15843bb75SJerome Forissier // SPDX-License-Identifier: BSD-2-Clause 25843bb75SJerome Forissier /* 35843bb75SJerome Forissier * Copyright (c) 2018-2019, Linaro Limited 46cb02818SJelle Sels * Copyright (c) 2020, Arm Limited. 55843bb75SJerome Forissier */ 65843bb75SJerome Forissier 75843bb75SJerome Forissier #include <assert.h> 85843bb75SJerome Forissier #include <crypto/crypto.h> 95843bb75SJerome Forissier #include <kernel/handle.h> 105843bb75SJerome Forissier #include <kernel/huk_subkey.h> 11cbe7e1b8SBalint Dobszay #include <kernel/ldelf_loader.h> 125843bb75SJerome Forissier #include <kernel/misc.h> 135843bb75SJerome Forissier #include <kernel/msg_param.h> 145843bb75SJerome Forissier #include <kernel/pseudo_ta.h> 15a8e39e9cSJens Wiklander #include <kernel/tpm.h> 166cb02818SJelle Sels #include <kernel/ts_store.h> 179c34c0c7SBalint Dobszay #include <kernel/user_mode_ctx.h> 185843bb75SJerome Forissier #include <ldelf.h> 195843bb75SJerome Forissier #include <mm/file.h> 205843bb75SJerome Forissier #include <mm/fobj.h> 2189c9728dSJens Wiklander #include <mm/vm.h> 225843bb75SJerome Forissier #include <pta_system.h> 23a8e39e9cSJens Wiklander #include <stdlib_ext.h> 24a8e39e9cSJens Wiklander #include <stdlib.h> 255843bb75SJerome Forissier #include <string.h> 265843bb75SJerome Forissier #include <tee_api_defines_extensions.h> 275843bb75SJerome Forissier #include <tee_api_defines.h> 285843bb75SJerome Forissier #include <util.h> 295843bb75SJerome Forissier 305843bb75SJerome Forissier static unsigned int system_pnum; 315843bb75SJerome Forissier 329c34c0c7SBalint Dobszay static TEE_Result system_rng_reseed(uint32_t param_types, 335843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 345843bb75SJerome Forissier { 3500b3b9a2SJens Wiklander size_t entropy_sz = 0; 3600b3b9a2SJens Wiklander uint8_t *entropy_input = NULL; 375843bb75SJerome Forissier uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 385843bb75SJerome Forissier TEE_PARAM_TYPE_NONE, 395843bb75SJerome Forissier TEE_PARAM_TYPE_NONE, 405843bb75SJerome Forissier TEE_PARAM_TYPE_NONE); 415843bb75SJerome Forissier 425843bb75SJerome Forissier if (exp_pt != param_types) 435843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 445843bb75SJerome Forissier entropy_input = params[0].memref.buffer; 455843bb75SJerome Forissier entropy_sz = params[0].memref.size; 465843bb75SJerome Forissier 47c2020b9dSJens Wiklander if (!entropy_sz || !entropy_input) 485843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 495843bb75SJerome Forissier 505843bb75SJerome Forissier crypto_rng_add_event(CRYPTO_RNG_SRC_NONSECURE, &system_pnum, 515843bb75SJerome Forissier entropy_input, entropy_sz); 525843bb75SJerome Forissier return TEE_SUCCESS; 535843bb75SJerome Forissier } 545843bb75SJerome Forissier 559c34c0c7SBalint Dobszay static TEE_Result system_derive_ta_unique_key(struct user_mode_ctx *uctx, 565843bb75SJerome Forissier uint32_t param_types, 575843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 585843bb75SJerome Forissier { 595843bb75SJerome Forissier size_t data_len = sizeof(TEE_UUID); 605843bb75SJerome Forissier TEE_Result res = TEE_ERROR_GENERIC; 615843bb75SJerome Forissier uint8_t *data = NULL; 625843bb75SJerome Forissier uint32_t access_flags = 0; 635843bb75SJerome Forissier uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 645843bb75SJerome Forissier TEE_PARAM_TYPE_MEMREF_OUTPUT, 655843bb75SJerome Forissier TEE_PARAM_TYPE_NONE, 665843bb75SJerome Forissier TEE_PARAM_TYPE_NONE); 675843bb75SJerome Forissier 685843bb75SJerome Forissier if (exp_pt != param_types) 695843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 705843bb75SJerome Forissier 715843bb75SJerome Forissier if (params[0].memref.size > TA_DERIVED_EXTRA_DATA_MAX_SIZE || 725843bb75SJerome Forissier params[1].memref.size < TA_DERIVED_KEY_MIN_SIZE || 735843bb75SJerome Forissier params[1].memref.size > TA_DERIVED_KEY_MAX_SIZE) 745843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 755843bb75SJerome Forissier 765843bb75SJerome Forissier /* 775843bb75SJerome Forissier * The derived key shall not end up in non-secure memory by 785843bb75SJerome Forissier * mistake. 795843bb75SJerome Forissier * 805843bb75SJerome Forissier * Note that we're allowing shared memory as long as it's 815843bb75SJerome Forissier * secure. This is needed because a TA always uses shared memory 825843bb75SJerome Forissier * when communicating with another TA. 835843bb75SJerome Forissier */ 845843bb75SJerome Forissier access_flags = TEE_MEMORY_ACCESS_WRITE | TEE_MEMORY_ACCESS_ANY_OWNER | 855843bb75SJerome Forissier TEE_MEMORY_ACCESS_SECURE; 869c34c0c7SBalint Dobszay res = vm_check_access_rights(uctx, access_flags, 875843bb75SJerome Forissier (uaddr_t)params[1].memref.buffer, 885843bb75SJerome Forissier params[1].memref.size); 895843bb75SJerome Forissier if (res != TEE_SUCCESS) 905843bb75SJerome Forissier return TEE_ERROR_SECURITY; 915843bb75SJerome Forissier 925843bb75SJerome Forissier /* Take extra data into account. */ 935843bb75SJerome Forissier if (ADD_OVERFLOW(data_len, params[0].memref.size, &data_len)) 945843bb75SJerome Forissier return TEE_ERROR_SECURITY; 955843bb75SJerome Forissier 965843bb75SJerome Forissier data = calloc(data_len, 1); 975843bb75SJerome Forissier if (!data) 985843bb75SJerome Forissier return TEE_ERROR_OUT_OF_MEMORY; 995843bb75SJerome Forissier 1009c34c0c7SBalint Dobszay memcpy(data, &uctx->ts_ctx->uuid, sizeof(TEE_UUID)); 1015843bb75SJerome Forissier 1025843bb75SJerome Forissier /* Append the user provided data */ 1035843bb75SJerome Forissier memcpy(data + sizeof(TEE_UUID), params[0].memref.buffer, 1045843bb75SJerome Forissier params[0].memref.size); 1055843bb75SJerome Forissier 1065843bb75SJerome Forissier res = huk_subkey_derive(HUK_SUBKEY_UNIQUE_TA, data, data_len, 1075843bb75SJerome Forissier params[1].memref.buffer, 1085843bb75SJerome Forissier params[1].memref.size); 109a8e39e9cSJens Wiklander free_wipe(data); 1105843bb75SJerome Forissier 1115843bb75SJerome Forissier return res; 1125843bb75SJerome Forissier } 1135843bb75SJerome Forissier 1149c34c0c7SBalint Dobszay static TEE_Result system_map_zi(struct user_mode_ctx *uctx, 1159c34c0c7SBalint Dobszay uint32_t param_types, 1165843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 1175843bb75SJerome Forissier { 1185843bb75SJerome Forissier uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT, 1195843bb75SJerome Forissier TEE_PARAM_TYPE_VALUE_INOUT, 1205843bb75SJerome Forissier TEE_PARAM_TYPE_VALUE_INPUT, 1215843bb75SJerome Forissier TEE_PARAM_TYPE_NONE); 1225843bb75SJerome Forissier uint32_t prot = TEE_MATTR_URW | TEE_MATTR_PRW; 1235843bb75SJerome Forissier TEE_Result res = TEE_ERROR_GENERIC; 1245843bb75SJerome Forissier struct mobj *mobj = NULL; 1255843bb75SJerome Forissier uint32_t pad_begin = 0; 126b9651492SJens Wiklander uint32_t vm_flags = 0; 1275843bb75SJerome Forissier struct fobj *f = NULL; 1285843bb75SJerome Forissier uint32_t pad_end = 0; 1295843bb75SJerome Forissier size_t num_bytes = 0; 1305843bb75SJerome Forissier vaddr_t va = 0; 1315843bb75SJerome Forissier 1325843bb75SJerome Forissier if (exp_pt != param_types) 1335843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 1345843bb75SJerome Forissier if (params[0].value.b & ~PTA_SYSTEM_MAP_FLAG_SHAREABLE) 1355843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 1365843bb75SJerome Forissier 1375843bb75SJerome Forissier if (params[0].value.b & PTA_SYSTEM_MAP_FLAG_SHAREABLE) 1385843bb75SJerome Forissier vm_flags |= VM_FLAG_SHAREABLE; 1395843bb75SJerome Forissier 1405843bb75SJerome Forissier num_bytes = params[0].value.a; 1415843bb75SJerome Forissier va = reg_pair_to_64(params[1].value.a, params[1].value.b); 1425843bb75SJerome Forissier pad_begin = params[2].value.a; 1435843bb75SJerome Forissier pad_end = params[2].value.b; 1445843bb75SJerome Forissier 145787295dfSJens Wiklander f = fobj_ta_mem_alloc(ROUNDUP_DIV(num_bytes, SMALL_PAGE_SIZE)); 1465843bb75SJerome Forissier if (!f) 1475843bb75SJerome Forissier return TEE_ERROR_OUT_OF_MEMORY; 1485843bb75SJerome Forissier mobj = mobj_with_fobj_alloc(f, NULL); 1495843bb75SJerome Forissier fobj_put(f); 1505843bb75SJerome Forissier if (!mobj) 1515843bb75SJerome Forissier return TEE_ERROR_OUT_OF_MEMORY; 1529c34c0c7SBalint Dobszay res = vm_map_pad(uctx, &va, num_bytes, prot, vm_flags, 153918e36c6SSughosh Ganu mobj, 0, pad_begin, pad_end, 0); 154b9651492SJens Wiklander mobj_put(mobj); 155b9651492SJens Wiklander if (!res) 1565843bb75SJerome Forissier reg_pair_from_64(va, ¶ms[1].value.a, ¶ms[1].value.b); 1575843bb75SJerome Forissier 1585843bb75SJerome Forissier return res; 1595843bb75SJerome Forissier } 1605843bb75SJerome Forissier 1619c34c0c7SBalint Dobszay static TEE_Result system_unmap(struct user_mode_ctx *uctx, uint32_t param_types, 1625843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 1635843bb75SJerome Forissier { 1645843bb75SJerome Forissier uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_VALUE_INPUT, 1655843bb75SJerome Forissier TEE_PARAM_TYPE_VALUE_INPUT, 1665843bb75SJerome Forissier TEE_PARAM_TYPE_NONE, 1675843bb75SJerome Forissier TEE_PARAM_TYPE_NONE); 16879f22013SJens Wiklander TEE_Result res = TEE_SUCCESS; 16979f22013SJens Wiklander uint32_t vm_flags = 0; 170095b07ceSJens Wiklander vaddr_t end_va = 0; 17179f22013SJens Wiklander vaddr_t va = 0; 17279f22013SJens Wiklander size_t sz = 0; 1735843bb75SJerome Forissier 1745843bb75SJerome Forissier if (exp_pt != param_types) 1755843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 1765843bb75SJerome Forissier 1775843bb75SJerome Forissier if (params[0].value.b) 1785843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 1795843bb75SJerome Forissier 18079f22013SJens Wiklander va = reg_pair_to_64(params[1].value.a, params[1].value.b); 18179f22013SJens Wiklander sz = ROUNDUP(params[0].value.a, SMALL_PAGE_SIZE); 18279f22013SJens Wiklander 183095b07ceSJens Wiklander /* 184095b07ceSJens Wiklander * The vm_get_flags() and vm_unmap() are supposed to detect or 185095b07ceSJens Wiklander * handle overflow directly or indirectly. However, this function 186095b07ceSJens Wiklander * an API function so an extra guard here is in order. If nothing 187095b07ceSJens Wiklander * else to make it easier to review the code. 188095b07ceSJens Wiklander */ 189095b07ceSJens Wiklander if (ADD_OVERFLOW(va, sz, &end_va)) 190095b07ceSJens Wiklander return TEE_ERROR_BAD_PARAMETERS; 191095b07ceSJens Wiklander 1929c34c0c7SBalint Dobszay res = vm_get_flags(uctx, va, sz, &vm_flags); 19379f22013SJens Wiklander if (res) 19479f22013SJens Wiklander return res; 19579f22013SJens Wiklander if (vm_flags & VM_FLAG_PERMANENT) 19679f22013SJens Wiklander return TEE_ERROR_ACCESS_DENIED; 19779f22013SJens Wiklander 1989c34c0c7SBalint Dobszay return vm_unmap(uctx, va, sz); 1995843bb75SJerome Forissier } 2005843bb75SJerome Forissier 2019c34c0c7SBalint Dobszay static TEE_Result system_dlopen(struct user_mode_ctx *uctx, 2029c34c0c7SBalint Dobszay uint32_t param_types, 2035843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 2045843bb75SJerome Forissier { 2055843bb75SJerome Forissier uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 2065843bb75SJerome Forissier TEE_PARAM_TYPE_VALUE_INPUT, 2075843bb75SJerome Forissier TEE_PARAM_TYPE_NONE, 2085843bb75SJerome Forissier TEE_PARAM_TYPE_NONE); 2095843bb75SJerome Forissier TEE_Result res = TEE_ERROR_GENERIC; 21000b3b9a2SJens Wiklander struct ts_session *s = NULL; 2115843bb75SJerome Forissier TEE_UUID *uuid = NULL; 2125843bb75SJerome Forissier uint32_t flags = 0; 2135843bb75SJerome Forissier 2145843bb75SJerome Forissier if (exp_pt != param_types) 2155843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 2165843bb75SJerome Forissier 2175843bb75SJerome Forissier uuid = params[0].memref.buffer; 2185843bb75SJerome Forissier if (!uuid || params[0].memref.size != sizeof(*uuid)) 2195843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 2205843bb75SJerome Forissier 2215843bb75SJerome Forissier flags = params[1].value.a; 2225843bb75SJerome Forissier 22300b3b9a2SJens Wiklander s = ts_pop_current_session(); 224cbe7e1b8SBalint Dobszay res = ldelf_dlopen(uctx, uuid, flags); 22500b3b9a2SJens Wiklander ts_push_current_session(s); 2265843bb75SJerome Forissier 2275843bb75SJerome Forissier return res; 2285843bb75SJerome Forissier } 2295843bb75SJerome Forissier 2309c34c0c7SBalint Dobszay static TEE_Result system_dlsym(struct user_mode_ctx *uctx, uint32_t param_types, 2315843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 2325843bb75SJerome Forissier { 2335843bb75SJerome Forissier uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 2345843bb75SJerome Forissier TEE_PARAM_TYPE_MEMREF_INPUT, 2355843bb75SJerome Forissier TEE_PARAM_TYPE_VALUE_OUTPUT, 2365843bb75SJerome Forissier TEE_PARAM_TYPE_NONE); 2375843bb75SJerome Forissier TEE_Result res = TEE_ERROR_GENERIC; 23800b3b9a2SJens Wiklander struct ts_session *s = NULL; 2395843bb75SJerome Forissier const char *sym = NULL; 2405843bb75SJerome Forissier TEE_UUID *uuid = NULL; 2415843bb75SJerome Forissier size_t maxlen = 0; 2425843bb75SJerome Forissier vaddr_t va = 0; 2435843bb75SJerome Forissier 2445843bb75SJerome Forissier if (exp_pt != param_types) 2455843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 2465843bb75SJerome Forissier 2475843bb75SJerome Forissier uuid = params[0].memref.buffer; 2485843bb75SJerome Forissier if (uuid && params[0].memref.size != sizeof(*uuid)) 2495843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 2505843bb75SJerome Forissier 2515843bb75SJerome Forissier sym = params[1].memref.buffer; 2525843bb75SJerome Forissier if (!sym) 2535843bb75SJerome Forissier return TEE_ERROR_BAD_PARAMETERS; 2545843bb75SJerome Forissier maxlen = params[1].memref.size; 2555843bb75SJerome Forissier 25600b3b9a2SJens Wiklander s = ts_pop_current_session(); 257cbe7e1b8SBalint Dobszay res = ldelf_dlsym(uctx, uuid, sym, maxlen, &va); 25800b3b9a2SJens Wiklander ts_push_current_session(s); 2595843bb75SJerome Forissier 2605843bb75SJerome Forissier if (!res) 2615843bb75SJerome Forissier reg_pair_from_64(va, ¶ms[2].value.a, ¶ms[2].value.b); 2625843bb75SJerome Forissier 2635843bb75SJerome Forissier return res; 2645843bb75SJerome Forissier } 2655843bb75SJerome Forissier 266dd333f03SJavier Almansa Sobrino static TEE_Result system_get_tpm_event_log(uint32_t param_types, 267dd333f03SJavier Almansa Sobrino TEE_Param params[TEE_NUM_PARAMS]) 268dd333f03SJavier Almansa Sobrino { 269dd333f03SJavier Almansa Sobrino uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_OUTPUT, 270dd333f03SJavier Almansa Sobrino TEE_PARAM_TYPE_NONE, 271dd333f03SJavier Almansa Sobrino TEE_PARAM_TYPE_NONE, 272dd333f03SJavier Almansa Sobrino TEE_PARAM_TYPE_NONE); 273dd333f03SJavier Almansa Sobrino size_t size = 0; 274dd333f03SJavier Almansa Sobrino TEE_Result res = TEE_SUCCESS; 275dd333f03SJavier Almansa Sobrino 276dd333f03SJavier Almansa Sobrino if (exp_pt != param_types) 277dd333f03SJavier Almansa Sobrino return TEE_ERROR_BAD_PARAMETERS; 278dd333f03SJavier Almansa Sobrino 279dd333f03SJavier Almansa Sobrino size = params[0].memref.size; 280dd333f03SJavier Almansa Sobrino res = tpm_get_event_log(params[0].memref.buffer, &size); 281dd333f03SJavier Almansa Sobrino params[0].memref.size = size; 282dd333f03SJavier Almansa Sobrino 283dd333f03SJavier Almansa Sobrino return res; 284dd333f03SJavier Almansa Sobrino } 285dd333f03SJavier Almansa Sobrino 2865843bb75SJerome Forissier static TEE_Result open_session(uint32_t param_types __unused, 2875843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS] __unused, 288*baa5161dSBalint Dobszay void **sess_ctx __unused) 2895843bb75SJerome Forissier { 29000b3b9a2SJens Wiklander struct ts_session *s = NULL; 2915843bb75SJerome Forissier 2925843bb75SJerome Forissier /* Check that we're called from a user TA */ 29300b3b9a2SJens Wiklander s = ts_get_calling_session(); 2945843bb75SJerome Forissier if (!s) 2955843bb75SJerome Forissier return TEE_ERROR_ACCESS_DENIED; 2965843bb75SJerome Forissier if (!is_user_ta_ctx(s->ctx)) 2975843bb75SJerome Forissier return TEE_ERROR_ACCESS_DENIED; 2985843bb75SJerome Forissier 2995843bb75SJerome Forissier return TEE_SUCCESS; 3005843bb75SJerome Forissier } 3015843bb75SJerome Forissier 302*baa5161dSBalint Dobszay static TEE_Result invoke_command(void *sess_ctx __unused, uint32_t cmd_id, 3035843bb75SJerome Forissier uint32_t param_types, 3045843bb75SJerome Forissier TEE_Param params[TEE_NUM_PARAMS]) 3055843bb75SJerome Forissier { 30600b3b9a2SJens Wiklander struct ts_session *s = ts_get_calling_session(); 3079c34c0c7SBalint Dobszay struct user_mode_ctx *uctx = to_user_mode_ctx(s->ctx); 3085843bb75SJerome Forissier 3095843bb75SJerome Forissier switch (cmd_id) { 3105843bb75SJerome Forissier case PTA_SYSTEM_ADD_RNG_ENTROPY: 3119c34c0c7SBalint Dobszay return system_rng_reseed(param_types, params); 3125843bb75SJerome Forissier case PTA_SYSTEM_DERIVE_TA_UNIQUE_KEY: 3139c34c0c7SBalint Dobszay return system_derive_ta_unique_key(uctx, param_types, params); 3145843bb75SJerome Forissier case PTA_SYSTEM_MAP_ZI: 3159c34c0c7SBalint Dobszay return system_map_zi(uctx, param_types, params); 3165843bb75SJerome Forissier case PTA_SYSTEM_UNMAP: 3179c34c0c7SBalint Dobszay return system_unmap(uctx, param_types, params); 3185843bb75SJerome Forissier case PTA_SYSTEM_DLOPEN: 3199c34c0c7SBalint Dobszay return system_dlopen(uctx, param_types, params); 3205843bb75SJerome Forissier case PTA_SYSTEM_DLSYM: 3219c34c0c7SBalint Dobszay return system_dlsym(uctx, param_types, params); 322dd333f03SJavier Almansa Sobrino case PTA_SYSTEM_GET_TPM_EVENT_LOG: 323dd333f03SJavier Almansa Sobrino return system_get_tpm_event_log(param_types, params); 3245843bb75SJerome Forissier default: 3255843bb75SJerome Forissier break; 3265843bb75SJerome Forissier } 3275843bb75SJerome Forissier 3285843bb75SJerome Forissier return TEE_ERROR_NOT_IMPLEMENTED; 3295843bb75SJerome Forissier } 3305843bb75SJerome Forissier 3315843bb75SJerome Forissier pseudo_ta_register(.uuid = PTA_SYSTEM_UUID, .name = "system.pta", 3325843bb75SJerome Forissier .flags = PTA_DEFAULT_FLAGS | TA_FLAG_CONCURRENT, 3335843bb75SJerome Forissier .open_session_entry_point = open_session, 3345843bb75SJerome Forissier .invoke_command_entry_point = invoke_command); 335