Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp2014546lqb; Mon, 27 May 2024 05:20:51 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXWfPMyq2pk8aVT8QaBpn8zxCsSlsdTqbouV4uQ0Z1Ta7hdfGYYp1grO2yqSVYagDI7fHTQcViafm5TEmRRDLxdpbU0Hp+b1mshJXbnMw== X-Google-Smtp-Source: AGHT+IFzxquj6R27lQlMVqRlsNrS842yfzkG8Tq+w7Dusl+PJ5ty0SmZ2TQkrO+iNBuO+0cii95X X-Received: by 2002:a17:90a:f2c1:b0:2bf:8824:d0a5 with SMTP id 98e67ed59e1d1-2bf8824f30amr7978931a91.6.1716812451692; Mon, 27 May 2024 05:20:51 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716812451; cv=pass; d=google.com; s=arc-20160816; b=0Voct2MhL4l5UDXLxiUWbwI7nnDiAgRux3DcwIyUloRgXXKbai3gvtqJKqmKUBa0Us f26w3InEiQPriCS0/wHLLIB/2yRfvLEOzkFGhYuB4QYFroIIbgH5qfeaML/lstYe3FsR 1uqKF7doYrCGLRniKuxPWxR2qMG4RTMuFdJvjnpKEOcXYJ3Pg/aP1ZQEkZ0K+qKqAEb+ MP2BrfQ0Bpr7O2786ltGGxCKtJbPZCNonDeSCLwTTd0Tte3jNJhOqySLxyVIEUtH8iVU LpPEQva4dRIPoVgVK0XU1eQp31+ujmUtIcqji1zbDCfzZfL0BiVi0pFKiSZvXDsth+yj MMMQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=lwzLqzyjdxC6O475cVXSLXVvtX9GC0h/UvWCIMp5xzM=; fh=oEGiiSgRoRKUFZ1Y9jGcbPm2dYLfOsOco77FB0Xd3L8=; b=pUQO5bjAIqzUsHG00C2sNvQorgdvLk5DPT8+NJZ3JCCNxTD8a3kmxPnHXqzhfpyLET I+NW8RQ+UXy1vE/0XYGAqK2zIS8rprbXhvoYlezbxG1dZv2PXJ3L0py/m2If8TxHQhve P9KQjHeXYu0mZJUQbFM4EXbLM4uO2hXjnNoL7pKetXeWHyvtCaS7xxWZm4k/cAjnoo9d JhhEAWu2/5KEiADkda798rM3iC3+7z/z2bu0sOqHV2VyHMP3Teoz+YqqUoBX0Ffe6iul osGAREV7xxbBabS0BGBQGRhE1rY47v7hH/cgercwbvNqSwGOd96CCRZwavLSCbo2+BDx gI5g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=YxtTi8Tn; arc=pass (i=1 spf=pass spfdomain=linaro.org dkim=pass dkdomain=linaro.org dmarc=pass fromdomain=linaro.org); spf=pass (google.com: domain of linux-kernel+bounces-190546-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-190546-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id 98e67ed59e1d1-2bde0868876si4612903a91.0.2024.05.27.05.20.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 May 2024 05:20:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-190546-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=YxtTi8Tn; arc=pass (i=1 spf=pass spfdomain=linaro.org dkim=pass dkdomain=linaro.org dmarc=pass fromdomain=linaro.org); spf=pass (google.com: domain of linux-kernel+bounces-190546-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-190546-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 43B18B23B67 for ; Mon, 27 May 2024 12:15:05 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 10AD715E5A4; Mon, 27 May 2024 12:14:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="YxtTi8Tn" Received: from mail-ej1-f67.google.com (mail-ej1-f67.google.com [209.85.218.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CF85C15DBC7 for ; Mon, 27 May 2024 12:14:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.218.67 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716812075; cv=none; b=VQav9GfxvYfLKINulg6Fj0/m6ylA7rGmlZ3QMljIxMeJj1ciNkU6Pb5vPllo2LcBu7ccCRYIWp0Xl5529cfE6eb+t+1FYkWFQUsLQmfVfN3fwjjG9rXtSbssUbMHU1iEf5fdDApCb4mXZEPpspennneKEWz5gdRzXIOms0WvRsE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716812075; c=relaxed/simple; bh=3BIdX3EdAPuVTft31wCYTBWCiJrQdkcS6E6jn6Egyfg=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version:Content-Type; b=mXbV7hGxPogDPkwvKHygVe1BEV3STVpfWaHf86ksFtIx8u/Uxb7x7OGLzoCm/boPC1P/PHpwbNRymDYOY4ivXWpDywsHPdgB2lpyNVLskw3Joagtmwy3c7P9wiBx55LJ+zUCTwRptXMaemnMiDGWyIHm8acx4zKqynwFze5aZdo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org; spf=pass smtp.mailfrom=linaro.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b=YxtTi8Tn; arc=none smtp.client-ip=209.85.218.67 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linaro.org Received: by mail-ej1-f67.google.com with SMTP id a640c23a62f3a-a62ef52e837so111090666b.3 for ; Mon, 27 May 2024 05:14:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1716812072; x=1717416872; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=lwzLqzyjdxC6O475cVXSLXVvtX9GC0h/UvWCIMp5xzM=; b=YxtTi8TnE+Mkn48uzSyrZhbKpvEMme5DAC9WQHW2kxmTe5YZFhnW0iGTp06nCrVNgO 5RG7jdWH5Z3OJG+hFr0g3FFxgEVXbqNYB5nZmltl8ADDRVMm3CqjFh2k8YWjgHJT7wvW L5O7gpism/a+Fjrd1pOddMxPR9ewC7jMGMazCunIFHBg4NhianfcPX1oMXKtBC3TBZqF GKvg5TfxQ29W5i3Rrgcgd1FbzNkIvKBPrF+Qt11bz/8GqxmmGgmfRYsgUWZaKHUJ1ZXl D2so44m9bAC52BAQQ8sJloW8HdiKfovN5FVUOwws3rfYfW0u9tgJ7ZWJ2R8H30f3YgT4 +1CQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1716812072; x=1717416872; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=lwzLqzyjdxC6O475cVXSLXVvtX9GC0h/UvWCIMp5xzM=; b=Nuca+FnVKH8fwZKL5Br1vUEsRVKssLn1gx6ObBQ3FEaP/f17lAGRXYHj7mfxlFxLq1 t2kvE4EwUZWlMKD3ZJx/+zqniJakgcSr0tUMX2OyFBrLu0pnUtlHuSXaOMA6pz+XhuTi 8j8KzAVfx7dx7e7bG+VPMTEYzzBV/mJBUsLmreTtleRsbrRe5D8vuUhkQgx0Hcme9+Ix aKLtFMwPLc3lp0I0LZOAdE+Wjx9VjuzCm8Qnim7iaYsM/fQKfUrW+NiD/eqSiwBzf24y A1wO2nwO0vNwXaCKLnxJV5gF4SM+ShnEuUYpW2Nrv6aU1grTAKg/TnU0jqIyRVIzECXg B6pA== X-Gm-Message-State: AOJu0YwMGZMPD4TGwQXXJaJonwqJwQ4LpUeg6vKXrw0jGyY+icVDfu0I MgODv342+Av8tyHVnNSdDlK6rSWaOtF4TU7FyJgwMxqJskj73xOiwmvULRxrJ3FaJLQ1/juCzO2 7g064sw== X-Received: by 2002:a17:906:4c4f:b0:a59:c28a:d350 with SMTP id a640c23a62f3a-a62641cde01mr549994066b.24.1716812071405; Mon, 27 May 2024 05:14:31 -0700 (PDT) Received: from rayden.urgonet (h-217-31-164-171.A175.priv.bahnhof.se. [217.31.164.171]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-a626cc8c2a8sm484100866b.165.2024.05.27.05.14.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 May 2024 05:14:30 -0700 (PDT) From: Jens Wiklander To: linux-kernel@vger.kernel.org, linux-mmc@vger.kernel.org, op-tee@lists.trustedfirmware.org Cc: Shyam Saini , Ulf Hansson , Linus Walleij , Jerome Forissier , Sumit Garg , Ilias Apalodimas , Bart Van Assche , Randy Dunlap , Ard Biesheuvel , Arnd Bergmann , Greg Kroah-Hartman , Manuel Traut , Mikko Rapeli , Jens Wiklander Subject: [PATCH v7 0/4] Replay Protected Memory Block (RPMB) subsystem Date: Mon, 27 May 2024 14:13:36 +0200 Message-Id: <20240527121340.3931987-1-jens.wiklander@linaro.org> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Hi, This patch set introduces a new RPMB subsystem, based on patches from [1], [2], and [3]. The RPMB subsystem aims at providing access to RPMB partitions to other kernel drivers, in particular the OP-TEE driver. A new user space ABI isn't needed, we can instead continue using the already present ABI when writing the RPMB key during production. I've added and removed things to keep only what is needed by the OP-TEE driver. Since the posting of [3], there has been major changes in the MMC subsystem so "mmc: block: register RPMB partition with the RPMB subsystem" is in practice completely rewritten. With this OP-TEE can access RPMB during early boot instead of having to wait for user space to become available as in the current design [4]. This will benefit the efi variables [5] since we won't rely on userspace as well as some TPM issues [6] that were solved. The OP-TEE driver finds the correct RPMB device to interact with by iterating over available devices until one is found with a programmed authentication matching the one OP-TEE is using. This enables coexisting users of other RPMBs since the owner can be determined by who knows the authentication key. The corresponding secure world OP-TEE patches are available at [7]. I've put myself as a maintainer for the RPMB subsystem as I have an interest in the OP-TEE driver to keep this in good shape. However, if you'd rather see someone else taking the maintainership that's fine too. I'll help keep the subsystem updated regardless. [1] https://lore.kernel.org/lkml/20230722014037.42647-1-shyamsaini@linux.microsoft.com/ [2] https://lore.kernel.org/lkml/20220405093759.1126835-2-alex.bennee@linaro.org/ [3] https://lore.kernel.org/linux-mmc/1478548394-8184-2-git-send-email-tomas.winkler@intel.com/ [4] https://optee.readthedocs.io/en/latest/architecture/secure_storage.html#rpmb-secure-storage [5] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c44b6be62e8dd4ee0a308c36a70620613e6fc55f [6] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7269cba53d906cf257c139d3b3a53ad272176bca [7] https://github.com/jenswi-linaro/optee_os/tree/rpmb_probe_v7 Thanks, Jens Changes since v6: * Add Tested-by: Manuel Traut provided for the v6 * Add a new patch "tee: add tee_device_set_dev_groups()" needed later in the patch set * Reintroduce the rpmb_class as requested by Greg, this affects the patches "rpmb: add Replay Protected Memory Block (RPMB) subsystem" and "optee: probe RPMB device using RPMB subsystem" * "rpmb: add Replay Protected Memory Block (RPMB) subsystem": - rpmb_interface_{,un}register() are now based on class_interface_{,un}register() - Embed a separate device in struct rpmb_dev for life cycle management etc * "optee: probe RPMB device using RPMB subsystem" - Add an internal blocking_notifier to deal with the struct class_interface callback - Add a rpmb_routing_model variable in sysfs to help integration with systemd, requested by Mikko Rapeli - Add an RPMB probe capability flag in the ABI shared with the secure world, both SMC and FF-A ABI, needed to support the rpmb_routing_model variable - optee_rpc_cmd() is strict whether an RPMB RPC request should be forwarded to tee-supplicant or routed via the RPMB subsystem, depending on the reported RPMB routing model Changes since v5: Manuel Traut reported and investigated an error on an i.MX8MM, the root cause was identified as insufficient alignment on frames sent to the RPMB device. Fixed in the OP-TEE driver as described below. * "rpmb: add Replay Protected Memory Block (RPMB) subsystem" - Adding a missing EXPORT_SYMBOL_GPL() * "optee: probe RPMB device using RPMB subsystem" - Replacing the old OPTEE_RPC_CMD_RPMB ABI with OPTEE_RPC_CMD_RPMB_FRAMES to get rid of the small header struct rpmb_req (now removed) causing the problem. - Matching changes on the secure side + support for re-initializing RPMB in case a boot stage has used RPMB, the latter also reported by Manuel Traut. Changes since v4: * "rpmb: add Replay Protected Memory Block (RPMB) subsystem" - Describing struct rpmb_descr as RPMB description instead of descriptor * "mmc: block: register RPMB partition with the RPMB subsystem" - Addressing review comments - Adding more comments for struct rpmb_frame - Fixing assignment of reliable_wr_count and capacity in mmc_blk_rpmb_add() * "optee: probe RPMB device using RPMB subsystem" - Updating struct rpmb_dev_info to match changes in "rpmb: add Replay Protected Memory Block (RPMB) subsystem" Changes since v3: * Move struct rpmb_frame into the MMC driver since the format of the RPMB frames depend on the implementation, one format for eMMC, another for UFS, and so on * "rpmb: add Replay Protected Memory Block (RPMB) subsystem" - Adding Reviewed-by: Linus Walleij - Adding more description of the API functions - Removing the set_dev_info() op from struct rpmb_ops, the needed information is supplied in the arguments to rpmb_dev_register() instead. - Getting rid of struct rpmb_ops since only the route_frames() op was remaining, store that op directly in struct rpmb_dev - Changed rpmb_interface_register() and rpmb_interface_unregister() to use notifier_block instead of implementing the same thing ourselves * "mmc: block: register RPMB partition with the RPMB subsystem" - Moving the call to rpmb_dev_register() to be done at the end of mmc_blk_probe() when the device is fully available * "optee: probe RPMB device using RPMB subsystem" - Use IS_REACHABLE(CONFIG_RPMB) to determine if the RPMB subsystem is available - Translate TEE_ERROR_STORAGE_NOT_AVAILABLE if encountered in get_devices() to recognize the error in optee_rpmb_scan() - Simplified optee_rpmb_scan() and optee_rpmb_intf_rdev() Changes since v2: * "rpmb: add Replay Protected Memory Block (RPMB) subsystem" - Fixing documentation issues - Adding a "depends on MMC" in the Kconfig - Removed the class-device and the embedded device, struct rpmb_dev now relies on the parent device for reference counting as requested - Removed the now unneeded rpmb_ops get_resources() and put_resources() since references are already taken in mmc_blk_alloc_rpmb_part() before rpmb_dev_register() is called - Added rpmb_interface_{,un}register() now that class_interface_{,un}register() can't be used ay longer * "mmc: block: register RPMB partition with the RPMB subsystem" - Adding the missing error cleanup in alloc_idata() - Taking the needed reference to md->disk in mmc_blk_alloc_rpmb_part() instead of in mmc_rpmb_chrdev_open() and rpmb_op_mmc_get_resources() * "optee: probe RPMB device using RPMB subsystem" - Registering to get a notification when an RPMB device comes online - Probes for RPMB devices each time an RPMB device comes online, until a usable device is found - When a usable RPMB device is found, call optee_enumerate_devices(PTA_CMD_GET_DEVICES_RPMB) - Pass type of rpmb in return value from OPTEE_RPC_CMD_RPMB_PROBE_NEXT Changes since Shyam's RFC: * Removed the remaining leftover rpmb_cdev_*() function calls * Refactored the struct rpmb_ops with all the previous ops replaced, in some sense closer to [3] with the route_frames() op * Added rpmb_route_frames() * Added struct rpmb_frame, enum rpmb_op_result, and enum rpmb_type from [3] * Removed all functions not needed in the OP-TEE use case * Added "mmc: block: register RPMB partition with the RPMB subsystem", based on the commit with the same name in [3] * Added "optee: probe RPMB device using RPMB subsystem" for integration with OP-TEE * Moved the RPMB driver into drivers/misc/rpmb-core.c * Added my name to MODULE_AUTHOR() in rpmb-core.c * Added an rpmb_mutex to serialize access to the IDA * Removed the target parameter from all rpmb_*() functions since it's currently unused Jens Wiklander (4): rpmb: add Replay Protected Memory Block (RPMB) subsystem mmc: block: register RPMB partition with the RPMB subsystem tee: add tee_device_set_dev_groups() optee: probe RPMB device using RPMB subsystem Documentation/ABI/testing/sysfs-class-tee | 15 ++ MAINTAINERS | 8 + drivers/misc/Kconfig | 10 + drivers/misc/Makefile | 1 + drivers/misc/rpmb-core.c | 232 +++++++++++++++++++++ drivers/mmc/core/block.c | 241 +++++++++++++++++++++- drivers/tee/optee/core.c | 96 ++++++++- drivers/tee/optee/device.c | 7 + drivers/tee/optee/ffa_abi.c | 14 ++ drivers/tee/optee/optee_ffa.h | 2 + drivers/tee/optee/optee_private.h | 26 ++- drivers/tee/optee/optee_rpc_cmd.h | 35 ++++ drivers/tee/optee/optee_smc.h | 2 + drivers/tee/optee/rpc.c | 177 ++++++++++++++++ drivers/tee/optee/smc_abi.c | 14 ++ drivers/tee/tee_core.c | 19 +- include/linux/rpmb.h | 123 +++++++++++ include/linux/tee_drv.h | 12 ++ 18 files changed, 1024 insertions(+), 10 deletions(-) create mode 100644 Documentation/ABI/testing/sysfs-class-tee create mode 100644 drivers/misc/rpmb-core.c create mode 100644 include/linux/rpmb.h -- 2.34.1