u-boot/cmd/optee_rpmb.c
Tom Rini 03de305ec4 Restore patch series "arm: dts: am62-beagleplay: Fix Beagleplay Ethernet"
As part of bringing the master branch back in to next, we need to allow
for all of these changes to exist here.

Reported-by: Jonas Karlman <jonas@kwiboo.se>
Signed-off-by: Tom Rini <trini@konsulko.com>
2024-05-20 13:35:03 -06:00

283 lines
5.7 KiB
C

// SPDX-License-Identifier: GPL-2.0+
/*
* Copyright 2020 NXP
*/
#include <command.h>
#include <env.h>
#include <errno.h>
#include <image.h>
#include <malloc.h>
#include <mmc.h>
#include <tee.h>
#include <tee/optee_ta_avb.h>
static struct udevice *tee;
static u32 session;
static int avb_ta_open_session(void)
{
const struct tee_optee_ta_uuid uuid = TA_AVB_UUID;
struct tee_open_session_arg arg;
int rc;
tee = tee_find_device(tee, NULL, NULL, NULL);
if (!tee)
return -ENODEV;
memset(&arg, 0, sizeof(arg));
tee_optee_ta_uuid_to_octets(arg.uuid, &uuid);
rc = tee_open_session(tee, &arg, 0, NULL);
if (!rc)
session = arg.session;
return 0;
}
static int invoke_func(u32 func, ulong num_param, struct tee_param *param)
{
struct tee_invoke_arg arg;
if (!tee)
if (avb_ta_open_session())
return -ENODEV;
memset(&arg, 0, sizeof(arg));
arg.func = func;
arg.session = session;
if (tee_invoke_func(tee, &arg, num_param, param))
return -EFAULT;
switch (arg.ret) {
case TEE_SUCCESS:
return 0;
case TEE_ERROR_OUT_OF_MEMORY:
case TEE_ERROR_STORAGE_NO_SPACE:
return -ENOSPC;
case TEE_ERROR_ITEM_NOT_FOUND:
return -EIO;
case TEE_ERROR_TARGET_DEAD:
/*
* The TA has paniced, close the session to reload the TA
* for the next request.
*/
tee_close_session(tee, session);
tee = NULL;
return -EIO;
default:
return -EIO;
}
}
static int read_persistent_value(const char *name,
size_t buffer_size,
u8 *out_buffer,
size_t *out_num_bytes_read)
{
int rc = 0;
struct tee_shm *shm_name;
struct tee_shm *shm_buf;
struct tee_param param[2];
size_t name_size = strlen(name) + 1;
if (!tee)
if (avb_ta_open_session())
return -ENODEV;
rc = tee_shm_alloc(tee, name_size,
TEE_SHM_ALLOC, &shm_name);
if (rc) {
rc = -ENOMEM;
goto close_session;
}
rc = tee_shm_alloc(tee, buffer_size,
TEE_SHM_ALLOC, &shm_buf);
if (rc) {
rc = -ENOMEM;
goto free_name;
}
memcpy(shm_name->addr, name, name_size);
memset(param, 0, sizeof(param));
param[0].attr = TEE_PARAM_ATTR_TYPE_MEMREF_INPUT;
param[0].u.memref.shm = shm_name;
param[0].u.memref.size = name_size;
param[1].attr = TEE_PARAM_ATTR_TYPE_MEMREF_INOUT;
param[1].u.memref.shm = shm_buf;
param[1].u.memref.size = buffer_size;
rc = invoke_func(TA_AVB_CMD_READ_PERSIST_VALUE,
2, param);
if (rc)
goto out;
if (param[1].u.memref.size > buffer_size) {
rc = -EINVAL;
goto out;
}
*out_num_bytes_read = param[1].u.memref.size;
memcpy(out_buffer, shm_buf->addr, *out_num_bytes_read);
out:
tee_shm_free(shm_buf);
free_name:
tee_shm_free(shm_name);
close_session:
tee_close_session(tee, session);
tee = NULL;
return rc;
}
static int write_persistent_value(const char *name,
size_t value_size,
const u8 *value)
{
int rc = 0;
struct tee_shm *shm_name;
struct tee_shm *shm_buf;
struct tee_param param[2];
size_t name_size = strlen(name) + 1;
if (!value_size)
return -EINVAL;
if (!tee) {
if (avb_ta_open_session())
return -ENODEV;
}
rc = tee_shm_alloc(tee, name_size,
TEE_SHM_ALLOC, &shm_name);
if (rc) {
rc = -ENOMEM;
goto close_session;
}
rc = tee_shm_alloc(tee, value_size,
TEE_SHM_ALLOC, &shm_buf);
if (rc) {
rc = -ENOMEM;
goto free_name;
}
memcpy(shm_name->addr, name, name_size);
memcpy(shm_buf->addr, value, value_size);
memset(param, 0, sizeof(param));
param[0].attr = TEE_PARAM_ATTR_TYPE_MEMREF_INPUT;
param[0].u.memref.shm = shm_name;
param[0].u.memref.size = name_size;
param[1].attr = TEE_PARAM_ATTR_TYPE_MEMREF_INPUT;
param[1].u.memref.shm = shm_buf;
param[1].u.memref.size = value_size;
rc = invoke_func(TA_AVB_CMD_WRITE_PERSIST_VALUE,
2, param);
if (rc)
goto out;
out:
tee_shm_free(shm_buf);
free_name:
tee_shm_free(shm_name);
close_session:
tee_close_session(tee, session);
tee = NULL;
return rc;
}
int do_optee_rpmb_read(struct cmd_tbl *cmdtp, int flag, int argc,
char * const argv[])
{
const char *name;
size_t bytes;
size_t bytes_read;
void *buffer;
char *endp;
if (argc != 3)
return CMD_RET_USAGE;
name = argv[1];
bytes = dectoul(argv[2], &endp);
if (*endp && *endp != '\n')
return CMD_RET_USAGE;
buffer = malloc(bytes);
if (!buffer)
return CMD_RET_FAILURE;
if (read_persistent_value(name, bytes, buffer, &bytes_read) == 0) {
printf("Read %zu bytes, value = %s\n", bytes_read,
(char *)buffer);
free(buffer);
return CMD_RET_SUCCESS;
}
printf("Failed to read persistent value\n");
free(buffer);
return CMD_RET_FAILURE;
}
int do_optee_rpmb_write(struct cmd_tbl *cmdtp, int flag, int argc,
char * const argv[])
{
const char *name;
const char *value;
if (argc != 3)
return CMD_RET_USAGE;
name = argv[1];
value = argv[2];
if (write_persistent_value(name, strlen(value) + 1,
(const uint8_t *)value) == 0) {
printf("Wrote %zu bytes\n", strlen(value) + 1);
return CMD_RET_SUCCESS;
}
printf("Failed to write persistent value\n");
return CMD_RET_FAILURE;
}
static struct cmd_tbl cmd_optee_rpmb[] = {
U_BOOT_CMD_MKENT(read_pvalue, 3, 0, do_optee_rpmb_read, "", ""),
U_BOOT_CMD_MKENT(write_pvalue, 3, 0, do_optee_rpmb_write, "", ""),
};
static int do_optee_rpmb(struct cmd_tbl *cmdtp, int flag, int argc,
char * const argv[])
{
struct cmd_tbl *cp;
cp = find_cmd_tbl(argv[1], cmd_optee_rpmb, ARRAY_SIZE(cmd_optee_rpmb));
argc--;
argv++;
if (!cp || argc > cp->maxargs)
return CMD_RET_USAGE;
if (flag == CMD_FLAG_REPEAT)
return CMD_RET_FAILURE;
return cp->cmd(cmdtp, flag, argc, argv);
}
U_BOOT_CMD (
optee_rpmb, 29, 0, do_optee_rpmb,
"Provides commands for testing secure storage on RPMB on OPTEE",
"read_pvalue <name> <bytes> - read a persistent value <name>\n"
"optee_rpmb write_pvalue <name> <value> - write a persistent value <name>\n"
);