2009-02-05 13:18:13 +08:00
|
|
|
/**
|
|
|
|
* AMCC SoC PPC4xx Crypto Driver
|
|
|
|
*
|
|
|
|
* Copyright (c) 2008 Applied Micro Circuits Corporation.
|
|
|
|
* All rights reserved. James Hsiao <jhsiao@amcc.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* This is the header file for AMCC Crypto offload Linux device driver for
|
|
|
|
* use with Linux CryptoAPI.
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __CRYPTO4XX_CORE_H__
|
|
|
|
#define __CRYPTO4XX_CORE_H__
|
|
|
|
|
2009-07-14 20:21:46 +08:00
|
|
|
#include <crypto/internal/hash.h>
|
2017-08-25 21:47:25 +08:00
|
|
|
#include "crypto4xx_reg_def.h"
|
|
|
|
#include "crypto4xx_sa.h"
|
2009-07-14 20:21:46 +08:00
|
|
|
|
2016-04-18 18:57:41 +08:00
|
|
|
#define MODULE_NAME "crypto4xx"
|
|
|
|
|
2009-02-05 13:18:13 +08:00
|
|
|
#define PPC460SX_SDR0_SRST 0x201
|
|
|
|
#define PPC405EX_SDR0_SRST 0x200
|
|
|
|
#define PPC460EX_SDR0_SRST 0x201
|
|
|
|
#define PPC460EX_CE_RESET 0x08000000
|
|
|
|
#define PPC460SX_CE_RESET 0x20000000
|
|
|
|
#define PPC405EX_CE_RESET 0x00000008
|
|
|
|
|
|
|
|
#define CRYPTO4XX_CRYPTO_PRIORITY 300
|
2017-10-04 07:00:08 +08:00
|
|
|
#define PPC4XX_NUM_PD 256
|
|
|
|
#define PPC4XX_LAST_PD (PPC4XX_NUM_PD - 1)
|
2009-02-05 13:18:13 +08:00
|
|
|
#define PPC4XX_NUM_GD 1024
|
2017-10-04 07:00:08 +08:00
|
|
|
#define PPC4XX_LAST_GD (PPC4XX_NUM_GD - 1)
|
|
|
|
#define PPC4XX_NUM_SD 256
|
|
|
|
#define PPC4XX_LAST_SD (PPC4XX_NUM_SD - 1)
|
2009-02-05 13:18:13 +08:00
|
|
|
#define PPC4XX_SD_BUFFER_SIZE 2048
|
|
|
|
|
crypto: crypto4xx - add backlog queue support
Previously, If the crypto4xx driver used all available
security contexts, it would simply refuse new requests
with -EAGAIN. CRYPTO_TFM_REQ_MAY_BACKLOG was ignored.
in case of dm-crypt.c's crypt_convert() function this was
causing the following errors to manifest, if the system was
pushed hard enough:
| EXT4-fs warning (dm-1): ext4_end_bio:314: I/O error -5 writing to ino ..
| EXT4-fs warning (dm-1): ext4_end_bio:314: I/O error -5 writing to ino ..
| EXT4-fs warning (dm-1): ext4_end_bio:314: I/O error -5 writing to ino ..
| JBD2: Detected IO errors while flushing file data on dm-1-8
| Aborting journal on device dm-1-8.
| EXT4-fs error : ext4_journal_check_start:56: Detected aborted journal
| EXT4-fs (dm-1): Remounting filesystem read-only
| EXT4-fs : ext4_writepages: jbd2_start: 2048 pages, inode 498...; err -30
(This did cause corruptions due to failed writes)
To fix this mess, the crypto4xx driver needs to notifiy the
user to slow down. This can be achieved by returning -EBUSY
on requests, once the crypto hardware was falling behind.
Note: -EBUSY has two different meanings. Setting the flag
CRYPTO_TFM_REQ_MAY_BACKLOG implies that the request was
successfully queued, by the crypto driver. To achieve this
requirement, the implementation introduces a threshold check and
adds logic to the completion routines in much the same way as
AMD's Cryptographic Coprocessor (CCP) driver do.
Note2: Tests showed that dm-crypt starved ipsec traffic.
Under load, ipsec links dropped to 0 Kbits/s. This is because
dm-crypt's callback would instantly queue the next request.
In order to not starve ipsec, the driver reserves a small
portion of the available crypto contexts for this purpose.
Signed-off-by: Christian Lamparter <chunkeey@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2017-10-04 07:00:09 +08:00
|
|
|
#define PD_ENTRY_BUSY BIT(1)
|
|
|
|
#define PD_ENTRY_INUSE BIT(0)
|
2009-02-05 13:18:13 +08:00
|
|
|
#define PD_ENTRY_FREE 0
|
|
|
|
#define ERING_WAS_FULL 0xffffffff
|
|
|
|
|
|
|
|
struct crypto4xx_device;
|
|
|
|
|
2017-08-25 21:47:25 +08:00
|
|
|
union shadow_sa_buf {
|
|
|
|
struct dynamic_sa_ctl sa;
|
|
|
|
|
|
|
|
/* alloc 256 bytes which is enough for any kind of dynamic sa */
|
|
|
|
u8 buf[256];
|
|
|
|
} __packed;
|
|
|
|
|
2009-02-05 13:18:13 +08:00
|
|
|
struct pd_uinfo {
|
|
|
|
struct crypto4xx_device *dev;
|
|
|
|
u32 state;
|
|
|
|
u32 using_sd;
|
|
|
|
u32 first_gd; /* first gather discriptor
|
|
|
|
used by this packet */
|
|
|
|
u32 num_gd; /* number of gather discriptor
|
|
|
|
used by this packet */
|
|
|
|
u32 first_sd; /* first scatter discriptor
|
|
|
|
used by this packet */
|
|
|
|
u32 num_sd; /* number of scatter discriptors
|
|
|
|
used by this packet */
|
2017-08-25 21:47:25 +08:00
|
|
|
struct dynamic_sa_ctl *sa_va; /* shadow sa */
|
|
|
|
struct sa_state_record *sr_va; /* state record for shadow sa */
|
2009-02-05 13:18:13 +08:00
|
|
|
u32 sr_pa;
|
|
|
|
struct scatterlist *dest_va;
|
|
|
|
struct crypto_async_request *async_req; /* base crypto request
|
|
|
|
for this packet */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto4xx_device {
|
|
|
|
struct crypto4xx_core_device *core_dev;
|
|
|
|
char *name;
|
|
|
|
void __iomem *ce_base;
|
2016-04-18 18:57:41 +08:00
|
|
|
void __iomem *trng_base;
|
2009-02-05 13:18:13 +08:00
|
|
|
|
2017-08-25 21:47:25 +08:00
|
|
|
struct ce_pd *pdr; /* base address of packet descriptor ring */
|
|
|
|
dma_addr_t pdr_pa; /* physical address of pdr_base_register */
|
|
|
|
struct ce_gd *gdr; /* gather descriptor ring */
|
|
|
|
dma_addr_t gdr_pa; /* physical address of gdr_base_register */
|
|
|
|
struct ce_sd *sdr; /* scatter descriptor ring */
|
|
|
|
dma_addr_t sdr_pa; /* physical address of sdr_base_register */
|
2009-02-05 13:18:13 +08:00
|
|
|
void *scatter_buffer_va;
|
|
|
|
dma_addr_t scatter_buffer_pa;
|
|
|
|
|
2017-08-25 21:47:25 +08:00
|
|
|
union shadow_sa_buf *shadow_sa_pool;
|
2009-02-05 13:18:13 +08:00
|
|
|
dma_addr_t shadow_sa_pool_pa;
|
2017-08-25 21:47:25 +08:00
|
|
|
struct sa_state_record *shadow_sr_pool;
|
2009-02-05 13:18:13 +08:00
|
|
|
dma_addr_t shadow_sr_pool_pa;
|
|
|
|
u32 pdr_tail;
|
|
|
|
u32 pdr_head;
|
|
|
|
u32 gdr_tail;
|
|
|
|
u32 gdr_head;
|
|
|
|
u32 sdr_tail;
|
|
|
|
u32 sdr_head;
|
2017-08-25 21:47:25 +08:00
|
|
|
struct pd_uinfo *pdr_uinfo;
|
2009-02-05 13:18:13 +08:00
|
|
|
struct list_head alg_list; /* List of algorithm supported
|
|
|
|
by this device */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto4xx_core_device {
|
|
|
|
struct device *device;
|
2010-08-06 23:25:50 +08:00
|
|
|
struct platform_device *ofdev;
|
2009-02-05 13:18:13 +08:00
|
|
|
struct crypto4xx_device *dev;
|
2016-04-18 18:57:41 +08:00
|
|
|
struct hwrng *trng;
|
2009-02-05 13:18:13 +08:00
|
|
|
u32 int_status;
|
|
|
|
u32 irq;
|
|
|
|
struct tasklet_struct tasklet;
|
|
|
|
spinlock_t lock;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto4xx_ctx {
|
|
|
|
struct crypto4xx_device *dev;
|
2017-08-25 21:47:25 +08:00
|
|
|
struct dynamic_sa_ctl *sa_in;
|
2009-02-05 13:18:13 +08:00
|
|
|
dma_addr_t sa_in_dma_addr;
|
2017-08-25 21:47:25 +08:00
|
|
|
struct dynamic_sa_ctl *sa_out;
|
2009-02-05 13:18:13 +08:00
|
|
|
dma_addr_t sa_out_dma_addr;
|
2017-08-25 21:47:25 +08:00
|
|
|
struct sa_state_record *state_record;
|
2009-02-05 13:18:13 +08:00
|
|
|
dma_addr_t state_record_dma_addr;
|
|
|
|
u32 sa_len;
|
|
|
|
};
|
|
|
|
|
2009-07-14 20:21:46 +08:00
|
|
|
struct crypto4xx_alg_common {
|
|
|
|
u32 type;
|
|
|
|
union {
|
|
|
|
struct crypto_alg cipher;
|
|
|
|
struct ahash_alg hash;
|
|
|
|
} u;
|
|
|
|
};
|
|
|
|
|
2009-02-05 13:18:13 +08:00
|
|
|
struct crypto4xx_alg {
|
|
|
|
struct list_head entry;
|
2009-07-14 20:21:46 +08:00
|
|
|
struct crypto4xx_alg_common alg;
|
2009-02-05 13:18:13 +08:00
|
|
|
struct crypto4xx_device *dev;
|
|
|
|
};
|
|
|
|
|
2009-07-14 20:21:46 +08:00
|
|
|
static inline struct crypto4xx_alg *crypto_alg_to_crypto4xx_alg(
|
|
|
|
struct crypto_alg *x)
|
|
|
|
{
|
|
|
|
switch (x->cra_flags & CRYPTO_ALG_TYPE_MASK) {
|
|
|
|
case CRYPTO_ALG_TYPE_AHASH:
|
|
|
|
return container_of(__crypto_ahash_alg(x),
|
|
|
|
struct crypto4xx_alg, alg.u.hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
return container_of(x, struct crypto4xx_alg, alg.u.cipher);
|
|
|
|
}
|
2009-02-05 13:18:13 +08:00
|
|
|
|
2017-08-25 21:47:17 +08:00
|
|
|
int crypto4xx_alloc_sa(struct crypto4xx_ctx *ctx, u32 size);
|
|
|
|
void crypto4xx_free_sa(struct crypto4xx_ctx *ctx);
|
|
|
|
void crypto4xx_free_ctx(struct crypto4xx_ctx *ctx);
|
|
|
|
u32 crypto4xx_alloc_state_record(struct crypto4xx_ctx *ctx);
|
2017-10-04 07:00:10 +08:00
|
|
|
int crypto4xx_build_pd(struct crypto_async_request *req,
|
2017-08-25 21:47:17 +08:00
|
|
|
struct crypto4xx_ctx *ctx,
|
|
|
|
struct scatterlist *src,
|
|
|
|
struct scatterlist *dst,
|
2017-10-04 07:00:11 +08:00
|
|
|
const unsigned int datalen,
|
|
|
|
const __le32 *iv, const u32 iv_len,
|
|
|
|
const struct dynamic_sa_ctl *sa,
|
|
|
|
const unsigned int sa_len);
|
2017-08-25 21:47:17 +08:00
|
|
|
int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
|
|
|
|
const u8 *key, unsigned int keylen);
|
2017-08-25 21:47:21 +08:00
|
|
|
int crypto4xx_setkey_aes_cfb(struct crypto_ablkcipher *cipher,
|
|
|
|
const u8 *key, unsigned int keylen);
|
|
|
|
int crypto4xx_setkey_aes_ecb(struct crypto_ablkcipher *cipher,
|
|
|
|
const u8 *key, unsigned int keylen);
|
|
|
|
int crypto4xx_setkey_aes_ofb(struct crypto_ablkcipher *cipher,
|
|
|
|
const u8 *key, unsigned int keylen);
|
|
|
|
int crypto4xx_setkey_rfc3686(struct crypto_ablkcipher *cipher,
|
|
|
|
const u8 *key, unsigned int keylen);
|
2017-08-25 21:47:17 +08:00
|
|
|
int crypto4xx_encrypt(struct ablkcipher_request *req);
|
|
|
|
int crypto4xx_decrypt(struct ablkcipher_request *req);
|
2017-08-25 21:47:21 +08:00
|
|
|
int crypto4xx_rfc3686_encrypt(struct ablkcipher_request *req);
|
|
|
|
int crypto4xx_rfc3686_decrypt(struct ablkcipher_request *req);
|
2017-08-25 21:47:17 +08:00
|
|
|
int crypto4xx_sha1_alg_init(struct crypto_tfm *tfm);
|
|
|
|
int crypto4xx_hash_digest(struct ahash_request *req);
|
|
|
|
int crypto4xx_hash_final(struct ahash_request *req);
|
|
|
|
int crypto4xx_hash_update(struct ahash_request *req);
|
|
|
|
int crypto4xx_hash_init(struct ahash_request *req);
|
2017-10-04 07:00:10 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Note: Only use this function to copy items that is word aligned.
|
|
|
|
*/
|
|
|
|
static inline void crypto4xx_memcpy_swab32(u32 *dst, const void *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
for (; len >= 4; buf += 4, len -= 4)
|
|
|
|
*dst++ = __swab32p((u32 *) buf);
|
|
|
|
|
|
|
|
if (len) {
|
|
|
|
const u8 *tmp = (u8 *)buf;
|
|
|
|
|
|
|
|
switch (len) {
|
|
|
|
case 3:
|
|
|
|
*dst = (tmp[2] << 16) |
|
|
|
|
(tmp[1] << 8) |
|
|
|
|
tmp[0];
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
*dst = (tmp[1] << 8) |
|
|
|
|
tmp[0];
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
*dst = tmp[0];
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void crypto4xx_memcpy_from_le32(u32 *dst, const void *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
crypto4xx_memcpy_swab32(dst, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void crypto4xx_memcpy_to_le32(__le32 *dst, const void *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
crypto4xx_memcpy_swab32((u32 *)dst, buf, len);
|
|
|
|
}
|
2009-02-05 13:18:13 +08:00
|
|
|
#endif
|