg_ptr = NULL;
  3933. dmabuf = NULL;
  3934. attach = NULL;
  3935. }
  3936. return ret;
  3937. err:
  3938. for (i = 0; i < MAX_ION_FD; i++)
  3939. if (data->client.sec_buf_fd[i].is_sec_buf_fd &&
  3940. data->client.sec_buf_fd[i].vbase)
  3941. dma_free_coherent(qseecom.dev,
  3942. data->client.sec_buf_fd[i].size,
  3943. data->client.sec_buf_fd[i].vbase,
  3944. data->client.sec_buf_fd[i].pbase);
  3945. if (!IS_ERR_OR_NULL(sg_ptr)) {
  3946. qseecom_dmabuf_unmap(sg_ptr, attach, dmabuf);
  3947. MAKE_NULL(sg_ptr, attach, dmabuf);
  3948. }
  3949. return -ENOMEM;
  3950. }
  3951. static int __qseecom_send_modfd_cmd(struct qseecom_dev_handle *data,
  3952. void __user *argp,
  3953. bool is_64bit_addr)
  3954. {
  3955. int ret = 0;
  3956. int i;
  3957. struct qseecom_send_modfd_cmd_req req;
  3958. struct qseecom_send_cmd_req send_cmd_req;
  3959. void *origin_req_buf_kvirt, *origin_rsp_buf_kvirt;
  3960. phys_addr_t pa;
  3961. u8 *va = NULL;
  3962. ret = copy_from_user(&req, argp, sizeof(req));
  3963. if (ret) {
  3964. pr_err("copy_from_user failed\n");
  3965. return ret;
  3966. }
  3967. send_cmd_req.cmd_req_buf = req.cmd_req_buf;
  3968. send_cmd_req.cmd_req_len = req.cmd_req_len;
  3969. send_cmd_req.resp_buf = req.resp_buf;
  3970. send_cmd_req.resp_len = req.resp_len;
  3971. if (__validate_send_cmd_inputs(data, &send_cmd_req))
  3972. return -EINVAL;
  3973. /* validate offsets */
  3974. for (i = 0; i < MAX_ION_FD; i++) {
  3975. if (req.ifd_data[i].cmd_buf_offset >= req.cmd_req_len) {
  3976. pr_err("Invalid offset %d = 0x%x\n",
  3977. i, req.ifd_data[i].cmd_buf_offset);
  3978. return -EINVAL;
  3979. }
  3980. }
  3981. /*Back up original address */
  3982. origin_req_buf_kvirt = (void *)__qseecom_uvirt_to_kvirt(data,
  3983. (uintptr_t)req.cmd_req_buf);
  3984. origin_rsp_buf_kvirt = (void *)__qseecom_uvirt_to_kvirt(data,
  3985. (uintptr_t)req.resp_buf);
  3986. /* Allocate kernel buffer for request and response*/
  3987. ret = __qseecom_alloc_coherent_buf(req.cmd_req_len + req.resp_len,
  3988. &va, &pa);
  3989. if (ret) {
  3990. pr_err("Failed to allocate coherent buf, ret %d\n", ret);
  3991. return ret;
  3992. }
  3993. req.cmd_req_buf = va;
  3994. send_cmd_req.cmd_req_buf = (void *)pa;
  3995. req.resp_buf = va + req.cmd_req_len;
  3996. send_cmd_req.resp_buf = (void *)pa + req.cmd_req_len;
  3997. /* Copy the data to kernel request and response buffers*/
  3998. memcpy(req.cmd_req_buf, origin_req_buf_kvirt, req.cmd_req_len);
  3999. memcpy(req.resp_buf, origin_rsp_buf_kvirt, req.resp_len);
  4000. if (!is_64bit_addr) {
  4001. ret = __qseecom_update_cmd_buf(&req, false, data);
  4002. if (ret)
  4003. goto out;
  4004. ret = __qseecom_send_cmd(data, &send_cmd_req, true);
  4005. if (ret)
  4006. goto out;
  4007. ret = __qseecom_update_cmd_buf(&req, true, data);
  4008. if (ret)
  4009. goto out;
  4010. } else {
  4011. ret = __qseecom_update_cmd_buf_64(&req, false, data);
  4012. if (ret)
  4013. goto out;
  4014. ret = __qseecom_send_cmd(data, &send_cmd_req, true);
  4015. if (ret)
  4016. goto out;
  4017. ret = __qseecom_update_cmd_buf_64(&req, true, data);
  4018. if (ret)
  4019. goto out;
  4020. }
  4021. /*Copy the response back to the userspace buffer*/
  4022. memcpy(origin_rsp_buf_kvirt, req.resp_buf, req.resp_len);
  4023. memcpy(origin_req_buf_kvirt, req.cmd_req_buf, req.cmd_req_len);
  4024. out:
  4025. if (req.cmd_req_buf)
  4026. __qseecom_free_coherent_buf(req.cmd_req_len + req.resp_len,
  4027. req.cmd_req_buf, (phys_addr_t)send_cmd_req.cmd_req_buf);
  4028. return ret;
  4029. }
  4030. static int qseecom_send_modfd_cmd(struct qseecom_dev_handle *data,
  4031. void __user *argp)
  4032. {
  4033. return __qseecom_send_modfd_cmd(data, argp, false);
  4034. }
  4035. static int qseecom_send_modfd_cmd_64(struct qseecom_dev_handle *data,
  4036. void __user *argp)
  4037. {
  4038. return __qseecom_send_modfd_cmd(data, argp, true);
  4039. }
  4040. static int __qseecom_listener_has_rcvd_req(struct qseecom_dev_handle *data,
  4041. struct qseecom_registered_listener_list *svc)
  4042. {
  4043. int ret;
  4044. ret = (svc->rcv_req_flag == 1);
  4045. return ret || data->abort;
  4046. }
  4047. static int qseecom_receive_req(struct qseecom_dev_handle *data)
  4048. {
  4049. int ret = 0;
  4050. struct qseecom_registered_listener_list *this_lstnr;
  4051. mutex_lock(&listener_access_lock);
  4052. this_lstnr = __qseecom_find_svc(data->listener.id);
  4053. if (!this_lstnr) {
  4054. pr_err("Invalid listener ID\n");
  4055. mutex_unlock(&listener_access_lock);
  4056. return -ENODATA;
  4057. }
  4058. mutex_unlock(&listener_access_lock);
  4059. while (1) {
  4060. if (wait_event_interruptible(this_lstnr->rcv_req_wq,
  4061. __qseecom_listener_has_rcvd_req(data,
  4062. this_lstnr))) {
  4063. pr_debug("Interrupted: exiting Listener Service = %d\n",
  4064. (uint32_t)data->listener.id);
  4065. /* woken up for different reason */
  4066. return -ERESTARTSYS;
  4067. }
  4068. if (data->abort) {
  4069. pr_err("Aborting Listener Service = %d\n",
  4070. (uint32_t)data->listener.id);
  4071. return -ENODEV;
  4072. }
  4073. mutex_lock(&listener_access_lock);
  4074. this_lstnr->rcv_req_flag = 0;
  4075. mutex_unlock(&listener_access_lock);
  4076. break;
  4077. }
  4078. return ret;
  4079. }
  4080. static bool __qseecom_is_fw_image_valid(const struct firmware *fw_entry)
  4081. {
  4082. unsigned char app_arch = 0;
  4083. struct elf32_hdr *ehdr;
  4084. struct elf64_hdr *ehdr64;
  4085. app_arch = *(unsigned char *)(fw_entry->data + EI_CLASS);
  4086. switch (app_arch) {
  4087. case ELFCLASS32: {
  4088. ehdr = (struct elf32_hdr *)fw_entry->data;
  4089. if (fw_entry->size < sizeof(*ehdr)) {
  4090. pr_err("%s: Not big enough to be an elf32 header\n",
  4091. qseecom.pdev->init_name);
  4092. return false;
  4093. }
  4094. if (memcmp(ehdr->e_ident, ELFMAG, SELFMAG)) {
  4095. pr_err("%s: Not an elf32 header\n",
  4096. qseecom.pdev->init_name);
  4097. return false;
  4098. }
  4099. if (ehdr->e_phnum == 0) {
  4100. pr_err("%s: No loadable segments\n",
  4101. qseecom.pdev->init_name);
  4102. return false;
  4103. }
  4104. if (sizeof(struct elf32_phdr) * ehdr->e_phnum +
  4105. sizeof(struct elf32_hdr) > fw_entry->size) {
  4106. pr_err("%s: Program headers not within mdt\n",
  4107. qseecom.pdev->init_name);
  4108. return false;
  4109. }
  4110. break;
  4111. }
  4112. case ELFCLASS64: {
  4113. ehdr64 = (struct elf64_hdr *)fw_entry->data;
  4114. if (fw_entry->size < sizeof(*ehdr64)) {
  4115. pr_err("%s: Not big enough to be an elf64 header\n",
  4116. qseecom.pdev->init_name);
  4117. return false;
  4118. }
  4119. if (memcmp(ehdr64->e_ident, ELFMAG, SELFMAG)) {
  4120. pr_err("%s: Not an elf64 header\n",
  4121. qseecom.pdev->init_name);
  4122. return false;
  4123. }
  4124. if (ehdr64->e_phnum == 0) {
  4125. pr_err("%s: No loadable segments\n",
  4126. qseecom.pdev->init_name);
  4127. return false;
  4128. }
  4129. if (sizeof(struct elf64_phdr) * ehdr64->e_phnum +
  4130. sizeof(struct elf64_hdr) > fw_entry->size) {
  4131. pr_err("%s: Program headers not within mdt\n",
  4132. qseecom.pdev->init_name);
  4133. return false;
  4134. }
  4135. break;
  4136. }
  4137. default: {
  4138. pr_err("QSEE app arch %u is not supported\n", app_arch);
  4139. return false;
  4140. }
  4141. }
  4142. return true;
  4143. }
  4144. static int __qseecom_get_fw_size(const char *appname, uint32_t *fw_size,
  4145. uint32_t *app_arch)
  4146. {
  4147. int ret = -1;
  4148. int i = 0, rc = 0;
  4149. const struct firmware *fw_entry = NULL;
  4150. char fw_name[MAX_APP_NAME_SIZE];
  4151. struct elf32_hdr *ehdr;
  4152. struct elf64_hdr *ehdr64;
  4153. int num_images = 0;
  4154. snprintf(fw_name, sizeof(fw_name), "%s.mdt", appname);
  4155. rc = firmware_request_nowarn(&fw_entry, fw_name, qseecom.pdev);
  4156. if (rc) {
  4157. pr_err("error with firmware_request_nowarn, rc = %d\n", rc);
  4158. ret = -EIO;
  4159. goto err;
  4160. }
  4161. if (!__qseecom_is_fw_image_valid(fw_entry)) {
  4162. ret = -EIO;
  4163. goto err;
  4164. }
  4165. *app_arch = *(unsigned char *)(fw_entry->data + EI_CLASS);
  4166. *fw_size = fw_entry->size;
  4167. if (*app_arch == ELFCLASS32) {
  4168. ehdr = (struct elf32_hdr *)fw_entry->data;
  4169. num_images = ehdr->e_phnum;
  4170. } else if (*app_arch == ELFCLASS64) {
  4171. ehdr64 = (struct elf64_hdr *)fw_entry->data;
  4172. num_images = ehdr64->e_phnum;
  4173. } else {
  4174. pr_err("QSEE %s app, arch %u is not supported\n",
  4175. appname, *app_arch);
  4176. ret = -EIO;
  4177. goto err;
  4178. }
  4179. pr_debug("QSEE %s app, arch %u\n", appname, *app_arch);
  4180. release_firmware(fw_entry);
  4181. fw_entry = NULL;
  4182. for (i = 0; i < num_images; i++) {
  4183. memset(fw_name, 0, sizeof(fw_name));
  4184. snprintf(fw_name, ARRAY_SIZE(fw_name), "%s.b%02d", appname, i);
  4185. ret = firmware_request_nowarn(&fw_entry, fw_name, qseecom.pdev);
  4186. if (ret)
  4187. goto err;
  4188. if (*fw_size > U32_MAX - fw_entry->size) {
  4189. pr_err("QSEE %s app file size overflow\n", appname);
  4190. ret = -EINVAL;
  4191. goto err;
  4192. }
  4193. *fw_size += fw_entry->size;
  4194. release_firmware(fw_entry);
  4195. fw_entry = NULL;
  4196. }
  4197. return ret;
  4198. err:
  4199. if (fw_entry)
  4200. release_firmware(fw_entry);
  4201. *fw_size = 0;
  4202. return ret;
  4203. }
  4204. static int __qseecom_get_fw_data(const char *appname, u8 *img_data,
  4205. uint32_t fw_size,
  4206. struct qseecom_load_app_ireq *load_req)
  4207. {
  4208. int ret = -1;
  4209. int i = 0, rc = 0;
  4210. const struct firmware *fw_entry = NULL;
  4211. char fw_name[MAX_APP_NAME_SIZE];
  4212. u8 *img_data_ptr = img_data;
  4213. struct elf32_hdr *ehdr;
  4214. struct elf64_hdr *ehdr64;
  4215. int num_images = 0;
  4216. unsigned char app_arch = 0;
  4217. snprintf(fw_name, sizeof(fw_name), "%s.mdt", appname);
  4218. rc = firmware_request_nowarn(&fw_entry, fw_name, qseecom.pdev);
  4219. if (rc) {
  4220. ret = -EIO;
  4221. goto err;
  4222. }
  4223. load_req->img_len = fw_entry->size;
  4224. if (load_req->img_len > fw_size) {
  4225. pr_err("app %s size %zu is larger than buf size %u\n",
  4226. appname, fw_entry->size, fw_size);
  4227. ret = -EINVAL;
  4228. goto err;
  4229. }
  4230. memcpy(img_data_ptr, fw_entry->data, fw_entry->size);
  4231. img_data_ptr = img_data_ptr + fw_entry->size;
  4232. load_req->mdt_len = fw_entry->size; /*Get MDT LEN*/
  4233. app_arch = *(unsigned char *)(fw_entry->data + EI_CLASS);
  4234. if (app_arch == ELFCLASS32) {
  4235. ehdr = (struct elf32_hdr *)fw_entry->data;
  4236. num_images = ehdr->e_phnum;
  4237. } else if (app_arch == ELFCLASS64) {
  4238. ehdr64 = (struct elf64_hdr *)fw_entry->data;
  4239. num_images = ehdr64->e_phnum;
  4240. } else {
  4241. pr_err("QSEE %s app, arch %u is not supported\n",
  4242. appname, app_arch);
  4243. ret = -EIO;
  4244. goto err;
  4245. }
  4246. release_firmware(fw_entry);
  4247. fw_entry = NULL;
  4248. for (i = 0; i < num_images; i++) {
  4249. snprintf(fw_name, ARRAY_SIZE(fw_name), "%s.b%02d", appname, i);
  4250. ret = firmware_request_nowarn(&fw_entry, fw_name, qseecom.pdev);
  4251. if (ret) {
  4252. pr_err("Failed to locate blob %s\n", fw_name);
  4253. goto err;
  4254. }
  4255. if ((fw_entry->size > U32_MAX - load_req->img_len) ||
  4256. (fw_entry->size + load_req->img_len > fw_size)) {
  4257. pr_err("Invalid file size for %s\n", fw_name);
  4258. ret = -EINVAL;
  4259. goto err;
  4260. }
  4261. memcpy(img_data_ptr, fw_entry->data, fw_entry->size);
  4262. img_data_ptr = img_data_ptr + fw_entry->size;
  4263. load_req->img_len += fw_entry->size;
  4264. release_firmware(fw_entry);
  4265. fw_entry = NULL;
  4266. }
  4267. return ret;
  4268. err:
  4269. release_firmware(fw_entry);
  4270. return ret;
  4271. }
  4272. static int __qseecom_alloc_coherent_buf(
  4273. uint32_t size, u8 **vaddr, phys_addr_t *paddr)
  4274. {
  4275. dma_addr_t coh_pmem;
  4276. void *buf = NULL;
  4277. /* Allocate a contiguous kernel buffer */
  4278. size = (size + PAGE_SIZE) & PAGE_MASK;
  4279. buf = dma_alloc_coherent(qseecom.dev,
  4280. size, &coh_pmem, GFP_KERNEL);
  4281. if (buf == NULL)
  4282. return -ENOMEM;
  4283. *vaddr = buf;
  4284. *paddr = coh_pmem;
  4285. return 0;
  4286. }
  4287. static void __qseecom_free_coherent_buf(uint32_t size,
  4288. u8 *vaddr, phys_addr_t paddr)
  4289. {
  4290. if (!vaddr)
  4291. return;
  4292. size = (size + PAGE_SIZE) & PAGE_MASK;
  4293. dma_free_coherent(qseecom.dev, size, vaddr, paddr);
  4294. }
  4295. #if IS_ENABLED(CONFIG_QSEECOM)
  4296. static int __qseecom_load_fw(struct qseecom_dev_handle *data, char *appname,
  4297. uint32_t *app_id)
  4298. {
  4299. int ret = -1;
  4300. uint32_t fw_size = 0;
  4301. struct qseecom_load_app_ireq load_req = {0, 0, 0, 0};
  4302. struct qseecom_load_app_64bit_ireq load_req_64bit = {0, 0, 0, 0};
  4303. struct qseecom_command_scm_resp resp;
  4304. u8 *img_data = NULL;
  4305. phys_addr_t pa = 0;
  4306. void *cmd_buf = NULL;
  4307. size_t cmd_len;
  4308. uint32_t app_arch = 0;
  4309. if (!data || !appname || !app_id) {
  4310. pr_err("Null pointer to data or appname or appid\n");
  4311. return -EINVAL;
  4312. }
  4313. *app_id = 0;
  4314. if (__qseecom_get_fw_size(appname, &fw_size, &app_arch))
  4315. return -EIO;
  4316. data->client.app_arch = app_arch;
  4317. /* Check and load cmnlib */
  4318. if (qseecom.qsee_version > QSEEE_VERSION_00) {
  4319. if (!qseecom.commonlib_loaded && app_arch == ELFCLASS32) {
  4320. ret = qseecom_load_commonlib_image(data, "cmnlib");
  4321. if (ret) {
  4322. pr_err("failed to load cmnlib\n");
  4323. return -EIO;
  4324. }
  4325. qseecom.commonlib_loaded = true;
  4326. pr_debug("cmnlib is loaded\n");
  4327. }
  4328. if (!qseecom.commonlib64_loaded && app_arch == ELFCLASS64) {
  4329. ret = qseecom_load_commonlib_image(data, "cmnlib64");
  4330. if (ret) {
  4331. pr_err("failed to load cmnlib64\n");
  4332. return -EIO;
  4333. }
  4334. qseecom.commonlib64_loaded = true;
  4335. pr_debug("cmnlib64 is loaded\n");
  4336. }
  4337. }
  4338. ret = __qseecom_alloc_coherent_buf(fw_size, &img_data, &pa);
  4339. if (ret)
  4340. return ret;
  4341. ret = __qseecom_get_fw_data(appname, img_data, fw_size, &load_req);
  4342. if (ret) {
  4343. ret = -EIO;
  4344. goto exit_free_img_data;
  4345. }
  4346. /* Populate the load_req parameters */
  4347. if (qseecom.qsee_version < QSEE_VERSION_40) {
  4348. load_req.qsee_cmd_id = QSEOS_APP_START_COMMAND;
  4349. load_req.mdt_len = load_req.mdt_len;
  4350. load_req.img_len = load_req.img_len;
  4351. strlcpy(load_req.app_name, appname, MAX_APP_NAME_SIZE);
  4352. load_req.phy_addr = (uint32_t)pa;
  4353. cmd_buf = (void *)&load_req;
  4354. cmd_len = sizeof(struct qseecom_load_app_ireq);
  4355. } else {
  4356. load_req_64bit.qsee_cmd_id = QSEOS_APP_START_COMMAND;
  4357. load_req_64bit.mdt_len = load_req.mdt_len;
  4358. load_req_64bit.img_len = load_req.img_len;
  4359. strlcpy(load_req_64bit.app_name, appname, MAX_APP_NAME_SIZE);
  4360. load_req_64bit.phy_addr = (uint64_t)pa;
  4361. cmd_buf = (void *)&load_req_64bit;
  4362. cmd_len = sizeof(struct qseecom_load_app_64bit_ireq);
  4363. }
  4364. if (qseecom.support_bus_scaling) {
  4365. mutex_lock(&qsee_bw_mutex);
  4366. ret = __qseecom_register_bus_bandwidth_needs(data, MEDIUM);
  4367. mutex_unlock(&qsee_bw_mutex);
  4368. if (ret) {
  4369. ret = -EIO;
  4370. goto exit_free_img_data;
  4371. }
  4372. }
  4373. ret = __qseecom_enable_clk_scale_up(data);
  4374. if (ret) {
  4375. ret = -EIO;
  4376. goto exit_unregister_bus_bw_need;
  4377. }
  4378. /* SCM_CALL to load the image */
  4379. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, cmd_buf, cmd_len,
  4380. &resp, sizeof(resp));
  4381. if (ret) {
  4382. pr_err("scm_call to load failed : ret %d\n", ret);
  4383. ret = -EIO;
  4384. goto exit_disable_clk_vote;
  4385. }
  4386. switch (resp.result) {
  4387. case QSEOS_RESULT_SUCCESS:
  4388. *app_id = resp.data;
  4389. break;
  4390. case QSEOS_RESULT_INCOMPLETE:
  4391. ret = __qseecom_process_incomplete_cmd(data, &resp);
  4392. if (ret) {
  4393. pr_err("incomp_cmd err %d, %d, unload %d %s\n",
  4394. ret, resp.result, resp.data, appname);
  4395. __qseecom_unload_app(data, resp.data);
  4396. ret = -EFAULT;
  4397. } else {
  4398. *app_id = resp.data;
  4399. }
  4400. break;
  4401. case QSEOS_RESULT_FAILURE:
  4402. pr_err("scm call failed with response QSEOS_RESULT FAILURE\n");
  4403. break;
  4404. default:
  4405. pr_err("scm call return unknown response %d\n", resp.result);
  4406. ret = -EINVAL;
  4407. break;
  4408. }
  4409. exit_disable_clk_vote:
  4410. __qseecom_disable_clk_scale_down(data);
  4411. exit_unregister_bus_bw_need:
  4412. if (qseecom.support_bus_scaling) {
  4413. mutex_lock(&qsee_bw_mutex);
  4414. qseecom_unregister_bus_bandwidth_needs(data);
  4415. mutex_unlock(&qsee_bw_mutex);
  4416. }
  4417. exit_free_img_data:
  4418. if (img_data)
  4419. __qseecom_free_coherent_buf(fw_size, img_data, pa);
  4420. return ret;
  4421. }
  4422. #endif
  4423. static int qseecom_load_commonlib_image(struct qseecom_dev_handle *data,
  4424. char *cmnlib_name)
  4425. {
  4426. int ret = 0;
  4427. uint32_t fw_size = 0;
  4428. struct qseecom_load_app_ireq load_req = {0, 0, 0, 0};
  4429. struct qseecom_load_app_64bit_ireq load_req_64bit = {0, 0, 0, 0};
  4430. struct qseecom_command_scm_resp resp;
  4431. u8 *img_data = NULL;
  4432. phys_addr_t pa = 0;
  4433. void *cmd_buf = NULL;
  4434. size_t cmd_len;
  4435. uint32_t app_arch = 0;
  4436. if (!cmnlib_name) {
  4437. pr_err("cmnlib_name is NULL\n");
  4438. return -EINVAL;
  4439. }
  4440. if (strlen(cmnlib_name) >= MAX_APP_NAME_SIZE) {
  4441. pr_err("The cmnlib_name (%s) with length %zu is not valid\n",
  4442. cmnlib_name, strlen(cmnlib_name));
  4443. return -EINVAL;
  4444. }
  4445. if (__qseecom_get_fw_size(cmnlib_name, &fw_size, &app_arch))
  4446. return -EIO;
  4447. ret = __qseecom_alloc_coherent_buf(fw_size, &img_data, &pa);
  4448. if (ret)
  4449. return -EIO;
  4450. ret = __qseecom_get_fw_data(cmnlib_name, img_data, fw_size, &load_req);
  4451. if (ret) {
  4452. ret = -EIO;
  4453. goto exit_free_img_data;
  4454. }
  4455. if (qseecom.qsee_version < QSEE_VERSION_40) {
  4456. load_req.phy_addr = (uint32_t)pa;
  4457. load_req.qsee_cmd_id = QSEOS_LOAD_SERV_IMAGE_COMMAND;
  4458. cmd_buf = (void *)&load_req;
  4459. cmd_len = sizeof(struct qseecom_load_lib_image_ireq);
  4460. } else {
  4461. load_req_64bit.phy_addr = (uint64_t)pa;
  4462. load_req_64bit.qsee_cmd_id = QSEOS_LOAD_SERV_IMAGE_COMMAND;
  4463. load_req_64bit.img_len = load_req.img_len;
  4464. load_req_64bit.mdt_len = load_req.mdt_len;
  4465. cmd_buf = (void *)&load_req_64bit;
  4466. cmd_len = sizeof(struct qseecom_load_lib_image_64bit_ireq);
  4467. }
  4468. if (qseecom.support_bus_scaling) {
  4469. mutex_lock(&qsee_bw_mutex);
  4470. ret = __qseecom_register_bus_bandwidth_needs(data, MEDIUM);
  4471. mutex_unlock(&qsee_bw_mutex);
  4472. if (ret) {
  4473. ret = -EIO;
  4474. goto exit_free_img_data;
  4475. }
  4476. }
  4477. /* Vote for the SFPB clock */
  4478. ret = __qseecom_enable_clk_scale_up(data);
  4479. if (ret) {
  4480. ret = -EIO;
  4481. goto exit_unregister_bus_bw_need;
  4482. }
  4483. /* SCM_CALL to load the image */
  4484. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, cmd_buf, cmd_len,
  4485. &resp, sizeof(resp));
  4486. if (ret) {
  4487. pr_err("scm_call to load failed : ret %d\n", ret);
  4488. ret = -EIO;
  4489. goto exit_disable_clk_vote;
  4490. }
  4491. switch (resp.result) {
  4492. case QSEOS_RESULT_SUCCESS:
  4493. break;
  4494. case QSEOS_RESULT_FAILURE:
  4495. pr_err("scm call failed w/response result%d\n", resp.result);
  4496. ret = -EINVAL;
  4497. goto exit_disable_clk_vote;
  4498. case QSEOS_RESULT_INCOMPLETE:
  4499. ret = __qseecom_process_incomplete_cmd(data, &resp);
  4500. if (ret) {
  4501. pr_err("process_incomplete_cmd failed err: %d\n", ret);
  4502. goto exit_disable_clk_vote;
  4503. }
  4504. break;
  4505. default:
  4506. pr_err("scm call return unknown response %d\n", resp.result);
  4507. ret = -EINVAL;
  4508. goto exit_disable_clk_vote;
  4509. }
  4510. exit_disable_clk_vote:
  4511. __qseecom_disable_clk_scale_down(data);
  4512. exit_unregister_bus_bw_need:
  4513. if (qseecom.support_bus_scaling) {
  4514. mutex_lock(&qsee_bw_mutex);
  4515. qseecom_unregister_bus_bandwidth_needs(data);
  4516. mutex_unlock(&qsee_bw_mutex);
  4517. }
  4518. exit_free_img_data:
  4519. if (img_data)
  4520. __qseecom_free_coherent_buf(fw_size, img_data, pa);
  4521. return ret;
  4522. }
  4523. static int qseecom_unload_commonlib_image(void)
  4524. {
  4525. int ret = -EINVAL;
  4526. struct qseecom_unload_lib_image_ireq unload_req = {0};
  4527. struct qseecom_command_scm_resp resp;
  4528. /* Populate the remaining parameters */
  4529. unload_req.qsee_cmd_id = QSEOS_UNLOAD_SERV_IMAGE_COMMAND;
  4530. /* SCM_CALL to load the image */
  4531. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, &unload_req,
  4532. sizeof(struct qseecom_unload_lib_image_ireq),
  4533. &resp, sizeof(resp));
  4534. if (ret) {
  4535. pr_err("scm_call to unload lib failed : ret %d\n", ret);
  4536. ret = -EIO;
  4537. } else {
  4538. switch (resp.result) {
  4539. case QSEOS_RESULT_SUCCESS:
  4540. break;
  4541. case QSEOS_RESULT_FAILURE:
  4542. pr_err("scm fail resp.result QSEOS_RESULT FAILURE\n");
  4543. break;
  4544. default:
  4545. pr_err("scm call return unknown response %d\n",
  4546. resp.result);
  4547. ret = -EINVAL;
  4548. break;
  4549. }
  4550. }
  4551. return ret;
  4552. }
  4553. #if IS_ENABLED(CONFIG_QSEECOM)
  4554. static int __qseecom_start_app(struct qseecom_handle **handle,
  4555. char *app_name, uint32_t size)
  4556. {
  4557. int32_t ret = 0;
  4558. unsigned long flags = 0;
  4559. struct qseecom_dev_handle *data = NULL;
  4560. struct qseecom_check_app_ireq app_ireq;
  4561. struct qseecom_registered_app_list *entry = NULL;
  4562. struct qseecom_registered_kclient_list *kclient_entry = NULL;
  4563. bool found_app = false;
  4564. phys_addr_t pa = 0;
  4565. u8 *va = NULL;
  4566. uint32_t fw_size, app_arch;
  4567. uint32_t app_id = 0;
  4568. __wakeup_unregister_listener_kthread();
  4569. __wakeup_unload_app_kthread();
  4570. if (atomic_read(&qseecom.qseecom_state) != QSEECOM_STATE_READY) {
  4571. pr_err("Not allowed to be called in %d state\n",
  4572. atomic_read(&qseecom.qseecom_state));
  4573. return -EPERM;
  4574. }
  4575. if (!app_name) {
  4576. pr_err("failed to get the app name\n");
  4577. return -EINVAL;
  4578. }
  4579. if (strnlen(app_name, MAX_APP_NAME_SIZE) == MAX_APP_NAME_SIZE) {
  4580. pr_err("The app_name (%s) with length %zu is not valid\n",
  4581. app_name, strnlen(app_name, MAX_APP_NAME_SIZE));
  4582. return -EINVAL;
  4583. }
  4584. *handle = kzalloc(sizeof(struct qseecom_handle), GFP_KERNEL);
  4585. if (!(*handle))
  4586. return -ENOMEM;
  4587. data = kzalloc(sizeof(*data), GFP_KERNEL);
  4588. if (!data) {
  4589. kfree(*handle);
  4590. *handle = NULL;
  4591. return -ENOMEM;
  4592. }
  4593. mutex_lock(&app_access_lock);
  4594. data->abort = 0;
  4595. data->type = QSEECOM_CLIENT_APP;
  4596. data->released = false;
  4597. data->client.sb_length = size;
  4598. data->client.user_virt_sb_base = 0;
  4599. data->sglistinfo_ptr = (struct sglist_info *)__qseecom_alloc_tzbuf(
  4600. sizeof(struct sglist_info) * MAX_ION_FD,
  4601. &data->sglistinfo_shm.paddr,
  4602. &data->sglistinfo_shm);
  4603. if (!data->sglistinfo_ptr) {
  4604. ret = -ENOMEM;
  4605. goto err;
  4606. }
  4607. init_waitqueue_head(&data->abort_wq);
  4608. app_ireq.qsee_cmd_id = QSEOS_APP_LOOKUP_COMMAND;
  4609. strlcpy(app_ireq.app_name, app_name, MAX_APP_NAME_SIZE);
  4610. ret = __qseecom_check_app_exists(app_ireq, &app_id);
  4611. if (ret)
  4612. goto err;
  4613. strlcpy(data->client.app_name, app_name, MAX_APP_NAME_SIZE);
  4614. if (app_id) {
  4615. pr_warn("App id %d for [%s] app exists\n", app_id,
  4616. (char *)app_ireq.app_name);
  4617. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  4618. list_for_each_entry(entry,
  4619. &qseecom.registered_app_list_head, list){
  4620. if (entry->app_id == app_id) {
  4621. if (entry->ref_cnt == U32_MAX) {
  4622. pr_err("App %d (%s) ref_cnt overflow\n",
  4623. app_id, app_ireq.app_name);
  4624. ret = -EINVAL;
  4625. goto err;
  4626. }
  4627. entry->ref_cnt++;
  4628. found_app = true;
  4629. break;
  4630. }
  4631. }
  4632. spin_unlock_irqrestore(
  4633. &qseecom.registered_app_list_lock, flags);
  4634. if (!found_app)
  4635. pr_warn("App_id %d [%s] was loaded but not registered\n",
  4636. ret, (char *)app_ireq.app_name);
  4637. } else {
  4638. /* load the app and get the app_id */
  4639. pr_debug("%s: Loading app for the first time'\n",
  4640. qseecom.pdev->init_name);
  4641. ret = __qseecom_load_fw(data, app_name, &app_id);
  4642. if (ret < 0)
  4643. goto err;
  4644. }
  4645. data->client.app_id = app_id;
  4646. if (!found_app) {
  4647. entry = kmalloc(sizeof(*entry), GFP_KERNEL);
  4648. if (!entry) {
  4649. ret = -ENOMEM;
  4650. goto err;
  4651. }
  4652. entry->app_id = app_id;
  4653. entry->ref_cnt = 1;
  4654. strlcpy(entry->app_name, app_name, MAX_APP_NAME_SIZE);
  4655. if (__qseecom_get_fw_size(app_name, &fw_size, &app_arch)) {
  4656. ret = -EIO;
  4657. kfree(entry);
  4658. goto err;
  4659. }
  4660. entry->app_arch = app_arch;
  4661. entry->app_blocked = false;
  4662. entry->blocked_on_listener_id = 0;
  4663. entry->check_block = 0;
  4664. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  4665. list_add_tail(&entry->list, &qseecom.registered_app_list_head);
  4666. spin_unlock_irqrestore(&qseecom.registered_app_list_lock,
  4667. flags);
  4668. }
  4669. /* Get the physical address of the req/resp buffer */
  4670. ret = __qseecom_alloc_coherent_buf(size, &va, &pa);
  4671. if (ret) {
  4672. pr_err("Cannot get phys_addr for the Ion Client, ret = %d\n",
  4673. ret);
  4674. goto err;
  4675. }
  4676. /* Populate the structure for sending scm call to load image */
  4677. data->client.sb_virt = va;
  4678. data->client.user_virt_sb_base = (uintptr_t)data->client.sb_virt;
  4679. data->client.sb_phys = (phys_addr_t)pa;
  4680. (*handle)->dev = (void *)data;
  4681. (*handle)->sbuf = (unsigned char *)data->client.sb_virt;
  4682. (*handle)->sbuf_len = data->client.sb_length;
  4683. kclient_entry = kzalloc(sizeof(*kclient_entry), GFP_KERNEL);
  4684. if (!kclient_entry) {
  4685. ret = -ENOMEM;
  4686. goto err;
  4687. }
  4688. kclient_entry->handle = *handle;
  4689. spin_lock_irqsave(&qseecom.registered_kclient_list_lock, flags);
  4690. list_add_tail(&kclient_entry->list,
  4691. &qseecom.registered_kclient_list_head);
  4692. spin_unlock_irqrestore(&qseecom.registered_kclient_list_lock, flags);
  4693. mutex_unlock(&app_access_lock);
  4694. __wakeup_unload_app_kthread();
  4695. return 0;
  4696. err:
  4697. __qseecom_free_coherent_buf(size, va, pa);
  4698. __qseecom_free_tzbuf(&data->sglistinfo_shm);
  4699. kfree(data);
  4700. kfree(*handle);
  4701. *handle = NULL;
  4702. mutex_unlock(&app_access_lock);
  4703. __wakeup_unload_app_kthread();
  4704. return ret;
  4705. }
  4706. static int __qseecom_shutdown_app(struct qseecom_handle **handle)
  4707. {
  4708. int ret = -EINVAL;
  4709. struct qseecom_dev_handle *data;
  4710. struct qseecom_registered_kclient_list *kclient = NULL;
  4711. unsigned long flags = 0;
  4712. bool found_handle = false;
  4713. __wakeup_unregister_listener_kthread();
  4714. __wakeup_unload_app_kthread();
  4715. if (atomic_read(&qseecom.qseecom_state) != QSEECOM_STATE_READY) {
  4716. pr_err("Not allowed to be called in %d state\n",
  4717. atomic_read(&qseecom.qseecom_state));
  4718. return -EPERM;
  4719. }
  4720. if ((handle == NULL) || (*handle == NULL)) {
  4721. pr_err("Handle is not initialized\n");
  4722. return -EINVAL;
  4723. }
  4724. data = (struct qseecom_dev_handle *) ((*handle)->dev);
  4725. mutex_lock(&app_access_lock);
  4726. spin_lock_irqsave(&qseecom.registered_kclient_list_lock, flags);
  4727. list_for_each_entry(kclient, &qseecom.registered_kclient_list_head,
  4728. list) {
  4729. if (kclient->handle == (*handle)) {
  4730. list_del(&kclient->list);
  4731. found_handle = true;
  4732. break;
  4733. }
  4734. }
  4735. spin_unlock_irqrestore(&qseecom.registered_kclient_list_lock, flags);
  4736. if (!found_handle)
  4737. pr_err("Unable to find the handle, exiting\n");
  4738. else
  4739. ret = qseecom_unload_app(data, false);
  4740. mutex_unlock(&app_access_lock);
  4741. if (ret == 0) {
  4742. if (data->client.sb_virt)
  4743. __qseecom_free_coherent_buf(data->client.sb_length,
  4744. data->client.sb_virt, data->client.sb_phys);
  4745. __qseecom_free_tzbuf(&data->sglistinfo_shm);
  4746. kfree_sensitive(data);
  4747. kfree_sensitive(*handle);
  4748. kfree_sensitive(kclient);
  4749. *handle = NULL;
  4750. }
  4751. __wakeup_unload_app_kthread();
  4752. return ret;
  4753. }
  4754. static int __qseecom_send_command(struct qseecom_handle *handle, void *send_buf,
  4755. uint32_t sbuf_len, void *resp_buf, uint32_t rbuf_len)
  4756. {
  4757. int ret = 0;
  4758. struct qseecom_send_cmd_req req = {NULL, 0, NULL, 0};
  4759. struct qseecom_dev_handle *data;
  4760. bool perf_enabled = false;
  4761. __wakeup_unregister_listener_kthread();
  4762. __wakeup_unload_app_kthread();
  4763. if (atomic_read(&qseecom.qseecom_state) != QSEECOM_STATE_READY) {
  4764. pr_err("Not allowed to be called in %d state\n",
  4765. atomic_read(&qseecom.qseecom_state));
  4766. return -EPERM;
  4767. }
  4768. if (handle == NULL) {
  4769. pr_err("Handle is not initialized\n");
  4770. return -EINVAL;
  4771. }
  4772. data = handle->dev;
  4773. req.cmd_req_len = sbuf_len;
  4774. req.resp_len = rbuf_len;
  4775. req.cmd_req_buf = send_buf;
  4776. req.resp_buf = resp_buf;
  4777. if (__validate_send_cmd_inputs(data, &req))
  4778. return -EINVAL;
  4779. mutex_lock(&app_access_lock);
  4780. if (qseecom.support_bus_scaling) {
  4781. ret = qseecom_scale_bus_bandwidth_timer(INACTIVE);
  4782. if (ret) {
  4783. pr_err("Failed to set bw.\n");
  4784. mutex_unlock(&app_access_lock);
  4785. return ret;
  4786. }
  4787. }
  4788. /*
  4789. * On targets where crypto clock is handled by HLOS,
  4790. * if clk_access_cnt is zero and perf_enabled is false,
  4791. * then the crypto clock was not enabled before sending cmd
  4792. * to tz, qseecom will enable the clock to avoid service failure.
  4793. */
  4794. if (!qseecom.no_clock_support &&
  4795. !qseecom.qsee.clk_access_cnt && !data->perf_enabled) {
  4796. pr_debug("ce clock is not enabled!\n");
  4797. ret = qseecom_perf_enable(data);
  4798. if (ret) {
  4799. pr_err("Failed to vote for clock with err %d\n",
  4800. ret);
  4801. mutex_unlock(&app_access_lock);
  4802. return -EINVAL;
  4803. }
  4804. perf_enabled = true;
  4805. }
  4806. if (!strcmp(data->client.app_name, "securemm"))
  4807. data->use_legacy_cmd = true;
  4808. ret = __qseecom_send_cmd(data, &req, false);
  4809. data->use_legacy_cmd = false;
  4810. if (qseecom.support_bus_scaling)
  4811. __qseecom_add_bw_scale_down_timer(
  4812. QSEECOM_SEND_CMD_CRYPTO_TIMEOUT);
  4813. if (perf_enabled) {
  4814. qsee_disable_clock_vote(data, CLK_DFAB);
  4815. qsee_disable_clock_vote(data, CLK_SFPB);
  4816. }
  4817. mutex_unlock(&app_access_lock);
  4818. if (ret)
  4819. return ret;
  4820. pr_debug("sending cmd_req->rsp size: %u, ptr: 0x%pK\n",
  4821. req.resp_len, req.resp_buf);
  4822. return ret;
  4823. }
  4824. #if IS_ENABLED(CONFIG_QSEECOM)
  4825. #if IS_ENABLED(CONFIG_QSEECOM_PROXY)
  4826. const static struct qseecom_drv_ops qseecom_driver_ops = {
  4827. .qseecom_send_command = __qseecom_send_command,
  4828. .qseecom_start_app = __qseecom_start_app,
  4829. .qseecom_shutdown_app = __qseecom_shutdown_app,
  4830. };
  4831. int get_qseecom_kernel_fun_ops(void)
  4832. {
  4833. return provide_qseecom_kernel_fun_ops(&qseecom_driver_ops);
  4834. }
  4835. #else
  4836. int qseecom_start_app(struct qseecom_handle **handle,
  4837. char *app_name, uint32_t size)
  4838. {
  4839. return __qseecom_start_app(handle, app_name, size);
  4840. }
  4841. EXPORT_SYMBOL(qseecom_start_app);
  4842. int qseecom_shutdown_app(struct qseecom_handle **handle)
  4843. {
  4844. return __qseecom_shutdown_app(handle);
  4845. }
  4846. EXPORT_SYMBOL(qseecom_shutdown_app);
  4847. int qseecom_send_command(struct qseecom_handle *handle, void *send_buf,
  4848. uint32_t sbuf_len, void *resp_buf, uint32_t rbuf_len)
  4849. {
  4850. return __qseecom_send_command(handle, send_buf, sbuf_len,
  4851. resp_buf, rbuf_len);
  4852. }
  4853. EXPORT_SYMBOL(qseecom_send_command);
  4854. #endif
  4855. #endif
  4856. int qseecom_set_bandwidth(struct qseecom_handle *handle, bool high)
  4857. {
  4858. int ret = 0;
  4859. if ((handle == NULL) || (handle->dev == NULL)) {
  4860. pr_err("No valid kernel client\n");
  4861. return -EINVAL;
  4862. }
  4863. if (high) {
  4864. if (qseecom.support_bus_scaling) {
  4865. mutex_lock(&qsee_bw_mutex);
  4866. __qseecom_register_bus_bandwidth_needs(handle->dev,
  4867. HIGH);
  4868. mutex_unlock(&qsee_bw_mutex);
  4869. } else {
  4870. ret = qseecom_perf_enable(handle->dev);
  4871. if (ret)
  4872. pr_err("Failed to vote for clock with err %d\n",
  4873. ret);
  4874. }
  4875. } else {
  4876. if (!qseecom.support_bus_scaling) {
  4877. qsee_disable_clock_vote(handle->dev, CLK_DFAB);
  4878. qsee_disable_clock_vote(handle->dev, CLK_SFPB);
  4879. } else {
  4880. mutex_lock(&qsee_bw_mutex);
  4881. qseecom_unregister_bus_bandwidth_needs(handle->dev);
  4882. mutex_unlock(&qsee_bw_mutex);
  4883. }
  4884. }
  4885. return ret;
  4886. }
  4887. EXPORT_SYMBOL(qseecom_set_bandwidth);
  4888. int qseecom_process_listener_from_smcinvoke(uint32_t *result,
  4889. u64 *response_type, unsigned int *data)
  4890. {
  4891. struct qseecom_registered_app_list dummy_app_entry;
  4892. struct qseecom_dev_handle dummy_private_data = {0};
  4893. struct qseecom_command_scm_resp resp;
  4894. int ret = 0;
  4895. if (!result || !response_type || !data) {
  4896. pr_err("input parameter NULL\n");
  4897. return -EINVAL;
  4898. }
  4899. memset((void *)&dummy_app_entry, 0, sizeof(dummy_app_entry));
  4900. /*
  4901. * smcinvoke expects result in scm call resp.ret[1] and type in ret[0],
  4902. * while qseecom expects result in ret[0] and type in ret[1].
  4903. * To simplify API interface and code changes in smcinvoke, here
  4904. * internally switch result and resp_type to let qseecom work with
  4905. * smcinvoke and upstream scm driver protocol.
  4906. */
  4907. resp.result = *response_type;
  4908. resp.resp_type = *result;
  4909. resp.data = *data;
  4910. dummy_private_data.client.app_id = *response_type;
  4911. dummy_private_data.client.from_smcinvoke = true;
  4912. dummy_app_entry.app_id = *response_type;
  4913. mutex_lock(&app_access_lock);
  4914. if (qseecom.qsee_reentrancy_support)
  4915. ret = __qseecom_process_reentrancy(&resp, &dummy_app_entry,
  4916. &dummy_private_data);
  4917. else
  4918. ret = __qseecom_process_incomplete_cmd(&dummy_private_data,
  4919. &resp);
  4920. mutex_unlock(&app_access_lock);
  4921. if (ret)
  4922. pr_err("Failed on cmd %d for lsnr %d session %d, ret = %d\n",
  4923. resp.result, resp.data, resp.resp_type, ret);
  4924. *result = resp.resp_type;
  4925. *response_type = resp.result;
  4926. *data = resp.data;
  4927. return ret;
  4928. }
  4929. EXPORT_SYMBOL(qseecom_process_listener_from_smcinvoke);
  4930. #endif
  4931. static int qseecom_send_resp(void)
  4932. {
  4933. qseecom.send_resp_flag = 1;
  4934. wake_up_interruptible(&qseecom.send_resp_wq);
  4935. return 0;
  4936. }
  4937. static int qseecom_reentrancy_send_resp(struct qseecom_dev_handle *data)
  4938. {
  4939. struct qseecom_registered_listener_list *this_lstnr = NULL;
  4940. pr_debug("lstnr %d send resp, wakeup\n", data->listener.id);
  4941. this_lstnr = __qseecom_find_svc(data->listener.id);
  4942. if (this_lstnr == NULL)
  4943. return -EINVAL;
  4944. qseecom.send_resp_flag = 1;
  4945. this_lstnr->send_resp_flag = 1;
  4946. wake_up_interruptible(&qseecom.send_resp_wq);
  4947. return 0;
  4948. }
  4949. static int __validate_send_modfd_resp_inputs(struct qseecom_dev_handle *data,
  4950. struct qseecom_send_modfd_listener_resp *resp,
  4951. struct qseecom_registered_listener_list *this_lstnr)
  4952. {
  4953. int i;
  4954. if (!data || !resp || !this_lstnr) {
  4955. pr_err("listener handle or resp msg is null\n");
  4956. return -EINVAL;
  4957. }
  4958. if (resp->resp_buf_ptr == NULL) {
  4959. pr_err("resp buffer is null\n");
  4960. return -EINVAL;
  4961. }
  4962. /* validate resp buf length */
  4963. if ((resp->resp_len == 0) ||
  4964. (resp->resp_len > this_lstnr->sb_length)) {
  4965. pr_err("resp buf length %d not valid\n", resp->resp_len);
  4966. return -EINVAL;
  4967. }
  4968. if ((uintptr_t)resp->resp_buf_ptr > (ULONG_MAX - resp->resp_len)) {
  4969. pr_err("Integer overflow in resp_len & resp_buf\n");
  4970. return -EINVAL;
  4971. }
  4972. if ((uintptr_t)this_lstnr->user_virt_sb_base >
  4973. (ULONG_MAX - this_lstnr->sb_length)) {
  4974. pr_err("Integer overflow in user_virt_sb_base & sb_length\n");
  4975. return -EINVAL;
  4976. }
  4977. /* validate resp buf */
  4978. if (((uintptr_t)resp->resp_buf_ptr <
  4979. (uintptr_t)this_lstnr->user_virt_sb_base) ||
  4980. ((uintptr_t)resp->resp_buf_ptr >=
  4981. ((uintptr_t)this_lstnr->user_virt_sb_base +
  4982. this_lstnr->sb_length)) ||
  4983. (((uintptr_t)resp->resp_buf_ptr + resp->resp_len) >
  4984. ((uintptr_t)this_lstnr->user_virt_sb_base +
  4985. this_lstnr->sb_length))) {
  4986. pr_err("resp buf is out of shared buffer region\n");
  4987. return -EINVAL;
  4988. }
  4989. /* validate offsets */
  4990. for (i = 0; i < MAX_ION_FD; i++) {
  4991. if (resp->ifd_data[i].cmd_buf_offset >= resp->resp_len) {
  4992. pr_err("Invalid offset %d = 0x%x\n",
  4993. i, resp->ifd_data[i].cmd_buf_offset);
  4994. return -EINVAL;
  4995. }
  4996. }
  4997. return 0;
  4998. }
  4999. static int __qseecom_send_modfd_resp(struct qseecom_dev_handle *data,
  5000. void __user *argp, bool is_64bit_addr)
  5001. {
  5002. struct qseecom_send_modfd_listener_resp resp;
  5003. struct qseecom_registered_listener_list *this_lstnr = NULL;
  5004. if (copy_from_user(&resp, argp, sizeof(resp))) {
  5005. pr_err("copy_from_user failed\n");
  5006. return -EINVAL;
  5007. }
  5008. this_lstnr = __qseecom_find_svc(data->listener.id);
  5009. if (this_lstnr == NULL)
  5010. return -EINVAL;
  5011. if (__validate_send_modfd_resp_inputs(data, &resp, this_lstnr))
  5012. return -EINVAL;
  5013. resp.resp_buf_ptr = this_lstnr->sb_virt +
  5014. (uintptr_t)(resp.resp_buf_ptr - this_lstnr->user_virt_sb_base);
  5015. if (!is_64bit_addr)
  5016. __qseecom_update_cmd_buf(&resp, false, data);
  5017. else
  5018. __qseecom_update_cmd_buf_64(&resp, false, data);
  5019. qseecom.send_resp_flag = 1;
  5020. this_lstnr->send_resp_flag = 1;
  5021. wake_up_interruptible(&qseecom.send_resp_wq);
  5022. return 0;
  5023. }
  5024. static int qseecom_send_modfd_resp(struct qseecom_dev_handle *data,
  5025. void __user *argp)
  5026. {
  5027. return __qseecom_send_modfd_resp(data, argp, false);
  5028. }
  5029. static int qseecom_send_modfd_resp_64(struct qseecom_dev_handle *data,
  5030. void __user *argp)
  5031. {
  5032. return __qseecom_send_modfd_resp(data, argp, true);
  5033. }
  5034. static int qseecom_get_qseos_version(struct qseecom_dev_handle *data,
  5035. void __user *argp)
  5036. {
  5037. struct qseecom_qseos_version_req req;
  5038. if (copy_from_user(&req, argp, sizeof(req))) {
  5039. pr_err("copy_from_user failed\n");
  5040. return -EINVAL;
  5041. }
  5042. req.qseos_version = qseecom.qseos_version;
  5043. if (copy_to_user(argp, &req, sizeof(req))) {
  5044. pr_err("copy_to_user failed\n");
  5045. return -EINVAL;
  5046. }
  5047. return 0;
  5048. }
  5049. static int __qseecom_enable_clk(enum qseecom_ce_hw_instance ce)
  5050. {
  5051. int rc = 0;
  5052. struct qseecom_clk *qclk = NULL;
  5053. if (qseecom.no_clock_support)
  5054. return 0;
  5055. if (ce == CLK_QSEE)
  5056. qclk = &qseecom.qsee;
  5057. if (ce == CLK_CE_DRV)
  5058. qclk = &qseecom.ce_drv;
  5059. if (qclk == NULL) {
  5060. pr_err("CLK type not supported\n");
  5061. return -EINVAL;
  5062. }
  5063. mutex_lock(&clk_access_lock);
  5064. if (qclk->clk_access_cnt == ULONG_MAX) {
  5065. pr_err("clk_access_cnt beyond limitation\n");
  5066. goto err;
  5067. }
  5068. if (qclk->clk_access_cnt > 0) {
  5069. qclk->clk_access_cnt++;
  5070. mutex_unlock(&clk_access_lock);
  5071. return rc;
  5072. }
  5073. /* Enable CE core clk */
  5074. if (qclk->ce_core_clk != NULL) {
  5075. rc = clk_prepare_enable(qclk->ce_core_clk);
  5076. if (rc) {
  5077. pr_err("Unable to enable/prepare CE core clk\n");
  5078. goto err;
  5079. }
  5080. }
  5081. /* Enable CE clk */
  5082. if (qclk->ce_clk != NULL) {
  5083. rc = clk_prepare_enable(qclk->ce_clk);
  5084. if (rc) {
  5085. pr_err("Unable to enable/prepare CE iface clk\n");
  5086. goto ce_clk_err;
  5087. }
  5088. }
  5089. /* Enable AXI clk */
  5090. if (qclk->ce_bus_clk != NULL) {
  5091. rc = clk_prepare_enable(qclk->ce_bus_clk);
  5092. if (rc) {
  5093. pr_err("Unable to enable/prepare CE bus clk\n");
  5094. goto ce_bus_clk_err;
  5095. }
  5096. }
  5097. qclk->clk_access_cnt++;
  5098. mutex_unlock(&clk_access_lock);
  5099. return 0;
  5100. ce_bus_clk_err:
  5101. if (qclk->ce_clk != NULL)
  5102. clk_disable_unprepare(qclk->ce_clk);
  5103. ce_clk_err:
  5104. if (qclk->ce_core_clk != NULL)
  5105. clk_disable_unprepare(qclk->ce_core_clk);
  5106. err:
  5107. mutex_unlock(&clk_access_lock);
  5108. return -EIO;
  5109. }
  5110. static void __qseecom_disable_clk(enum qseecom_ce_hw_instance ce)
  5111. {
  5112. struct qseecom_clk *qclk;
  5113. if (qseecom.no_clock_support)
  5114. return;
  5115. if (ce == CLK_QSEE)
  5116. qclk = &qseecom.qsee;
  5117. else
  5118. qclk = &qseecom.ce_drv;
  5119. mutex_lock(&clk_access_lock);
  5120. if (qclk->clk_access_cnt == 0) {
  5121. mutex_unlock(&clk_access_lock);
  5122. return;
  5123. }
  5124. if (qclk->clk_access_cnt == 1) {
  5125. if (qclk->ce_clk != NULL)
  5126. clk_disable_unprepare(qclk->ce_clk);
  5127. if (qclk->ce_core_clk != NULL)
  5128. clk_disable_unprepare(qclk->ce_core_clk);
  5129. if (qclk->ce_bus_clk != NULL)
  5130. clk_disable_unprepare(qclk->ce_bus_clk);
  5131. }
  5132. qclk->clk_access_cnt--;
  5133. mutex_unlock(&clk_access_lock);
  5134. }
  5135. static int qsee_vote_for_clock(struct qseecom_dev_handle *data,
  5136. int32_t clk_type)
  5137. {
  5138. int ret = 0;
  5139. struct qseecom_clk *qclk;
  5140. if (qseecom.no_clock_support)
  5141. return 0;
  5142. qclk = &qseecom.qsee;
  5143. if (!qseecom.qsee_perf_client)
  5144. return ret;
  5145. switch (clk_type) {
  5146. case CLK_DFAB:
  5147. mutex_lock(&qsee_bw_mutex);
  5148. if (!qseecom.qsee_bw_count) {
  5149. if (qseecom.qsee_sfpb_bw_count > 0)
  5150. ret = qseecom_bus_scale_update_request(
  5151. qseecom.qsee_perf_client, 3);
  5152. else {
  5153. if (qclk->ce_core_src_clk != NULL)
  5154. ret = __qseecom_enable_clk(CLK_QSEE);
  5155. if (!ret) {
  5156. ret =
  5157. qseecom_bus_scale_update_request(
  5158. qseecom.qsee_perf_client, 1);
  5159. if ((ret) &&
  5160. (qclk->ce_core_src_clk != NULL))
  5161. __qseecom_disable_clk(CLK_QSEE);
  5162. }
  5163. }
  5164. if (ret)
  5165. pr_err("DFAB Bandwidth req failed (%d)\n",
  5166. ret);
  5167. else {
  5168. qseecom.qsee_bw_count++;
  5169. data->perf_enabled = true;
  5170. }
  5171. } else {
  5172. qseecom.qsee_bw_count++;
  5173. data->perf_enabled = true;
  5174. }
  5175. mutex_unlock(&qsee_bw_mutex);
  5176. break;
  5177. case CLK_SFPB:
  5178. mutex_lock(&qsee_bw_mutex);
  5179. if (!qseecom.qsee_sfpb_bw_count) {
  5180. if (qseecom.qsee_bw_count > 0)
  5181. ret = qseecom_bus_scale_update_request(
  5182. qseecom.qsee_perf_client, 3);
  5183. else {
  5184. if (qclk->ce_core_src_clk != NULL)
  5185. ret = __qseecom_enable_clk(CLK_QSEE);
  5186. if (!ret) {
  5187. ret =
  5188. qseecom_bus_scale_update_request(
  5189. qseecom.qsee_perf_client, 2);
  5190. if ((ret) &&
  5191. (qclk->ce_core_src_clk != NULL))
  5192. __qseecom_disable_clk(CLK_QSEE);
  5193. }
  5194. }
  5195. if (ret)
  5196. pr_err("SFPB Bandwidth req failed (%d)\n",
  5197. ret);
  5198. else {
  5199. qseecom.qsee_sfpb_bw_count++;
  5200. data->fast_load_enabled = true;
  5201. }
  5202. } else {
  5203. qseecom.qsee_sfpb_bw_count++;
  5204. data->fast_load_enabled = true;
  5205. }
  5206. mutex_unlock(&qsee_bw_mutex);
  5207. break;
  5208. default:
  5209. pr_err("Clock type not defined\n");
  5210. break;
  5211. }
  5212. return ret;
  5213. }
  5214. static void qsee_disable_clock_vote(struct qseecom_dev_handle *data,
  5215. int32_t clk_type)
  5216. {
  5217. int32_t ret = 0;
  5218. struct qseecom_clk *qclk;
  5219. qclk = &qseecom.qsee;
  5220. if (qseecom.no_clock_support)
  5221. return;
  5222. if (!qseecom.qsee_perf_client)
  5223. return;
  5224. switch (clk_type) {
  5225. case CLK_DFAB:
  5226. mutex_lock(&qsee_bw_mutex);
  5227. if (qseecom.qsee_bw_count == 0) {
  5228. pr_err("Client error.Extra call to disable DFAB clk\n");
  5229. mutex_unlock(&qsee_bw_mutex);
  5230. return;
  5231. }
  5232. if (qseecom.qsee_bw_count == 1) {
  5233. if (qseecom.qsee_sfpb_bw_count > 0)
  5234. ret = qseecom_bus_scale_update_request(
  5235. qseecom.qsee_perf_client, 2);
  5236. else {
  5237. ret = qseecom_bus_scale_update_request(
  5238. qseecom.qsee_perf_client, 0);
  5239. if ((!ret) && (qclk->ce_core_src_clk != NULL))
  5240. __qseecom_disable_clk(CLK_QSEE);
  5241. }
  5242. if (ret)
  5243. pr_err("SFPB Bandwidth req fail (%d)\n",
  5244. ret);
  5245. else {
  5246. qseecom.qsee_bw_count--;
  5247. data->perf_enabled = false;
  5248. }
  5249. } else {
  5250. qseecom.qsee_bw_count--;
  5251. data->perf_enabled = false;
  5252. }
  5253. mutex_unlock(&qsee_bw_mutex);
  5254. break;
  5255. case CLK_SFPB:
  5256. mutex_lock(&qsee_bw_mutex);
  5257. if (qseecom.qsee_sfpb_bw_count == 0) {
  5258. pr_err("Client error.Extra call to disable SFPB clk\n");
  5259. mutex_unlock(&qsee_bw_mutex);
  5260. return;
  5261. }
  5262. if (qseecom.qsee_sfpb_bw_count == 1) {
  5263. if (qseecom.qsee_bw_count > 0)
  5264. ret = qseecom_bus_scale_update_request(
  5265. qseecom.qsee_perf_client, 1);
  5266. else {
  5267. ret = qseecom_bus_scale_update_request(
  5268. qseecom.qsee_perf_client, 0);
  5269. if ((!ret) && (qclk->ce_core_src_clk != NULL))
  5270. __qseecom_disable_clk(CLK_QSEE);
  5271. }
  5272. if (ret)
  5273. pr_err("SFPB Bandwidth req fail (%d)\n",
  5274. ret);
  5275. else {
  5276. qseecom.qsee_sfpb_bw_count--;
  5277. data->fast_load_enabled = false;
  5278. }
  5279. } else {
  5280. qseecom.qsee_sfpb_bw_count--;
  5281. data->fast_load_enabled = false;
  5282. }
  5283. mutex_unlock(&qsee_bw_mutex);
  5284. break;
  5285. default:
  5286. pr_err("Clock type not defined\n");
  5287. break;
  5288. }
  5289. }
  5290. static int qseecom_load_external_elf(struct qseecom_dev_handle *data,
  5291. void __user *argp)
  5292. {
  5293. struct qseecom_load_img_req load_img_req;
  5294. int uret = 0;
  5295. int ret = 0;
  5296. phys_addr_t pa = 0;
  5297. size_t len;
  5298. struct qseecom_load_app_ireq load_req;
  5299. struct qseecom_load_app_64bit_ireq load_req_64bit;
  5300. struct qseecom_command_scm_resp resp;
  5301. void *cmd_buf = NULL;
  5302. size_t cmd_len;
  5303. struct sg_table *sgt = NULL;
  5304. struct dma_buf_attachment *attach = NULL;
  5305. struct dma_buf *dmabuf = NULL;
  5306. void *va = NULL;
  5307. /* Copy the relevant information needed for loading the image */
  5308. if (copy_from_user(&load_img_req,
  5309. (void __user *)argp,
  5310. sizeof(struct qseecom_load_img_req))) {
  5311. pr_err("copy_from_user failed\n");
  5312. return -EFAULT;
  5313. }
  5314. /* Get the handle of the shared fd */
  5315. ret = qseecom_vaddr_map(load_img_req.ifd_data_fd, &pa, &va,
  5316. &sgt, &attach, &len, &dmabuf);
  5317. if (ret) {
  5318. pr_err("Failed to map vaddr for ion_fd %d\n",
  5319. load_img_req.ifd_data_fd);
  5320. return -ENOMEM;
  5321. }
  5322. if (load_img_req.mdt_len > len || load_img_req.img_len > len) {
  5323. pr_err("ion len %zu is smaller than mdt_len %u or img_len %u\n",
  5324. len, load_img_req.mdt_len,
  5325. load_img_req.img_len);
  5326. ret = -EINVAL;
  5327. goto exit_cpu_restore;
  5328. }
  5329. /* Populate the structure for sending scm call to load image */
  5330. if (qseecom.qsee_version < QSEE_VERSION_40) {
  5331. load_req.qsee_cmd_id = QSEOS_LOAD_EXTERNAL_ELF_COMMAND;
  5332. load_req.mdt_len = load_img_req.mdt_len;
  5333. load_req.img_len = load_img_req.img_len;
  5334. load_req.phy_addr = (uint32_t)pa;
  5335. cmd_buf = (void *)&load_req;
  5336. cmd_len = sizeof(struct qseecom_load_app_ireq);
  5337. } else {
  5338. load_req_64bit.qsee_cmd_id = QSEOS_LOAD_EXTERNAL_ELF_COMMAND;
  5339. load_req_64bit.mdt_len = load_img_req.mdt_len;
  5340. load_req_64bit.img_len = load_img_req.img_len;
  5341. load_req_64bit.phy_addr = (uint64_t)pa;
  5342. cmd_buf = (void *)&load_req_64bit;
  5343. cmd_len = sizeof(struct qseecom_load_app_64bit_ireq);
  5344. }
  5345. if (qseecom.support_bus_scaling) {
  5346. mutex_lock(&qsee_bw_mutex);
  5347. ret = __qseecom_register_bus_bandwidth_needs(data, MEDIUM);
  5348. mutex_unlock(&qsee_bw_mutex);
  5349. if (ret) {
  5350. ret = -EIO;
  5351. goto exit_cpu_restore;
  5352. }
  5353. }
  5354. /* Vote for the SFPB clock */
  5355. ret = __qseecom_enable_clk_scale_up(data);
  5356. if (ret) {
  5357. ret = -EIO;
  5358. goto exit_register_bus_bandwidth_needs;
  5359. }
  5360. ret = qseecom_dmabuf_cache_operations(dmabuf,
  5361. QSEECOM_CACHE_CLEAN);
  5362. if (ret) {
  5363. pr_err("cache operation failed %d\n", ret);
  5364. goto exit_disable_clock;
  5365. }
  5366. /* SCM_CALL to load the external elf */
  5367. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, cmd_buf, cmd_len,
  5368. &resp, sizeof(resp));
  5369. if (ret) {
  5370. pr_err("scm_call to load failed : ret %d\n",
  5371. ret);
  5372. ret = -EFAULT;
  5373. goto exit_disable_clock;
  5374. }
  5375. ret = qseecom_dmabuf_cache_operations(dmabuf,
  5376. QSEECOM_CACHE_INVALIDATE);
  5377. if (ret) {
  5378. pr_err("cache operation failed %d\n", ret);
  5379. goto exit_disable_clock;
  5380. }
  5381. switch (resp.result) {
  5382. case QSEOS_RESULT_SUCCESS:
  5383. break;
  5384. case QSEOS_RESULT_INCOMPLETE:
  5385. pr_err("%s: qseos result incomplete\n", __func__);
  5386. ret = __qseecom_process_incomplete_cmd(data, &resp);
  5387. if (ret)
  5388. pr_err("process_incomplete_cmd failed: err: %d\n", ret);
  5389. break;
  5390. case QSEOS_RESULT_FAILURE:
  5391. pr_err("scm_call rsp.result is QSEOS_RESULT_FAILURE\n");
  5392. ret = -EFAULT;
  5393. break;
  5394. default:
  5395. pr_err("scm_call response result %d not supported\n",
  5396. resp.result);
  5397. ret = -EFAULT;
  5398. break;
  5399. }
  5400. exit_disable_clock:
  5401. __qseecom_disable_clk_scale_down(data);
  5402. exit_register_bus_bandwidth_needs:
  5403. if (qseecom.support_bus_scaling) {
  5404. mutex_lock(&qsee_bw_mutex);
  5405. uret = qseecom_unregister_bus_bandwidth_needs(data);
  5406. mutex_unlock(&qsee_bw_mutex);
  5407. if (uret)
  5408. pr_err("Failed to unregister bus bw needs %d, scm_call ret %d\n",
  5409. uret, ret);
  5410. }
  5411. exit_cpu_restore:
  5412. if (dmabuf) {
  5413. qseecom_vaddr_unmap(va, sgt, attach, dmabuf);
  5414. MAKE_NULL(sgt, attach, dmabuf);
  5415. }
  5416. return ret;
  5417. }
  5418. static int qseecom_unload_external_elf(struct qseecom_dev_handle *data)
  5419. {
  5420. int ret = 0;
  5421. struct qseecom_command_scm_resp resp;
  5422. struct qseecom_unload_app_ireq req;
  5423. /* unavailable client app */
  5424. data->type = QSEECOM_UNAVAILABLE_CLIENT_APP;
  5425. /* Populate the structure for sending scm call to unload image */
  5426. req.qsee_cmd_id = QSEOS_UNLOAD_EXTERNAL_ELF_COMMAND;
  5427. /* SCM_CALL to unload the external elf */
  5428. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1, &req,
  5429. sizeof(struct qseecom_unload_app_ireq),
  5430. &resp, sizeof(resp));
  5431. if (ret) {
  5432. pr_err("scm_call to unload failed : ret %d\n",
  5433. ret);
  5434. ret = -EFAULT;
  5435. goto qseecom_unload_external_elf_scm_err;
  5436. }
  5437. if (resp.result == QSEOS_RESULT_INCOMPLETE) {
  5438. ret = __qseecom_process_incomplete_cmd(data, &resp);
  5439. if (ret)
  5440. pr_err("process_incomplete_cmd fail err: %d\n",
  5441. ret);
  5442. } else {
  5443. if (resp.result != QSEOS_RESULT_SUCCESS) {
  5444. pr_err("scm_call to unload image failed resp.result =%d\n",
  5445. resp.result);
  5446. ret = -EFAULT;
  5447. }
  5448. }
  5449. qseecom_unload_external_elf_scm_err:
  5450. return ret;
  5451. }
  5452. static int qseecom_query_app_loaded(struct qseecom_dev_handle *data,
  5453. void __user *argp)
  5454. {
  5455. int32_t ret = 0;
  5456. struct qseecom_qseos_app_load_query query_req = { {0} };
  5457. struct qseecom_check_app_ireq req;
  5458. struct qseecom_registered_app_list *entry = NULL;
  5459. unsigned long flags = 0;
  5460. uint32_t app_arch = 0, app_id = 0;
  5461. bool found_app = false;
  5462. /* Copy the relevant information needed for loading the image */
  5463. if (copy_from_user(&query_req, (void __user *)argp,
  5464. sizeof(struct qseecom_qseos_app_load_query))) {
  5465. pr_err("copy_from_user failed\n");
  5466. ret = -EFAULT;
  5467. goto exit_free;
  5468. }
  5469. req.qsee_cmd_id = QSEOS_APP_LOOKUP_COMMAND;
  5470. query_req.app_name[MAX_APP_NAME_SIZE-1] = '\0';
  5471. strlcpy(req.app_name, query_req.app_name, MAX_APP_NAME_SIZE);
  5472. ret = __qseecom_check_app_exists(req, &app_id);
  5473. if (ret) {
  5474. pr_err(" scm call to check if app is loaded failed\n");
  5475. goto exit_free;
  5476. }
  5477. if (app_id) {
  5478. pr_debug("App id %d (%s) already exists\n", app_id,
  5479. (char *)(req.app_name));
  5480. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  5481. list_for_each_entry(entry,
  5482. &qseecom.registered_app_list_head, list){
  5483. if (entry->app_id == app_id) {
  5484. app_arch = entry->app_arch;
  5485. if (entry->ref_cnt == U32_MAX) {
  5486. pr_err("App %d (%s) ref_cnt overflow\n",
  5487. app_id, req.app_name);
  5488. ret = -EINVAL;
  5489. spin_unlock_irqrestore(
  5490. &qseecom.registered_app_list_lock,
  5491. flags);
  5492. goto exit_free;
  5493. }
  5494. entry->ref_cnt++;
  5495. found_app = true;
  5496. break;
  5497. }
  5498. }
  5499. spin_unlock_irqrestore(
  5500. &qseecom.registered_app_list_lock, flags);
  5501. data->client.app_id = app_id;
  5502. query_req.app_id = app_id;
  5503. if (app_arch) {
  5504. data->client.app_arch = app_arch;
  5505. query_req.app_arch = app_arch;
  5506. } else {
  5507. data->client.app_arch = 0;
  5508. query_req.app_arch = 0;
  5509. }
  5510. strlcpy(data->client.app_name, query_req.app_name,
  5511. MAX_APP_NAME_SIZE);
  5512. /*
  5513. * If app was loaded by appsbl before and was not registered,
  5514. * regiser this app now.
  5515. */
  5516. if (!found_app) {
  5517. pr_debug("Register app %d [%s] which was loaded before\n",
  5518. ret, (char *)query_req.app_name);
  5519. entry = kmalloc(sizeof(*entry), GFP_KERNEL);
  5520. if (!entry) {
  5521. ret = -ENOMEM;
  5522. goto exit_free;
  5523. }
  5524. entry->app_id = app_id;
  5525. entry->ref_cnt = 1;
  5526. entry->app_arch = data->client.app_arch;
  5527. strlcpy(entry->app_name, data->client.app_name,
  5528. MAX_APP_NAME_SIZE);
  5529. entry->app_blocked = false;
  5530. entry->blocked_on_listener_id = 0;
  5531. entry->check_block = 0;
  5532. spin_lock_irqsave(&qseecom.registered_app_list_lock,
  5533. flags);
  5534. list_add_tail(&entry->list,
  5535. &qseecom.registered_app_list_head);
  5536. spin_unlock_irqrestore(
  5537. &qseecom.registered_app_list_lock, flags);
  5538. }
  5539. if (copy_to_user(argp, &query_req, sizeof(query_req))) {
  5540. pr_err("copy_to_user failed\n");
  5541. ret = -EFAULT;
  5542. goto exit_free;
  5543. }
  5544. ret = -EEXIST; /* app already loaded */
  5545. goto exit_free;
  5546. }
  5547. exit_free:
  5548. return ret; /* app not loaded */
  5549. }
  5550. static int __qseecom_get_ce_pipe_info(
  5551. enum qseecom_key_management_usage_type usage,
  5552. uint32_t *pipe, uint32_t **ce_hw, uint32_t unit)
  5553. {
  5554. int ret = -EINVAL;
  5555. int i, j;
  5556. struct qseecom_ce_info_use *p = NULL;
  5557. int total = 0;
  5558. struct qseecom_ce_pipe_entry *pcepipe;
  5559. switch (usage) {
  5560. case QSEOS_KM_USAGE_DISK_ENCRYPTION:
  5561. case QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION:
  5562. case QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION:
  5563. if (qseecom.support_fde) {
  5564. p = qseecom.ce_info.fde;
  5565. total = qseecom.ce_info.num_fde;
  5566. } else {
  5567. pr_err("system does not support fde\n");
  5568. return -EINVAL;
  5569. }
  5570. break;
  5571. case QSEOS_KM_USAGE_FILE_ENCRYPTION:
  5572. if (qseecom.support_pfe) {
  5573. p = qseecom.ce_info.pfe;
  5574. total = qseecom.ce_info.num_pfe;
  5575. } else {
  5576. pr_err("system does not support pfe\n");
  5577. return -EINVAL;
  5578. }
  5579. break;
  5580. default:
  5581. pr_err("unsupported usage %d\n", usage);
  5582. return -EINVAL;
  5583. }
  5584. for (j = 0; j < total; j++) {
  5585. if (p->unit_num == unit) {
  5586. pcepipe = p->ce_pipe_entry;
  5587. for (i = 0; i < p->num_ce_pipe_entries; i++) {
  5588. (*ce_hw)[i] = pcepipe->ce_num;
  5589. *pipe = pcepipe->ce_pipe_pair;
  5590. pcepipe++;
  5591. }
  5592. ret = 0;
  5593. break;
  5594. }
  5595. p++;
  5596. }
  5597. return ret;
  5598. }
  5599. static int __qseecom_generate_and_save_key(struct qseecom_dev_handle *data,
  5600. enum qseecom_key_management_usage_type usage,
  5601. struct qseecom_key_generate_ireq *ireq)
  5602. {
  5603. struct qseecom_command_scm_resp resp;
  5604. int ret;
  5605. if (usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  5606. usage >= QSEOS_KM_USAGE_MAX) {
  5607. pr_err("Error:: unsupported usage %d\n", usage);
  5608. return -EFAULT;
  5609. }
  5610. ret = __qseecom_enable_clk(CLK_QSEE);
  5611. if (ret)
  5612. return ret;
  5613. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  5614. ireq, sizeof(struct qseecom_key_generate_ireq),
  5615. &resp, sizeof(resp));
  5616. if (ret) {
  5617. if (ret == -EINVAL &&
  5618. resp.result == QSEOS_RESULT_FAIL_KEY_ID_EXISTS) {
  5619. pr_debug("Key ID exists.\n");
  5620. ret = 0;
  5621. } else {
  5622. pr_err("scm call to generate key failed : %d\n", ret);
  5623. ret = -EFAULT;
  5624. }
  5625. goto generate_key_exit;
  5626. }
  5627. switch (resp.result) {
  5628. case QSEOS_RESULT_SUCCESS:
  5629. break;
  5630. case QSEOS_RESULT_FAIL_KEY_ID_EXISTS:
  5631. pr_debug("Key ID exists.\n");
  5632. break;
  5633. case QSEOS_RESULT_INCOMPLETE:
  5634. ret = __qseecom_process_incomplete_cmd(data, &resp);
  5635. if (ret) {
  5636. if (resp.result == QSEOS_RESULT_FAIL_KEY_ID_EXISTS) {
  5637. pr_debug("Key ID exists.\n");
  5638. ret = 0;
  5639. } else {
  5640. pr_err("process_incomplete_cmd FAILED, resp.result %d\n",
  5641. resp.result);
  5642. }
  5643. }
  5644. break;
  5645. case QSEOS_RESULT_FAILURE:
  5646. default:
  5647. pr_err("gen key scm call failed resp.result %d\n", resp.result);
  5648. ret = -EINVAL;
  5649. break;
  5650. }
  5651. generate_key_exit:
  5652. __qseecom_disable_clk(CLK_QSEE);
  5653. return ret;
  5654. }
  5655. static int __qseecom_delete_saved_key(struct qseecom_dev_handle *data,
  5656. enum qseecom_key_management_usage_type usage,
  5657. struct qseecom_key_delete_ireq *ireq)
  5658. {
  5659. struct qseecom_command_scm_resp resp;
  5660. int ret;
  5661. if (usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  5662. usage >= QSEOS_KM_USAGE_MAX) {
  5663. pr_err("Error:: unsupported usage %d\n", usage);
  5664. return -EFAULT;
  5665. }
  5666. ret = __qseecom_enable_clk(CLK_QSEE);
  5667. if (ret)
  5668. return ret;
  5669. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  5670. ireq, sizeof(struct qseecom_key_delete_ireq),
  5671. &resp, sizeof(struct qseecom_command_scm_resp));
  5672. if (ret) {
  5673. if (ret == -EINVAL &&
  5674. resp.result == QSEOS_RESULT_FAIL_MAX_ATTEMPT) {
  5675. pr_debug("Max attempts to input password reached.\n");
  5676. ret = -ERANGE;
  5677. } else {
  5678. pr_err("scm call to delete key failed : %d\n", ret);
  5679. ret = -EFAULT;
  5680. }
  5681. goto del_key_exit;
  5682. }
  5683. switch (resp.result) {
  5684. case QSEOS_RESULT_SUCCESS:
  5685. break;
  5686. case QSEOS_RESULT_INCOMPLETE:
  5687. ret = __qseecom_process_incomplete_cmd(data, &resp);
  5688. if (ret) {
  5689. pr_err("process_incomplete_cmd FAILED, resp.result %d\n",
  5690. resp.result);
  5691. if (resp.result == QSEOS_RESULT_FAIL_MAX_ATTEMPT) {
  5692. pr_debug("Max attempts to input password reached.\n");
  5693. ret = -ERANGE;
  5694. }
  5695. }
  5696. break;
  5697. case QSEOS_RESULT_FAIL_MAX_ATTEMPT:
  5698. pr_debug("Max attempts to input password reached.\n");
  5699. ret = -ERANGE;
  5700. break;
  5701. case QSEOS_RESULT_FAILURE:
  5702. default:
  5703. pr_err("Delete key scm call failed resp.result %d\n",
  5704. resp.result);
  5705. ret = -EINVAL;
  5706. break;
  5707. }
  5708. del_key_exit:
  5709. __qseecom_disable_clk(CLK_QSEE);
  5710. return ret;
  5711. }
  5712. static int __qseecom_set_clear_ce_key(struct qseecom_dev_handle *data,
  5713. enum qseecom_key_management_usage_type usage,
  5714. struct qseecom_key_select_ireq *ireq)
  5715. {
  5716. struct qseecom_command_scm_resp resp;
  5717. int ret;
  5718. if (usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  5719. usage >= QSEOS_KM_USAGE_MAX) {
  5720. pr_err("Error:: unsupported usage %d\n", usage);
  5721. return -EFAULT;
  5722. }
  5723. ret = __qseecom_enable_clk(CLK_QSEE);
  5724. if (ret)
  5725. return ret;
  5726. if (qseecom.qsee.instance != qseecom.ce_drv.instance) {
  5727. ret = __qseecom_enable_clk(CLK_CE_DRV);
  5728. if (ret)
  5729. return ret;
  5730. }
  5731. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  5732. ireq, sizeof(struct qseecom_key_select_ireq),
  5733. &resp, sizeof(struct qseecom_command_scm_resp));
  5734. if (ret) {
  5735. if (ret == -EINVAL &&
  5736. resp.result == QSEOS_RESULT_FAIL_MAX_ATTEMPT) {
  5737. pr_debug("Max attempts to input password reached.\n");
  5738. ret = -ERANGE;
  5739. } else if (ret == -EINVAL &&
  5740. resp.result == QSEOS_RESULT_FAIL_PENDING_OPERATION) {
  5741. pr_debug("Set Key operation under processing...\n");
  5742. ret = QSEOS_RESULT_FAIL_PENDING_OPERATION;
  5743. } else {
  5744. pr_err("scm call to set QSEOS_PIPE_ENC key failed : %d\n",
  5745. ret);
  5746. ret = -EFAULT;
  5747. }
  5748. goto set_key_exit;
  5749. }
  5750. switch (resp.result) {
  5751. case QSEOS_RESULT_SUCCESS:
  5752. break;
  5753. case QSEOS_RESULT_INCOMPLETE:
  5754. ret = __qseecom_process_incomplete_cmd(data, &resp);
  5755. if (ret) {
  5756. pr_err("process_incomplete_cmd FAILED, resp.result %d\n",
  5757. resp.result);
  5758. if (resp.result ==
  5759. QSEOS_RESULT_FAIL_PENDING_OPERATION) {
  5760. pr_debug("Set Key operation under processing...\n");
  5761. ret = QSEOS_RESULT_FAIL_PENDING_OPERATION;
  5762. }
  5763. if (resp.result == QSEOS_RESULT_FAIL_MAX_ATTEMPT) {
  5764. pr_debug("Max attempts to input password reached.\n");
  5765. ret = -ERANGE;
  5766. }
  5767. }
  5768. break;
  5769. case QSEOS_RESULT_FAIL_MAX_ATTEMPT:
  5770. pr_debug("Max attempts to input password reached.\n");
  5771. ret = -ERANGE;
  5772. break;
  5773. case QSEOS_RESULT_FAIL_PENDING_OPERATION:
  5774. pr_debug("Set Key operation under processing...\n");
  5775. ret = QSEOS_RESULT_FAIL_PENDING_OPERATION;
  5776. break;
  5777. case QSEOS_RESULT_FAILURE:
  5778. default:
  5779. pr_err("Set key scm call failed resp.result %d\n", resp.result);
  5780. ret = -EINVAL;
  5781. break;
  5782. }
  5783. set_key_exit:
  5784. __qseecom_disable_clk(CLK_QSEE);
  5785. if (qseecom.qsee.instance != qseecom.ce_drv.instance)
  5786. __qseecom_disable_clk(CLK_CE_DRV);
  5787. return ret;
  5788. }
  5789. static int __qseecom_update_current_key_user_info(
  5790. struct qseecom_dev_handle *data,
  5791. enum qseecom_key_management_usage_type usage,
  5792. struct qseecom_key_userinfo_update_ireq *ireq)
  5793. {
  5794. struct qseecom_command_scm_resp resp;
  5795. int ret;
  5796. if (usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  5797. usage >= QSEOS_KM_USAGE_MAX) {
  5798. pr_err("Error:: unsupported usage %d\n", usage);
  5799. return -EFAULT;
  5800. }
  5801. ret = __qseecom_enable_clk(CLK_QSEE);
  5802. if (ret)
  5803. return ret;
  5804. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  5805. ireq, sizeof(struct qseecom_key_userinfo_update_ireq),
  5806. &resp, sizeof(struct qseecom_command_scm_resp));
  5807. if (ret) {
  5808. if (ret == -EINVAL &&
  5809. resp.result == QSEOS_RESULT_FAIL_PENDING_OPERATION) {
  5810. pr_debug("Set Key operation under processing...\n");
  5811. ret = QSEOS_RESULT_FAIL_PENDING_OPERATION;
  5812. } else {
  5813. pr_err("scm call to update key userinfo failed: %d\n",
  5814. ret);
  5815. __qseecom_disable_clk(CLK_QSEE);
  5816. return -EFAULT;
  5817. }
  5818. }
  5819. switch (resp.result) {
  5820. case QSEOS_RESULT_SUCCESS:
  5821. break;
  5822. case QSEOS_RESULT_INCOMPLETE:
  5823. ret = __qseecom_process_incomplete_cmd(data, &resp);
  5824. if (resp.result ==
  5825. QSEOS_RESULT_FAIL_PENDING_OPERATION) {
  5826. pr_debug("Set Key operation under processing...\n");
  5827. ret = QSEOS_RESULT_FAIL_PENDING_OPERATION;
  5828. }
  5829. if (ret)
  5830. pr_err("process_incomplete_cmd FAILED, resp.result %d\n",
  5831. resp.result);
  5832. break;
  5833. case QSEOS_RESULT_FAIL_PENDING_OPERATION:
  5834. pr_debug("Update Key operation under processing...\n");
  5835. ret = QSEOS_RESULT_FAIL_PENDING_OPERATION;
  5836. break;
  5837. case QSEOS_RESULT_FAILURE:
  5838. default:
  5839. pr_err("Set key scm call failed resp.result %d\n", resp.result);
  5840. ret = -EINVAL;
  5841. break;
  5842. }
  5843. __qseecom_disable_clk(CLK_QSEE);
  5844. return ret;
  5845. }
  5846. static int qseecom_enable_ice_setup(int usage)
  5847. {
  5848. int ret = 0;
  5849. if (usage == QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION)
  5850. ret = qcom_ice_setup_ice_hw("ufs", true);
  5851. else if (usage == QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION)
  5852. ret = qcom_ice_setup_ice_hw("sdcc", true);
  5853. return ret;
  5854. }
  5855. static int qseecom_disable_ice_setup(int usage)
  5856. {
  5857. int ret = 0;
  5858. if (usage == QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION)
  5859. ret = qcom_ice_setup_ice_hw("ufs", false);
  5860. else if (usage == QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION)
  5861. ret = qcom_ice_setup_ice_hw("sdcc", false);
  5862. return ret;
  5863. }
  5864. static int qseecom_get_ce_hw_instance(uint32_t unit, uint32_t usage)
  5865. {
  5866. struct qseecom_ce_info_use *pce_info_use, *p;
  5867. int total = 0;
  5868. int i;
  5869. switch (usage) {
  5870. case QSEOS_KM_USAGE_DISK_ENCRYPTION:
  5871. case QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION:
  5872. case QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION:
  5873. p = qseecom.ce_info.fde;
  5874. total = qseecom.ce_info.num_fde;
  5875. break;
  5876. case QSEOS_KM_USAGE_FILE_ENCRYPTION:
  5877. p = qseecom.ce_info.pfe;
  5878. total = qseecom.ce_info.num_pfe;
  5879. break;
  5880. default:
  5881. pr_err("unsupported usage %d\n", usage);
  5882. return -EINVAL;
  5883. }
  5884. pce_info_use = NULL;
  5885. for (i = 0; i < total; i++) {
  5886. if (p->unit_num == unit) {
  5887. pce_info_use = p;
  5888. break;
  5889. }
  5890. p++;
  5891. }
  5892. if (!pce_info_use) {
  5893. pr_err("can not find %d\n", unit);
  5894. return -EINVAL;
  5895. }
  5896. return pce_info_use->num_ce_pipe_entries;
  5897. }
  5898. static int qseecom_create_key(struct qseecom_dev_handle *data,
  5899. void __user *argp)
  5900. {
  5901. int i;
  5902. uint32_t *ce_hw = NULL;
  5903. uint32_t pipe = 0;
  5904. int ret = 0;
  5905. uint32_t flags = 0;
  5906. struct qseecom_create_key_req create_key_req;
  5907. struct qseecom_key_generate_ireq generate_key_ireq;
  5908. struct qseecom_key_select_ireq set_key_ireq;
  5909. uint32_t entries = 0;
  5910. ret = copy_from_user(&create_key_req, argp, sizeof(create_key_req));
  5911. if (ret) {
  5912. pr_err("copy_from_user failed\n");
  5913. return ret;
  5914. }
  5915. if (create_key_req.usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  5916. create_key_req.usage >= QSEOS_KM_USAGE_MAX) {
  5917. pr_err("unsupported usage %d\n", create_key_req.usage);
  5918. ret = -EFAULT;
  5919. return ret;
  5920. }
  5921. entries = qseecom_get_ce_hw_instance(DEFAULT_CE_INFO_UNIT,
  5922. create_key_req.usage);
  5923. if (entries <= 0) {
  5924. pr_err("no ce instance for usage %d instance %d\n",
  5925. DEFAULT_CE_INFO_UNIT, create_key_req.usage);
  5926. ret = -EINVAL;
  5927. return ret;
  5928. }
  5929. ce_hw = kcalloc(entries, sizeof(*ce_hw), GFP_KERNEL);
  5930. if (!ce_hw) {
  5931. ret = -ENOMEM;
  5932. return ret;
  5933. }
  5934. ret = __qseecom_get_ce_pipe_info(create_key_req.usage, &pipe, &ce_hw,
  5935. DEFAULT_CE_INFO_UNIT);
  5936. if (ret) {
  5937. pr_err("Failed to retrieve pipe/ce_hw info: %d\n", ret);
  5938. ret = -EINVAL;
  5939. goto free_buf;
  5940. }
  5941. if (qseecom.fde_key_size)
  5942. flags |= QSEECOM_ICE_FDE_KEY_SIZE_32_BYTE;
  5943. else
  5944. flags |= QSEECOM_ICE_FDE_KEY_SIZE_16_BYTE;
  5945. if (qseecom.enable_key_wrap_in_ks)
  5946. flags |= ENABLE_KEY_WRAP_IN_KS;
  5947. generate_key_ireq.flags = flags;
  5948. generate_key_ireq.qsee_command_id = QSEOS_GENERATE_KEY;
  5949. memset((void *)generate_key_ireq.key_id,
  5950. 0, QSEECOM_KEY_ID_SIZE);
  5951. memset((void *)generate_key_ireq.hash32,
  5952. 0, QSEECOM_HASH_SIZE);
  5953. memcpy((void *)generate_key_ireq.key_id,
  5954. (void *)key_id_array[create_key_req.usage].desc,
  5955. QSEECOM_KEY_ID_SIZE);
  5956. memcpy((void *)generate_key_ireq.hash32,
  5957. (void *)create_key_req.hash32,
  5958. QSEECOM_HASH_SIZE);
  5959. ret = __qseecom_generate_and_save_key(data,
  5960. create_key_req.usage, &generate_key_ireq);
  5961. if (ret) {
  5962. pr_err("Failed to generate key on storage: %d\n", ret);
  5963. goto free_buf;
  5964. }
  5965. for (i = 0; i < entries; i++) {
  5966. set_key_ireq.qsee_command_id = QSEOS_SET_KEY;
  5967. if (create_key_req.usage ==
  5968. QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION) {
  5969. set_key_ireq.ce = QSEECOM_UFS_ICE_CE_NUM;
  5970. set_key_ireq.pipe = QSEECOM_ICE_FDE_KEY_INDEX;
  5971. } else if (create_key_req.usage ==
  5972. QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION) {
  5973. set_key_ireq.ce = QSEECOM_SDCC_ICE_CE_NUM;
  5974. set_key_ireq.pipe = QSEECOM_ICE_FDE_KEY_INDEX;
  5975. } else {
  5976. set_key_ireq.ce = ce_hw[i];
  5977. set_key_ireq.pipe = pipe;
  5978. }
  5979. set_key_ireq.flags = flags;
  5980. /* set both PIPE_ENC and PIPE_ENC_XTS*/
  5981. set_key_ireq.pipe_type = QSEOS_PIPE_ENC|QSEOS_PIPE_ENC_XTS;
  5982. memset((void *)set_key_ireq.key_id, 0, QSEECOM_KEY_ID_SIZE);
  5983. memset((void *)set_key_ireq.hash32, 0, QSEECOM_HASH_SIZE);
  5984. memcpy((void *)set_key_ireq.key_id,
  5985. (void *)key_id_array[create_key_req.usage].desc,
  5986. QSEECOM_KEY_ID_SIZE);
  5987. memcpy((void *)set_key_ireq.hash32,
  5988. (void *)create_key_req.hash32,
  5989. QSEECOM_HASH_SIZE);
  5990. /*
  5991. * It will return false if it is GPCE based crypto instance or
  5992. * ICE is setup properly
  5993. */
  5994. ret = qseecom_enable_ice_setup(create_key_req.usage);
  5995. if (ret)
  5996. goto free_buf;
  5997. do {
  5998. ret = __qseecom_set_clear_ce_key(data,
  5999. create_key_req.usage,
  6000. &set_key_ireq);
  6001. /*
  6002. * wait a little before calling scm again to let other
  6003. * processes run
  6004. */
  6005. if (ret == QSEOS_RESULT_FAIL_PENDING_OPERATION)
  6006. msleep(50);
  6007. } while (ret == QSEOS_RESULT_FAIL_PENDING_OPERATION);
  6008. qseecom_disable_ice_setup(create_key_req.usage);
  6009. if (ret) {
  6010. pr_err("Failed to create key: pipe %d, ce %d: %d\n",
  6011. pipe, ce_hw[i], ret);
  6012. goto free_buf;
  6013. } else {
  6014. pr_err("Set the key successfully\n");
  6015. if ((create_key_req.usage ==
  6016. QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION) ||
  6017. (create_key_req.usage ==
  6018. QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION))
  6019. goto free_buf;
  6020. }
  6021. }
  6022. free_buf:
  6023. kfree_sensitive(ce_hw);
  6024. return ret;
  6025. }
  6026. static int qseecom_wipe_key(struct qseecom_dev_handle *data,
  6027. void __user *argp)
  6028. {
  6029. uint32_t *ce_hw = NULL;
  6030. uint32_t pipe = 0;
  6031. int ret = 0;
  6032. uint32_t flags = 0;
  6033. int i, j;
  6034. struct qseecom_wipe_key_req wipe_key_req;
  6035. struct qseecom_key_delete_ireq delete_key_ireq;
  6036. struct qseecom_key_select_ireq clear_key_ireq;
  6037. uint32_t entries = 0;
  6038. ret = copy_from_user(&wipe_key_req, argp, sizeof(wipe_key_req));
  6039. if (ret) {
  6040. pr_err("copy_from_user failed\n");
  6041. return ret;
  6042. }
  6043. if (wipe_key_req.usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  6044. wipe_key_req.usage >= QSEOS_KM_USAGE_MAX) {
  6045. pr_err("unsupported usage %d\n", wipe_key_req.usage);
  6046. ret = -EFAULT;
  6047. return ret;
  6048. }
  6049. entries = qseecom_get_ce_hw_instance(DEFAULT_CE_INFO_UNIT,
  6050. wipe_key_req.usage);
  6051. if (entries <= 0) {
  6052. pr_err("no ce instance for usage %d instance %d\n",
  6053. DEFAULT_CE_INFO_UNIT, wipe_key_req.usage);
  6054. ret = -EINVAL;
  6055. return ret;
  6056. }
  6057. ce_hw = kcalloc(entries, sizeof(*ce_hw), GFP_KERNEL);
  6058. if (!ce_hw) {
  6059. ret = -ENOMEM;
  6060. return ret;
  6061. }
  6062. ret = __qseecom_get_ce_pipe_info(wipe_key_req.usage, &pipe, &ce_hw,
  6063. DEFAULT_CE_INFO_UNIT);
  6064. if (ret) {
  6065. pr_err("Failed to retrieve pipe/ce_hw info: %d\n", ret);
  6066. ret = -EINVAL;
  6067. goto free_buf;
  6068. }
  6069. if (wipe_key_req.wipe_key_flag) {
  6070. delete_key_ireq.flags = flags;
  6071. delete_key_ireq.qsee_command_id = QSEOS_DELETE_KEY;
  6072. memset((void *)delete_key_ireq.key_id, 0, QSEECOM_KEY_ID_SIZE);
  6073. memcpy((void *)delete_key_ireq.key_id,
  6074. (void *)key_id_array[wipe_key_req.usage].desc,
  6075. QSEECOM_KEY_ID_SIZE);
  6076. memset((void *)delete_key_ireq.hash32, 0, QSEECOM_HASH_SIZE);
  6077. ret = __qseecom_delete_saved_key(data, wipe_key_req.usage,
  6078. &delete_key_ireq);
  6079. if (ret) {
  6080. pr_err("Failed to delete key from ssd storage: %d\n",
  6081. ret);
  6082. ret = -EFAULT;
  6083. goto free_buf;
  6084. }
  6085. }
  6086. for (j = 0; j < entries; j++) {
  6087. clear_key_ireq.qsee_command_id = QSEOS_SET_KEY;
  6088. if (wipe_key_req.usage ==
  6089. QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION) {
  6090. clear_key_ireq.ce = QSEECOM_UFS_ICE_CE_NUM;
  6091. clear_key_ireq.pipe = QSEECOM_ICE_FDE_KEY_INDEX;
  6092. } else if (wipe_key_req.usage ==
  6093. QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION) {
  6094. clear_key_ireq.ce = QSEECOM_SDCC_ICE_CE_NUM;
  6095. clear_key_ireq.pipe = QSEECOM_ICE_FDE_KEY_INDEX;
  6096. } else {
  6097. clear_key_ireq.ce = ce_hw[j];
  6098. clear_key_ireq.pipe = pipe;
  6099. }
  6100. clear_key_ireq.flags = flags;
  6101. clear_key_ireq.pipe_type = QSEOS_PIPE_ENC|QSEOS_PIPE_ENC_XTS;
  6102. for (i = 0; i < QSEECOM_KEY_ID_SIZE; i++)
  6103. clear_key_ireq.key_id[i] = QSEECOM_INVALID_KEY_ID;
  6104. memset((void *)clear_key_ireq.hash32, 0, QSEECOM_HASH_SIZE);
  6105. /*
  6106. * It will return false if it is GPCE based crypto instance or
  6107. * ICE is setup properly
  6108. */
  6109. ret = qseecom_enable_ice_setup(wipe_key_req.usage);
  6110. if (ret)
  6111. goto free_buf;
  6112. ret = __qseecom_set_clear_ce_key(data, wipe_key_req.usage,
  6113. &clear_key_ireq);
  6114. qseecom_disable_ice_setup(wipe_key_req.usage);
  6115. if (ret) {
  6116. pr_err("Failed to wipe key: pipe %d, ce %d: %d\n",
  6117. pipe, ce_hw[j], ret);
  6118. ret = -EFAULT;
  6119. goto free_buf;
  6120. }
  6121. }
  6122. free_buf:
  6123. kfree_sensitive(ce_hw);
  6124. return ret;
  6125. }
  6126. static int qseecom_update_key_user_info(struct qseecom_dev_handle *data,
  6127. void __user *argp)
  6128. {
  6129. int ret = 0;
  6130. uint32_t flags = 0;
  6131. struct qseecom_update_key_userinfo_req update_key_req;
  6132. struct qseecom_key_userinfo_update_ireq ireq;
  6133. ret = copy_from_user(&update_key_req, argp, sizeof(update_key_req));
  6134. if (ret) {
  6135. pr_err("copy_from_user failed\n");
  6136. return ret;
  6137. }
  6138. if (update_key_req.usage < QSEOS_KM_USAGE_DISK_ENCRYPTION ||
  6139. update_key_req.usage >= QSEOS_KM_USAGE_MAX) {
  6140. pr_err("Error:: unsupported usage %d\n", update_key_req.usage);
  6141. return -EFAULT;
  6142. }
  6143. ireq.qsee_command_id = QSEOS_UPDATE_KEY_USERINFO;
  6144. if (qseecom.fde_key_size)
  6145. flags |= QSEECOM_ICE_FDE_KEY_SIZE_32_BYTE;
  6146. else
  6147. flags |= QSEECOM_ICE_FDE_KEY_SIZE_16_BYTE;
  6148. ireq.flags = flags;
  6149. memset(ireq.key_id, 0, QSEECOM_KEY_ID_SIZE);
  6150. memset((void *)ireq.current_hash32, 0, QSEECOM_HASH_SIZE);
  6151. memset((void *)ireq.new_hash32, 0, QSEECOM_HASH_SIZE);
  6152. memcpy((void *)ireq.key_id,
  6153. (void *)key_id_array[update_key_req.usage].desc,
  6154. QSEECOM_KEY_ID_SIZE);
  6155. memcpy((void *)ireq.current_hash32,
  6156. (void *)update_key_req.current_hash32, QSEECOM_HASH_SIZE);
  6157. memcpy((void *)ireq.new_hash32,
  6158. (void *)update_key_req.new_hash32, QSEECOM_HASH_SIZE);
  6159. do {
  6160. ret = __qseecom_update_current_key_user_info(data,
  6161. update_key_req.usage,
  6162. &ireq);
  6163. /*
  6164. * wait a little before calling scm again to let other
  6165. * processes run
  6166. */
  6167. if (ret == QSEOS_RESULT_FAIL_PENDING_OPERATION)
  6168. msleep(50);
  6169. } while (ret == QSEOS_RESULT_FAIL_PENDING_OPERATION);
  6170. if (ret) {
  6171. pr_err("Failed to update key info: %d\n", ret);
  6172. return ret;
  6173. }
  6174. return ret;
  6175. }
  6176. static int qseecom_is_es_activated(void __user *argp)
  6177. {
  6178. struct qseecom_is_es_activated_req req = {0};
  6179. struct qseecom_command_scm_resp resp;
  6180. int ret;
  6181. if (qseecom.qsee_version < QSEE_VERSION_04) {
  6182. pr_err("invalid qsee version\n");
  6183. return -ENODEV;
  6184. }
  6185. if (argp == NULL) {
  6186. pr_err("arg is null\n");
  6187. return -EINVAL;
  6188. }
  6189. ret = qseecom_scm_call(SCM_SVC_ES, SCM_IS_ACTIVATED_ID,
  6190. &req, sizeof(req), &resp, sizeof(resp));
  6191. if (ret) {
  6192. pr_err("scm_call failed\n");
  6193. return ret;
  6194. }
  6195. req.is_activated = resp.result;
  6196. ret = copy_to_user(argp, &req, sizeof(req));
  6197. if (ret) {
  6198. pr_err("copy_to_user failed\n");
  6199. return ret;
  6200. }
  6201. return 0;
  6202. }
  6203. static int qseecom_save_partition_hash(void __user *argp)
  6204. {
  6205. struct qseecom_save_partition_hash_req req;
  6206. struct qseecom_command_scm_resp resp;
  6207. int ret;
  6208. memset(&resp, 0x00, sizeof(resp));
  6209. if (qseecom.qsee_version < QSEE_VERSION_04) {
  6210. pr_err("invalid qsee version\n");
  6211. return -ENODEV;
  6212. }
  6213. if (argp == NULL) {
  6214. pr_err("arg is null\n");
  6215. return -EINVAL;
  6216. }
  6217. ret = copy_from_user(&req, argp, sizeof(req));
  6218. if (ret) {
  6219. pr_err("copy_from_user failed\n");
  6220. return ret;
  6221. }
  6222. ret = qseecom_scm_call(SCM_SVC_ES, SCM_SAVE_PARTITION_HASH_ID,
  6223. (void *)&req, sizeof(req), (void *)&resp, sizeof(resp));
  6224. if (ret) {
  6225. pr_err("qseecom_scm_call failed\n");
  6226. return ret;
  6227. }
  6228. return 0;
  6229. }
  6230. static int qseecom_mdtp_cipher_dip(void __user *argp)
  6231. {
  6232. struct qseecom_mdtp_cipher_dip_req req;
  6233. u32 tzbuflenin, tzbuflenout;
  6234. char *tzbufin = NULL, *tzbufout = NULL;
  6235. struct qseecom_scm_desc desc = {0};
  6236. int ret;
  6237. phys_addr_t pain, paout;
  6238. struct qtee_shm shmin = {0}, shmout = {0};
  6239. do {
  6240. /* Copy the parameters from userspace */
  6241. if (argp == NULL) {
  6242. pr_err("arg is null\n");
  6243. ret = -EINVAL;
  6244. break;
  6245. }
  6246. ret = copy_from_user(&req, argp, sizeof(req));
  6247. if (ret) {
  6248. pr_err("copy_from_user failed, ret= %d\n", ret);
  6249. break;
  6250. }
  6251. if (req.in_buf == NULL || req.out_buf == NULL ||
  6252. req.in_buf_size == 0 || req.in_buf_size > MAX_DIP ||
  6253. req.out_buf_size == 0 || req.out_buf_size > MAX_DIP ||
  6254. req.direction > 1) {
  6255. pr_err("invalid parameters\n");
  6256. ret = -EINVAL;
  6257. break;
  6258. }
  6259. /* Copy the input buffer from userspace to kernel space */
  6260. tzbuflenin = PAGE_ALIGN(req.in_buf_size);
  6261. tzbufin = __qseecom_alloc_tzbuf(tzbuflenin, &pain, &shmin);
  6262. if (!tzbufin) {
  6263. pr_err("error allocating in buffer\n");
  6264. ret = -ENOMEM;
  6265. break;
  6266. }
  6267. ret = copy_from_user(tzbufin, (void __user *)req.in_buf,
  6268. req.in_buf_size);
  6269. if (ret) {
  6270. pr_err("copy_from_user failed, ret=%d\n", ret);
  6271. break;
  6272. }
  6273. qtee_shmbridge_flush_shm_buf(&shmin);
  6274. /* Prepare the output buffer in kernel space */
  6275. tzbuflenout = PAGE_ALIGN(req.out_buf_size);
  6276. tzbufout = __qseecom_alloc_tzbuf(tzbuflenout, &paout, &shmout);
  6277. if (!tzbufout) {
  6278. pr_err("error allocating out buffer\n");
  6279. ret = -ENOMEM;
  6280. break;
  6281. }
  6282. qtee_shmbridge_flush_shm_buf(&shmout);
  6283. /* Send the command to TZ */
  6284. desc.arginfo = TZ_MDTP_CIPHER_DIP_ID_PARAM_ID;
  6285. desc.args[0] = pain;
  6286. desc.args[1] = req.in_buf_size;
  6287. desc.args[2] = paout;
  6288. desc.args[3] = req.out_buf_size;
  6289. desc.args[4] = req.direction;
  6290. ret = __qseecom_enable_clk(CLK_QSEE);
  6291. if (ret)
  6292. break;
  6293. ret = __qseecom_scm_call2_locked(TZ_MDTP_CIPHER_DIP_ID, &desc);
  6294. __qseecom_disable_clk(CLK_QSEE);
  6295. if (ret) {
  6296. pr_err("failed for SCM_SVC_MDTP, ret=%d\n",
  6297. ret);
  6298. break;
  6299. }
  6300. /* Copy the output buffer from kernel space to userspace */
  6301. qtee_shmbridge_flush_shm_buf(&shmout);
  6302. ret = copy_to_user((void __user *)req.out_buf,
  6303. tzbufout, req.out_buf_size);
  6304. if (ret) {
  6305. pr_err("copy_to_user failed, ret=%d\n", ret);
  6306. break;
  6307. }
  6308. } while (0);
  6309. __qseecom_free_tzbuf(&shmin);
  6310. __qseecom_free_tzbuf(&shmout);
  6311. return ret;
  6312. }
  6313. static int __qseecom_qteec_validate_msg(struct qseecom_dev_handle *data,
  6314. struct qseecom_qteec_req *req)
  6315. {
  6316. if (!data || !data->client.sb_virt) {
  6317. pr_err("Client or client buf is not initialized\n");
  6318. return -EINVAL;
  6319. }
  6320. if (data->type != QSEECOM_CLIENT_APP)
  6321. return -EFAULT;
  6322. if (req->req_len > UINT_MAX - req->resp_len) {
  6323. pr_err("Integer overflow detected in req_len & rsp_len\n");
  6324. return -EINVAL;
  6325. }
  6326. if (req->req_len + req->resp_len > data->client.sb_length) {
  6327. pr_debug("Not enough memory to fit cmd_buf.\n");
  6328. pr_debug("resp_buf. Required: %u, Available: %zu\n",
  6329. (req->req_len + req->resp_len), data->client.sb_length);
  6330. return -ENOMEM;
  6331. }
  6332. if (req->req_ptr == NULL || req->resp_ptr == NULL) {
  6333. pr_err("cmd buffer or response buffer is null\n");
  6334. return -EINVAL;
  6335. }
  6336. if (((uintptr_t)req->req_ptr <
  6337. data->client.user_virt_sb_base) ||
  6338. ((uintptr_t)req->req_ptr >=
  6339. (data->client.user_virt_sb_base + data->client.sb_length))) {
  6340. pr_err("cmd buffer address not within shared bufffer\n");
  6341. return -EINVAL;
  6342. }
  6343. if (((uintptr_t)req->resp_ptr <
  6344. data->client.user_virt_sb_base) ||
  6345. ((uintptr_t)req->resp_ptr >=
  6346. (data->client.user_virt_sb_base + data->client.sb_length))) {
  6347. pr_err("response buffer address not within shared bufffer\n");
  6348. return -EINVAL;
  6349. }
  6350. if ((req->req_len == 0) || (req->resp_len == 0)) {
  6351. pr_err("cmd buf lengtgh/response buf length not valid\n");
  6352. return -EINVAL;
  6353. }
  6354. if ((uintptr_t)req->req_ptr > (ULONG_MAX - req->req_len)) {
  6355. pr_err("Integer overflow in req_len & req_ptr\n");
  6356. return -EINVAL;
  6357. }
  6358. if ((uintptr_t)req->resp_ptr > (ULONG_MAX - req->resp_len)) {
  6359. pr_err("Integer overflow in resp_len & resp_ptr\n");
  6360. return -EINVAL;
  6361. }
  6362. if (data->client.user_virt_sb_base >
  6363. (ULONG_MAX - data->client.sb_length)) {
  6364. pr_err("Integer overflow in user_virt_sb_base & sb_length\n");
  6365. return -EINVAL;
  6366. }
  6367. if ((((uintptr_t)req->req_ptr + req->req_len) >
  6368. ((uintptr_t)data->client.user_virt_sb_base +
  6369. data->client.sb_length)) ||
  6370. (((uintptr_t)req->resp_ptr + req->resp_len) >
  6371. ((uintptr_t)data->client.user_virt_sb_base +
  6372. data->client.sb_length))) {
  6373. pr_err("cmd buf or resp buf is out of shared buffer region\n");
  6374. return -EINVAL;
  6375. }
  6376. return 0;
  6377. }
  6378. static int __qseecom_qteec_handle_pre_alc_fd(struct qseecom_dev_handle *data,
  6379. uint32_t fd_idx, struct sg_table *sg_ptr)
  6380. {
  6381. struct scatterlist *sg = sg_ptr->sgl;
  6382. struct qseecom_sg_entry *sg_entry;
  6383. void *buf;
  6384. uint i;
  6385. size_t size;
  6386. dma_addr_t coh_pmem;
  6387. if (fd_idx >= MAX_ION_FD) {
  6388. pr_err("fd_idx [%d] is invalid\n", fd_idx);
  6389. return -ENOMEM;
  6390. }
  6391. /*
  6392. * Allocate a buffer, populate it with number of entry plus
  6393. * each sg entry's phy addr and length; then return the
  6394. * phy_addr of the buffer.
  6395. */
  6396. size = sizeof(uint32_t) +
  6397. sizeof(struct qseecom_sg_entry) * sg_ptr->nents;
  6398. size = (size + PAGE_SIZE) & PAGE_MASK;
  6399. buf = dma_alloc_coherent(qseecom.dev,
  6400. size, &coh_pmem, GFP_KERNEL);
  6401. if (buf == NULL)
  6402. return -ENOMEM;
  6403. *(uint32_t *)buf = sg_ptr->nents;
  6404. sg_entry = (struct qseecom_sg_entry *) (buf + sizeof(uint32_t));
  6405. for (i = 0; i < sg_ptr->nents; i++) {
  6406. sg_entry->phys_addr = (uint32_t)sg_dma_address(sg);
  6407. sg_entry->len = sg->length;
  6408. sg_entry++;
  6409. sg = sg_next(sg);
  6410. }
  6411. data->client.sec_buf_fd[fd_idx].is_sec_buf_fd = true;
  6412. data->client.sec_buf_fd[fd_idx].vbase = buf;
  6413. data->client.sec_buf_fd[fd_idx].pbase = coh_pmem;
  6414. data->client.sec_buf_fd[fd_idx].size = size;
  6415. return 0;
  6416. }
  6417. static int __qseecom_update_qteec_req_buf(struct qseecom_qteec_modfd_req *req,
  6418. struct qseecom_dev_handle *data, bool cleanup)
  6419. {
  6420. int ret = 0;
  6421. int i = 0;
  6422. uint32_t *update;
  6423. struct sg_table *sg_ptr = NULL;
  6424. struct scatterlist *sg;
  6425. struct qseecom_param_memref *memref;
  6426. int ion_fd = -1;
  6427. struct dma_buf *dmabuf = NULL;
  6428. struct dma_buf_attachment *attach = NULL;
  6429. if (req == NULL) {
  6430. pr_err("Invalid address\n");
  6431. return -EINVAL;
  6432. }
  6433. for (i = 0; i < MAX_ION_FD; i++) {
  6434. if (req->ifd_data[i].fd > 0) {
  6435. ion_fd = req->ifd_data[i].fd;
  6436. if ((req->req_len <
  6437. sizeof(struct qseecom_param_memref)) ||
  6438. (req->ifd_data[i].cmd_buf_offset >
  6439. req->req_len -
  6440. sizeof(struct qseecom_param_memref))) {
  6441. pr_err("Invalid offset/req len 0x%x/0x%x\n",
  6442. req->req_len,
  6443. req->ifd_data[i].cmd_buf_offset);
  6444. return -EINVAL;
  6445. }
  6446. update = (uint32_t *)((char *) req->req_ptr +
  6447. req->ifd_data[i].cmd_buf_offset);
  6448. if (!update) {
  6449. pr_err("update pointer is NULL\n");
  6450. return -EINVAL;
  6451. }
  6452. } else {
  6453. continue;
  6454. }
  6455. /* Populate the cmd data structure with the phys_addr */
  6456. ret = qseecom_dmabuf_map(ion_fd, &sg_ptr, &attach, &dmabuf);
  6457. if (ret) {
  6458. pr_err("IOn client could not retrieve sg table\n");
  6459. goto err;
  6460. }
  6461. sg = sg_ptr->sgl;
  6462. if (sg == NULL) {
  6463. pr_err("sg is NULL\n");
  6464. goto err;
  6465. }
  6466. if ((sg_ptr->nents == 0) || (sg->length == 0)) {
  6467. pr_err("Num of scat entr (%d)or length(%d) invalid\n",
  6468. sg_ptr->nents, sg->length);
  6469. goto err;
  6470. }
  6471. /* clean up buf for pre-allocated fd */
  6472. if (cleanup && data->client.sec_buf_fd[i].is_sec_buf_fd &&
  6473. (*update)) {
  6474. if (data->client.sec_buf_fd[i].vbase)
  6475. dma_free_coherent(qseecom.dev,
  6476. data->client.sec_buf_fd[i].size,
  6477. data->client.sec_buf_fd[i].vbase,
  6478. data->client.sec_buf_fd[i].pbase);
  6479. memset((void *)update, 0,
  6480. sizeof(struct qseecom_param_memref));
  6481. memset(&(data->client.sec_buf_fd[i]), 0,
  6482. sizeof(struct qseecom_sec_buf_fd_info));
  6483. goto clean;
  6484. }
  6485. if (*update == 0) {
  6486. /* update buf for pre-allocated fd from secure heap*/
  6487. ret = __qseecom_qteec_handle_pre_alc_fd(data, i,
  6488. sg_ptr);
  6489. if (ret) {
  6490. pr_err("Failed to handle buf for fd[%d]\n", i);
  6491. goto err;
  6492. }
  6493. memref = (struct qseecom_param_memref *)update;
  6494. memref->buffer =
  6495. (uint32_t)(data->client.sec_buf_fd[i].pbase);
  6496. memref->size =
  6497. (uint32_t)(data->client.sec_buf_fd[i].size);
  6498. } else {
  6499. /* update buf for fd from non-secure qseecom heap */
  6500. if (sg_ptr->nents != 1) {
  6501. pr_err("Num of scat entr (%d) invalid\n",
  6502. sg_ptr->nents);
  6503. goto err;
  6504. }
  6505. if (cleanup)
  6506. *update = 0;
  6507. else
  6508. *update = (uint32_t)sg_dma_address(sg_ptr->sgl);
  6509. }
  6510. clean:
  6511. if (cleanup) {
  6512. ret = qseecom_dmabuf_cache_operations(dmabuf,
  6513. QSEECOM_CACHE_INVALIDATE);
  6514. if (ret) {
  6515. pr_err("cache operation failed %d\n", ret);
  6516. goto err;
  6517. }
  6518. } else {
  6519. ret = qseecom_dmabuf_cache_operations(dmabuf,
  6520. QSEECOM_CACHE_CLEAN);
  6521. if (ret) {
  6522. pr_err("cache operation failed %d\n", ret);
  6523. goto err;
  6524. }
  6525. data->sglistinfo_ptr[i].indexAndFlags =
  6526. SGLISTINFO_SET_INDEX_FLAG(
  6527. (sg_ptr->nents == 1), 0,
  6528. req->ifd_data[i].cmd_buf_offset);
  6529. data->sglistinfo_ptr[i].sizeOrCount =
  6530. (sg_ptr->nents == 1) ?
  6531. sg->length : sg_ptr->nents;
  6532. data->sglist_cnt = i + 1;
  6533. }
  6534. /* unmap the dmabuf */
  6535. qseecom_dmabuf_unmap(sg_ptr, attach, dmabuf);
  6536. sg_ptr = NULL;
  6537. dmabuf = NULL;
  6538. attach = NULL;
  6539. }
  6540. return ret;
  6541. err:
  6542. if (!IS_ERR_OR_NULL(sg_ptr)) {
  6543. qseecom_dmabuf_unmap(sg_ptr, attach, dmabuf);
  6544. MAKE_NULL(sg_ptr, attach, dmabuf);
  6545. }
  6546. return -ENOMEM;
  6547. }
  6548. static int __qseecom_qteec_issue_cmd(struct qseecom_dev_handle *data,
  6549. struct qseecom_qteec_req *req, uint32_t cmd_id)
  6550. {
  6551. struct qseecom_command_scm_resp resp;
  6552. struct qseecom_qteec_ireq ireq;
  6553. struct qseecom_qteec_64bit_ireq ireq_64bit;
  6554. struct qseecom_registered_app_list *ptr_app;
  6555. bool found_app = false;
  6556. unsigned long flags;
  6557. int ret = 0;
  6558. int ret2 = 0;
  6559. uint32_t reqd_len_sb_in = 0;
  6560. void *cmd_buf = NULL;
  6561. size_t cmd_len;
  6562. struct sglist_info *table = data->sglistinfo_ptr;
  6563. void *req_ptr = NULL;
  6564. void *resp_ptr = NULL;
  6565. ret = __qseecom_qteec_validate_msg(data, req);
  6566. if (ret)
  6567. return ret;
  6568. req_ptr = req->req_ptr;
  6569. resp_ptr = req->resp_ptr;
  6570. /* find app_id & img_name from list */
  6571. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  6572. list_for_each_entry(ptr_app, &qseecom.registered_app_list_head,
  6573. list) {
  6574. if ((ptr_app->app_id == data->client.app_id) &&
  6575. (!strcmp(ptr_app->app_name, data->client.app_name))) {
  6576. found_app = true;
  6577. break;
  6578. }
  6579. }
  6580. spin_unlock_irqrestore(&qseecom.registered_app_list_lock, flags);
  6581. if (!found_app) {
  6582. pr_err("app_id %d (%s) is not found\n", data->client.app_id,
  6583. (char *)data->client.app_name);
  6584. return -ENOENT;
  6585. }
  6586. if (__qseecom_find_pending_unload_app(data->client.app_id,
  6587. data->client.app_name)) {
  6588. pr_err("app %d (%s) unload is pending\n",
  6589. data->client.app_id, data->client.app_name);
  6590. return -ENOENT;
  6591. }
  6592. req->req_ptr = (void *)__qseecom_uvirt_to_kvirt(data,
  6593. (uintptr_t)req->req_ptr);
  6594. req->resp_ptr = (void *)__qseecom_uvirt_to_kvirt(data,
  6595. (uintptr_t)req->resp_ptr);
  6596. if ((cmd_id == QSEOS_TEE_OPEN_SESSION) ||
  6597. (cmd_id == QSEOS_TEE_REQUEST_CANCELLATION)) {
  6598. ret = __qseecom_update_qteec_req_buf(
  6599. (struct qseecom_qteec_modfd_req *)req, data, false);
  6600. if (ret)
  6601. return ret;
  6602. }
  6603. if (qseecom.qsee_version < QSEE_VERSION_40) {
  6604. ireq.app_id = data->client.app_id;
  6605. ireq.req_ptr = (uint32_t)__qseecom_uvirt_to_kphys(data,
  6606. (uintptr_t)req_ptr);
  6607. ireq.req_len = req->req_len;
  6608. ireq.resp_ptr = (uint32_t)__qseecom_uvirt_to_kphys(data,
  6609. (uintptr_t)resp_ptr);
  6610. ireq.resp_len = req->resp_len;
  6611. ireq.sglistinfo_ptr = (uint32_t)virt_to_phys(table);
  6612. ireq.sglistinfo_len = SGLISTINFO_TABLE_SIZE;
  6613. qtee_shmbridge_flush_shm_buf(&data->sglistinfo_shm);
  6614. cmd_buf = (void *)&ireq;
  6615. cmd_len = sizeof(struct qseecom_qteec_ireq);
  6616. } else {
  6617. ireq_64bit.app_id = data->client.app_id;
  6618. ireq_64bit.req_ptr = (uint64_t)__qseecom_uvirt_to_kphys(data,
  6619. (uintptr_t)req_ptr);
  6620. ireq_64bit.req_len = req->req_len;
  6621. ireq_64bit.resp_ptr = (uint64_t)__qseecom_uvirt_to_kphys(data,
  6622. (uintptr_t)resp_ptr);
  6623. ireq_64bit.resp_len = req->resp_len;
  6624. if ((data->client.app_arch == ELFCLASS32) &&
  6625. ((ireq_64bit.req_ptr >=
  6626. PHY_ADDR_4G - ireq_64bit.req_len) ||
  6627. (ireq_64bit.resp_ptr >=
  6628. PHY_ADDR_4G - ireq_64bit.resp_len))){
  6629. pr_err("32bit app %s (id: %d): phy_addr exceeds 4G\n",
  6630. data->client.app_name, data->client.app_id);
  6631. pr_err("req_ptr:%llx,req_len:%x,rsp_ptr:%llx,rsp_len:%x\n",
  6632. ireq_64bit.req_ptr, ireq_64bit.req_len,
  6633. ireq_64bit.resp_ptr, ireq_64bit.resp_len);
  6634. return -EFAULT;
  6635. }
  6636. ireq_64bit.sglistinfo_ptr = (uint64_t)virt_to_phys(table);
  6637. ireq_64bit.sglistinfo_len = SGLISTINFO_TABLE_SIZE;
  6638. qtee_shmbridge_flush_shm_buf(&data->sglistinfo_shm);
  6639. cmd_buf = (void *)&ireq_64bit;
  6640. cmd_len = sizeof(struct qseecom_qteec_64bit_ireq);
  6641. }
  6642. if (qseecom.whitelist_support
  6643. && cmd_id == QSEOS_TEE_OPEN_SESSION)
  6644. *(uint32_t *)cmd_buf = QSEOS_TEE_OPEN_SESSION_WHITELIST;
  6645. else
  6646. *(uint32_t *)cmd_buf = cmd_id;
  6647. reqd_len_sb_in = req->req_len + req->resp_len;
  6648. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  6649. QSEECOM_CACHE_CLEAN);
  6650. if (ret) {
  6651. pr_err("cache operation failed %d\n", ret);
  6652. return ret;
  6653. }
  6654. __qseecom_reentrancy_check_if_this_app_blocked(ptr_app);
  6655. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  6656. cmd_buf, cmd_len,
  6657. &resp, sizeof(resp));
  6658. if (ret) {
  6659. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  6660. ret, data->client.app_id);
  6661. goto exit;
  6662. }
  6663. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  6664. QSEECOM_CACHE_INVALIDATE);
  6665. if (ret) {
  6666. pr_err("cache operation failed %d\n", ret);
  6667. return ret;
  6668. }
  6669. if (qseecom.qsee_reentrancy_support) {
  6670. ret = __qseecom_process_reentrancy(&resp, ptr_app, data);
  6671. if (ret)
  6672. goto exit;
  6673. } else {
  6674. if (resp.result == QSEOS_RESULT_INCOMPLETE) {
  6675. ret = __qseecom_process_incomplete_cmd(data, &resp);
  6676. if (ret) {
  6677. pr_err("process_incomplete_cmd failed err: %d\n",
  6678. ret);
  6679. goto exit;
  6680. }
  6681. } else {
  6682. if (resp.result != QSEOS_RESULT_SUCCESS) {
  6683. pr_err("Response result %d not supported\n",
  6684. resp.result);
  6685. ret = -EINVAL;
  6686. goto exit;
  6687. }
  6688. }
  6689. }
  6690. exit:
  6691. if ((cmd_id == QSEOS_TEE_OPEN_SESSION) ||
  6692. (cmd_id == QSEOS_TEE_REQUEST_CANCELLATION)) {
  6693. ret2 = __qseecom_update_qteec_req_buf(
  6694. (struct qseecom_qteec_modfd_req *)req, data, true);
  6695. if (ret2)
  6696. return ret2;
  6697. }
  6698. return ret;
  6699. }
  6700. static int qseecom_qteec_open_session(struct qseecom_dev_handle *data,
  6701. void __user *argp)
  6702. {
  6703. struct qseecom_qteec_modfd_req req;
  6704. int ret = 0;
  6705. ret = copy_from_user(&req, argp,
  6706. sizeof(struct qseecom_qteec_modfd_req));
  6707. if (ret) {
  6708. pr_err("copy_from_user failed\n");
  6709. return ret;
  6710. }
  6711. ret = __qseecom_qteec_issue_cmd(data, (struct qseecom_qteec_req *)&req,
  6712. QSEOS_TEE_OPEN_SESSION);
  6713. return ret;
  6714. }
  6715. static int qseecom_qteec_close_session(struct qseecom_dev_handle *data,
  6716. void __user *argp)
  6717. {
  6718. struct qseecom_qteec_req req;
  6719. int ret = 0;
  6720. ret = copy_from_user(&req, argp, sizeof(struct qseecom_qteec_req));
  6721. if (ret) {
  6722. pr_err("copy_from_user failed\n");
  6723. return ret;
  6724. }
  6725. ret = __qseecom_qteec_issue_cmd(data, &req, QSEOS_TEE_CLOSE_SESSION);
  6726. return ret;
  6727. }
  6728. static int qseecom_qteec_invoke_modfd_cmd(struct qseecom_dev_handle *data,
  6729. void __user *argp)
  6730. {
  6731. struct qseecom_qteec_modfd_req req;
  6732. struct qseecom_command_scm_resp resp;
  6733. struct qseecom_qteec_ireq ireq;
  6734. struct qseecom_qteec_64bit_ireq ireq_64bit;
  6735. struct qseecom_registered_app_list *ptr_app;
  6736. bool found_app = false;
  6737. unsigned long flags;
  6738. int ret = 0;
  6739. int i = 0;
  6740. uint32_t reqd_len_sb_in = 0;
  6741. void *cmd_buf = NULL;
  6742. size_t cmd_len;
  6743. struct sglist_info *table = data->sglistinfo_ptr;
  6744. void *req_ptr = NULL;
  6745. void *resp_ptr = NULL;
  6746. ret = copy_from_user(&req, argp,
  6747. sizeof(struct qseecom_qteec_modfd_req));
  6748. if (ret) {
  6749. pr_err("copy_from_user failed\n");
  6750. return ret;
  6751. }
  6752. ret = __qseecom_qteec_validate_msg(data,
  6753. (struct qseecom_qteec_req *)(&req));
  6754. if (ret)
  6755. return ret;
  6756. req_ptr = req.req_ptr;
  6757. resp_ptr = req.resp_ptr;
  6758. /* find app_id & img_name from list */
  6759. spin_lock_irqsave(&qseecom.registered_app_list_lock, flags);
  6760. list_for_each_entry(ptr_app, &qseecom.registered_app_list_head,
  6761. list) {
  6762. if ((ptr_app->app_id == data->client.app_id) &&
  6763. (!strcmp(ptr_app->app_name, data->client.app_name))) {
  6764. found_app = true;
  6765. break;
  6766. }
  6767. }
  6768. spin_unlock_irqrestore(&qseecom.registered_app_list_lock, flags);
  6769. if (!found_app) {
  6770. pr_err("app_id %d (%s) is not found\n", data->client.app_id,
  6771. (char *)data->client.app_name);
  6772. return -ENOENT;
  6773. }
  6774. if (__qseecom_find_pending_unload_app(data->client.app_id,
  6775. data->client.app_name)) {
  6776. pr_err("app %d (%s) unload is pending\n",
  6777. data->client.app_id, data->client.app_name);
  6778. return -ENOENT;
  6779. }
  6780. /* validate offsets */
  6781. for (i = 0; i < MAX_ION_FD; i++) {
  6782. if (req.ifd_data[i].fd) {
  6783. if (req.ifd_data[i].cmd_buf_offset >= req.req_len)
  6784. return -EINVAL;
  6785. }
  6786. }
  6787. req.req_ptr = (void *)__qseecom_uvirt_to_kvirt(data,
  6788. (uintptr_t)req.req_ptr);
  6789. req.resp_ptr = (void *)__qseecom_uvirt_to_kvirt(data,
  6790. (uintptr_t)req.resp_ptr);
  6791. ret = __qseecom_update_qteec_req_buf(&req, data, false);
  6792. if (ret)
  6793. return ret;
  6794. if (qseecom.qsee_version < QSEE_VERSION_40) {
  6795. ireq.app_id = data->client.app_id;
  6796. ireq.req_ptr = (uint32_t)__qseecom_uvirt_to_kphys(data,
  6797. (uintptr_t)req_ptr);
  6798. ireq.req_len = req.req_len;
  6799. ireq.resp_ptr = (uint32_t)__qseecom_uvirt_to_kphys(data,
  6800. (uintptr_t)resp_ptr);
  6801. ireq.resp_len = req.resp_len;
  6802. cmd_buf = (void *)&ireq;
  6803. cmd_len = sizeof(struct qseecom_qteec_ireq);
  6804. ireq.sglistinfo_ptr = (uint32_t)virt_to_phys(table);
  6805. ireq.sglistinfo_len = SGLISTINFO_TABLE_SIZE;
  6806. qtee_shmbridge_flush_shm_buf(&data->sglistinfo_shm);
  6807. } else {
  6808. ireq_64bit.app_id = data->client.app_id;
  6809. ireq_64bit.req_ptr = (uint64_t)__qseecom_uvirt_to_kphys(data,
  6810. (uintptr_t)req_ptr);
  6811. ireq_64bit.req_len = req.req_len;
  6812. ireq_64bit.resp_ptr = (uint64_t)__qseecom_uvirt_to_kphys(data,
  6813. (uintptr_t)resp_ptr);
  6814. ireq_64bit.resp_len = req.resp_len;
  6815. cmd_buf = (void *)&ireq_64bit;
  6816. cmd_len = sizeof(struct qseecom_qteec_64bit_ireq);
  6817. ireq_64bit.sglistinfo_ptr = (uint64_t)virt_to_phys(table);
  6818. ireq_64bit.sglistinfo_len = SGLISTINFO_TABLE_SIZE;
  6819. qtee_shmbridge_flush_shm_buf(&data->sglistinfo_shm);
  6820. }
  6821. reqd_len_sb_in = req.req_len + req.resp_len;
  6822. if (qseecom.whitelist_support)
  6823. *(uint32_t *)cmd_buf = QSEOS_TEE_INVOKE_COMMAND_WHITELIST;
  6824. else
  6825. *(uint32_t *)cmd_buf = QSEOS_TEE_INVOKE_COMMAND;
  6826. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  6827. QSEECOM_CACHE_CLEAN);
  6828. if (ret) {
  6829. pr_err("cache operation failed %d\n", ret);
  6830. return ret;
  6831. }
  6832. __qseecom_reentrancy_check_if_this_app_blocked(ptr_app);
  6833. ret = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  6834. cmd_buf, cmd_len,
  6835. &resp, sizeof(resp));
  6836. if (ret) {
  6837. pr_err("scm_call() failed with err: %d (app_id = %d)\n",
  6838. ret, data->client.app_id);
  6839. return ret;
  6840. }
  6841. ret = qseecom_dmabuf_cache_operations(data->client.dmabuf,
  6842. QSEECOM_CACHE_INVALIDATE);
  6843. if (ret) {
  6844. pr_err("cache operation failed %d\n", ret);
  6845. return ret;
  6846. }
  6847. if (qseecom.qsee_reentrancy_support) {
  6848. ret = __qseecom_process_reentrancy(&resp, ptr_app, data);
  6849. } else {
  6850. if (resp.result == QSEOS_RESULT_INCOMPLETE) {
  6851. ret = __qseecom_process_incomplete_cmd(data, &resp);
  6852. if (ret) {
  6853. pr_err("process_incomplete_cmd failed err: %d\n",
  6854. ret);
  6855. return ret;
  6856. }
  6857. } else {
  6858. if (resp.result != QSEOS_RESULT_SUCCESS) {
  6859. pr_err("Response result %d not supported\n",
  6860. resp.result);
  6861. ret = -EINVAL;
  6862. }
  6863. }
  6864. }
  6865. ret = __qseecom_update_qteec_req_buf(&req, data, true);
  6866. if (ret)
  6867. return ret;
  6868. return 0;
  6869. }
  6870. static int qseecom_qteec_request_cancellation(struct qseecom_dev_handle *data,
  6871. void __user *argp)
  6872. {
  6873. struct qseecom_qteec_modfd_req req;
  6874. int ret = 0;
  6875. ret = copy_from_user(&req, argp,
  6876. sizeof(struct qseecom_qteec_modfd_req));
  6877. if (ret) {
  6878. pr_err("copy_from_user failed\n");
  6879. return ret;
  6880. }
  6881. ret = __qseecom_qteec_issue_cmd(data, (struct qseecom_qteec_req *)&req,
  6882. QSEOS_TEE_REQUEST_CANCELLATION);
  6883. return ret;
  6884. }
  6885. static void __qseecom_clean_data_sglistinfo(struct qseecom_dev_handle *data)
  6886. {
  6887. if (data->sglist_cnt) {
  6888. memset(data->sglistinfo_ptr, 0,
  6889. SGLISTINFO_TABLE_SIZE);
  6890. data->sglist_cnt = 0;
  6891. }
  6892. }
  6893. long qseecom_ioctl(struct file *file,
  6894. unsigned int cmd, unsigned long arg)
  6895. {
  6896. int ret = 0;
  6897. struct qseecom_dev_handle *data = file->private_data;
  6898. void __user *argp = (void __user *) arg;
  6899. bool perf_enabled = false;
  6900. if (!data) {
  6901. pr_err("Invalid/uninitialized device handle\n");
  6902. return -EINVAL;
  6903. }
  6904. if (data->abort) {
  6905. pr_err("Aborting qseecom driver\n");
  6906. return -ENODEV;
  6907. }
  6908. if (cmd != QSEECOM_IOCTL_RECEIVE_REQ &&
  6909. cmd != QSEECOM_IOCTL_SEND_RESP_REQ &&
  6910. cmd != QSEECOM_IOCTL_SEND_MODFD_RESP &&
  6911. cmd != QSEECOM_IOCTL_SEND_MODFD_RESP_64)
  6912. __wakeup_unregister_listener_kthread();
  6913. __wakeup_unload_app_kthread();
  6914. switch (cmd) {
  6915. case QSEECOM_IOCTL_REGISTER_LISTENER_REQ: {
  6916. if (data->type != QSEECOM_GENERIC) {
  6917. pr_err("reg lstnr req: invalid handle (%d)\n",
  6918. data->type);
  6919. ret = -EINVAL;
  6920. break;
  6921. }
  6922. pr_debug("ioctl register_listener_req()\n");
  6923. mutex_lock(&listener_access_lock);
  6924. atomic_inc(&data->ioctl_count);
  6925. data->type = QSEECOM_LISTENER_SERVICE;
  6926. ret = qseecom_register_listener(data, argp);
  6927. atomic_dec(&data->ioctl_count);
  6928. wake_up_all(&data->abort_wq);
  6929. mutex_unlock(&listener_access_lock);
  6930. if (ret)
  6931. pr_err("failed qseecom_register_listener: %d\n", ret);
  6932. break;
  6933. }
  6934. case QSEECOM_IOCTL_UNREGISTER_LISTENER_REQ: {
  6935. if ((data->listener.id == 0) ||
  6936. (data->type != QSEECOM_LISTENER_SERVICE)) {
  6937. pr_err("unreg lstnr req: invalid handle (%d) lid(%d)\n",
  6938. data->type, data->listener.id);
  6939. ret = -EINVAL;
  6940. break;
  6941. }
  6942. pr_debug("ioctl unregister_listener_req()\n");
  6943. mutex_lock(&listener_access_lock);
  6944. atomic_inc(&data->ioctl_count);
  6945. ret = qseecom_unregister_listener(data);
  6946. atomic_dec(&data->ioctl_count);
  6947. wake_up_all(&data->abort_wq);
  6948. mutex_unlock(&listener_access_lock);
  6949. if (ret)
  6950. pr_err("failed qseecom_unregister_listener: %d\n", ret);
  6951. break;
  6952. }
  6953. case QSEECOM_IOCTL_SEND_CMD_REQ: {
  6954. if ((data->client.app_id == 0) ||
  6955. (data->type != QSEECOM_CLIENT_APP)) {
  6956. pr_err("send cmd req: invalid handle (%d) app_id(%d)\n",
  6957. data->type, data->client.app_id);
  6958. ret = -EINVAL;
  6959. break;
  6960. }
  6961. /* Only one client allowed here at a time */
  6962. mutex_lock(&app_access_lock);
  6963. if (qseecom.support_bus_scaling) {
  6964. /* register bus bw in case the client doesn't do it */
  6965. if (!data->mode) {
  6966. mutex_lock(&qsee_bw_mutex);
  6967. __qseecom_register_bus_bandwidth_needs(
  6968. data, HIGH);
  6969. mutex_unlock(&qsee_bw_mutex);
  6970. }
  6971. ret = qseecom_scale_bus_bandwidth_timer(INACTIVE);
  6972. if (ret) {
  6973. pr_err("Failed to set bw.\n");
  6974. ret = -EINVAL;
  6975. mutex_unlock(&app_access_lock);
  6976. break;
  6977. }
  6978. }
  6979. /*
  6980. * On targets where crypto clock is handled by HLOS,
  6981. * if clk_access_cnt is zero and perf_enabled is false,
  6982. * then the crypto clock was not enabled before sending cmd to
  6983. * tz, qseecom will enable the clock to avoid service failure.
  6984. */
  6985. if (!qseecom.no_clock_support &&
  6986. !qseecom.qsee.clk_access_cnt && !data->perf_enabled) {
  6987. pr_debug("ce clock is not enabled!\n");
  6988. ret = qseecom_perf_enable(data);
  6989. if (ret) {
  6990. pr_err("Failed to vote for clock with err %d\n",
  6991. ret);
  6992. mutex_unlock(&app_access_lock);
  6993. ret = -EINVAL;
  6994. break;
  6995. }
  6996. perf_enabled = true;
  6997. }
  6998. atomic_inc(&data->ioctl_count);
  6999. ret = qseecom_send_cmd(data, argp);
  7000. if (qseecom.support_bus_scaling)
  7001. __qseecom_add_bw_scale_down_timer(
  7002. QSEECOM_SEND_CMD_CRYPTO_TIMEOUT);
  7003. if (perf_enabled) {
  7004. qsee_disable_clock_vote(data, CLK_DFAB);
  7005. qsee_disable_clock_vote(data, CLK_SFPB);
  7006. }
  7007. atomic_dec(&data->ioctl_count);
  7008. wake_up_all(&data->abort_wq);
  7009. mutex_unlock(&app_access_lock);
  7010. if (ret)
  7011. pr_err("failed qseecom_send_cmd: %d\n", ret);
  7012. break;
  7013. }
  7014. case QSEECOM_IOCTL_SEND_MODFD_CMD_REQ:
  7015. case QSEECOM_IOCTL_SEND_MODFD_CMD_64_REQ: {
  7016. if ((data->client.app_id == 0) ||
  7017. (data->type != QSEECOM_CLIENT_APP)) {
  7018. pr_err("send mdfd cmd: invalid handle (%d) appid(%d)\n",
  7019. data->type, data->client.app_id);
  7020. ret = -EINVAL;
  7021. break;
  7022. }
  7023. /* Only one client allowed here at a time */
  7024. mutex_lock(&app_access_lock);
  7025. if (qseecom.support_bus_scaling) {
  7026. if (!data->mode) {
  7027. mutex_lock(&qsee_bw_mutex);
  7028. __qseecom_register_bus_bandwidth_needs(
  7029. data, HIGH);
  7030. mutex_unlock(&qsee_bw_mutex);
  7031. }
  7032. ret = qseecom_scale_bus_bandwidth_timer(INACTIVE);
  7033. if (ret) {
  7034. pr_err("Failed to set bw.\n");
  7035. mutex_unlock(&app_access_lock);
  7036. ret = -EINVAL;
  7037. break;
  7038. }
  7039. }
  7040. /*
  7041. * On targets where crypto clock is handled by HLOS,
  7042. * if clk_access_cnt is zero and perf_enabled is false,
  7043. * then the crypto clock was not enabled before sending cmd to
  7044. * tz, qseecom will enable the clock to avoid service failure.
  7045. */
  7046. if (!qseecom.no_clock_support &&
  7047. !qseecom.qsee.clk_access_cnt && !data->perf_enabled) {
  7048. pr_debug("ce clock is not enabled!\n");
  7049. ret = qseecom_perf_enable(data);
  7050. if (ret) {
  7051. pr_err("Failed to vote for clock with err %d\n",
  7052. ret);
  7053. mutex_unlock(&app_access_lock);
  7054. ret = -EINVAL;
  7055. break;
  7056. }
  7057. perf_enabled = true;
  7058. }
  7059. atomic_inc(&data->ioctl_count);
  7060. if (cmd == QSEECOM_IOCTL_SEND_MODFD_CMD_REQ)
  7061. ret = qseecom_send_modfd_cmd(data, argp);
  7062. else
  7063. ret = qseecom_send_modfd_cmd_64(data, argp);
  7064. if (qseecom.support_bus_scaling)
  7065. __qseecom_add_bw_scale_down_timer(
  7066. QSEECOM_SEND_CMD_CRYPTO_TIMEOUT);
  7067. if (perf_enabled) {
  7068. qsee_disable_clock_vote(data, CLK_DFAB);
  7069. qsee_disable_clock_vote(data, CLK_SFPB);
  7070. }
  7071. atomic_dec(&data->ioctl_count);
  7072. wake_up_all(&data->abort_wq);
  7073. mutex_unlock(&app_access_lock);
  7074. if (ret)
  7075. pr_err("failed qseecom_send_cmd: %d\n", ret);
  7076. __qseecom_clean_data_sglistinfo(data);
  7077. break;
  7078. }
  7079. case QSEECOM_IOCTL_RECEIVE_REQ: {
  7080. if ((data->listener.id == 0) ||
  7081. (data->type != QSEECOM_LISTENER_SERVICE)) {
  7082. pr_err("receive req: invalid handle (%d), lid(%d)\n",
  7083. data->type, data->listener.id);
  7084. ret = -EINVAL;
  7085. break;
  7086. }
  7087. atomic_inc(&data->ioctl_count);
  7088. ret = qseecom_receive_req(data);
  7089. atomic_dec(&data->ioctl_count);
  7090. wake_up_all(&data->abort_wq);
  7091. if (ret && (ret != -ERESTARTSYS))
  7092. pr_err("failed qseecom_receive_req: %d\n", ret);
  7093. break;
  7094. }
  7095. case QSEECOM_IOCTL_SEND_RESP_REQ: {
  7096. if ((data->listener.id == 0) ||
  7097. (data->type != QSEECOM_LISTENER_SERVICE)) {
  7098. pr_err("send resp req: invalid handle (%d), lid(%d)\n",
  7099. data->type, data->listener.id);
  7100. ret = -EINVAL;
  7101. break;
  7102. }
  7103. mutex_lock(&listener_access_lock);
  7104. atomic_inc(&data->ioctl_count);
  7105. if (!qseecom.qsee_reentrancy_support)
  7106. ret = qseecom_send_resp();
  7107. else
  7108. ret = qseecom_reentrancy_send_resp(data);
  7109. atomic_dec(&data->ioctl_count);
  7110. wake_up_all(&data->abort_wq);
  7111. mutex_unlock(&listener_access_lock);
  7112. if (ret)
  7113. pr_err("failed qseecom_send_resp: %d\n", ret);
  7114. break;
  7115. }
  7116. case QSEECOM_IOCTL_SET_MEM_PARAM_REQ: {
  7117. if ((data->type != QSEECOM_CLIENT_APP) &&
  7118. (data->type != QSEECOM_GENERIC) &&
  7119. (data->type != QSEECOM_SECURE_SERVICE)) {
  7120. pr_err("set mem param req: invalid handle (%d)\n",
  7121. data->type);
  7122. ret = -EINVAL;
  7123. break;
  7124. }
  7125. pr_debug("SET_MEM_PARAM: qseecom addr = 0x%pK\n", data);
  7126. mutex_lock(&app_access_lock);
  7127. atomic_inc(&data->ioctl_count);
  7128. ret = qseecom_set_client_mem_param(data, argp);
  7129. atomic_dec(&data->ioctl_count);
  7130. mutex_unlock(&app_access_lock);
  7131. if (ret)
  7132. pr_err("failed Qqseecom_set_mem_param request: %d\n",
  7133. ret);
  7134. break;
  7135. }
  7136. case QSEECOM_IOCTL_LOAD_APP_REQ: {
  7137. if ((data->type != QSEECOM_GENERIC) &&
  7138. (data->type != QSEECOM_CLIENT_APP)) {
  7139. pr_err("load app req: invalid handle (%d)\n",
  7140. data->type);
  7141. ret = -EINVAL;
  7142. break;
  7143. }
  7144. data->type = QSEECOM_CLIENT_APP;
  7145. pr_debug("LOAD_APP_REQ: qseecom_addr = 0x%pK\n", data);
  7146. mutex_lock(&app_access_lock);
  7147. atomic_inc(&data->ioctl_count);
  7148. ret = qseecom_load_app(data, argp);
  7149. atomic_dec(&data->ioctl_count);
  7150. mutex_unlock(&app_access_lock);
  7151. if (ret)
  7152. pr_err("failed load_app request: %d\n", ret);
  7153. __wakeup_unload_app_kthread();
  7154. break;
  7155. }
  7156. case QSEECOM_IOCTL_UNLOAD_APP_REQ: {
  7157. if ((data->client.app_id == 0) ||
  7158. (data->type != QSEECOM_CLIENT_APP)) {
  7159. pr_err("unload app req:invalid handle(%d) app_id(%d)\n",
  7160. data->type, data->client.app_id);
  7161. ret = -EINVAL;
  7162. break;
  7163. }
  7164. pr_debug("UNLOAD_APP: qseecom_addr = 0x%pK\n", data);
  7165. mutex_lock(&app_access_lock);
  7166. atomic_inc(&data->ioctl_count);
  7167. ret = qseecom_unload_app(data, false);
  7168. atomic_dec(&data->ioctl_count);
  7169. mutex_unlock(&app_access_lock);
  7170. if (ret)
  7171. pr_err("failed unload_app request: %d\n", ret);
  7172. __wakeup_unload_app_kthread();
  7173. break;
  7174. }
  7175. case QSEECOM_IOCTL_GET_QSEOS_VERSION_REQ: {
  7176. atomic_inc(&data->ioctl_count);
  7177. ret = qseecom_get_qseos_version(data, argp);
  7178. if (ret)
  7179. pr_err("qseecom_get_qseos_version: %d\n", ret);
  7180. atomic_dec(&data->ioctl_count);
  7181. break;
  7182. }
  7183. case QSEECOM_IOCTL_LOAD_EXTERNAL_ELF_REQ: {
  7184. if (data->type != QSEECOM_GENERIC) {
  7185. pr_err("load ext elf req: invalid client handle (%d)\n",
  7186. data->type);
  7187. ret = -EINVAL;
  7188. break;
  7189. }
  7190. data->type = QSEECOM_UNAVAILABLE_CLIENT_APP;
  7191. data->released = true;
  7192. mutex_lock(&app_access_lock);
  7193. atomic_inc(&data->ioctl_count);
  7194. ret = qseecom_load_external_elf(data, argp);
  7195. atomic_dec(&data->ioctl_count);
  7196. mutex_unlock(&app_access_lock);
  7197. if (ret)
  7198. pr_err("failed load_external_elf request: %d\n", ret);
  7199. break;
  7200. }
  7201. case QSEECOM_IOCTL_UNLOAD_EXTERNAL_ELF_REQ: {
  7202. if (data->type != QSEECOM_UNAVAILABLE_CLIENT_APP) {
  7203. pr_err("unload ext elf req: invalid handle (%d)\n",
  7204. data->type);
  7205. ret = -EINVAL;
  7206. break;
  7207. }
  7208. data->released = true;
  7209. mutex_lock(&app_access_lock);
  7210. atomic_inc(&data->ioctl_count);
  7211. ret = qseecom_unload_external_elf(data);
  7212. atomic_dec(&data->ioctl_count);
  7213. mutex_unlock(&app_access_lock);
  7214. if (ret)
  7215. pr_err("failed unload_app request: %d\n", ret);
  7216. break;
  7217. }
  7218. case QSEECOM_IOCTL_APP_LOADED_QUERY_REQ: {
  7219. if ((data->type != QSEECOM_GENERIC) &&
  7220. (data->type != QSEECOM_CLIENT_APP)) {
  7221. pr_err("app loaded query req: invalid handle (%d)\n",
  7222. data->type);
  7223. ret = -EINVAL;
  7224. break;
  7225. }
  7226. data->type = QSEECOM_CLIENT_APP;
  7227. mutex_lock(&app_access_lock);
  7228. atomic_inc(&data->ioctl_count);
  7229. pr_debug("APP_LOAD_QUERY: qseecom_addr = 0x%pK\n", data);
  7230. ret = qseecom_query_app_loaded(data, argp);
  7231. atomic_dec(&data->ioctl_count);
  7232. mutex_unlock(&app_access_lock);
  7233. break;
  7234. }
  7235. case QSEECOM_IOCTL_SEND_CMD_SERVICE_REQ: {
  7236. if (data->type != QSEECOM_GENERIC) {
  7237. pr_err("send cmd svc req: invalid handle (%d)\n",
  7238. data->type);
  7239. ret = -EINVAL;
  7240. break;
  7241. }
  7242. data->type = QSEECOM_SECURE_SERVICE;
  7243. if (qseecom.qsee_version < QSEE_VERSION_03) {
  7244. pr_err("SEND_CMD_SERVICE_REQ: Invalid qsee ver %u\n",
  7245. qseecom.qsee_version);
  7246. return -EINVAL;
  7247. }
  7248. mutex_lock(&app_access_lock);
  7249. atomic_inc(&data->ioctl_count);
  7250. ret = qseecom_send_service_cmd(data, argp);
  7251. atomic_dec(&data->ioctl_count);
  7252. mutex_unlock(&app_access_lock);
  7253. break;
  7254. }
  7255. case QSEECOM_IOCTL_CREATE_KEY_REQ: {
  7256. if (!(qseecom.support_pfe || qseecom.support_fde))
  7257. pr_err("Features requiring key init not supported\n");
  7258. if (data->type != QSEECOM_GENERIC) {
  7259. pr_err("create key req: invalid handle (%d)\n",
  7260. data->type);
  7261. ret = -EINVAL;
  7262. break;
  7263. }
  7264. if (qseecom.qsee_version < QSEE_VERSION_05) {
  7265. pr_err("Create Key feature unsupported: qsee ver %u\n",
  7266. qseecom.qsee_version);
  7267. return -EINVAL;
  7268. }
  7269. data->released = true;
  7270. mutex_lock(&app_access_lock);
  7271. atomic_inc(&data->ioctl_count);
  7272. ret = qseecom_create_key(data, argp);
  7273. if (ret)
  7274. pr_err("failed to create encryption key: %d\n", ret);
  7275. atomic_dec(&data->ioctl_count);
  7276. mutex_unlock(&app_access_lock);
  7277. break;
  7278. }
  7279. case QSEECOM_IOCTL_WIPE_KEY_REQ: {
  7280. if (!(qseecom.support_pfe || qseecom.support_fde))
  7281. pr_err("Features requiring key init not supported\n");
  7282. if (data->type != QSEECOM_GENERIC) {
  7283. pr_err("wipe key req: invalid handle (%d)\n",
  7284. data->type);
  7285. ret = -EINVAL;
  7286. break;
  7287. }
  7288. if (qseecom.qsee_version < QSEE_VERSION_05) {
  7289. pr_err("Wipe Key feature unsupported in qsee ver %u\n",
  7290. qseecom.qsee_version);
  7291. return -EINVAL;
  7292. }
  7293. data->released = true;
  7294. mutex_lock(&app_access_lock);
  7295. atomic_inc(&data->ioctl_count);
  7296. ret = qseecom_wipe_key(data, argp);
  7297. if (ret)
  7298. pr_err("failed to wipe encryption key: %d\n", ret);
  7299. atomic_dec(&data->ioctl_count);
  7300. mutex_unlock(&app_access_lock);
  7301. break;
  7302. }
  7303. case QSEECOM_IOCTL_UPDATE_KEY_USER_INFO_REQ: {
  7304. if (!(qseecom.support_pfe || qseecom.support_fde))
  7305. pr_err("Features requiring key init not supported\n");
  7306. if (data->type != QSEECOM_GENERIC) {
  7307. pr_err("update key req: invalid handle (%d)\n",
  7308. data->type);
  7309. ret = -EINVAL;
  7310. break;
  7311. }
  7312. if (qseecom.qsee_version < QSEE_VERSION_05) {
  7313. pr_err("Update Key feature unsupported in qsee ver %u\n",
  7314. qseecom.qsee_version);
  7315. return -EINVAL;
  7316. }
  7317. data->released = true;
  7318. mutex_lock(&app_access_lock);
  7319. atomic_inc(&data->ioctl_count);
  7320. ret = qseecom_update_key_user_info(data, argp);
  7321. if (ret)
  7322. pr_err("failed to update key user info: %d\n", ret);
  7323. atomic_dec(&data->ioctl_count);
  7324. mutex_unlock(&app_access_lock);
  7325. break;
  7326. }
  7327. case QSEECOM_IOCTL_SAVE_PARTITION_HASH_REQ: {
  7328. if (data->type != QSEECOM_GENERIC) {
  7329. pr_err("save part hash req: invalid handle (%d)\n",
  7330. data->type);
  7331. ret = -EINVAL;
  7332. break;
  7333. }
  7334. data->released = true;
  7335. mutex_lock(&app_access_lock);
  7336. atomic_inc(&data->ioctl_count);
  7337. ret = qseecom_save_partition_hash(argp);
  7338. atomic_dec(&data->ioctl_count);
  7339. mutex_unlock(&app_access_lock);
  7340. break;
  7341. }
  7342. case QSEECOM_IOCTL_IS_ES_ACTIVATED_REQ: {
  7343. if (data->type != QSEECOM_GENERIC) {
  7344. pr_err("ES activated req: invalid handle (%d)\n",
  7345. data->type);
  7346. ret = -EINVAL;
  7347. break;
  7348. }
  7349. data->released = true;
  7350. mutex_lock(&app_access_lock);
  7351. atomic_inc(&data->ioctl_count);
  7352. ret = qseecom_is_es_activated(argp);
  7353. atomic_dec(&data->ioctl_count);
  7354. mutex_unlock(&app_access_lock);
  7355. break;
  7356. }
  7357. case QSEECOM_IOCTL_MDTP_CIPHER_DIP_REQ: {
  7358. if (data->type != QSEECOM_GENERIC) {
  7359. pr_err("MDTP cipher DIP req: invalid handle (%d)\n",
  7360. data->type);
  7361. ret = -EINVAL;
  7362. break;
  7363. }
  7364. data->released = true;
  7365. mutex_lock(&app_access_lock);
  7366. atomic_inc(&data->ioctl_count);
  7367. ret = qseecom_mdtp_cipher_dip(argp);
  7368. atomic_dec(&data->ioctl_count);
  7369. mutex_unlock(&app_access_lock);
  7370. break;
  7371. }
  7372. case QSEECOM_IOCTL_SEND_MODFD_RESP:
  7373. case QSEECOM_IOCTL_SEND_MODFD_RESP_64: {
  7374. if ((data->listener.id == 0) ||
  7375. (data->type != QSEECOM_LISTENER_SERVICE)) {
  7376. pr_err("receive req: invalid handle (%d), lid(%d)\n",
  7377. data->type, data->listener.id);
  7378. ret = -EINVAL;
  7379. break;
  7380. }
  7381. mutex_lock(&listener_access_lock);
  7382. atomic_inc(&data->ioctl_count);
  7383. if (cmd == QSEECOM_IOCTL_SEND_MODFD_RESP)
  7384. ret = qseecom_send_modfd_resp(data, argp);
  7385. else
  7386. ret = qseecom_send_modfd_resp_64(data, argp);
  7387. atomic_dec(&data->ioctl_count);
  7388. wake_up_all(&data->abort_wq);
  7389. mutex_unlock(&listener_access_lock);
  7390. if (ret)
  7391. pr_err("failed qseecom_send_mod_resp: %d\n", ret);
  7392. __qseecom_clean_data_sglistinfo(data);
  7393. break;
  7394. }
  7395. case QSEECOM_QTEEC_IOCTL_OPEN_SESSION_REQ: {
  7396. if ((data->client.app_id == 0) ||
  7397. (data->type != QSEECOM_CLIENT_APP)) {
  7398. pr_err("Open session: invalid handle (%d) appid(%d)\n",
  7399. data->type, data->client.app_id);
  7400. ret = -EINVAL;
  7401. break;
  7402. }
  7403. if (qseecom.qsee_version < QSEE_VERSION_40) {
  7404. pr_err("GP feature unsupported: qsee ver %u\n",
  7405. qseecom.qsee_version);
  7406. return -EINVAL;
  7407. }
  7408. /* Only one client allowed here at a time */
  7409. mutex_lock(&app_access_lock);
  7410. atomic_inc(&data->ioctl_count);
  7411. ret = qseecom_qteec_open_session(data, argp);
  7412. atomic_dec(&data->ioctl_count);
  7413. wake_up_all(&data->abort_wq);
  7414. mutex_unlock(&app_access_lock);
  7415. if (ret)
  7416. pr_err("failed open_session_cmd: %d\n", ret);
  7417. __qseecom_clean_data_sglistinfo(data);
  7418. break;
  7419. }
  7420. case QSEECOM_QTEEC_IOCTL_CLOSE_SESSION_REQ: {
  7421. if ((data->client.app_id == 0) ||
  7422. (data->type != QSEECOM_CLIENT_APP)) {
  7423. pr_err("Close session: invalid handle (%d) appid(%d)\n",
  7424. data->type, data->client.app_id);
  7425. ret = -EINVAL;
  7426. break;
  7427. }
  7428. if (qseecom.qsee_version < QSEE_VERSION_40) {
  7429. pr_err("GP feature unsupported: qsee ver %u\n",
  7430. qseecom.qsee_version);
  7431. return -EINVAL;
  7432. }
  7433. /* Only one client allowed here at a time */
  7434. mutex_lock(&app_access_lock);
  7435. atomic_inc(&data->ioctl_count);
  7436. ret = qseecom_qteec_close_session(data, argp);
  7437. atomic_dec(&data->ioctl_count);
  7438. wake_up_all(&data->abort_wq);
  7439. mutex_unlock(&app_access_lock);
  7440. if (ret)
  7441. pr_err("failed close_session_cmd: %d\n", ret);
  7442. break;
  7443. }
  7444. case QSEECOM_QTEEC_IOCTL_INVOKE_MODFD_CMD_REQ: {
  7445. if ((data->client.app_id == 0) ||
  7446. (data->type != QSEECOM_CLIENT_APP)) {
  7447. pr_err("Invoke cmd: invalid handle (%d) appid(%d)\n",
  7448. data->type, data->client.app_id);
  7449. ret = -EINVAL;
  7450. break;
  7451. }
  7452. if (qseecom.qsee_version < QSEE_VERSION_40) {
  7453. pr_err("GP feature unsupported: qsee ver %u\n",
  7454. qseecom.qsee_version);
  7455. return -EINVAL;
  7456. }
  7457. /* Only one client allowed here at a time */
  7458. mutex_lock(&app_access_lock);
  7459. atomic_inc(&data->ioctl_count);
  7460. ret = qseecom_qteec_invoke_modfd_cmd(data, argp);
  7461. atomic_dec(&data->ioctl_count);
  7462. wake_up_all(&data->abort_wq);
  7463. mutex_unlock(&app_access_lock);
  7464. if (ret)
  7465. pr_err("failed Invoke cmd: %d\n", ret);
  7466. __qseecom_clean_data_sglistinfo(data);
  7467. break;
  7468. }
  7469. case QSEECOM_QTEEC_IOCTL_REQUEST_CANCELLATION_REQ: {
  7470. if ((data->client.app_id == 0) ||
  7471. (data->type != QSEECOM_CLIENT_APP)) {
  7472. pr_err("Cancel req: invalid handle (%d) appid(%d)\n",
  7473. data->type, data->client.app_id);
  7474. ret = -EINVAL;
  7475. break;
  7476. }
  7477. if (qseecom.qsee_version < QSEE_VERSION_40) {
  7478. pr_err("GP feature unsupported: qsee ver %u\n",
  7479. qseecom.qsee_version);
  7480. return -EINVAL;
  7481. }
  7482. /* Only one client allowed here at a time */
  7483. mutex_lock(&app_access_lock);
  7484. atomic_inc(&data->ioctl_count);
  7485. ret = qseecom_qteec_request_cancellation(data, argp);
  7486. atomic_dec(&data->ioctl_count);
  7487. wake_up_all(&data->abort_wq);
  7488. mutex_unlock(&app_access_lock);
  7489. if (ret)
  7490. pr_err("failed request_cancellation: %d\n", ret);
  7491. break;
  7492. }
  7493. case QSEECOM_IOCTL_GET_CE_PIPE_INFO: {
  7494. atomic_inc(&data->ioctl_count);
  7495. ret = qseecom_get_ce_info(data, argp);
  7496. if (ret)
  7497. pr_err("failed get fde ce pipe info: %d\n", ret);
  7498. atomic_dec(&data->ioctl_count);
  7499. break;
  7500. }
  7501. case QSEECOM_IOCTL_FREE_CE_PIPE_INFO: {
  7502. atomic_inc(&data->ioctl_count);
  7503. ret = qseecom_free_ce_info(data, argp);
  7504. if (ret)
  7505. pr_err("failed get fde ce pipe info: %d\n", ret);
  7506. atomic_dec(&data->ioctl_count);
  7507. break;
  7508. }
  7509. case QSEECOM_IOCTL_QUERY_CE_PIPE_INFO: {
  7510. atomic_inc(&data->ioctl_count);
  7511. ret = qseecom_query_ce_info(data, argp);
  7512. if (ret)
  7513. pr_err("failed get fde ce pipe info: %d\n", ret);
  7514. atomic_dec(&data->ioctl_count);
  7515. break;
  7516. }
  7517. case QSEECOM_IOCTL_SET_ICE_INFO: {
  7518. struct qseecom_ice_data_t ice_data;
  7519. ret = copy_from_user(&ice_data, argp, sizeof(ice_data));
  7520. if (ret) {
  7521. pr_err("copy_from_user failed\n");
  7522. return -EFAULT;
  7523. }
  7524. qcom_ice_set_fde_flag(ice_data.flag);
  7525. break;
  7526. }
  7527. case QSEECOM_IOCTL_FBE_CLEAR_KEY: {
  7528. pr_err("QSEECOM_IOCTL_FBE_CLEAR_KEY IOCTL is deprecated\n");
  7529. return -EINVAL;
  7530. }
  7531. default:
  7532. pr_err("Invalid IOCTL: 0x%x\n", cmd);
  7533. return -ENOIOCTLCMD;
  7534. }
  7535. return ret;
  7536. }
  7537. static int qseecom_open(struct inode *inode, struct file *file)
  7538. {
  7539. int ret = 0;
  7540. struct qseecom_dev_handle *data;
  7541. data = kzalloc(sizeof(*data), GFP_KERNEL);
  7542. if (!data)
  7543. {
  7544. return -ENOMEM;
  7545. }
  7546. file->private_data = data;
  7547. data->abort = 0;
  7548. data->type = QSEECOM_GENERIC;
  7549. data->released = false;
  7550. memset((void *)data->client.app_name, 0, MAX_APP_NAME_SIZE);
  7551. data->mode = INACTIVE;
  7552. init_waitqueue_head(&data->abort_wq);
  7553. atomic_set(&data->ioctl_count, 0);
  7554. data->sglistinfo_ptr = (struct sglist_info *)__qseecom_alloc_tzbuf(
  7555. sizeof(struct sglist_info) * MAX_ION_FD,
  7556. &data->sglistinfo_shm.paddr,
  7557. &data->sglistinfo_shm);
  7558. if (!data->sglistinfo_ptr)
  7559. {
  7560. return -ENOMEM;
  7561. }
  7562. return ret;
  7563. }
  7564. static void __qseecom_release_disable_clk(struct qseecom_dev_handle *data)
  7565. {
  7566. if (qseecom.no_clock_support)
  7567. return;
  7568. if (qseecom.support_bus_scaling) {
  7569. mutex_lock(&qsee_bw_mutex);
  7570. if (data->mode != INACTIVE) {
  7571. qseecom_unregister_bus_bandwidth_needs(data);
  7572. if (qseecom.cumulative_mode == INACTIVE)
  7573. __qseecom_set_msm_bus_request(INACTIVE);
  7574. }
  7575. mutex_unlock(&qsee_bw_mutex);
  7576. } else {
  7577. if (data->fast_load_enabled)
  7578. qsee_disable_clock_vote(data, CLK_SFPB);
  7579. if (data->perf_enabled)
  7580. qsee_disable_clock_vote(data, CLK_DFAB);
  7581. }
  7582. }
  7583. static int qseecom_release(struct inode *inode, struct file *file)
  7584. {
  7585. struct qseecom_dev_handle *data = file->private_data;
  7586. int ret = 0;
  7587. bool free_private_data = true;
  7588. __qseecom_release_disable_clk(data);
  7589. if (!data->released) {
  7590. pr_debug("data: released=false, type=%d, mode=%d, data=0x%pK\n",
  7591. data->type, data->mode, data);
  7592. switch (data->type) {
  7593. case QSEECOM_LISTENER_SERVICE:
  7594. pr_debug("release lsnr svc %d\n", data->listener.id);
  7595. mutex_lock(&listener_access_lock);
  7596. ret = qseecom_unregister_listener(data);
  7597. if (!ret)
  7598. free_private_data = false;
  7599. data->listener.release_called = true;
  7600. mutex_unlock(&listener_access_lock);
  7601. __wakeup_unregister_listener_kthread();
  7602. break;
  7603. case QSEECOM_CLIENT_APP:
  7604. pr_debug("release app %d (%s)\n",
  7605. data->client.app_id, data->client.app_name);
  7606. if (data->client.app_id) {
  7607. free_private_data = false;
  7608. mutex_lock(&unload_app_pending_list_lock);
  7609. ret = qseecom_prepare_unload_app(data);
  7610. mutex_unlock(&unload_app_pending_list_lock);
  7611. __wakeup_unload_app_kthread();
  7612. }
  7613. break;
  7614. case QSEECOM_SECURE_SERVICE:
  7615. case QSEECOM_GENERIC:
  7616. if (data->client.dmabuf) {
  7617. qseecom_vaddr_unmap(data->client.sb_virt,
  7618. data->client.sgt, data->client.attach,
  7619. data->client.dmabuf);
  7620. MAKE_NULL(data->client.sgt, data->client.attach,
  7621. data->client.dmabuf);
  7622. }
  7623. break;
  7624. case QSEECOM_UNAVAILABLE_CLIENT_APP:
  7625. break;
  7626. default:
  7627. pr_err("Unsupported clnt_handle_type %d\n",
  7628. data->type);
  7629. break;
  7630. }
  7631. }
  7632. if (free_private_data) {
  7633. __qseecom_free_tzbuf(&data->sglistinfo_shm);
  7634. kfree(data);
  7635. }
  7636. return ret;
  7637. }
  7638. static const struct file_operations qseecom_fops = {
  7639. .owner = THIS_MODULE,
  7640. .unlocked_ioctl = qseecom_ioctl,
  7641. .open = qseecom_open,
  7642. .release = qseecom_release
  7643. };
  7644. static int __qseecom_init_clk(enum qseecom_ce_hw_instance ce)
  7645. {
  7646. int rc = 0;
  7647. struct device *pdev;
  7648. struct qseecom_clk *qclk;
  7649. char *core_clk_src = NULL;
  7650. char *core_clk = NULL;
  7651. char *iface_clk = NULL;
  7652. char *bus_clk = NULL;
  7653. switch (ce) {
  7654. case CLK_QSEE: {
  7655. core_clk_src = "core_clk_src";
  7656. core_clk = "core_clk";
  7657. iface_clk = "iface_clk";
  7658. bus_clk = "bus_clk";
  7659. qclk = &qseecom.qsee;
  7660. qclk->instance = CLK_QSEE;
  7661. break;
  7662. };
  7663. case CLK_CE_DRV: {
  7664. core_clk_src = "ce_drv_core_clk_src";
  7665. core_clk = "ce_drv_core_clk";
  7666. iface_clk = "ce_drv_iface_clk";
  7667. bus_clk = "ce_drv_bus_clk";
  7668. qclk = &qseecom.ce_drv;
  7669. qclk->instance = CLK_CE_DRV;
  7670. break;
  7671. };
  7672. default:
  7673. pr_err("Invalid ce hw instance: %d!\n", ce);
  7674. return -EIO;
  7675. }
  7676. if (qseecom.no_clock_support) {
  7677. qclk->ce_core_clk = NULL;
  7678. qclk->ce_clk = NULL;
  7679. qclk->ce_bus_clk = NULL;
  7680. qclk->ce_core_src_clk = NULL;
  7681. return 0;
  7682. }
  7683. pdev = qseecom.pdev;
  7684. /* Get CE3 src core clk. */
  7685. qclk->ce_core_src_clk = clk_get(pdev, core_clk_src);
  7686. if (!IS_ERR(qclk->ce_core_src_clk)) {
  7687. rc = clk_set_rate(qclk->ce_core_src_clk,
  7688. qseecom.ce_opp_freq_hz);
  7689. if (rc) {
  7690. clk_put(qclk->ce_core_src_clk);
  7691. qclk->ce_core_src_clk = NULL;
  7692. pr_err("Unable to set the core src clk @%uMhz.\n",
  7693. qseecom.ce_opp_freq_hz/CE_CLK_DIV);
  7694. return -EIO;
  7695. }
  7696. } else {
  7697. pr_warn("Unable to get CE core src clk, set to NULL\n");
  7698. qclk->ce_core_src_clk = NULL;
  7699. }
  7700. /* Get CE core clk */
  7701. qclk->ce_core_clk = clk_get(pdev, core_clk);
  7702. if (IS_ERR(qclk->ce_core_clk)) {
  7703. rc = PTR_ERR(qclk->ce_core_clk);
  7704. pr_err("Unable to get CE core clk\n");
  7705. if (qclk->ce_core_src_clk != NULL)
  7706. clk_put(qclk->ce_core_src_clk);
  7707. return -EIO;
  7708. }
  7709. /* Get CE Interface clk */
  7710. qclk->ce_clk = clk_get(pdev, iface_clk);
  7711. if (IS_ERR(qclk->ce_clk)) {
  7712. rc = PTR_ERR(qclk->ce_clk);
  7713. pr_err("Unable to get CE interface clk\n");
  7714. if (qclk->ce_core_src_clk != NULL)
  7715. clk_put(qclk->ce_core_src_clk);
  7716. clk_put(qclk->ce_core_clk);
  7717. return -EIO;
  7718. }
  7719. /* Get CE AXI clk */
  7720. qclk->ce_bus_clk = clk_get(pdev, bus_clk);
  7721. if (IS_ERR(qclk->ce_bus_clk)) {
  7722. rc = PTR_ERR(qclk->ce_bus_clk);
  7723. pr_err("Unable to get CE BUS interface clk\n");
  7724. if (qclk->ce_core_src_clk != NULL)
  7725. clk_put(qclk->ce_core_src_clk);
  7726. clk_put(qclk->ce_core_clk);
  7727. clk_put(qclk->ce_clk);
  7728. return -EIO;
  7729. }
  7730. return rc;
  7731. }
  7732. static void __qseecom_deinit_clk(enum qseecom_ce_hw_instance ce)
  7733. {
  7734. struct qseecom_clk *qclk;
  7735. if (ce == CLK_QSEE)
  7736. qclk = &qseecom.qsee;
  7737. else
  7738. qclk = &qseecom.ce_drv;
  7739. if (qclk->ce_clk != NULL) {
  7740. clk_put(qclk->ce_clk);
  7741. qclk->ce_clk = NULL;
  7742. }
  7743. if (qclk->ce_core_clk != NULL) {
  7744. clk_put(qclk->ce_core_clk);
  7745. qclk->ce_core_clk = NULL;
  7746. }
  7747. if (qclk->ce_bus_clk != NULL) {
  7748. clk_put(qclk->ce_bus_clk);
  7749. qclk->ce_bus_clk = NULL;
  7750. }
  7751. if (qclk->ce_core_src_clk != NULL) {
  7752. clk_put(qclk->ce_core_src_clk);
  7753. qclk->ce_core_src_clk = NULL;
  7754. }
  7755. qclk->instance = CLK_INVALID;
  7756. }
  7757. static int qseecom_retrieve_ce_data(struct platform_device *pdev)
  7758. {
  7759. int rc = 0;
  7760. uint32_t hlos_num_ce_hw_instances;
  7761. uint32_t disk_encrypt_pipe;
  7762. uint32_t file_encrypt_pipe;
  7763. uint32_t hlos_ce_hw_instance[MAX_CE_PIPE_PAIR_PER_UNIT] = {0};
  7764. int i;
  7765. const int *tbl;
  7766. int size;
  7767. int entry;
  7768. struct qseecom_crypto_info *pfde_tbl = NULL;
  7769. struct qseecom_crypto_info *p;
  7770. int tbl_size;
  7771. int j;
  7772. bool old_db = true;
  7773. struct qseecom_ce_info_use *pce_info_use;
  7774. uint32_t *unit_tbl = NULL;
  7775. int total_units = 0;
  7776. struct qseecom_ce_pipe_entry *pce_entry;
  7777. qseecom.ce_info.fde = qseecom.ce_info.pfe = NULL;
  7778. qseecom.ce_info.num_fde = qseecom.ce_info.num_pfe = 0;
  7779. if (of_property_read_u32((&pdev->dev)->of_node,
  7780. "qcom,qsee-ce-hw-instance",
  7781. &qseecom.ce_info.qsee_ce_hw_instance)) {
  7782. pr_err("Fail to get qsee ce hw instance information.\n");
  7783. rc = -EINVAL;
  7784. goto out;
  7785. } else {
  7786. pr_debug("qsee-ce-hw-instance=0x%x\n",
  7787. qseecom.ce_info.qsee_ce_hw_instance);
  7788. }
  7789. qseecom.support_fde = of_property_read_bool((&pdev->dev)->of_node,
  7790. "qcom,support-fde");
  7791. qseecom.support_pfe = of_property_read_bool((&pdev->dev)->of_node,
  7792. "qcom,support-pfe");
  7793. if (!qseecom.support_pfe && !qseecom.support_fde) {
  7794. pr_warn("Device does not support PFE/FDE\n");
  7795. goto out;
  7796. }
  7797. if (qseecom.support_fde)
  7798. tbl = of_get_property((&pdev->dev)->of_node,
  7799. "qcom,full-disk-encrypt-info", &size);
  7800. else
  7801. tbl = NULL;
  7802. if (tbl) {
  7803. old_db = false;
  7804. if (size % sizeof(struct qseecom_crypto_info)) {
  7805. pr_err("full-disk-encrypt-info tbl size(%d)\n",
  7806. size);
  7807. rc = -EINVAL;
  7808. goto out;
  7809. }
  7810. tbl_size = size / sizeof
  7811. (struct qseecom_crypto_info);
  7812. pfde_tbl = kzalloc(size, GFP_KERNEL);
  7813. unit_tbl = kcalloc(tbl_size, sizeof(int), GFP_KERNEL);
  7814. total_units = 0;
  7815. if (!pfde_tbl || !unit_tbl) {
  7816. rc = -ENOMEM;
  7817. goto out;
  7818. }
  7819. if (of_property_read_u32_array((&pdev->dev)->of_node,
  7820. "qcom,full-disk-encrypt-info",
  7821. (u32 *)pfde_tbl, size/sizeof(u32))) {
  7822. pr_err("failed to read full-disk-encrypt-info tbl\n");
  7823. rc = -EINVAL;
  7824. goto out;
  7825. }
  7826. for (i = 0, p = pfde_tbl; i < tbl_size; i++, p++) {
  7827. for (j = 0; j < total_units; j++) {
  7828. if (p->unit_num == *(unit_tbl + j))
  7829. break;
  7830. }
  7831. if (j == total_units) {
  7832. *(unit_tbl + total_units) = p->unit_num;
  7833. total_units++;
  7834. }
  7835. }
  7836. qseecom.ce_info.num_fde = total_units;
  7837. pce_info_use = qseecom.ce_info.fde = kcalloc(
  7838. total_units, sizeof(struct qseecom_ce_info_use),
  7839. GFP_KERNEL);
  7840. if (!pce_info_use) {
  7841. rc = -ENOMEM;
  7842. goto out;
  7843. }
  7844. for (j = 0; j < total_units; j++, pce_info_use++) {
  7845. pce_info_use->unit_num = *(unit_tbl + j);
  7846. pce_info_use->alloc = false;
  7847. pce_info_use->type = CE_PIPE_PAIR_USE_TYPE_FDE;
  7848. pce_info_use->num_ce_pipe_entries = 0;
  7849. pce_info_use->ce_pipe_entry = NULL;
  7850. for (i = 0, p = pfde_tbl; i < tbl_size; i++, p++) {
  7851. if (p->unit_num == pce_info_use->unit_num)
  7852. pce_info_use->num_ce_pipe_entries++;
  7853. }
  7854. entry = pce_info_use->num_ce_pipe_entries;
  7855. pce_entry = pce_info_use->ce_pipe_entry =
  7856. kcalloc(entry,
  7857. sizeof(struct qseecom_ce_pipe_entry),
  7858. GFP_KERNEL);
  7859. if (pce_entry == NULL) {
  7860. rc = -ENOMEM;
  7861. goto out;
  7862. }
  7863. for (i = 0, p = pfde_tbl; i < tbl_size; i++, p++) {
  7864. if (p->unit_num == pce_info_use->unit_num) {
  7865. pce_entry->ce_num = p->ce;
  7866. pce_entry->ce_pipe_pair =
  7867. p->pipe_pair;
  7868. pce_entry->valid = true;
  7869. pce_entry++;
  7870. }
  7871. }
  7872. }
  7873. kfree(unit_tbl);
  7874. unit_tbl = NULL;
  7875. kfree(pfde_tbl);
  7876. pfde_tbl = NULL;
  7877. }
  7878. if (qseecom.support_pfe)
  7879. tbl = of_get_property((&pdev->dev)->of_node,
  7880. "qcom,per-file-encrypt-info", &size);
  7881. else
  7882. tbl = NULL;
  7883. if (tbl) {
  7884. old_db = false;
  7885. if (size % sizeof(struct qseecom_crypto_info)) {
  7886. pr_err("per-file-encrypt-info tbl size(%d)\n",
  7887. size);
  7888. rc = -EINVAL;
  7889. goto out;
  7890. }
  7891. tbl_size = size / sizeof
  7892. (struct qseecom_crypto_info);
  7893. pfde_tbl = kzalloc(size, GFP_KERNEL);
  7894. unit_tbl = kcalloc(tbl_size, sizeof(int), GFP_KERNEL);
  7895. total_units = 0;
  7896. if (!pfde_tbl || !unit_tbl) {
  7897. rc = -ENOMEM;
  7898. goto out;
  7899. }
  7900. if (of_property_read_u32_array((&pdev->dev)->of_node,
  7901. "qcom,per-file-encrypt-info",
  7902. (u32 *)pfde_tbl, size/sizeof(u32))) {
  7903. pr_err("failed to read per-file-encrypt-info tbl\n");
  7904. rc = -EINVAL;
  7905. goto out;
  7906. }
  7907. for (i = 0, p = pfde_tbl; i < tbl_size; i++, p++) {
  7908. for (j = 0; j < total_units; j++) {
  7909. if (p->unit_num == *(unit_tbl + j))
  7910. break;
  7911. }
  7912. if (j == total_units) {
  7913. *(unit_tbl + total_units) = p->unit_num;
  7914. total_units++;
  7915. }
  7916. }
  7917. qseecom.ce_info.num_pfe = total_units;
  7918. pce_info_use = qseecom.ce_info.pfe = kcalloc(
  7919. total_units, sizeof(struct qseecom_ce_info_use),
  7920. GFP_KERNEL);
  7921. if (!pce_info_use) {
  7922. rc = -ENOMEM;
  7923. goto out;
  7924. }
  7925. for (j = 0; j < total_units; j++, pce_info_use++) {
  7926. pce_info_use->unit_num = *(unit_tbl + j);
  7927. pce_info_use->alloc = false;
  7928. pce_info_use->type = CE_PIPE_PAIR_USE_TYPE_PFE;
  7929. pce_info_use->num_ce_pipe_entries = 0;
  7930. pce_info_use->ce_pipe_entry = NULL;
  7931. for (i = 0, p = pfde_tbl; i < tbl_size; i++, p++) {
  7932. if (p->unit_num == pce_info_use->unit_num)
  7933. pce_info_use->num_ce_pipe_entries++;
  7934. }
  7935. entry = pce_info_use->num_ce_pipe_entries;
  7936. pce_entry = pce_info_use->ce_pipe_entry =
  7937. kcalloc(entry,
  7938. sizeof(struct qseecom_ce_pipe_entry),
  7939. GFP_KERNEL);
  7940. if (pce_entry == NULL) {
  7941. rc = -ENOMEM;
  7942. goto out;
  7943. }
  7944. for (i = 0, p = pfde_tbl; i < tbl_size; i++, p++) {
  7945. if (p->unit_num == pce_info_use->unit_num) {
  7946. pce_entry->ce_num = p->ce;
  7947. pce_entry->ce_pipe_pair =
  7948. p->pipe_pair;
  7949. pce_entry->valid = true;
  7950. pce_entry++;
  7951. }
  7952. }
  7953. }
  7954. kfree(unit_tbl);
  7955. unit_tbl = NULL;
  7956. kfree(pfde_tbl);
  7957. pfde_tbl = NULL;
  7958. }
  7959. if (!old_db)
  7960. goto out1;
  7961. if (of_property_read_bool((&pdev->dev)->of_node,
  7962. "qcom,support-multiple-ce-hw-instance")) {
  7963. if (of_property_read_u32((&pdev->dev)->of_node,
  7964. "qcom,hlos-num-ce-hw-instances",
  7965. &hlos_num_ce_hw_instances)) {
  7966. pr_err("Fail: get hlos number of ce hw instance\n");
  7967. rc = -EINVAL;
  7968. goto out;
  7969. }
  7970. } else {
  7971. hlos_num_ce_hw_instances = 1;
  7972. }
  7973. if (hlos_num_ce_hw_instances > MAX_CE_PIPE_PAIR_PER_UNIT) {
  7974. pr_err("Fail: hlos number of ce hw instance exceeds %d\n",
  7975. MAX_CE_PIPE_PAIR_PER_UNIT);
  7976. rc = -EINVAL;
  7977. goto out;
  7978. }
  7979. if (of_property_read_u32_array((&pdev->dev)->of_node,
  7980. "qcom,hlos-ce-hw-instance", hlos_ce_hw_instance,
  7981. hlos_num_ce_hw_instances)) {
  7982. pr_err("Fail: get hlos ce hw instance info\n");
  7983. rc = -EINVAL;
  7984. goto out;
  7985. }
  7986. if (qseecom.support_fde) {
  7987. pce_info_use = qseecom.ce_info.fde =
  7988. kzalloc(sizeof(struct qseecom_ce_info_use), GFP_KERNEL);
  7989. if (!pce_info_use) {
  7990. rc = -ENOMEM;
  7991. goto out;
  7992. }
  7993. /* by default for old db */
  7994. qseecom.ce_info.num_fde = DEFAULT_NUM_CE_INFO_UNIT;
  7995. pce_info_use->unit_num = DEFAULT_CE_INFO_UNIT;
  7996. pce_info_use->alloc = false;
  7997. pce_info_use->type = CE_PIPE_PAIR_USE_TYPE_FDE;
  7998. pce_info_use->ce_pipe_entry = NULL;
  7999. if (of_property_read_u32((&pdev->dev)->of_node,
  8000. "qcom,disk-encrypt-pipe-pair",
  8001. &disk_encrypt_pipe)) {
  8002. pr_err("Fail to get FDE pipe information.\n");
  8003. rc = -EINVAL;
  8004. goto out;
  8005. } else {
  8006. pr_debug("disk-encrypt-pipe-pair=0x%x\n",
  8007. disk_encrypt_pipe);
  8008. }
  8009. entry = pce_info_use->num_ce_pipe_entries =
  8010. hlos_num_ce_hw_instances;
  8011. pce_entry = pce_info_use->ce_pipe_entry =
  8012. kcalloc(entry,
  8013. sizeof(struct qseecom_ce_pipe_entry),
  8014. GFP_KERNEL);
  8015. if (pce_entry == NULL) {
  8016. rc = -ENOMEM;
  8017. goto out;
  8018. }
  8019. for (i = 0; i < entry; i++) {
  8020. pce_entry->ce_num = hlos_ce_hw_instance[i];
  8021. pce_entry->ce_pipe_pair = disk_encrypt_pipe;
  8022. pce_entry->valid = 1;
  8023. pce_entry++;
  8024. }
  8025. } else {
  8026. pr_warn("Device does not support FDE\n");
  8027. disk_encrypt_pipe = 0xff;
  8028. }
  8029. if (qseecom.support_pfe) {
  8030. pce_info_use = qseecom.ce_info.pfe =
  8031. kzalloc(sizeof(struct qseecom_ce_info_use), GFP_KERNEL);
  8032. if (!pce_info_use) {
  8033. rc = -ENOMEM;
  8034. goto out;
  8035. }
  8036. /* by default for old db */
  8037. qseecom.ce_info.num_pfe = DEFAULT_NUM_CE_INFO_UNIT;
  8038. pce_info_use->unit_num = DEFAULT_CE_INFO_UNIT;
  8039. pce_info_use->alloc = false;
  8040. pce_info_use->type = CE_PIPE_PAIR_USE_TYPE_PFE;
  8041. pce_info_use->ce_pipe_entry = NULL;
  8042. if (of_property_read_u32((&pdev->dev)->of_node,
  8043. "qcom,file-encrypt-pipe-pair",
  8044. &file_encrypt_pipe)) {
  8045. pr_err("Fail to get PFE pipe information.\n");
  8046. rc = -EINVAL;
  8047. goto out;
  8048. } else {
  8049. pr_debug("file-encrypt-pipe-pair=0x%x\n",
  8050. file_encrypt_pipe);
  8051. }
  8052. entry = pce_info_use->num_ce_pipe_entries =
  8053. hlos_num_ce_hw_instances;
  8054. pce_entry = pce_info_use->ce_pipe_entry =
  8055. kcalloc(entry,
  8056. sizeof(struct qseecom_ce_pipe_entry),
  8057. GFP_KERNEL);
  8058. if (pce_entry == NULL) {
  8059. rc = -ENOMEM;
  8060. goto out;
  8061. }
  8062. for (i = 0; i < entry; i++) {
  8063. pce_entry->ce_num = hlos_ce_hw_instance[i];
  8064. pce_entry->ce_pipe_pair = file_encrypt_pipe;
  8065. pce_entry->valid = 1;
  8066. pce_entry++;
  8067. }
  8068. } else {
  8069. pr_warn("Device does not support PFE\n");
  8070. file_encrypt_pipe = 0xff;
  8071. }
  8072. out1:
  8073. qseecom.qsee.instance = qseecom.ce_info.qsee_ce_hw_instance;
  8074. qseecom.ce_drv.instance = hlos_ce_hw_instance[0];
  8075. out:
  8076. if (rc) {
  8077. if (qseecom.ce_info.fde) {
  8078. pce_info_use = qseecom.ce_info.fde;
  8079. for (i = 0; i < qseecom.ce_info.num_fde; i++) {
  8080. pce_entry = pce_info_use->ce_pipe_entry;
  8081. kfree(pce_entry);
  8082. pce_info_use++;
  8083. }
  8084. }
  8085. kfree(qseecom.ce_info.fde);
  8086. qseecom.ce_info.fde = NULL;
  8087. if (qseecom.ce_info.pfe) {
  8088. pce_info_use = qseecom.ce_info.pfe;
  8089. for (i = 0; i < qseecom.ce_info.num_pfe; i++) {
  8090. pce_entry = pce_info_use->ce_pipe_entry;
  8091. kfree(pce_entry);
  8092. pce_info_use++;
  8093. }
  8094. }
  8095. kfree(qseecom.ce_info.pfe);
  8096. qseecom.ce_info.pfe = NULL;
  8097. }
  8098. kfree(unit_tbl);
  8099. kfree(pfde_tbl);
  8100. return rc;
  8101. }
  8102. static int qseecom_get_ce_info(struct qseecom_dev_handle *data,
  8103. void __user *argp)
  8104. {
  8105. struct qseecom_ce_info_req req;
  8106. struct qseecom_ce_info_req *pinfo = &req;
  8107. int ret = 0;
  8108. int i;
  8109. unsigned int entries;
  8110. struct qseecom_ce_info_use *pce_info_use, *p;
  8111. int total = 0;
  8112. bool found = false;
  8113. struct qseecom_ce_pipe_entry *pce_entry;
  8114. ret = copy_from_user(pinfo, argp,
  8115. sizeof(struct qseecom_ce_info_req));
  8116. if (ret) {
  8117. pr_err("copy_from_user failed\n");
  8118. return ret;
  8119. }
  8120. switch (pinfo->usage) {
  8121. case QSEOS_KM_USAGE_DISK_ENCRYPTION:
  8122. case QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION:
  8123. case QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION:
  8124. if (qseecom.support_fde) {
  8125. p = qseecom.ce_info.fde;
  8126. total = qseecom.ce_info.num_fde;
  8127. } else {
  8128. pr_err("system does not support fde\n");
  8129. return -EINVAL;
  8130. }
  8131. break;
  8132. case QSEOS_KM_USAGE_FILE_ENCRYPTION:
  8133. if (qseecom.support_pfe) {
  8134. p = qseecom.ce_info.pfe;
  8135. total = qseecom.ce_info.num_pfe;
  8136. } else {
  8137. pr_err("system does not support pfe\n");
  8138. return -EINVAL;
  8139. }
  8140. break;
  8141. default:
  8142. pr_err("unsupported usage %d\n", pinfo->usage);
  8143. return -EINVAL;
  8144. }
  8145. pce_info_use = NULL;
  8146. for (i = 0; i < total; i++) {
  8147. if (!p->alloc)
  8148. pce_info_use = p;
  8149. else if (!memcmp(p->handle, pinfo->handle,
  8150. MAX_CE_INFO_HANDLE_SIZE)) {
  8151. pce_info_use = p;
  8152. found = true;
  8153. break;
  8154. }
  8155. p++;
  8156. }
  8157. if (pce_info_use == NULL)
  8158. return -EBUSY;
  8159. pinfo->unit_num = pce_info_use->unit_num;
  8160. if (!pce_info_use->alloc) {
  8161. pce_info_use->alloc = true;
  8162. memcpy(pce_info_use->handle,
  8163. pinfo->handle, MAX_CE_INFO_HANDLE_SIZE);
  8164. }
  8165. if (pce_info_use->num_ce_pipe_entries >
  8166. MAX_CE_PIPE_PAIR_PER_UNIT)
  8167. entries = MAX_CE_PIPE_PAIR_PER_UNIT;
  8168. else
  8169. entries = pce_info_use->num_ce_pipe_entries;
  8170. pinfo->num_ce_pipe_entries = entries;
  8171. pce_entry = pce_info_use->ce_pipe_entry;
  8172. for (i = 0; i < entries; i++, pce_entry++)
  8173. pinfo->ce_pipe_entry[i] = *pce_entry;
  8174. for (; i < MAX_CE_PIPE_PAIR_PER_UNIT; i++)
  8175. pinfo->ce_pipe_entry[i].valid = 0;
  8176. if (copy_to_user(argp, pinfo, sizeof(struct qseecom_ce_info_req))) {
  8177. pr_err("copy_to_user failed\n");
  8178. ret = -EFAULT;
  8179. }
  8180. return ret;
  8181. }
  8182. static int qseecom_free_ce_info(struct qseecom_dev_handle *data,
  8183. void __user *argp)
  8184. {
  8185. struct qseecom_ce_info_req req;
  8186. struct qseecom_ce_info_req *pinfo = &req;
  8187. int ret = 0;
  8188. struct qseecom_ce_info_use *p;
  8189. int total = 0;
  8190. int i;
  8191. bool found = false;
  8192. ret = copy_from_user(pinfo, argp,
  8193. sizeof(struct qseecom_ce_info_req));
  8194. if (ret)
  8195. return ret;
  8196. switch (pinfo->usage) {
  8197. case QSEOS_KM_USAGE_DISK_ENCRYPTION:
  8198. case QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION:
  8199. case QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION:
  8200. if (qseecom.support_fde) {
  8201. p = qseecom.ce_info.fde;
  8202. total = qseecom.ce_info.num_fde;
  8203. } else {
  8204. pr_err("system does not support fde\n");
  8205. return -EINVAL;
  8206. }
  8207. break;
  8208. case QSEOS_KM_USAGE_FILE_ENCRYPTION:
  8209. if (qseecom.support_pfe) {
  8210. p = qseecom.ce_info.pfe;
  8211. total = qseecom.ce_info.num_pfe;
  8212. } else {
  8213. pr_err("system does not support pfe\n");
  8214. return -EINVAL;
  8215. }
  8216. break;
  8217. default:
  8218. pr_err("unsupported usage %d\n", pinfo->usage);
  8219. return -EINVAL;
  8220. }
  8221. for (i = 0; i < total; i++) {
  8222. if (p->alloc &&
  8223. !memcmp(p->handle, pinfo->handle,
  8224. MAX_CE_INFO_HANDLE_SIZE)) {
  8225. memset(p->handle, 0, MAX_CE_INFO_HANDLE_SIZE);
  8226. p->alloc = false;
  8227. found = true;
  8228. break;
  8229. }
  8230. p++;
  8231. }
  8232. return ret;
  8233. }
  8234. static int qseecom_query_ce_info(struct qseecom_dev_handle *data,
  8235. void __user *argp)
  8236. {
  8237. struct qseecom_ce_info_req req;
  8238. struct qseecom_ce_info_req *pinfo = &req;
  8239. int ret = 0;
  8240. int i;
  8241. unsigned int entries;
  8242. struct qseecom_ce_info_use *pce_info_use, *p;
  8243. int total = 0;
  8244. bool found = false;
  8245. struct qseecom_ce_pipe_entry *pce_entry;
  8246. ret = copy_from_user(pinfo, argp,
  8247. sizeof(struct qseecom_ce_info_req));
  8248. if (ret)
  8249. return ret;
  8250. switch (pinfo->usage) {
  8251. case QSEOS_KM_USAGE_DISK_ENCRYPTION:
  8252. case QSEOS_KM_USAGE_UFS_ICE_DISK_ENCRYPTION:
  8253. case QSEOS_KM_USAGE_SDCC_ICE_DISK_ENCRYPTION:
  8254. if (qseecom.support_fde) {
  8255. p = qseecom.ce_info.fde;
  8256. total = qseecom.ce_info.num_fde;
  8257. } else {
  8258. pr_err("system does not support fde\n");
  8259. return -EINVAL;
  8260. }
  8261. break;
  8262. case QSEOS_KM_USAGE_FILE_ENCRYPTION:
  8263. if (qseecom.support_pfe) {
  8264. p = qseecom.ce_info.pfe;
  8265. total = qseecom.ce_info.num_pfe;
  8266. } else {
  8267. pr_err("system does not support pfe\n");
  8268. return -EINVAL;
  8269. }
  8270. break;
  8271. default:
  8272. pr_err("unsupported usage %d\n", pinfo->usage);
  8273. return -EINVAL;
  8274. }
  8275. pce_info_use = NULL;
  8276. pinfo->unit_num = INVALID_CE_INFO_UNIT_NUM;
  8277. pinfo->num_ce_pipe_entries = 0;
  8278. for (i = 0; i < MAX_CE_PIPE_PAIR_PER_UNIT; i++)
  8279. pinfo->ce_pipe_entry[i].valid = 0;
  8280. for (i = 0; i < total; i++) {
  8281. if (p->alloc && !memcmp(p->handle,
  8282. pinfo->handle, MAX_CE_INFO_HANDLE_SIZE)) {
  8283. pce_info_use = p;
  8284. found = true;
  8285. break;
  8286. }
  8287. p++;
  8288. }
  8289. if (!pce_info_use)
  8290. goto out;
  8291. pinfo->unit_num = pce_info_use->unit_num;
  8292. if (pce_info_use->num_ce_pipe_entries >
  8293. MAX_CE_PIPE_PAIR_PER_UNIT)
  8294. entries = MAX_CE_PIPE_PAIR_PER_UNIT;
  8295. else
  8296. entries = pce_info_use->num_ce_pipe_entries;
  8297. pinfo->num_ce_pipe_entries = entries;
  8298. pce_entry = pce_info_use->ce_pipe_entry;
  8299. for (i = 0; i < entries; i++, pce_entry++)
  8300. pinfo->ce_pipe_entry[i] = *pce_entry;
  8301. for (; i < MAX_CE_PIPE_PAIR_PER_UNIT; i++)
  8302. pinfo->ce_pipe_entry[i].valid = 0;
  8303. out:
  8304. if (copy_to_user(argp, pinfo, sizeof(struct qseecom_ce_info_req))) {
  8305. pr_err("copy_to_user failed\n");
  8306. ret = -EFAULT;
  8307. }
  8308. return ret;
  8309. }
  8310. /*
  8311. * Check whitelist feature, and if TZ feature version is < 1.0.0,
  8312. * then whitelist feature is not supported.
  8313. */
  8314. #define GET_FEAT_VERSION_CMD 3
  8315. static int qseecom_check_whitelist_feature(void)
  8316. {
  8317. struct qseecom_scm_desc desc = {0};
  8318. int version = 0;
  8319. int ret = 0;
  8320. desc.args[0] = FEATURE_ID_WHITELIST;
  8321. desc.arginfo = SCM_ARGS(1);
  8322. mutex_lock(&app_access_lock);
  8323. ret = __qseecom_scm_call2_locked(SCM_SIP_FNID(SCM_SVC_INFO,
  8324. GET_FEAT_VERSION_CMD), &desc);
  8325. mutex_unlock(&app_access_lock);
  8326. if (!ret)
  8327. version = desc.ret[0];
  8328. return version >= MAKE_WHITELIST_VERSION(1, 0, 0);
  8329. }
  8330. static int qseecom_init_clk(void)
  8331. {
  8332. int rc;
  8333. if (qseecom.no_clock_support)
  8334. return 0;
  8335. rc = __qseecom_init_clk(CLK_QSEE);
  8336. if (rc)
  8337. return rc;
  8338. if ((qseecom.qsee.instance != qseecom.ce_drv.instance) &&
  8339. (qseecom.support_pfe || qseecom.support_fde)) {
  8340. rc = __qseecom_init_clk(CLK_CE_DRV);
  8341. if (rc) {
  8342. __qseecom_deinit_clk(CLK_QSEE);
  8343. return rc;
  8344. }
  8345. } else {
  8346. qseecom.ce_drv.ce_core_clk = qseecom.qsee.ce_core_clk;
  8347. qseecom.ce_drv.ce_clk = qseecom.qsee.ce_clk;
  8348. qseecom.ce_drv.ce_core_src_clk = qseecom.qsee.ce_core_src_clk;
  8349. qseecom.ce_drv.ce_bus_clk = qseecom.qsee.ce_bus_clk;
  8350. }
  8351. return rc;
  8352. }
  8353. static void qseecom_deinit_clk(void)
  8354. {
  8355. if (qseecom.no_clock_support)
  8356. return;
  8357. __qseecom_deinit_clk(CLK_QSEE);
  8358. if ((qseecom.qsee.instance != qseecom.ce_drv.instance) &&
  8359. (qseecom.support_pfe || qseecom.support_fde))
  8360. __qseecom_deinit_clk(CLK_CE_DRV);
  8361. }
  8362. static int qseecom_init_bus(struct platform_device *pdev)
  8363. {
  8364. int ret = 0;
  8365. if (!qseecom.support_bus_scaling)
  8366. return 0;
  8367. if (qseecom.no_clock_support) {
  8368. pr_err("Can not support bus_scalling if no clock support\n");
  8369. return -EINVAL;
  8370. }
  8371. timer_setup(&(qseecom.bw_scale_down_timer),
  8372. qseecom_scale_bus_bandwidth_timer_callback, 0);
  8373. INIT_WORK(&qseecom.bw_inactive_req_ws,
  8374. qseecom_bw_inactive_req_work);
  8375. qseecom.timer_running = false;
  8376. qseecom.icc_path = of_icc_get(&pdev->dev, "data_path");
  8377. if (IS_ERR(qseecom.icc_path)) {
  8378. ret = PTR_ERR(qseecom.icc_path);
  8379. if (ret != -EPROBE_DEFER)
  8380. pr_err("Unable to get Interconnect path\n");
  8381. return ret;
  8382. }
  8383. return 0;
  8384. }
  8385. static void qseecom_deinit_bus(void)
  8386. {
  8387. if (!qseecom.support_bus_scaling || qseecom.no_clock_support)
  8388. return;
  8389. qseecom_bus_scale_update_request(qseecom.qsee_perf_client, 0);
  8390. icc_put(qseecom.icc_path);
  8391. cancel_work_sync(&qseecom.bw_inactive_req_ws);
  8392. del_timer_sync(&qseecom.bw_scale_down_timer);
  8393. }
  8394. static int qseecom_send_app_region(struct platform_device *pdev)
  8395. {
  8396. struct resource *resource = NULL;
  8397. struct qsee_apps_region_info_64bit_ireq req_64bit;
  8398. struct qseecom_command_scm_resp resp;
  8399. void *cmd_buf = NULL;
  8400. size_t cmd_len;
  8401. int rc = 0;
  8402. if (qseecom.qsee_version < QSEE_VERSION_02 ||
  8403. qseecom.is_apps_region_protected ||
  8404. qseecom.appsbl_qseecom_support)
  8405. return 0;
  8406. resource = platform_get_resource_byname(pdev,
  8407. IORESOURCE_MEM, "secapp-region");
  8408. if (!resource) {
  8409. pr_err("Fail to get secure app region info\n");
  8410. return -ENOMEM;
  8411. }
  8412. req_64bit.qsee_cmd_id = QSEOS_APP_REGION_NOTIFICATION;
  8413. req_64bit.addr = resource->start;
  8414. req_64bit.size = resource_size(resource);
  8415. cmd_buf = (void *)&req_64bit;
  8416. cmd_len = sizeof(struct qsee_apps_region_info_64bit_ireq);
  8417. pr_warn("secure app region addr=0x%llx size=0x%x\n",
  8418. req_64bit.addr, req_64bit.size);
  8419. rc = __qseecom_enable_clk(CLK_QSEE);
  8420. if (rc) {
  8421. pr_err("CLK_QSEE enabling failed (%d)\n", rc);
  8422. return rc;
  8423. }
  8424. mutex_lock(&app_access_lock);
  8425. rc = qseecom_scm_call(SCM_SVC_TZSCHEDULER, 1,
  8426. cmd_buf, cmd_len,
  8427. &resp, sizeof(resp));
  8428. mutex_unlock(&app_access_lock);
  8429. __qseecom_disable_clk(CLK_QSEE);
  8430. if (rc || (resp.result != QSEOS_RESULT_SUCCESS)) {
  8431. pr_err("send secapp reg fail %d resp.res %d\n",
  8432. rc, resp.result);
  8433. return -EINVAL;
  8434. }
  8435. return rc;
  8436. }
  8437. static void qseecom_release_ce_data(void)
  8438. {
  8439. int i;
  8440. struct qseecom_ce_info_use *pce_info_use = NULL;
  8441. if (qseecom.ce_info.fde) {
  8442. pce_info_use = qseecom.ce_info.fde;
  8443. for (i = 0; i < qseecom.ce_info.num_fde; i++) {
  8444. kfree_sensitive(pce_info_use->ce_pipe_entry);
  8445. pce_info_use++;
  8446. }
  8447. kfree(qseecom.ce_info.fde);
  8448. }
  8449. if (qseecom.ce_info.pfe) {
  8450. pce_info_use = qseecom.ce_info.pfe;
  8451. for (i = 0; i < qseecom.ce_info.num_pfe; i++) {
  8452. kfree_sensitive(pce_info_use->ce_pipe_entry);
  8453. pce_info_use++;
  8454. }
  8455. kfree(qseecom.ce_info.pfe);
  8456. }
  8457. }
  8458. static int qseecom_init_dev(struct platform_device *pdev)
  8459. {
  8460. int rc = 0;
  8461. rc = alloc_chrdev_region(&qseecom.qseecom_device_no,
  8462. 0, 1, QSEECOM_DEV);
  8463. if (rc < 0) {
  8464. pr_err("alloc_chrdev_region failed %d\n", rc);
  8465. return rc;
  8466. }
  8467. qseecom.driver_class = class_create(THIS_MODULE, QSEECOM_DEV);
  8468. if (IS_ERR(qseecom.driver_class)) {
  8469. rc = PTR_ERR(qseecom.driver_class);
  8470. pr_err("class_create failed %x\n", rc);
  8471. goto exit_unreg_chrdev_region;
  8472. }
  8473. qseecom.pdev = device_create(qseecom.driver_class, NULL,
  8474. qseecom.qseecom_device_no, NULL,
  8475. QSEECOM_DEV);
  8476. if (IS_ERR(qseecom.pdev)) {
  8477. pr_err("class_device_create failed %d\n", rc);
  8478. rc = PTR_ERR(qseecom.pdev);
  8479. goto exit_destroy_class;
  8480. }
  8481. cdev_init(&qseecom.cdev, &qseecom_fops);
  8482. qseecom.cdev.owner = THIS_MODULE;
  8483. rc = cdev_add(&qseecom.cdev,
  8484. MKDEV(MAJOR(qseecom.qseecom_device_no), 0), 1);
  8485. if (rc < 0) {
  8486. pr_err("cdev_add failed %d\n", rc);
  8487. goto exit_destroy_device;
  8488. }
  8489. qseecom.dev = &pdev->dev;
  8490. rc = dma_set_mask(qseecom.dev, DMA_BIT_MASK(64));
  8491. if (rc) {
  8492. pr_err("qseecom failed to set dma mask %d\n", rc);
  8493. goto exit_del_cdev;
  8494. }
  8495. if (!qseecom.dev->dma_parms) {
  8496. qseecom.dev->dma_parms =
  8497. kzalloc(sizeof(*qseecom.dev->dma_parms), GFP_KERNEL);
  8498. if (!qseecom.dev->dma_parms) {
  8499. rc = -ENOMEM;
  8500. goto exit_del_cdev;
  8501. }
  8502. }
  8503. dma_set_max_seg_size(qseecom.dev, DMA_BIT_MASK(32));
  8504. rc = of_reserved_mem_device_init_by_idx(&pdev->dev,
  8505. (&pdev->dev)->of_node, 0);
  8506. if (rc) {
  8507. pr_err("Failed to initialize reserved mem, ret %d\n", rc);
  8508. goto exit_del_cdev;
  8509. }
  8510. return 0;
  8511. exit_del_cdev:
  8512. cdev_del(&qseecom.cdev);
  8513. exit_destroy_device:
  8514. device_destroy(qseecom.driver_class, qseecom.qseecom_device_no);
  8515. exit_destroy_class:
  8516. class_destroy(qseecom.driver_class);
  8517. exit_unreg_chrdev_region:
  8518. unregister_chrdev_region(qseecom.qseecom_device_no, 1);
  8519. return rc;
  8520. }
  8521. static void qseecom_deinit_dev(void)
  8522. {
  8523. kfree(qseecom.dev->dma_parms);
  8524. qseecom.dev->dma_parms = NULL;
  8525. cdev_del(&qseecom.cdev);
  8526. device_destroy(qseecom.driver_class, qseecom.qseecom_device_no);
  8527. class_destroy(qseecom.driver_class);
  8528. unregister_chrdev_region(qseecom.qseecom_device_no, 1);
  8529. }
  8530. static int qseecom_init_control(void)
  8531. {
  8532. uint32_t feature = 10;
  8533. struct qseecom_command_scm_resp resp;
  8534. int rc = 0;
  8535. qseecom.qsee_version = QSEEE_VERSION_00;
  8536. mutex_lock(&app_access_lock);
  8537. rc = qseecom_scm_call(6, 3, &feature, sizeof(feature),
  8538. &resp, sizeof(resp));
  8539. mutex_unlock(&app_access_lock);
  8540. pr_info("qseecom.qsee_version = 0x%x\n", resp.result);
  8541. if (rc) {
  8542. pr_err("Failed to get QSEE version info %d\n", rc);
  8543. return rc;
  8544. }
  8545. qseecom.qsee_version = resp.result;
  8546. atomic_set(&qseecom.qseecom_state, QSEECOM_STATE_NOT_READY);
  8547. init_waitqueue_head(&qseecom.app_block_wq);
  8548. qseecom.whitelist_support = true;
  8549. INIT_LIST_HEAD(&qseecom.registered_listener_list_head);
  8550. INIT_LIST_HEAD(&qseecom.registered_app_list_head);
  8551. spin_lock_init(&qseecom.registered_app_list_lock);
  8552. INIT_LIST_HEAD(&qseecom.unregister_lsnr_pending_list_head);
  8553. INIT_LIST_HEAD(&qseecom.registered_kclient_list_head);
  8554. spin_lock_init(&qseecom.registered_kclient_list_lock);
  8555. init_waitqueue_head(&qseecom.send_resp_wq);
  8556. init_waitqueue_head(&qseecom.register_lsnr_pending_wq);
  8557. init_waitqueue_head(&qseecom.unregister_lsnr_kthread_wq);
  8558. INIT_LIST_HEAD(&qseecom.unload_app_pending_list_head);
  8559. init_waitqueue_head(&qseecom.unload_app_kthread_wq);
  8560. qseecom.send_resp_flag = 0;
  8561. qseecom.qseos_version = QSEOS_VERSION_14;
  8562. qseecom.commonlib_loaded = false;
  8563. qseecom.commonlib64_loaded = false;
  8564. qseecom.whitelist_support = qseecom_check_whitelist_feature();
  8565. return rc;
  8566. }
  8567. static int qseecom_parse_dt(struct platform_device *pdev)
  8568. {
  8569. if (!pdev->dev.of_node) {
  8570. pr_err("NULL of_node\n");
  8571. return -ENODEV;
  8572. }
  8573. qseecom.pdev->of_node = pdev->dev.of_node;
  8574. qseecom.support_bus_scaling =
  8575. of_property_read_bool((&pdev->dev)->of_node,
  8576. "qcom,support-bus-scaling");
  8577. qseecom.appsbl_qseecom_support =
  8578. of_property_read_bool((&pdev->dev)->of_node,
  8579. "qcom,appsbl-qseecom-support");
  8580. qseecom.commonlib64_loaded =
  8581. of_property_read_bool((&pdev->dev)->of_node,
  8582. "qcom,commonlib64-loaded-by-uefi");
  8583. qseecom.fde_key_size =
  8584. of_property_read_bool((&pdev->dev)->of_node,
  8585. "qcom,fde-key-size");
  8586. qseecom.no_clock_support =
  8587. of_property_read_bool((&pdev->dev)->of_node,
  8588. "qcom,no-clock-support");
  8589. qseecom.enable_key_wrap_in_ks =
  8590. of_property_read_bool((&pdev->dev)->of_node,
  8591. "qcom,enable-key-wrap-in-ks");
  8592. if (of_property_read_u32((&pdev->dev)->of_node,
  8593. "qcom,qsee-reentrancy-support",
  8594. &qseecom.qsee_reentrancy_support)) {
  8595. pr_warn("qsee reentrancy support phase is not defined, setting to default 0\n");
  8596. qseecom.qsee_reentrancy_support = 0;
  8597. }
  8598. if (of_property_read_u32((&pdev->dev)->of_node,
  8599. "qcom,ce-opp-freq", &qseecom.ce_opp_freq_hz)) {
  8600. pr_debug("CE operating frequency is not defined, setting to default 100MHZ\n");
  8601. qseecom.ce_opp_freq_hz = QSEE_CE_CLK_100MHZ;
  8602. }
  8603. /*
  8604. * By default, appsbl only loads cmnlib. If OEM changes appsbl to
  8605. * load cmnlib64 too, while cmnlib64 img is not present in non_hlos.bin,
  8606. * Pls add "qseecom.commonlib64_loaded = true" here too.
  8607. */
  8608. if (qseecom.is_apps_region_protected ||
  8609. qseecom.appsbl_qseecom_support)
  8610. qseecom.commonlib_loaded = true;
  8611. return 0;
  8612. }
  8613. static int qseecom_create_kthreads(void)
  8614. {
  8615. int rc = 0;
  8616. qseecom.unregister_lsnr_kthread_task = kthread_run(
  8617. __qseecom_unregister_listener_kthread_func,
  8618. NULL, "qseecom-unreg-lsnr");
  8619. if (IS_ERR(qseecom.unregister_lsnr_kthread_task)) {
  8620. rc = PTR_ERR(qseecom.unregister_lsnr_kthread_task);
  8621. pr_err("fail to create kthread to unreg lsnr, rc = %x\n", rc);
  8622. return rc;
  8623. }
  8624. atomic_set(&qseecom.unregister_lsnr_kthread_state,
  8625. LSNR_UNREG_KT_SLEEP);
  8626. /*create a kthread to process pending ta unloading task */
  8627. qseecom.unload_app_kthread_task = kthread_run(
  8628. __qseecom_unload_app_kthread_func,
  8629. NULL, "qseecom-unload-ta");
  8630. if (IS_ERR(qseecom.unload_app_kthread_task)) {
  8631. rc = PTR_ERR(qseecom.unload_app_kthread_task);
  8632. pr_err("failed to create kthread to unload ta, rc = %x\n", rc);
  8633. kthread_stop(qseecom.unregister_lsnr_kthread_task);
  8634. return rc;
  8635. }
  8636. atomic_set(&qseecom.unload_app_kthread_state,
  8637. UNLOAD_APP_KT_SLEEP);
  8638. return 0;
  8639. }
  8640. static int qseecom_register_heap_shmbridge(struct platform_device *pdev,
  8641. char *heap_mem_region_name,
  8642. uint64_t *handle)
  8643. {
  8644. phys_addr_t heap_pa = 0;
  8645. size_t heap_size = 0;
  8646. struct device_node *node = NULL;
  8647. struct reserved_mem *rmem = NULL;
  8648. uint32_t ns_vmids[] = {VMID_HLOS};
  8649. uint32_t ns_vm_perms[] = {PERM_READ | PERM_WRITE};
  8650. node = of_parse_phandle(pdev->dev.of_node, heap_mem_region_name, 0);
  8651. if (!node) {
  8652. pr_err("unable to parse memory-region of heap %d\n", heap_mem_region_name);
  8653. return -EINVAL;
  8654. }
  8655. rmem = of_reserved_mem_lookup(node);
  8656. if (!rmem) {
  8657. pr_err("unable to acquire memory-region of heap %d\n", heap_mem_region_name);
  8658. return -EINVAL;
  8659. }
  8660. heap_pa = rmem->base;
  8661. heap_size = (size_t)rmem->size;
  8662. pr_debug("get heap %d info: shmbridge created\n", heap_mem_region_name);
  8663. return qtee_shmbridge_register(heap_pa,
  8664. heap_size, ns_vmids, ns_vm_perms, 1,
  8665. PERM_READ | PERM_WRITE, handle);
  8666. }
  8667. static int qseecom_register_shmbridge(struct platform_device *pdev)
  8668. {
  8669. int ret = 0;
  8670. if (!qtee_shmbridge_is_enabled())
  8671. return 0;
  8672. ret = qseecom_register_heap_shmbridge(pdev, "qseecom_ta_mem",
  8673. &qseecom.ta_bridge_handle);
  8674. if (ret)
  8675. return ret;
  8676. ret = qseecom_register_heap_shmbridge(pdev, "qseecom_mem",
  8677. &qseecom.qseecom_bridge_handle);
  8678. if (ret) {
  8679. qtee_shmbridge_deregister(qseecom.ta_bridge_handle);
  8680. return ret;
  8681. }
  8682. /* no-user-contig-mem is present in dtsi if user_contig_region is not needed*/
  8683. qseecom.no_user_contig_mem_support = of_property_read_bool((&pdev->dev)->of_node,
  8684. "qcom,no-user-contig-mem-support");
  8685. if (!qseecom.no_user_contig_mem_support) {
  8686. ret = qseecom_register_heap_shmbridge(pdev, "user_contig_mem",
  8687. &qseecom.user_contig_bridge_handle);
  8688. if (ret) {
  8689. qtee_shmbridge_deregister(qseecom.qseecom_bridge_handle);
  8690. qtee_shmbridge_deregister(qseecom.ta_bridge_handle);
  8691. return ret;
  8692. }
  8693. }
  8694. return 0;
  8695. }
  8696. static void qseecom_deregister_shmbridge(void)
  8697. {
  8698. qtee_shmbridge_deregister(qseecom.user_contig_bridge_handle);
  8699. qtee_shmbridge_deregister(qseecom.qseecom_bridge_handle);
  8700. qtee_shmbridge_deregister(qseecom.ta_bridge_handle);
  8701. }
  8702. static int qseecom_probe(struct platform_device *pdev)
  8703. {
  8704. int rc;
  8705. rc = qseecom_register_shmbridge(pdev);
  8706. if (rc)
  8707. return rc;
  8708. rc = qseecom_init_dev(pdev);
  8709. if (rc)
  8710. goto exit_unregister_bridge;
  8711. rc = qseecom_init_control();
  8712. if (rc)
  8713. goto exit_deinit_dev;
  8714. rc = qseecom_parse_dt(pdev);
  8715. if (rc)
  8716. goto exit_deinit_dev;
  8717. rc = qseecom_retrieve_ce_data(pdev);
  8718. if (rc)
  8719. goto exit_deinit_dev;
  8720. rc = qseecom_init_clk();
  8721. if (rc)
  8722. goto exit_release_ce_data;
  8723. rc = qseecom_init_bus(pdev);
  8724. if (rc)
  8725. goto exit_deinit_clock;
  8726. rc = qseecom_send_app_region(pdev);
  8727. if (rc)
  8728. goto exit_deinit_bus;
  8729. rc = qseecom_create_kthreads();
  8730. if (rc)
  8731. goto exit_deinit_bus;
  8732. #if IS_ENABLED(CONFIG_QSEECOM) && IS_ENABLED(CONFIG_QSEECOM_PROXY)
  8733. /*If the api fails to get the func ops, print the error and continue
  8734. * Do not treat it as fatal*/
  8735. rc = get_qseecom_kernel_fun_ops();
  8736. if (rc)
  8737. pr_err("failed to provide qseecom ops %d", rc);
  8738. #endif
  8739. atomic_set(&qseecom.qseecom_state, QSEECOM_STATE_READY);
  8740. return 0;
  8741. exit_deinit_bus:
  8742. qseecom_deinit_bus();
  8743. exit_deinit_clock:
  8744. qseecom_deinit_clk();
  8745. exit_release_ce_data:
  8746. qseecom_release_ce_data();
  8747. exit_deinit_dev:
  8748. qseecom_deinit_dev();
  8749. exit_unregister_bridge:
  8750. qseecom_deregister_shmbridge();
  8751. return rc;
  8752. }
  8753. static int qseecom_remove(struct platform_device *pdev)
  8754. {
  8755. struct qseecom_registered_kclient_list *kclient = NULL;
  8756. struct qseecom_registered_kclient_list *kclient_tmp = NULL;
  8757. unsigned long flags = 0;
  8758. int ret = 0;
  8759. atomic_set(&qseecom.qseecom_state, QSEECOM_STATE_NOT_READY);
  8760. spin_lock_irqsave(&qseecom.registered_kclient_list_lock, flags);
  8761. list_for_each_entry_safe(kclient, kclient_tmp,
  8762. &qseecom.registered_kclient_list_head, list) {
  8763. /* Break the loop if client handle is NULL */
  8764. if (!kclient->handle) {
  8765. list_del(&kclient->list);
  8766. kfree_sensitive(kclient);
  8767. break;
  8768. }
  8769. list_del(&kclient->list);
  8770. mutex_lock(&app_access_lock);
  8771. ret = qseecom_unload_app(kclient->handle->dev, false);
  8772. mutex_unlock(&app_access_lock);
  8773. if (!ret) {
  8774. kfree_sensitive(kclient->handle->dev);
  8775. kfree_sensitive(kclient->handle);
  8776. kfree_sensitive(kclient);
  8777. }
  8778. }
  8779. spin_unlock_irqrestore(&qseecom.registered_kclient_list_lock, flags);
  8780. if (qseecom.qseos_version > QSEEE_VERSION_00)
  8781. qseecom_unload_commonlib_image();
  8782. qseecom_deregister_shmbridge();
  8783. kthread_stop(qseecom.unload_app_kthread_task);
  8784. kthread_stop(qseecom.unregister_lsnr_kthread_task);
  8785. qseecom_deinit_bus();
  8786. qseecom_deinit_clk();
  8787. qseecom_release_ce_data();
  8788. qseecom_deinit_dev();
  8789. return ret;
  8790. }
  8791. static int qseecom_suspend(struct platform_device *pdev, pm_message_t state)
  8792. {
  8793. int ret = 0;
  8794. struct qseecom_clk *qclk;
  8795. qclk = &qseecom.qsee;
  8796. atomic_set(&qseecom.qseecom_state, QSEECOM_STATE_SUSPEND);
  8797. if (qseecom.no_clock_support)
  8798. return 0;
  8799. mutex_lock(&qsee_bw_mutex);
  8800. mutex_lock(&clk_access_lock);
  8801. if (qseecom.current_mode != INACTIVE) {
  8802. ret = qseecom_bus_scale_update_request(
  8803. qseecom.qsee_perf_client, INACTIVE);
  8804. if (ret)
  8805. pr_err("Fail to scale down bus\n");
  8806. else
  8807. qseecom.current_mode = INACTIVE;
  8808. }
  8809. if (qclk->clk_access_cnt) {
  8810. if (qclk->ce_clk != NULL)
  8811. clk_disable_unprepare(qclk->ce_clk);
  8812. if (qclk->ce_core_clk != NULL)
  8813. clk_disable_unprepare(qclk->ce_core_clk);
  8814. if (qclk->ce_bus_clk != NULL)
  8815. clk_disable_unprepare(qclk->ce_bus_clk);
  8816. }
  8817. del_timer_sync(&(qseecom.bw_scale_down_timer));
  8818. qseecom.timer_running = false;
  8819. mutex_unlock(&clk_access_lock);
  8820. mutex_unlock(&qsee_bw_mutex);
  8821. cancel_work_sync(&qseecom.bw_inactive_req_ws);
  8822. return 0;
  8823. }
  8824. static int qseecom_resume(struct platform_device *pdev)
  8825. {
  8826. int mode = 0;
  8827. int ret = 0;
  8828. struct qseecom_clk *qclk;
  8829. qclk = &qseecom.qsee;
  8830. if (qseecom.no_clock_support)
  8831. goto exit;
  8832. mutex_lock(&qsee_bw_mutex);
  8833. mutex_lock(&clk_access_lock);
  8834. if (qseecom.cumulative_mode >= HIGH)
  8835. mode = HIGH;
  8836. else
  8837. mode = qseecom.cumulative_mode;
  8838. if (qseecom.cumulative_mode != INACTIVE) {
  8839. ret = qseecom_bus_scale_update_request(
  8840. qseecom.qsee_perf_client, mode);
  8841. if (ret)
  8842. pr_err("Fail to scale up bus to %d\n", mode);
  8843. else
  8844. qseecom.current_mode = mode;
  8845. }
  8846. if (qclk->clk_access_cnt) {
  8847. if (qclk->ce_core_clk != NULL) {
  8848. ret = clk_prepare_enable(qclk->ce_core_clk);
  8849. if (ret) {
  8850. pr_err("Unable to enable/prep CE core clk\n");
  8851. qclk->clk_access_cnt = 0;
  8852. goto err;
  8853. }
  8854. }
  8855. if (qclk->ce_clk != NULL) {
  8856. ret = clk_prepare_enable(qclk->ce_clk);
  8857. if (ret) {
  8858. pr_err("Unable to enable/prep CE iface clk\n");
  8859. qclk->clk_access_cnt = 0;
  8860. goto ce_clk_err;
  8861. }
  8862. }
  8863. if (qclk->ce_bus_clk != NULL) {
  8864. ret = clk_prepare_enable(qclk->ce_bus_clk);
  8865. if (ret) {
  8866. pr_err("Unable to enable/prep CE bus clk\n");
  8867. qclk->clk_access_cnt = 0;
  8868. goto ce_bus_clk_err;
  8869. }
  8870. }
  8871. }
  8872. if (qclk->clk_access_cnt || qseecom.cumulative_mode) {
  8873. qseecom.bw_scale_down_timer.expires = jiffies +
  8874. msecs_to_jiffies(QSEECOM_SEND_CMD_CRYPTO_TIMEOUT);
  8875. mod_timer(&(qseecom.bw_scale_down_timer),
  8876. qseecom.bw_scale_down_timer.expires);
  8877. qseecom.timer_running = true;
  8878. }
  8879. mutex_unlock(&clk_access_lock);
  8880. mutex_unlock(&qsee_bw_mutex);
  8881. goto exit;
  8882. ce_bus_clk_err:
  8883. if (qclk->ce_clk)
  8884. clk_disable_unprepare(qclk->ce_clk);
  8885. ce_clk_err:
  8886. if (qclk->ce_core_clk)
  8887. clk_disable_unprepare(qclk->ce_core_clk);
  8888. err:
  8889. mutex_unlock(&clk_access_lock);
  8890. mutex_unlock(&qsee_bw_mutex);
  8891. ret = -EIO;
  8892. exit:
  8893. atomic_set(&qseecom.qseecom_state, QSEECOM_STATE_READY);
  8894. return ret;
  8895. }
  8896. static const struct of_device_id qseecom_match[] = {
  8897. {
  8898. .compatible = "qcom,qseecom",
  8899. },
  8900. {}
  8901. };
  8902. static struct platform_driver qseecom_plat_driver = {
  8903. .probe = qseecom_probe,
  8904. .remove = qseecom_remove,
  8905. .suspend = qseecom_suspend,
  8906. .resume = qseecom_resume,
  8907. .driver = {
  8908. .name = "qseecom",
  8909. .of_match_table = qseecom_match,
  8910. },
  8911. };
  8912. static int qseecom_init(void)
  8913. {
  8914. return platform_driver_register(&qseecom_plat_driver);
  8915. }
  8916. static void qseecom_exit(void)
  8917. {
  8918. platform_driver_unregister(&qseecom_plat_driver);
  8919. }
  8920. MODULE_LICENSE("GPL v2");
  8921. MODULE_DESCRIPTION("QTI Secure Execution Environment Communicator");
  8922. MODULE_IMPORT_NS(DMA_BUF);
  8923. module_init(qseecom_init);
  8924. module_exit(qseecom_exit);