1  /*
2   * Copyright (c) 2015-2016, Linaro Limited
3   * All rights reserved.
4   *
5   * Redistribution and use in source and binary forms, with or without
6   * modification, are permitted provided that the following conditions are met:
7   *
8   * 1. Redistributions of source code must retain the above copyright notice,
9   * this list of conditions and the following disclaimer.
10   *
11   * 2. Redistributions in binary form must reproduce the above copyright notice,
12   * this list of conditions and the following disclaimer in the documentation
13   * and/or other materials provided with the distribution.
14   *
15   * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
16   * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17   * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18   * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
19   * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20   * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21   * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22   * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23   * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24   * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25   * POSSIBILITY OF SUCH DAMAGE.
26   */
27  
28  #ifndef __TEE_H
29  #define __TEE_H
30  
31  #include <linux/ioctl.h>
32  #include <linux/types.h>
33  
34  /*
35   * This file describes the API provided by a TEE driver to user space.
36   *
37   * Each TEE driver defines a TEE specific protocol which is used for the
38   * data passed back and forth using TEE_IOC_CMD.
39   */
40  
41  /* Helpers to make the ioctl defines */
42  #define TEE_IOC_MAGIC	0xa4
43  #define TEE_IOC_BASE	0
44  
45  #define TEE_MAX_ARG_SIZE	1024
46  
47  #define TEE_GEN_CAP_GP		(1 << 0)/* GlobalPlatform compliant TEE */
48  #define TEE_GEN_CAP_PRIVILEGED	(1 << 1)/* Privileged device (for supplicant) */
49  #define TEE_GEN_CAP_REG_MEM	(1 << 2)/* Supports registering shared memory */
50  #define TEE_GEN_CAP_MEMREF_NULL	(1 << 3)/* NULL MemRef support */
51  
52  #define TEE_MEMREF_NULL		(__u64)(-1) /* NULL MemRef Buffer */
53  
54  /*
55   * TEE Implementation ID
56   */
57  #define TEE_IMPL_ID_OPTEE	1
58  #define TEE_IMPL_ID_AMDTEE	2
59  
60  /*
61   * OP-TEE specific capabilities
62   */
63  #define TEE_OPTEE_CAP_TZ	(1 << 0)
64  
65  /**
66   * struct tee_ioctl_version_data - TEE version
67   * @impl_id:	[out] TEE implementation id
68   * @impl_caps:	[out] Implementation specific capabilities
69   * @gen_caps:	[out] Generic capabilities, defined by TEE_GEN_CAPS_* above
70   *
71   * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above.
72   * @impl_caps is implementation specific, for example TEE_OPTEE_CAP_*
73   * is valid when @impl_id == TEE_IMPL_ID_OPTEE.
74   */
75  struct tee_ioctl_version_data {
76  	__u32 impl_id;
77  	__u32 impl_caps;
78  	__u32 gen_caps;
79  };
80  
81  /**
82   * TEE_IOC_VERSION - query version of TEE
83   *
84   * Takes a tee_ioctl_version_data struct and returns with the TEE version
85   * data filled in.
86   */
87  #define TEE_IOC_VERSION		_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 0, \
88  				     struct tee_ioctl_version_data)
89  
90  /**
91   * struct tee_ioctl_shm_alloc_data - Shared memory allocate argument
92   * @size:	[in/out] Size of shared memory to allocate
93   * @flags:	[in/out] Flags to/from allocation.
94   * @id:		[out] Identifier of the shared memory
95   *
96   * The flags field should currently be zero as input. Updated by the call
97   * with actual flags as defined by TEE_IOCTL_SHM_* above.
98   * This structure is used as argument for TEE_IOC_SHM_ALLOC below.
99   */
100  struct tee_ioctl_shm_alloc_data {
101  	__u64 size;
102  	__u32 flags;
103  	__s32 id;
104  };
105  
106  /**
107   * TEE_IOC_SHM_ALLOC - allocate shared memory
108   *
109   * Allocates shared memory between the user space process and secure OS.
110   *
111   * Returns a file descriptor on success or < 0 on failure
112   *
113   * The returned file descriptor is used to map the shared memory into user
114   * space. The shared memory is freed when the descriptor is closed and the
115   * memory is unmapped.
116   */
117  #define TEE_IOC_SHM_ALLOC	_IOWR(TEE_IOC_MAGIC, TEE_IOC_BASE + 1, \
118  				     struct tee_ioctl_shm_alloc_data)
119  
120  /**
121   * struct tee_ioctl_buf_data - Variable sized buffer
122   * @buf_ptr:	[in] A __user pointer to a buffer
123   * @buf_len:	[in] Length of the buffer above
124   *
125   * Used as argument for TEE_IOC_OPEN_SESSION, TEE_IOC_INVOKE,
126   * TEE_IOC_SUPPL_RECV, and TEE_IOC_SUPPL_SEND below.
127   */
128  struct tee_ioctl_buf_data {
129  	__u64 buf_ptr;
130  	__u64 buf_len;
131  };
132  
133  /*
134   * Attributes for struct tee_ioctl_param, selects field in the union
135   */
136  #define TEE_IOCTL_PARAM_ATTR_TYPE_NONE		0	/* parameter not used */
137  
138  /*
139   * These defines value parameters (struct tee_ioctl_param_value)
140   */
141  #define TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT	1
142  #define TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT	2
143  #define TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT	3	/* input and output */
144  
145  /*
146   * These defines shared memory reference parameters (struct
147   * tee_ioctl_param_memref)
148   */
149  #define TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT	5
150  #define TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT	6
151  #define TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT	7	/* input and output */
152  
153  /*
154   * Mask for the type part of the attribute, leaves room for more types
155   */
156  #define TEE_IOCTL_PARAM_ATTR_TYPE_MASK		0xff
157  
158  /* Meta parameter carrying extra information about the message. */
159  #define TEE_IOCTL_PARAM_ATTR_META		0x100
160  
161  /* Mask of all known attr bits */
162  #define TEE_IOCTL_PARAM_ATTR_MASK \
163  	(TEE_IOCTL_PARAM_ATTR_TYPE_MASK | TEE_IOCTL_PARAM_ATTR_META)
164  
165  /*
166   * Matches TEEC_LOGIN_* in GP TEE Client API
167   * Are only defined for GP compliant TEEs
168   */
169  #define TEE_IOCTL_LOGIN_PUBLIC			0
170  #define TEE_IOCTL_LOGIN_USER			1
171  #define TEE_IOCTL_LOGIN_GROUP			2
172  #define TEE_IOCTL_LOGIN_APPLICATION		4
173  #define TEE_IOCTL_LOGIN_USER_APPLICATION	5
174  #define TEE_IOCTL_LOGIN_GROUP_APPLICATION	6
175  /*
176   * Disallow user-space to use GP implementation specific login
177   * method range (0x80000000 - 0xBFFFFFFF). This range is rather
178   * being reserved for REE kernel clients or TEE implementation.
179   */
180  #define TEE_IOCTL_LOGIN_REE_KERNEL_MIN		0x80000000
181  #define TEE_IOCTL_LOGIN_REE_KERNEL_MAX		0xBFFFFFFF
182  /* Private login method for REE kernel clients */
183  #define TEE_IOCTL_LOGIN_REE_KERNEL		0x80000000
184  
185  /**
186   * struct tee_ioctl_param - parameter
187   * @attr: attributes
188   * @a: if a memref, offset into the shared memory object, else a value parameter
189   * @b: if a memref, size of the buffer, else a value parameter
190   * @c: if a memref, shared memory identifier, else a value parameter
191   *
192   * @attr & TEE_PARAM_ATTR_TYPE_MASK indicates if memref or value is used in
193   * the union. TEE_PARAM_ATTR_TYPE_VALUE_* indicates value and
194   * TEE_PARAM_ATTR_TYPE_MEMREF_* indicates memref. TEE_PARAM_ATTR_TYPE_NONE
195   * indicates that none of the members are used.
196   *
197   * Shared memory is allocated with TEE_IOC_SHM_ALLOC which returns an
198   * identifier representing the shared memory object. A memref can reference
199   * a part of a shared memory by specifying an offset (@a) and size (@b) of
200   * the object. To supply the entire shared memory object set the offset
201   * (@a) to 0 and size (@b) to the previously returned size of the object.
202   *
203   * A client may need to present a NULL pointer in the argument
204   * passed to a trusted application in the TEE.
205   * This is also a requirement in GlobalPlatform Client API v1.0c
206   * (section 3.2.5 memory references), which can be found at
207   * http://www.globalplatform.org/specificationsdevice.asp
208   *
209   * If a NULL pointer is passed to a TA in the TEE, the (@c)
210   * IOCTL parameters value must be set to TEE_MEMREF_NULL indicating a NULL
211   * memory reference.
212   */
213  struct tee_ioctl_param {
214  	__u64 attr;
215  	__u64 a;
216  	__u64 b;
217  	__u64 c;
218  };
219  
220  #define TEE_IOCTL_UUID_LEN		16
221  
222  /**
223   * struct tee_ioctl_open_session_arg - Open session argument
224   * @uuid:	[in] UUID of the Trusted Application
225   * @clnt_uuid:	[in] UUID of client
226   * @clnt_login:	[in] Login class of client, TEE_IOCTL_LOGIN_* above
227   * @cancel_id:	[in] Cancellation id, a unique value to identify this request
228   * @session:	[out] Session id
229   * @ret:	[out] return value
230   * @ret_origin	[out] origin of the return value
231   * @num_params	[in] number of parameters following this struct
232   */
233  struct tee_ioctl_open_session_arg {
234  	__u8 uuid[TEE_IOCTL_UUID_LEN];
235  	__u8 clnt_uuid[TEE_IOCTL_UUID_LEN];
236  	__u32 clnt_login;
237  	__u32 cancel_id;
238  	__u32 session;
239  	__u32 ret;
240  	__u32 ret_origin;
241  	__u32 num_params;
242  	/* num_params tells the actual number of element in params */
243  	struct tee_ioctl_param params[];
244  };
245  
246  /**
247   * TEE_IOC_OPEN_SESSION - opens a session to a Trusted Application
248   *
249   * Takes a struct tee_ioctl_buf_data which contains a struct
250   * tee_ioctl_open_session_arg followed by any array of struct
251   * tee_ioctl_param
252   */
253  #define TEE_IOC_OPEN_SESSION	_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 2, \
254  				     struct tee_ioctl_buf_data)
255  
256  /**
257   * struct tee_ioctl_invoke_func_arg - Invokes a function in a Trusted
258   * Application
259   * @func:	[in] Trusted Application function, specific to the TA
260   * @session:	[in] Session id
261   * @cancel_id:	[in] Cancellation id, a unique value to identify this request
262   * @ret:	[out] return value
263   * @ret_origin	[out] origin of the return value
264   * @num_params	[in] number of parameters following this struct
265   */
266  struct tee_ioctl_invoke_arg {
267  	__u32 func;
268  	__u32 session;
269  	__u32 cancel_id;
270  	__u32 ret;
271  	__u32 ret_origin;
272  	__u32 num_params;
273  	/* num_params tells the actual number of element in params */
274  	struct tee_ioctl_param params[];
275  };
276  
277  /**
278   * TEE_IOC_INVOKE - Invokes a function in a Trusted Application
279   *
280   * Takes a struct tee_ioctl_buf_data which contains a struct
281   * tee_invoke_func_arg followed by any array of struct tee_param
282   */
283  #define TEE_IOC_INVOKE		_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 3, \
284  				     struct tee_ioctl_buf_data)
285  
286  /**
287   * struct tee_ioctl_cancel_arg - Cancels an open session or invoke ioctl
288   * @cancel_id:	[in] Cancellation id, a unique value to identify this request
289   * @session:	[in] Session id, if the session is opened, else set to 0
290   */
291  struct tee_ioctl_cancel_arg {
292  	__u32 cancel_id;
293  	__u32 session;
294  };
295  
296  /**
297   * TEE_IOC_CANCEL - Cancels an open session or invoke
298   */
299  #define TEE_IOC_CANCEL		_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 4, \
300  				     struct tee_ioctl_cancel_arg)
301  
302  /**
303   * struct tee_ioctl_close_session_arg - Closes an open session
304   * @session:	[in] Session id
305   */
306  struct tee_ioctl_close_session_arg {
307  	__u32 session;
308  };
309  
310  /**
311   * TEE_IOC_CLOSE_SESSION - Closes a session
312   */
313  #define TEE_IOC_CLOSE_SESSION	_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 5, \
314  				     struct tee_ioctl_close_session_arg)
315  
316  /**
317   * struct tee_iocl_supp_recv_arg - Receive a request for a supplicant function
318   * @func:	[in] supplicant function
319   * @num_params	[in/out] number of parameters following this struct
320   *
321   * @num_params is the number of params that tee-supplicant has room to
322   * receive when input, @num_params is the number of actual params
323   * tee-supplicant receives when output.
324   */
325  struct tee_iocl_supp_recv_arg {
326  	__u32 func;
327  	__u32 num_params;
328  	/* num_params tells the actual number of element in params */
329  	struct tee_ioctl_param params[];
330  };
331  
332  /**
333   * TEE_IOC_SUPPL_RECV - Receive a request for a supplicant function
334   *
335   * Takes a struct tee_ioctl_buf_data which contains a struct
336   * tee_iocl_supp_recv_arg followed by any array of struct tee_param
337   */
338  #define TEE_IOC_SUPPL_RECV	_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 6, \
339  				     struct tee_ioctl_buf_data)
340  
341  /**
342   * struct tee_iocl_supp_send_arg - Send a response to a received request
343   * @ret:	[out] return value
344   * @num_params	[in] number of parameters following this struct
345   */
346  struct tee_iocl_supp_send_arg {
347  	__u32 ret;
348  	__u32 num_params;
349  	/* num_params tells the actual number of element in params */
350  	struct tee_ioctl_param params[];
351  };
352  
353  /**
354   * TEE_IOC_SUPPL_SEND - Send a response to a received request
355   *
356   * Takes a struct tee_ioctl_buf_data which contains a struct
357   * tee_iocl_supp_send_arg followed by any array of struct tee_param
358   */
359  #define TEE_IOC_SUPPL_SEND	_IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 7, \
360  				     struct tee_ioctl_buf_data)
361  
362  /**
363   * struct tee_ioctl_shm_register_data - Shared memory register argument
364   * @addr:      [in] Start address of shared memory to register
365   * @length:    [in/out] Length of shared memory to register
366   * @flags:     [in/out] Flags to/from registration.
367   * @id:                [out] Identifier of the shared memory
368   *
369   * The flags field should currently be zero as input. Updated by the call
370   * with actual flags as defined by TEE_IOCTL_SHM_* above.
371   * This structure is used as argument for TEE_IOC_SHM_REGISTER below.
372   */
373  struct tee_ioctl_shm_register_data {
374  	__u64 addr;
375  	__u64 length;
376  	__u32 flags;
377  	__s32 id;
378  };
379  
380  /**
381   * TEE_IOC_SHM_REGISTER - Register shared memory argument
382   *
383   * Registers shared memory between the user space process and secure OS.
384   *
385   * Returns a file descriptor on success or < 0 on failure
386   *
387   * The shared memory is unregisterred when the descriptor is closed.
388   */
389  #define TEE_IOC_SHM_REGISTER   _IOWR(TEE_IOC_MAGIC, TEE_IOC_BASE + 9, \
390  				     struct tee_ioctl_shm_register_data)
391  /*
392   * Five syscalls are used when communicating with the TEE driver.
393   * open(): opens the device associated with the driver
394   * ioctl(): as described above operating on the file descriptor from open()
395   * close(): two cases
396   *   - closes the device file descriptor
397   *   - closes a file descriptor connected to allocated shared memory
398   * mmap(): maps shared memory into user space using information from struct
399   *	   tee_ioctl_shm_alloc_data
400   * munmap(): unmaps previously shared memory
401   */
402  
403  #endif /*__TEE_H*/
404