tegrakernel/kernel/nvidia/drivers/trusty/trusty-log.c

290 lines
7.3 KiB
C
Raw Permalink Normal View History

2022-02-16 09:13:02 -06:00
/*
* Copyright (C) 2015 Google, Inc.
* Copyright (c) 2017, NVIDIA CORPORATION. All rights reserved.
*
* This software is licensed under the terms of the GNU General Public
* License version 2, as published by the Free Software Foundation, and
* may be copied, distributed, and modified under those terms.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
*/
#include <linux/platform_device.h>
#include <linux/trusty/smcall.h>
#include <linux/trusty/trusty.h>
#include <linux/notifier.h>
#include <linux/slab.h>
#include <linux/mm.h>
#include <linux/module.h>
#include <linux/log2.h>
#include <asm/page.h>
#include "trusty-log.h"
#define TRUSTY_LOG_SIZE (PAGE_SIZE * 2)
#define TRUSTY_LINE_BUFFER_SIZE 256
struct trusty_log_state {
struct device *dev;
struct device *trusty_dev;
/*
* This lock is here to ensure only one consumer will read
* from the log ring buffer at a time.
*/
raw_spinlock_t lock;
struct log_rb *log;
uint32_t get;
struct page *log_pages;
struct notifier_block call_notifier;
struct notifier_block panic_notifier;
char line_buffer[TRUSTY_LINE_BUFFER_SIZE];
};
static int log_read_line(struct trusty_log_state *s, int put, int get)
{
struct log_rb *log = s->log;
int i;
char c = '\0';
size_t max_to_read = min((size_t)(put - get),
sizeof(s->line_buffer) - 1);
size_t mask = log->sz - 1;
for (i = 0; i < max_to_read && c != '\n';)
s->line_buffer[i++] = c = log->data[get++ & mask];
s->line_buffer[i] = '\0';
return i;
}
static void trusty_dump_logs(struct trusty_log_state *s)
{
struct log_rb *log = s->log;
uint32_t get, put, alloc;
int read_chars;
BUG_ON(!is_power_of_2(log->sz));
/*
* For this ring buffer, at any given point, alloc >= put >= get.
* The producer side of the buffer is not locked, so the put and alloc
* pointers must be read in a defined order (put before alloc) so
* that the above condition is maintained. A read barrier is needed
* to make sure the hardware and compiler keep the reads ordered.
*/
get = s->get;
while ((put = log->put) != get) {
/* Make sure that the read of put occurs before the read of log data */
rmb();
/* Read a line from the log */
read_chars = log_read_line(s, put, get);
/* Force the loads from log_read_line to complete. */
rmb();
alloc = log->alloc;
/*
* Discard the line that was just read if the data could
* have been corrupted by the producer.
*/
if (alloc - get > log->sz) {
pr_err("trusty: log overflow.");
get = alloc - log->sz;
continue;
}
pr_info("[TRUSTY] %s", s->line_buffer);
get += read_chars;
}
s->get = get;
}
static int trusty_log_call_notify(struct notifier_block *nb,
unsigned long action, void *data)
{
struct trusty_log_state *s;
unsigned long flags;
if (action != TRUSTY_CALL_RETURNED)
return NOTIFY_DONE;
s = container_of(nb, struct trusty_log_state, call_notifier);
raw_spin_lock_irqsave(&s->lock, flags);
trusty_dump_logs(s);
raw_spin_unlock_irqrestore(&s->lock, flags);
return NOTIFY_OK;
}
static int trusty_log_panic_notify(struct notifier_block *nb,
unsigned long action, void *data)
{
struct trusty_log_state *s;
/*
* Don't grab the spin lock to hold up the panic notifier, even
* though this is racy.
*/
s = container_of(nb, struct trusty_log_state, panic_notifier);
pr_info("trusty-log panic notifier - trusty version %s",
trusty_version_str_get(s->trusty_dev));
trusty_dump_logs(s);
return NOTIFY_OK;
}
static bool trusty_supports_logging(struct device *device)
{
int result;
result = trusty_std_call32(device, SMC_SC_SHARED_LOG_VERSION,
TRUSTY_LOG_API_VERSION, 0, 0);
if (result == SM_ERR_UNDEFINED_SMC) {
pr_info("trusty-log not supported on secure side.\n");
return false;
} else if (result < 0) {
pr_err("trusty std call (SMC_SC_SHARED_LOG_VERSION) failed: %d\n",
result);
return false;
}
if (result == TRUSTY_LOG_API_VERSION) {
return true;
} else {
pr_info("trusty-log unsupported api version: %d, supported: %d\n",
result, TRUSTY_LOG_API_VERSION);
return false;
}
}
static int trusty_log_probe(struct platform_device *pdev)
{
struct trusty_log_state *s;
int result;
phys_addr_t pa;
dev_dbg(&pdev->dev, "%s\n", __func__);
if (!trusty_supports_logging(pdev->dev.parent)) {
return -ENXIO;
}
s = kzalloc(sizeof(*s), GFP_KERNEL);
if (!s) {
result = -ENOMEM;
goto error_alloc_state;
}
raw_spin_lock_init(&s->lock);
s->dev = &pdev->dev;
s->trusty_dev = s->dev->parent;
s->get = 0;
s->log_pages = alloc_pages(GFP_KERNEL | __GFP_ZERO,
get_order(TRUSTY_LOG_SIZE));
if (!s->log_pages) {
result = -ENOMEM;
goto error_alloc_log;
}
s->log = page_address(s->log_pages);
pa = page_to_phys(s->log_pages);
result = hyp_ipa_translate(&pa);
if (result) {
pr_err("%s: IPA to PA failed: %x\n", __func__, result);
goto error_std_call;
}
result = trusty_std_call32(s->trusty_dev,
SMC_SC_SHARED_LOG_ADD,
(u32)(pa), (u32)(pa >> 32),
TRUSTY_LOG_SIZE);
if (result < 0) {
pr_err("trusty std call (SMC_SC_SHARED_LOG_ADD) failed: %d %pa\n",
result, &pa);
goto error_std_call;
}
s->call_notifier.notifier_call = trusty_log_call_notify;
result = trusty_call_notifier_register(s->trusty_dev,
&s->call_notifier);
if (result < 0) {
dev_err(&pdev->dev,
"failed to register trusty call notifier\n");
goto error_call_notifier;
}
s->panic_notifier.notifier_call = trusty_log_panic_notify;
result = atomic_notifier_chain_register(&panic_notifier_list,
&s->panic_notifier);
if (result < 0) {
dev_err(&pdev->dev,
"failed to register panic notifier\n");
goto error_panic_notifier;
}
platform_set_drvdata(pdev, s);
return 0;
error_panic_notifier:
trusty_call_notifier_unregister(s->trusty_dev, &s->call_notifier);
error_call_notifier:
trusty_std_call32(s->trusty_dev, SMC_SC_SHARED_LOG_RM,
(u32)pa, (u32)(pa >> 32), 0);
error_std_call:
__free_pages(s->log_pages, get_order(TRUSTY_LOG_SIZE));
error_alloc_log:
kfree(s);
error_alloc_state:
return result;
}
static int trusty_log_remove(struct platform_device *pdev)
{
int result;
struct trusty_log_state *s = platform_get_drvdata(pdev);
phys_addr_t pa = page_to_phys(s->log_pages);
dev_dbg(&pdev->dev, "%s\n", __func__);
result = hyp_ipa_translate(&pa);
if (result) {
pr_err("%s: IPA to PA failed: %x\n", __func__, result);
return result;
}
atomic_notifier_chain_unregister(&panic_notifier_list,
&s->panic_notifier);
trusty_call_notifier_unregister(s->trusty_dev, &s->call_notifier);
result = trusty_std_call32(s->trusty_dev, SMC_SC_SHARED_LOG_RM,
(u32)pa, (u32)(pa >> 32), 0);
if (result) {
pr_err("trusty std call (SMC_SC_SHARED_LOG_RM) failed: %d\n",
result);
}
__free_pages(s->log_pages, get_order(TRUSTY_LOG_SIZE));
kfree(s);
return 0;
}
static const struct of_device_id trusty_test_of_match[] = {
{ .compatible = "android,trusty-log-v1", },
{},
};
static struct platform_driver trusty_log_driver = {
.probe = trusty_log_probe,
.remove = trusty_log_remove,
.driver = {
.name = "trusty-log",
.owner = THIS_MODULE,
.of_match_table = trusty_test_of_match,
},
};
module_platform_driver(trusty_log_driver);
MODULE_DESCRIPTION("Trusty log dirver");
MODULE_AUTHOR("Google, Inc");
MODULE_LICENSE("GPL v2");