File: tee_api_panic.c

package info (click to toggle)
optee-os 4.7.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 31,560 kB
  • sloc: ansic: 441,914; asm: 12,903; python: 3,719; makefile: 1,676; sh: 238
file content (114 lines) | stat: -rw-r--r-- 2,724 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
// SPDX-License-Identifier: BSD-2-Clause
/*
 * Copyright (c) 2014, STMicroelectronics International N.V.
 * Copyright (c) 2020, Linaro Limited
 */

#include <config.h>
#include <string.h>
#include <tee_api.h>
#include <utee_syscalls.h>
#include <util.h>

#include "tee_api_private.h"

#define ACCESS_RW	(TEE_MEMORY_ACCESS_READ | TEE_MEMORY_ACCESS_WRITE)
#define ACCESS_W_ANY	(TEE_MEMORY_ACCESS_WRITE | TEE_MEMORY_ACCESS_ANY_OWNER)
#define ACCESS_R	TEE_MEMORY_ACCESS_READ
#define ACCESS_W	TEE_MEMORY_ACCESS_WRITE

/* System API - Misc */

void TEE_Panic(TEE_Result panicCode)
{
	_utee_panic(panicCode);
#ifdef __COVERITY__
	__coverity_panic__();
#endif
}

static void check_res(const char *msg __maybe_unused, TEE_Result res)
{
	if (res) {
		DMSG("%s: error %#"PRIx32, msg, res);
		TEE_Panic(0);
	}
}

static TEE_Result check_access(uint32_t flags, void *buf, size_t len)
{
	if (!len)
		return TEE_SUCCESS;

	if (!buf)
		return TEE_ERROR_SECURITY;

	if (IS_ENABLED(CFG_TA_STRICT_ANNOTATION_CHECKS))
		return TEE_CheckMemoryAccessRights(flags, buf, len);

	return TEE_SUCCESS;
}

void __utee_check_outbuf_annotation(void *buf, size_t *len)
{
	check_res("[outbuf] len",
		  check_access(ACCESS_RW, len, sizeof(*len)));
	check_res("[outbuf] buf",
		  check_access(ACCESS_W_ANY, buf, *len));
}

void __utee_check_gp11_outbuf_annotation(void *buf, uint32_t *len)
{
	check_res("[outbuf] len",
		  check_access(ACCESS_RW, len, sizeof(*len)));
	check_res("[outbuf] buf",
		  check_access(ACCESS_W_ANY, buf, *len));
}

void __utee_check_instring_annotation(const char *buf)
{
	check_res("[instring]",
		  check_access(ACCESS_R, (char *)buf, strlen(buf) + 1));
}

void __utee_check_outstring_annotation(char *buf, size_t *len)
{
	check_res("[outstring] len",
		  check_access(ACCESS_RW, len, sizeof(*len)));
	check_res("[outstring] buf",
		  check_access(ACCESS_W_ANY, buf, *len));
}

void __utee_check_gp11_outstring_annotation(char *buf, uint32_t *len)
{
	check_res("[outstring] len",
		  check_access(ACCESS_RW, len, sizeof(*len)));
	check_res("[outstring] buf",
		  check_access(ACCESS_W_ANY, buf, *len));
}

void __utee_check_out_annotation(void *buf, const size_t len)
{
	check_res("[out]",
		  check_access(ACCESS_W, buf, len));
}

void __utee_check_attr_in_annotation(const TEE_Attribute *attr, size_t count)
{
	check_res("[in] attr",
		  check_access(ACCESS_R, (void *)attr, sizeof(*attr) * count));
}

void __utee_check_gp11_attr_in_annotation(const __GP11_TEE_Attribute *attr,
					  size_t count)

{
	check_res("[in] attr",
		  check_access(ACCESS_R, (void *)attr, sizeof(*attr) * count));
}

void __utee_check_inout_annotation(void *buf, const size_t len)
{
	check_res("[inout]",
		  check_access(ACCESS_RW, buf, len));
}