blob: 2ac3214daf82a39b37da9d4c080223957b7ac68c [file] [log] [blame]
/*
*/
#include <linux/mm.h>
#include <linux/miscdevice.h>
#include <linux/slab.h>
#include <linux/vmalloc.h>
#include <linux/mman.h>
#include <linux/random.h>
#include <linux/init.h>
#include <linux/raw.h>
#include <linux/tty.h>
#include <linux/capability.h>
#include <linux/ptrace.h>
#include <linux/device.h>
#include <linux/highmem.h>
#include <linux/crash_dump.h>
#include <linux/backing-dev.h>
#include <linux/bootmem.h>
#include <linux/splice.h>
#include <linux/pfn.h>
#include <linux/export.h>
#include <linux/seq_file.h>
#include <asm/uaccess.h>
#include <asm/io.h>
#ifdef CONFIG_RKP_CFP_FIX_SMC_BUG
#include <linux/rkp_cfp.h>
#endif
#ifdef CONFIG_TZDEV //TEEgris
#define CUSTOM_SMC_FID (0xB2000202)
#define SUBFUN_KAP_STATUS 150
#else
#define SMC_CMD_KAP_CALL (0x83000009)
#define SMC_CMD_KAP_STATUS (0x8300000A)
#endif
unsigned int kap_on_reboot = 0; // 1: turn on kap after reboot; 0: no pending ON action
unsigned int kap_off_reboot = 0; // 1: turn off kap after reboot; 0: no pending OFF action
u64 exynos_smc64(u64 cmd, u64 arg1, u64 arg2, u64 arg3)
{
register u64 reg0 __asm__("x0") = cmd;
register u64 reg1 __asm__("x1") = arg1;
register u64 reg2 __asm__("x2") = arg2;
register u64 reg3 __asm__("x3") = arg3;
__asm__ volatile (
#ifdef CONFIG_RKP_CFP_FIX_SMC_BUG
PRE_SMC_INLINE
#endif
"dsb sy\n"
"smc 0\n"
#ifdef CONFIG_RKP_CFP_FIX_SMC_BUG
POST_SMC_INLINE
#endif
: "+r"(reg0), "+r"(reg1), "+r"(reg2), "+r"(reg3)
);
return reg0;
}
static void turn_off_kap(void) {
kap_on_reboot = 0;
kap_off_reboot = 1;
printk(KERN_ERR " %s -> Turn off kap mode\n", __FUNCTION__);
//exynos_smc64(SMC_CMD_KAP_CALL, 0x51, 0, 0);
}
static void turn_on_kap(void) {
kap_off_reboot = 0;
kap_on_reboot = 1;
printk(KERN_ERR " %s -> Turn on kap mode\n", __FUNCTION__);
}
ssize_t knox_kap_write(struct file *file, const char __user *buffer, size_t size, loff_t *offset) {
unsigned long mode;
char *string;
int rc;
printk(KERN_ERR " %s\n", __FUNCTION__);
if(size == 0 || size+1 == 0)
return 0;
string = kmalloc(size + sizeof(char), GFP_KERNEL);
if (string == NULL) {
printk(KERN_ERR "%s failed kmalloc\n", __func__);
return size;
}
//memcpy(string, buffer, size);
rc = copy_from_user(string, buffer, size);
if(rc){
printk(KERN_ERR "%s copy_from_user failed rc=%d\n",__func__,rc);
}
string[size] = '\0';
if(kstrtoul(string, 0, &mode)) {
kfree(string);
return size;
};
kfree(string);
printk(KERN_ERR "id: %d\n", (int)mode);
switch(mode) {
case 0:
turn_off_kap();
break;
case 1:
turn_on_kap();
break;
default:
printk(KERN_ERR " %s -> Invalid kap mode operations\n", __FUNCTION__);
break;
}
*offset += size;
return size;
}
#define KAP_RET_SIZE 5
#define KAP_MAGIC 0x5afe0000
#define KAP_MAGIC_MASK 0xffff0000
static int knox_kap_read(struct seq_file *m, void *v)
{
unsigned long tz_ret = 0;
unsigned char ret_buffer[KAP_RET_SIZE];
unsigned volatile int ret_val;
// ????? //
//clean_dcache_area(&tz_ret, 8);
//tima_send_cmd(__pa(&tz_ret), 0x3f850221);
//tz_ret = exynos_smc_kap(SMC_CMD_KAP_CALL, 0x50, 0, 0);
#ifdef CONFIG_TZDEV //TEEgris
tz_ret = exynos_smc64(CUSTOM_SMC_FID, SUBFUN_KAP_STATUS, 0, 0);
#else
tz_ret = exynos_smc64(SMC_CMD_KAP_STATUS, 0, 0, 0);
#endif
//tz_ret = KAP_MAGIC | 1;
printk(KERN_ERR "KAP Read STATUS val = %lx\n", tz_ret);
if (tz_ret == (KAP_MAGIC | 3)) {
ret_val = 0x03; //RKP and/or DMVerity says device is tampered
} else if (tz_ret == (KAP_MAGIC | 1)) {
/* KAP is ON*/
if (kap_off_reboot == 1){
ret_val = 0x10; //KAP is ON and will turn OFF upon next reboot
} else {
ret_val = 0x11; //KAP is ON and will stay ON
}
} else if (tz_ret == (KAP_MAGIC)) {
/* KAP is OFF*/
if (kap_on_reboot == 1){
ret_val = 0x01; //KAP is OFF but will turn on upon next reboot
} else {
ret_val = 0; //KAP is OFF and will stay OFF upon next reboot
}
} else {
ret_val = 0x04; //The magic string is not there. KAP mode not implemented
}
memset(ret_buffer,0,KAP_RET_SIZE);
snprintf(ret_buffer, sizeof(ret_buffer), "%02x\n", ret_val);
seq_write(m, ret_buffer, sizeof(ret_buffer));
return 0;
}
static int knox_kap_open(struct inode *inode, struct file *filp)
{
return single_open(filp, knox_kap_read, NULL);
}
long knox_kap_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
{
/*
* Switch according to the ioctl called
*/
switch (cmd) {
case 0:
turn_off_kap();
break;
case 1:
#if defined(CONFIG_SOC_EXYNOS7580) || defined(CONFIG_SOC_EXYNOS7870)
if(arg)
{
turn_off_kap();
} else {
turn_on_kap();
}
#else
turn_on_kap();
#endif
break;
default:
printk(KERN_ERR " %s -> Invalid kap mode operations\n", __FUNCTION__);
return -1;
break;
}
return 0;
}
const struct file_operations knox_kap_fops = {
.open = knox_kap_open,
.release = single_release,
.read = seq_read,
.write = knox_kap_write,
.unlocked_ioctl = knox_kap_ioctl,
};