Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 | // SPDX-License-Identifier: GPL-2.0-or-later OR BSD-3-Clause /* * Copyright (C) 2022, STMicroelectronics - All Rights Reserved */ #define LOG_CATEGORY UCLASS_RNG #include <rng.h> #include <tee.h> #include <dm/device.h> #include <dm/device_compat.h> #include <linux/sizes.h> #include <tee/optee_service.h> #define DRIVER_NAME "optee-rng" #define TEE_ERROR_HEALTH_TEST_FAIL 0x00000001 /* * TA_CMD_GET_ENTROPY - Get Entropy from RNG * * param[0] (inout memref) - Entropy buffer memory reference * param[1] unused * param[2] unused * param[3] unused * * Result: * TEE_SUCCESS - Invoke command success * TEE_ERROR_BAD_PARAMETERS - Incorrect input param * TEE_ERROR_NOT_SUPPORTED - Requested entropy size greater than size of pool * TEE_ERROR_HEALTH_TEST_FAIL - Continuous health testing failed */ #define TA_CMD_GET_ENTROPY 0x0 #define MAX_ENTROPY_REQ_SZ SZ_4K #define TA_HWRNG_UUID { 0xab7a617c, 0xb8e7, 0x4d8f, \ { 0x83, 0x01, 0xd0, 0x9b, 0x61, 0x03, 0x6b, 0x64 } } OPTEE_SERVICE_DRIVER(optee_rng, TA_HWRNG_UUID, DRIVER_NAME); /** open_session_ta_hwrng() - Open session with hwrng Trusted App * * @dev: device * @session_id: return the RNG TA session identifier * Return: 0 if ok */ static int open_session_ta_hwrng(struct udevice *dev, u32 *session_id) { const struct tee_optee_ta_uuid uuid = TA_HWRNG_UUID; struct tee_open_session_arg sess_arg = {0}; int ret; /* Open session with hwrng Trusted App */ tee_optee_ta_uuid_to_octets(sess_arg.uuid, &uuid); sess_arg.clnt_login = TEE_LOGIN_PUBLIC; ret = tee_open_session(dev->parent, &sess_arg, 0, NULL); if (ret || sess_arg.ret) { if (!ret) ret = -EIO; return ret; } *session_id = sess_arg.session; return 0; } /** * get_optee_rng_data() - read RNG data from OP-TEE TA * * @dev: device * @session_id: the RNG TA session identifier * @entropy_shm_pool: shared memory pool used for TEE message * @buf: buffer to receive data * @size: size of buffer, limited by entropy_shm_pool size * Return: 0 if ok */ static int get_optee_rng_data(struct udevice *dev, u32 session_id, struct tee_shm *entropy_shm_pool, void *buf, size_t *size) { int ret = 0; struct tee_invoke_arg arg = {0}; struct tee_param param = {0}; /* Invoke TA_CMD_GET_ENTROPY function of Trusted App */ arg.func = TA_CMD_GET_ENTROPY; arg.session = session_id; /* Fill invoke cmd params */ param.attr = TEE_PARAM_ATTR_TYPE_MEMREF_INOUT; param.u.memref.shm = entropy_shm_pool; param.u.memref.size = *size; ret = tee_invoke_func(dev->parent, &arg, 1, ¶m); if (ret || arg.ret) { if (!ret) ret = -EPROTO; dev_err(dev, "TA_CMD_GET_ENTROPY invoke err: %d 0x%x\n", ret, arg.ret); *size = 0; return ret; } memcpy(buf, param.u.memref.shm->addr, param.u.memref.size); *size = param.u.memref.size; return 0; } /** * optee_rng_read() - rng read ops for OP-TEE RNG device * * @dev: device * @buf: buffer to receive data * @len: size of buffer * Return: 0 if ok */ static int optee_rng_read(struct udevice *dev, void *buf, size_t len) { size_t read = 0, rng_size = 0; struct tee_shm *entropy_shm_pool; u8 *data = buf; int ret; u32 session_id = 0; ret = open_session_ta_hwrng(dev, &session_id); if (ret) { dev_err(dev, "can't open session: %d\n", ret); return ret; } ret = tee_shm_alloc(dev->parent, MAX_ENTROPY_REQ_SZ, 0, &entropy_shm_pool); if (ret) { dev_err(dev, "tee_shm_alloc failed: %d\n", ret); goto session_close; } while (read < len) { rng_size = min(len - read, (size_t)MAX_ENTROPY_REQ_SZ); ret = get_optee_rng_data(dev, session_id, entropy_shm_pool, data, &rng_size); if (ret) goto shm_free; data += rng_size; read += rng_size; } shm_free: tee_shm_free(entropy_shm_pool); session_close: tee_close_session(dev->parent, session_id); return ret; } /** * optee_rng_probe() - probe function for OP-TEE RNG device * * @dev: device * Return: 0 if ok */ static int optee_rng_probe(struct udevice *dev) { int ret; u32 session_id; ret = open_session_ta_hwrng(dev, &session_id); if (ret) { dev_err(dev, "can't open session: %d\n", ret); return ret; } tee_close_session(dev->parent, session_id); return 0; } static const struct dm_rng_ops optee_rng_ops = { .read = optee_rng_read, }; U_BOOT_DRIVER(optee_rng) = { .name = DRIVER_NAME, .id = UCLASS_RNG, .ops = &optee_rng_ops, .probe = optee_rng_probe, }; |