tee.h (13412B)
1/* 2 * Copyright (c) 2015-2016, Linaro Limited 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright notice, 9 * this list of conditions and the following disclaimer. 10 * 11 * 2. Redistributions in binary form must reproduce the above copyright notice, 12 * this list of conditions and the following disclaimer in the documentation 13 * and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 16 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 19 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 20 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 21 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 22 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 23 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 24 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 25 * POSSIBILITY OF SUCH DAMAGE. 26 */ 27 28#ifndef __TEE_H 29#define __TEE_H 30 31#include <linux/ioctl.h> 32#include <linux/types.h> 33 34/* 35 * This file describes the API provided by a TEE driver to user space. 36 * 37 * Each TEE driver defines a TEE specific protocol which is used for the 38 * data passed back and forth using TEE_IOC_CMD. 39 */ 40 41/* Helpers to make the ioctl defines */ 42#define TEE_IOC_MAGIC 0xa4 43#define TEE_IOC_BASE 0 44 45#define TEE_MAX_ARG_SIZE 1024 46 47#define TEE_GEN_CAP_GP (1 << 0)/* GlobalPlatform compliant TEE */ 48#define TEE_GEN_CAP_PRIVILEGED (1 << 1)/* Privileged device (for supplicant) */ 49#define TEE_GEN_CAP_REG_MEM (1 << 2)/* Supports registering shared memory */ 50#define TEE_GEN_CAP_MEMREF_NULL (1 << 3)/* NULL MemRef support */ 51 52#define TEE_MEMREF_NULL (__u64)(-1) /* NULL MemRef Buffer */ 53 54/* 55 * TEE Implementation ID 56 */ 57#define TEE_IMPL_ID_OPTEE 1 58#define TEE_IMPL_ID_AMDTEE 2 59 60/* 61 * OP-TEE specific capabilities 62 */ 63#define TEE_OPTEE_CAP_TZ (1 << 0) 64 65/** 66 * struct tee_ioctl_version_data - TEE version 67 * @impl_id: [out] TEE implementation id 68 * @impl_caps: [out] Implementation specific capabilities 69 * @gen_caps: [out] Generic capabilities, defined by TEE_GEN_CAPS_* above 70 * 71 * Identifies the TEE implementation, @impl_id is one of TEE_IMPL_ID_* above. 72 * @impl_caps is implementation specific, for example TEE_OPTEE_CAP_* 73 * is valid when @impl_id == TEE_IMPL_ID_OPTEE. 74 */ 75struct tee_ioctl_version_data { 76 __u32 impl_id; 77 __u32 impl_caps; 78 __u32 gen_caps; 79}; 80 81/** 82 * TEE_IOC_VERSION - query version of TEE 83 * 84 * Takes a tee_ioctl_version_data struct and returns with the TEE version 85 * data filled in. 86 */ 87#define TEE_IOC_VERSION _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 0, \ 88 struct tee_ioctl_version_data) 89 90/** 91 * struct tee_ioctl_shm_alloc_data - Shared memory allocate argument 92 * @size: [in/out] Size of shared memory to allocate 93 * @flags: [in/out] Flags to/from allocation. 94 * @id: [out] Identifier of the shared memory 95 * 96 * The flags field should currently be zero as input. Updated by the call 97 * with actual flags as defined by TEE_IOCTL_SHM_* above. 98 * This structure is used as argument for TEE_IOC_SHM_ALLOC below. 99 */ 100struct tee_ioctl_shm_alloc_data { 101 __u64 size; 102 __u32 flags; 103 __s32 id; 104}; 105 106/** 107 * TEE_IOC_SHM_ALLOC - allocate shared memory 108 * 109 * Allocates shared memory between the user space process and secure OS. 110 * 111 * Returns a file descriptor on success or < 0 on failure 112 * 113 * The returned file descriptor is used to map the shared memory into user 114 * space. The shared memory is freed when the descriptor is closed and the 115 * memory is unmapped. 116 */ 117#define TEE_IOC_SHM_ALLOC _IOWR(TEE_IOC_MAGIC, TEE_IOC_BASE + 1, \ 118 struct tee_ioctl_shm_alloc_data) 119 120/** 121 * struct tee_ioctl_buf_data - Variable sized buffer 122 * @buf_ptr: [in] A __user pointer to a buffer 123 * @buf_len: [in] Length of the buffer above 124 * 125 * Used as argument for TEE_IOC_OPEN_SESSION, TEE_IOC_INVOKE, 126 * TEE_IOC_SUPPL_RECV, and TEE_IOC_SUPPL_SEND below. 127 */ 128struct tee_ioctl_buf_data { 129 __u64 buf_ptr; 130 __u64 buf_len; 131}; 132 133/* 134 * Attributes for struct tee_ioctl_param, selects field in the union 135 */ 136#define TEE_IOCTL_PARAM_ATTR_TYPE_NONE 0 /* parameter not used */ 137 138/* 139 * These defines value parameters (struct tee_ioctl_param_value) 140 */ 141#define TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INPUT 1 142#define TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_OUTPUT 2 143#define TEE_IOCTL_PARAM_ATTR_TYPE_VALUE_INOUT 3 /* input and output */ 144 145/* 146 * These defines shared memory reference parameters (struct 147 * tee_ioctl_param_memref) 148 */ 149#define TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT 5 150#define TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT 6 151#define TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INOUT 7 /* input and output */ 152 153/* 154 * Mask for the type part of the attribute, leaves room for more types 155 */ 156#define TEE_IOCTL_PARAM_ATTR_TYPE_MASK 0xff 157 158/* Meta parameter carrying extra information about the message. */ 159#define TEE_IOCTL_PARAM_ATTR_META 0x100 160 161/* Mask of all known attr bits */ 162#define TEE_IOCTL_PARAM_ATTR_MASK \ 163 (TEE_IOCTL_PARAM_ATTR_TYPE_MASK | TEE_IOCTL_PARAM_ATTR_META) 164 165/* 166 * Matches TEEC_LOGIN_* in GP TEE Client API 167 * Are only defined for GP compliant TEEs 168 */ 169#define TEE_IOCTL_LOGIN_PUBLIC 0 170#define TEE_IOCTL_LOGIN_USER 1 171#define TEE_IOCTL_LOGIN_GROUP 2 172#define TEE_IOCTL_LOGIN_APPLICATION 4 173#define TEE_IOCTL_LOGIN_USER_APPLICATION 5 174#define TEE_IOCTL_LOGIN_GROUP_APPLICATION 6 175/* 176 * Disallow user-space to use GP implementation specific login 177 * method range (0x80000000 - 0xBFFFFFFF). This range is rather 178 * being reserved for REE kernel clients or TEE implementation. 179 */ 180#define TEE_IOCTL_LOGIN_REE_KERNEL_MIN 0x80000000 181#define TEE_IOCTL_LOGIN_REE_KERNEL_MAX 0xBFFFFFFF 182/* Private login method for REE kernel clients */ 183#define TEE_IOCTL_LOGIN_REE_KERNEL 0x80000000 184 185/** 186 * struct tee_ioctl_param - parameter 187 * @attr: attributes 188 * @a: if a memref, offset into the shared memory object, else a value parameter 189 * @b: if a memref, size of the buffer, else a value parameter 190 * @c: if a memref, shared memory identifier, else a value parameter 191 * 192 * @attr & TEE_PARAM_ATTR_TYPE_MASK indicates if memref or value is used in 193 * the union. TEE_PARAM_ATTR_TYPE_VALUE_* indicates value and 194 * TEE_PARAM_ATTR_TYPE_MEMREF_* indicates memref. TEE_PARAM_ATTR_TYPE_NONE 195 * indicates that none of the members are used. 196 * 197 * Shared memory is allocated with TEE_IOC_SHM_ALLOC which returns an 198 * identifier representing the shared memory object. A memref can reference 199 * a part of a shared memory by specifying an offset (@a) and size (@b) of 200 * the object. To supply the entire shared memory object set the offset 201 * (@a) to 0 and size (@b) to the previously returned size of the object. 202 * 203 * A client may need to present a NULL pointer in the argument 204 * passed to a trusted application in the TEE. 205 * This is also a requirement in GlobalPlatform Client API v1.0c 206 * (section 3.2.5 memory references), which can be found at 207 * http://www.globalplatform.org/specificationsdevice.asp 208 * 209 * If a NULL pointer is passed to a TA in the TEE, the (@c) 210 * IOCTL parameters value must be set to TEE_MEMREF_NULL indicating a NULL 211 * memory reference. 212 */ 213struct tee_ioctl_param { 214 __u64 attr; 215 __u64 a; 216 __u64 b; 217 __u64 c; 218}; 219 220#define TEE_IOCTL_UUID_LEN 16 221 222/** 223 * struct tee_ioctl_open_session_arg - Open session argument 224 * @uuid: [in] UUID of the Trusted Application 225 * @clnt_uuid: [in] UUID of client 226 * @clnt_login: [in] Login class of client, TEE_IOCTL_LOGIN_* above 227 * @cancel_id: [in] Cancellation id, a unique value to identify this request 228 * @session: [out] Session id 229 * @ret: [out] return value 230 * @ret_origin [out] origin of the return value 231 * @num_params [in] number of parameters following this struct 232 */ 233struct tee_ioctl_open_session_arg { 234 __u8 uuid[TEE_IOCTL_UUID_LEN]; 235 __u8 clnt_uuid[TEE_IOCTL_UUID_LEN]; 236 __u32 clnt_login; 237 __u32 cancel_id; 238 __u32 session; 239 __u32 ret; 240 __u32 ret_origin; 241 __u32 num_params; 242 /* num_params tells the actual number of element in params */ 243 struct tee_ioctl_param params[]; 244}; 245 246/** 247 * TEE_IOC_OPEN_SESSION - opens a session to a Trusted Application 248 * 249 * Takes a struct tee_ioctl_buf_data which contains a struct 250 * tee_ioctl_open_session_arg followed by any array of struct 251 * tee_ioctl_param 252 */ 253#define TEE_IOC_OPEN_SESSION _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 2, \ 254 struct tee_ioctl_buf_data) 255 256/** 257 * struct tee_ioctl_invoke_func_arg - Invokes a function in a Trusted 258 * Application 259 * @func: [in] Trusted Application function, specific to the TA 260 * @session: [in] Session id 261 * @cancel_id: [in] Cancellation id, a unique value to identify this request 262 * @ret: [out] return value 263 * @ret_origin [out] origin of the return value 264 * @num_params [in] number of parameters following this struct 265 */ 266struct tee_ioctl_invoke_arg { 267 __u32 func; 268 __u32 session; 269 __u32 cancel_id; 270 __u32 ret; 271 __u32 ret_origin; 272 __u32 num_params; 273 /* num_params tells the actual number of element in params */ 274 struct tee_ioctl_param params[]; 275}; 276 277/** 278 * TEE_IOC_INVOKE - Invokes a function in a Trusted Application 279 * 280 * Takes a struct tee_ioctl_buf_data which contains a struct 281 * tee_invoke_func_arg followed by any array of struct tee_param 282 */ 283#define TEE_IOC_INVOKE _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 3, \ 284 struct tee_ioctl_buf_data) 285 286/** 287 * struct tee_ioctl_cancel_arg - Cancels an open session or invoke ioctl 288 * @cancel_id: [in] Cancellation id, a unique value to identify this request 289 * @session: [in] Session id, if the session is opened, else set to 0 290 */ 291struct tee_ioctl_cancel_arg { 292 __u32 cancel_id; 293 __u32 session; 294}; 295 296/** 297 * TEE_IOC_CANCEL - Cancels an open session or invoke 298 */ 299#define TEE_IOC_CANCEL _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 4, \ 300 struct tee_ioctl_cancel_arg) 301 302/** 303 * struct tee_ioctl_close_session_arg - Closes an open session 304 * @session: [in] Session id 305 */ 306struct tee_ioctl_close_session_arg { 307 __u32 session; 308}; 309 310/** 311 * TEE_IOC_CLOSE_SESSION - Closes a session 312 */ 313#define TEE_IOC_CLOSE_SESSION _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 5, \ 314 struct tee_ioctl_close_session_arg) 315 316/** 317 * struct tee_iocl_supp_recv_arg - Receive a request for a supplicant function 318 * @func: [in] supplicant function 319 * @num_params [in/out] number of parameters following this struct 320 * 321 * @num_params is the number of params that tee-supplicant has room to 322 * receive when input, @num_params is the number of actual params 323 * tee-supplicant receives when output. 324 */ 325struct tee_iocl_supp_recv_arg { 326 __u32 func; 327 __u32 num_params; 328 /* num_params tells the actual number of element in params */ 329 struct tee_ioctl_param params[]; 330}; 331 332/** 333 * TEE_IOC_SUPPL_RECV - Receive a request for a supplicant function 334 * 335 * Takes a struct tee_ioctl_buf_data which contains a struct 336 * tee_iocl_supp_recv_arg followed by any array of struct tee_param 337 */ 338#define TEE_IOC_SUPPL_RECV _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 6, \ 339 struct tee_ioctl_buf_data) 340 341/** 342 * struct tee_iocl_supp_send_arg - Send a response to a received request 343 * @ret: [out] return value 344 * @num_params [in] number of parameters following this struct 345 */ 346struct tee_iocl_supp_send_arg { 347 __u32 ret; 348 __u32 num_params; 349 /* num_params tells the actual number of element in params */ 350 struct tee_ioctl_param params[]; 351}; 352 353/** 354 * TEE_IOC_SUPPL_SEND - Send a response to a received request 355 * 356 * Takes a struct tee_ioctl_buf_data which contains a struct 357 * tee_iocl_supp_send_arg followed by any array of struct tee_param 358 */ 359#define TEE_IOC_SUPPL_SEND _IOR(TEE_IOC_MAGIC, TEE_IOC_BASE + 7, \ 360 struct tee_ioctl_buf_data) 361 362/** 363 * struct tee_ioctl_shm_register_data - Shared memory register argument 364 * @addr: [in] Start address of shared memory to register 365 * @length: [in/out] Length of shared memory to register 366 * @flags: [in/out] Flags to/from registration. 367 * @id: [out] Identifier of the shared memory 368 * 369 * The flags field should currently be zero as input. Updated by the call 370 * with actual flags as defined by TEE_IOCTL_SHM_* above. 371 * This structure is used as argument for TEE_IOC_SHM_REGISTER below. 372 */ 373struct tee_ioctl_shm_register_data { 374 __u64 addr; 375 __u64 length; 376 __u32 flags; 377 __s32 id; 378}; 379 380/** 381 * TEE_IOC_SHM_REGISTER - Register shared memory argument 382 * 383 * Registers shared memory between the user space process and secure OS. 384 * 385 * Returns a file descriptor on success or < 0 on failure 386 * 387 * The shared memory is unregisterred when the descriptor is closed. 388 */ 389#define TEE_IOC_SHM_REGISTER _IOWR(TEE_IOC_MAGIC, TEE_IOC_BASE + 9, \ 390 struct tee_ioctl_shm_register_data) 391/* 392 * Five syscalls are used when communicating with the TEE driver. 393 * open(): opens the device associated with the driver 394 * ioctl(): as described above operating on the file descriptor from open() 395 * close(): two cases 396 * - closes the device file descriptor 397 * - closes a file descriptor connected to allocated shared memory 398 * mmap(): maps shared memory into user space using information from struct 399 * tee_ioctl_shm_alloc_data 400 * munmap(): unmaps previously shared memory 401 */ 402 403#endif /*__TEE_H*/