1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * Copyright IBM Corp. 2012, 2022
4 * Author(s): Holger Dengler <hd@linux.vnet.ibm.com>
5 */
6
7 #include <linux/module.h>
8 #include <linux/slab.h>
9 #include <linux/init.h>
10 #include <linux/err.h>
11 #include <linux/atomic.h>
12 #include <linux/uaccess.h>
13 #include <linux/mod_devicetable.h>
14
15 #include "ap_bus.h"
16 #include "zcrypt_api.h"
17 #include "zcrypt_msgtype6.h"
18 #include "zcrypt_msgtype50.h"
19 #include "zcrypt_error.h"
20 #include "zcrypt_cex4.h"
21 #include "zcrypt_ccamisc.h"
22 #include "zcrypt_ep11misc.h"
23
24 #define CEX4A_MIN_MOD_SIZE 1 /* 8 bits */
25 #define CEX4A_MAX_MOD_SIZE_2K 256 /* 2048 bits */
26 #define CEX4A_MAX_MOD_SIZE_4K 512 /* 4096 bits */
27
28 #define CEX4C_MIN_MOD_SIZE 16 /* 256 bits */
29 #define CEX4C_MAX_MOD_SIZE 512 /* 4096 bits */
30
31 /* Waiting time for requests to be processed.
32 * Currently there are some types of request which are not deterministic.
33 * But the maximum time limit managed by the stomper code is set to 60sec.
34 * Hence we have to wait at least that time period.
35 */
36 #define CEX4_CLEANUP_TIME (900 * HZ)
37
38 MODULE_AUTHOR("IBM Corporation");
39 MODULE_DESCRIPTION("CEX[45678] Cryptographic Card device driver, " \
40 "Copyright IBM Corp. 2022");
41 MODULE_LICENSE("GPL");
42
43 static struct ap_device_id zcrypt_cex4_card_ids[] = {
44 { .dev_type = AP_DEVICE_TYPE_CEX4,
45 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
46 { .dev_type = AP_DEVICE_TYPE_CEX5,
47 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
48 { .dev_type = AP_DEVICE_TYPE_CEX6,
49 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
50 { .dev_type = AP_DEVICE_TYPE_CEX7,
51 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
52 { .dev_type = AP_DEVICE_TYPE_CEX8,
53 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
54 { /* end of list */ },
55 };
56
57 MODULE_DEVICE_TABLE(ap, zcrypt_cex4_card_ids);
58
59 static struct ap_device_id zcrypt_cex4_queue_ids[] = {
60 { .dev_type = AP_DEVICE_TYPE_CEX4,
61 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
62 { .dev_type = AP_DEVICE_TYPE_CEX5,
63 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
64 { .dev_type = AP_DEVICE_TYPE_CEX6,
65 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
66 { .dev_type = AP_DEVICE_TYPE_CEX7,
67 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
68 { .dev_type = AP_DEVICE_TYPE_CEX8,
69 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
70 { /* end of list */ },
71 };
72
73 MODULE_DEVICE_TABLE(ap, zcrypt_cex4_queue_ids);
74
75 /*
76 * CCA card additional device attributes
77 */
cca_serialnr_show(struct device * dev,struct device_attribute * attr,char * buf)78 static ssize_t cca_serialnr_show(struct device *dev,
79 struct device_attribute *attr,
80 char *buf)
81 {
82 struct ap_card *ac = to_ap_card(dev);
83 struct cca_info ci;
84
85 memset(&ci, 0, sizeof(ci));
86
87 if (ap_domain_index >= 0)
88 cca_get_info(ac->id, ap_domain_index, &ci, 0);
89
90 return sysfs_emit(buf, "%s\n", ci.serial);
91 }
92
93 static struct device_attribute dev_attr_cca_serialnr =
94 __ATTR(serialnr, 0444, cca_serialnr_show, NULL);
95
96 static struct attribute *cca_card_attrs[] = {
97 &dev_attr_cca_serialnr.attr,
98 NULL,
99 };
100
101 static const struct attribute_group cca_card_attr_grp = {
102 .attrs = cca_card_attrs,
103 };
104
105 /*
106 * CCA queue additional device attributes
107 */
cca_mkvps_show(struct device * dev,struct device_attribute * attr,char * buf)108 static ssize_t cca_mkvps_show(struct device *dev,
109 struct device_attribute *attr,
110 char *buf)
111 {
112 static const char * const new_state[] = { "empty", "partial", "full" };
113 static const char * const cao_state[] = { "invalid", "valid" };
114 struct zcrypt_queue *zq = dev_get_drvdata(dev);
115 struct cca_info ci;
116 int n = 0;
117
118 memset(&ci, 0, sizeof(ci));
119
120 cca_get_info(AP_QID_CARD(zq->queue->qid),
121 AP_QID_QUEUE(zq->queue->qid),
122 &ci, 0);
123
124 if (ci.new_aes_mk_state >= '1' && ci.new_aes_mk_state <= '3')
125 n += sysfs_emit_at(buf, n, "AES NEW: %s 0x%016llx\n",
126 new_state[ci.new_aes_mk_state - '1'],
127 ci.new_aes_mkvp);
128 else
129 n += sysfs_emit_at(buf, n, "AES NEW: - -\n");
130
131 if (ci.cur_aes_mk_state >= '1' && ci.cur_aes_mk_state <= '2')
132 n += sysfs_emit_at(buf, n, "AES CUR: %s 0x%016llx\n",
133 cao_state[ci.cur_aes_mk_state - '1'],
134 ci.cur_aes_mkvp);
135 else
136 n += sysfs_emit_at(buf, n, "AES CUR: - -\n");
137
138 if (ci.old_aes_mk_state >= '1' && ci.old_aes_mk_state <= '2')
139 n += sysfs_emit_at(buf, n, "AES OLD: %s 0x%016llx\n",
140 cao_state[ci.old_aes_mk_state - '1'],
141 ci.old_aes_mkvp);
142 else
143 n += sysfs_emit_at(buf, n, "AES OLD: - -\n");
144
145 if (ci.new_apka_mk_state >= '1' && ci.new_apka_mk_state <= '3')
146 n += sysfs_emit_at(buf, n, "APKA NEW: %s 0x%016llx\n",
147 new_state[ci.new_apka_mk_state - '1'],
148 ci.new_apka_mkvp);
149 else
150 n += sysfs_emit_at(buf, n, "APKA NEW: - -\n");
151
152 if (ci.cur_apka_mk_state >= '1' && ci.cur_apka_mk_state <= '2')
153 n += sysfs_emit_at(buf, n, "APKA CUR: %s 0x%016llx\n",
154 cao_state[ci.cur_apka_mk_state - '1'],
155 ci.cur_apka_mkvp);
156 else
157 n += sysfs_emit_at(buf, n, "APKA CUR: - -\n");
158
159 if (ci.old_apka_mk_state >= '1' && ci.old_apka_mk_state <= '2')
160 n += sysfs_emit_at(buf, n, "APKA OLD: %s 0x%016llx\n",
161 cao_state[ci.old_apka_mk_state - '1'],
162 ci.old_apka_mkvp);
163 else
164 n += sysfs_emit_at(buf, n, "APKA OLD: - -\n");
165
166 if (ci.new_asym_mk_state >= '1' && ci.new_asym_mk_state <= '3')
167 n += sysfs_emit_at(buf, n, "ASYM NEW: %s 0x%016llx%016llx\n",
168 new_state[ci.new_asym_mk_state - '1'],
169 *((u64 *)(ci.new_asym_mkvp)),
170 *((u64 *)(ci.new_asym_mkvp + sizeof(u64))));
171 else
172 n += sysfs_emit_at(buf, n, "ASYM NEW: - -\n");
173
174 if (ci.cur_asym_mk_state >= '1' && ci.cur_asym_mk_state <= '2')
175 n += sysfs_emit_at(buf, n, "ASYM CUR: %s 0x%016llx%016llx\n",
176 cao_state[ci.cur_asym_mk_state - '1'],
177 *((u64 *)(ci.cur_asym_mkvp)),
178 *((u64 *)(ci.cur_asym_mkvp + sizeof(u64))));
179 else
180 n += sysfs_emit_at(buf, n, "ASYM CUR: - -\n");
181
182 if (ci.old_asym_mk_state >= '1' && ci.old_asym_mk_state <= '2')
183 n += sysfs_emit_at(buf, n, "ASYM OLD: %s 0x%016llx%016llx\n",
184 cao_state[ci.old_asym_mk_state - '1'],
185 *((u64 *)(ci.old_asym_mkvp)),
186 *((u64 *)(ci.old_asym_mkvp + sizeof(u64))));
187 else
188 n += sysfs_emit_at(buf, n, "ASYM OLD: - -\n");
189
190 return n;
191 }
192
193 static struct device_attribute dev_attr_cca_mkvps =
194 __ATTR(mkvps, 0444, cca_mkvps_show, NULL);
195
196 static struct attribute *cca_queue_attrs[] = {
197 &dev_attr_cca_mkvps.attr,
198 NULL,
199 };
200
201 static const struct attribute_group cca_queue_attr_grp = {
202 .attrs = cca_queue_attrs,
203 };
204
205 /*
206 * EP11 card additional device attributes
207 */
ep11_api_ordinalnr_show(struct device * dev,struct device_attribute * attr,char * buf)208 static ssize_t ep11_api_ordinalnr_show(struct device *dev,
209 struct device_attribute *attr,
210 char *buf)
211 {
212 struct ap_card *ac = to_ap_card(dev);
213 struct ep11_card_info ci;
214
215 memset(&ci, 0, sizeof(ci));
216
217 ep11_get_card_info(ac->id, &ci, 0);
218
219 if (ci.API_ord_nr > 0)
220 return sysfs_emit(buf, "%u\n", ci.API_ord_nr);
221 else
222 return sysfs_emit(buf, "\n");
223 }
224
225 static struct device_attribute dev_attr_ep11_api_ordinalnr =
226 __ATTR(API_ordinalnr, 0444, ep11_api_ordinalnr_show, NULL);
227
ep11_fw_version_show(struct device * dev,struct device_attribute * attr,char * buf)228 static ssize_t ep11_fw_version_show(struct device *dev,
229 struct device_attribute *attr,
230 char *buf)
231 {
232 struct ap_card *ac = to_ap_card(dev);
233 struct ep11_card_info ci;
234
235 memset(&ci, 0, sizeof(ci));
236
237 ep11_get_card_info(ac->id, &ci, 0);
238
239 if (ci.FW_version > 0)
240 return sysfs_emit(buf, "%d.%d\n",
241 (int)(ci.FW_version >> 8),
242 (int)(ci.FW_version & 0xFF));
243 else
244 return sysfs_emit(buf, "\n");
245 }
246
247 static struct device_attribute dev_attr_ep11_fw_version =
248 __ATTR(FW_version, 0444, ep11_fw_version_show, NULL);
249
ep11_serialnr_show(struct device * dev,struct device_attribute * attr,char * buf)250 static ssize_t ep11_serialnr_show(struct device *dev,
251 struct device_attribute *attr,
252 char *buf)
253 {
254 struct ap_card *ac = to_ap_card(dev);
255 struct ep11_card_info ci;
256
257 memset(&ci, 0, sizeof(ci));
258
259 ep11_get_card_info(ac->id, &ci, 0);
260
261 if (ci.serial[0])
262 return sysfs_emit(buf, "%16.16s\n", ci.serial);
263 else
264 return sysfs_emit(buf, "\n");
265 }
266
267 static struct device_attribute dev_attr_ep11_serialnr =
268 __ATTR(serialnr, 0444, ep11_serialnr_show, NULL);
269
270 static const struct {
271 int mode_bit;
272 const char *mode_txt;
273 } ep11_op_modes[] = {
274 { 0, "FIPS2009" },
275 { 1, "BSI2009" },
276 { 2, "FIPS2011" },
277 { 3, "BSI2011" },
278 { 4, "SIGG-IMPORT" },
279 { 5, "SIGG" },
280 { 6, "BSICC2017" },
281 { 7, "FIPS2021" },
282 { 8, "FIPS2024" },
283 { 0, NULL }
284 };
285
ep11_card_op_modes_show(struct device * dev,struct device_attribute * attr,char * buf)286 static ssize_t ep11_card_op_modes_show(struct device *dev,
287 struct device_attribute *attr,
288 char *buf)
289 {
290 struct ap_card *ac = to_ap_card(dev);
291 struct ep11_card_info ci;
292 int i, n = 0;
293
294 memset(&ci, 0, sizeof(ci));
295
296 ep11_get_card_info(ac->id, &ci, 0);
297
298 for (i = 0; ep11_op_modes[i].mode_txt; i++) {
299 if (ci.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
300 if (n > 0)
301 buf[n++] = ' ';
302 n += sysfs_emit_at(buf, n, "%s",
303 ep11_op_modes[i].mode_txt);
304 }
305 }
306 n += sysfs_emit_at(buf, n, "\n");
307
308 return n;
309 }
310
311 static struct device_attribute dev_attr_ep11_card_op_modes =
312 __ATTR(op_modes, 0444, ep11_card_op_modes_show, NULL);
313
314 static struct attribute *ep11_card_attrs[] = {
315 &dev_attr_ep11_api_ordinalnr.attr,
316 &dev_attr_ep11_fw_version.attr,
317 &dev_attr_ep11_serialnr.attr,
318 &dev_attr_ep11_card_op_modes.attr,
319 NULL,
320 };
321
322 static const struct attribute_group ep11_card_attr_grp = {
323 .attrs = ep11_card_attrs,
324 };
325
326 /*
327 * EP11 queue additional device attributes
328 */
329
ep11_mkvps_show(struct device * dev,struct device_attribute * attr,char * buf)330 static ssize_t ep11_mkvps_show(struct device *dev,
331 struct device_attribute *attr,
332 char *buf)
333 {
334 struct zcrypt_queue *zq = dev_get_drvdata(dev);
335 int n = 0;
336 struct ep11_domain_info di;
337 static const char * const cwk_state[] = { "invalid", "valid" };
338 static const char * const nwk_state[] = { "empty", "uncommitted",
339 "committed" };
340
341 memset(&di, 0, sizeof(di));
342
343 if (zq->online)
344 ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
345 AP_QID_QUEUE(zq->queue->qid),
346 &di, 0);
347
348 if (di.cur_wk_state == '0') {
349 n = sysfs_emit(buf, "WK CUR: %s -\n",
350 cwk_state[di.cur_wk_state - '0']);
351 } else if (di.cur_wk_state == '1') {
352 n = sysfs_emit(buf, "WK CUR: %s 0x",
353 cwk_state[di.cur_wk_state - '0']);
354 bin2hex(buf + n, di.cur_wkvp, sizeof(di.cur_wkvp));
355 n += 2 * sizeof(di.cur_wkvp);
356 n += sysfs_emit_at(buf, n, "\n");
357 } else {
358 n = sysfs_emit(buf, "WK CUR: - -\n");
359 }
360
361 if (di.new_wk_state == '0') {
362 n += sysfs_emit_at(buf, n, "WK NEW: %s -\n",
363 nwk_state[di.new_wk_state - '0']);
364 } else if (di.new_wk_state >= '1' && di.new_wk_state <= '2') {
365 n += sysfs_emit_at(buf, n, "WK NEW: %s 0x",
366 nwk_state[di.new_wk_state - '0']);
367 bin2hex(buf + n, di.new_wkvp, sizeof(di.new_wkvp));
368 n += 2 * sizeof(di.new_wkvp);
369 n += sysfs_emit_at(buf, n, "\n");
370 } else {
371 n += sysfs_emit_at(buf, n, "WK NEW: - -\n");
372 }
373
374 return n;
375 }
376
377 static struct device_attribute dev_attr_ep11_mkvps =
378 __ATTR(mkvps, 0444, ep11_mkvps_show, NULL);
379
ep11_queue_op_modes_show(struct device * dev,struct device_attribute * attr,char * buf)380 static ssize_t ep11_queue_op_modes_show(struct device *dev,
381 struct device_attribute *attr,
382 char *buf)
383 {
384 struct zcrypt_queue *zq = dev_get_drvdata(dev);
385 int i, n = 0;
386 struct ep11_domain_info di;
387
388 memset(&di, 0, sizeof(di));
389
390 if (zq->online)
391 ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
392 AP_QID_QUEUE(zq->queue->qid),
393 &di, 0);
394
395 for (i = 0; ep11_op_modes[i].mode_txt; i++) {
396 if (di.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
397 if (n > 0)
398 buf[n++] = ' ';
399 n += sysfs_emit_at(buf, n, "%s",
400 ep11_op_modes[i].mode_txt);
401 }
402 }
403 n += sysfs_emit_at(buf, n, "\n");
404
405 return n;
406 }
407
408 static struct device_attribute dev_attr_ep11_queue_op_modes =
409 __ATTR(op_modes, 0444, ep11_queue_op_modes_show, NULL);
410
411 static struct attribute *ep11_queue_attrs[] = {
412 &dev_attr_ep11_mkvps.attr,
413 &dev_attr_ep11_queue_op_modes.attr,
414 NULL,
415 };
416
417 static const struct attribute_group ep11_queue_attr_grp = {
418 .attrs = ep11_queue_attrs,
419 };
420
421 /*
422 * Probe function for CEX[45678] card device. It always
423 * accepts the AP device since the bus_match already checked
424 * the hardware type.
425 * @ap_dev: pointer to the AP device.
426 */
zcrypt_cex4_card_probe(struct ap_device * ap_dev)427 static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
428 {
429 /*
430 * Normalized speed ratings per crypto adapter
431 * MEX_1k, MEX_2k, MEX_4k, CRT_1k, CRT_2k, CRT_4k, RNG, SECKEY
432 */
433 static const int CEX4A_SPEED_IDX[NUM_OPS] = {
434 14, 19, 249, 42, 228, 1458, 0, 0};
435 static const int CEX5A_SPEED_IDX[NUM_OPS] = {
436 8, 9, 20, 18, 66, 458, 0, 0};
437 static const int CEX6A_SPEED_IDX[NUM_OPS] = {
438 6, 9, 20, 17, 65, 438, 0, 0};
439 static const int CEX7A_SPEED_IDX[NUM_OPS] = {
440 6, 8, 17, 15, 54, 362, 0, 0};
441 static const int CEX8A_SPEED_IDX[NUM_OPS] = {
442 6, 8, 17, 15, 54, 362, 0, 0};
443
444 static const int CEX4C_SPEED_IDX[NUM_OPS] = {
445 59, 69, 308, 83, 278, 2204, 209, 40};
446 static const int CEX5C_SPEED_IDX[] = {
447 24, 31, 50, 37, 90, 479, 27, 10};
448 static const int CEX6C_SPEED_IDX[NUM_OPS] = {
449 16, 20, 32, 27, 77, 455, 24, 9};
450 static const int CEX7C_SPEED_IDX[NUM_OPS] = {
451 14, 16, 26, 23, 64, 376, 23, 8};
452 static const int CEX8C_SPEED_IDX[NUM_OPS] = {
453 14, 16, 26, 23, 64, 376, 23, 8};
454
455 static const int CEX4P_SPEED_IDX[NUM_OPS] = {
456 0, 0, 0, 0, 0, 0, 0, 50};
457 static const int CEX5P_SPEED_IDX[NUM_OPS] = {
458 0, 0, 0, 0, 0, 0, 0, 10};
459 static const int CEX6P_SPEED_IDX[NUM_OPS] = {
460 0, 0, 0, 0, 0, 0, 0, 9};
461 static const int CEX7P_SPEED_IDX[NUM_OPS] = {
462 0, 0, 0, 0, 0, 0, 0, 8};
463 static const int CEX8P_SPEED_IDX[NUM_OPS] = {
464 0, 0, 0, 0, 0, 0, 0, 8};
465
466 struct ap_card *ac = to_ap_card(&ap_dev->device);
467 struct zcrypt_card *zc;
468 int rc = 0;
469
470 zc = zcrypt_card_alloc();
471 if (!zc)
472 return -ENOMEM;
473 zc->card = ac;
474 dev_set_drvdata(&ap_dev->device, zc);
475 if (ac->hwinfo.accel) {
476 if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
477 zc->type_string = "CEX4A";
478 zc->user_space_type = ZCRYPT_CEX4;
479 zc->speed_rating = CEX4A_SPEED_IDX;
480 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
481 zc->type_string = "CEX5A";
482 zc->user_space_type = ZCRYPT_CEX5;
483 zc->speed_rating = CEX5A_SPEED_IDX;
484 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
485 zc->type_string = "CEX6A";
486 zc->user_space_type = ZCRYPT_CEX6;
487 zc->speed_rating = CEX6A_SPEED_IDX;
488 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX7) {
489 zc->type_string = "CEX7A";
490 zc->speed_rating = CEX7A_SPEED_IDX;
491 /* wrong user space type, just for compatibility
492 * with the ZCRYPT_STATUS_MASK ioctl.
493 */
494 zc->user_space_type = ZCRYPT_CEX6;
495 } else {
496 zc->type_string = "CEX8A";
497 zc->speed_rating = CEX8A_SPEED_IDX;
498 /* wrong user space type, just for compatibility
499 * with the ZCRYPT_STATUS_MASK ioctl.
500 */
501 zc->user_space_type = ZCRYPT_CEX6;
502 }
503 zc->min_mod_size = CEX4A_MIN_MOD_SIZE;
504 if (ac->hwinfo.mex4k && ac->hwinfo.crt4k) {
505 zc->max_mod_size = CEX4A_MAX_MOD_SIZE_4K;
506 zc->max_exp_bit_length =
507 CEX4A_MAX_MOD_SIZE_4K;
508 } else {
509 zc->max_mod_size = CEX4A_MAX_MOD_SIZE_2K;
510 zc->max_exp_bit_length =
511 CEX4A_MAX_MOD_SIZE_2K;
512 }
513 } else if (ac->hwinfo.cca) {
514 if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
515 zc->type_string = "CEX4C";
516 zc->speed_rating = CEX4C_SPEED_IDX;
517 /* wrong user space type, must be CEX3C
518 * just keep it for cca compatibility
519 */
520 zc->user_space_type = ZCRYPT_CEX3C;
521 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
522 zc->type_string = "CEX5C";
523 zc->speed_rating = CEX5C_SPEED_IDX;
524 /* wrong user space type, must be CEX3C
525 * just keep it for cca compatibility
526 */
527 zc->user_space_type = ZCRYPT_CEX3C;
528 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
529 zc->type_string = "CEX6C";
530 zc->speed_rating = CEX6C_SPEED_IDX;
531 /* wrong user space type, must be CEX3C
532 * just keep it for cca compatibility
533 */
534 zc->user_space_type = ZCRYPT_CEX3C;
535 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX7) {
536 zc->type_string = "CEX7C";
537 zc->speed_rating = CEX7C_SPEED_IDX;
538 /* wrong user space type, must be CEX3C
539 * just keep it for cca compatibility
540 */
541 zc->user_space_type = ZCRYPT_CEX3C;
542 } else {
543 zc->type_string = "CEX8C";
544 zc->speed_rating = CEX8C_SPEED_IDX;
545 /* wrong user space type, must be CEX3C
546 * just keep it for cca compatibility
547 */
548 zc->user_space_type = ZCRYPT_CEX3C;
549 }
550 zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
551 zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
552 zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
553 } else if (ac->hwinfo.ep11) {
554 if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
555 zc->type_string = "CEX4P";
556 zc->user_space_type = ZCRYPT_CEX4;
557 zc->speed_rating = CEX4P_SPEED_IDX;
558 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
559 zc->type_string = "CEX5P";
560 zc->user_space_type = ZCRYPT_CEX5;
561 zc->speed_rating = CEX5P_SPEED_IDX;
562 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
563 zc->type_string = "CEX6P";
564 zc->user_space_type = ZCRYPT_CEX6;
565 zc->speed_rating = CEX6P_SPEED_IDX;
566 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX7) {
567 zc->type_string = "CEX7P";
568 zc->speed_rating = CEX7P_SPEED_IDX;
569 /* wrong user space type, just for compatibility
570 * with the ZCRYPT_STATUS_MASK ioctl.
571 */
572 zc->user_space_type = ZCRYPT_CEX6;
573 } else {
574 zc->type_string = "CEX8P";
575 zc->speed_rating = CEX8P_SPEED_IDX;
576 /* wrong user space type, just for compatibility
577 * with the ZCRYPT_STATUS_MASK ioctl.
578 */
579 zc->user_space_type = ZCRYPT_CEX6;
580 }
581 zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
582 zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
583 zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
584 } else {
585 zcrypt_card_free(zc);
586 return -ENODEV;
587 }
588 zc->online = 1;
589
590 rc = zcrypt_card_register(zc);
591 if (rc) {
592 zcrypt_card_free(zc);
593 return rc;
594 }
595
596 if (ac->hwinfo.cca) {
597 rc = sysfs_create_group(&ap_dev->device.kobj,
598 &cca_card_attr_grp);
599 if (rc) {
600 zcrypt_card_unregister(zc);
601 zcrypt_card_free(zc);
602 }
603 } else if (ac->hwinfo.ep11) {
604 rc = sysfs_create_group(&ap_dev->device.kobj,
605 &ep11_card_attr_grp);
606 if (rc) {
607 zcrypt_card_unregister(zc);
608 zcrypt_card_free(zc);
609 }
610 }
611
612 return rc;
613 }
614
615 /*
616 * This is called to remove the CEX[45678] card driver
617 * information if an AP card device is removed.
618 */
zcrypt_cex4_card_remove(struct ap_device * ap_dev)619 static void zcrypt_cex4_card_remove(struct ap_device *ap_dev)
620 {
621 struct zcrypt_card *zc = dev_get_drvdata(&ap_dev->device);
622 struct ap_card *ac = to_ap_card(&ap_dev->device);
623
624 if (ac->hwinfo.cca)
625 sysfs_remove_group(&ap_dev->device.kobj, &cca_card_attr_grp);
626 else if (ac->hwinfo.ep11)
627 sysfs_remove_group(&ap_dev->device.kobj, &ep11_card_attr_grp);
628
629 zcrypt_card_unregister(zc);
630 }
631
632 static struct ap_driver zcrypt_cex4_card_driver = {
633 .probe = zcrypt_cex4_card_probe,
634 .remove = zcrypt_cex4_card_remove,
635 .ids = zcrypt_cex4_card_ids,
636 .flags = AP_DRIVER_FLAG_DEFAULT,
637 };
638
639 /*
640 * Probe function for CEX[45678] queue device. It always
641 * accepts the AP device since the bus_match already checked
642 * the hardware type.
643 * @ap_dev: pointer to the AP device.
644 */
zcrypt_cex4_queue_probe(struct ap_device * ap_dev)645 static int zcrypt_cex4_queue_probe(struct ap_device *ap_dev)
646 {
647 struct ap_queue *aq = to_ap_queue(&ap_dev->device);
648 struct zcrypt_queue *zq;
649 int rc;
650
651 if (aq->card->hwinfo.accel) {
652 zq = zcrypt_queue_alloc(aq->card->maxmsgsize);
653 if (!zq)
654 return -ENOMEM;
655 zq->ops = zcrypt_msgtype(MSGTYPE50_NAME,
656 MSGTYPE50_VARIANT_DEFAULT);
657 } else if (aq->card->hwinfo.cca) {
658 zq = zcrypt_queue_alloc(aq->card->maxmsgsize);
659 if (!zq)
660 return -ENOMEM;
661 zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
662 MSGTYPE06_VARIANT_DEFAULT);
663 } else if (aq->card->hwinfo.ep11) {
664 zq = zcrypt_queue_alloc(aq->card->maxmsgsize);
665 if (!zq)
666 return -ENOMEM;
667 zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
668 MSGTYPE06_VARIANT_EP11);
669 } else {
670 return -ENODEV;
671 }
672
673 zq->queue = aq;
674 zq->online = 1;
675 atomic_set(&zq->load, 0);
676 ap_queue_init_state(aq);
677 ap_queue_init_reply(aq, &zq->reply);
678 aq->request_timeout = CEX4_CLEANUP_TIME;
679 dev_set_drvdata(&ap_dev->device, zq);
680 rc = zcrypt_queue_register(zq);
681 if (rc) {
682 zcrypt_queue_free(zq);
683 return rc;
684 }
685
686 if (aq->card->hwinfo.cca) {
687 rc = sysfs_create_group(&ap_dev->device.kobj,
688 &cca_queue_attr_grp);
689 if (rc) {
690 zcrypt_queue_unregister(zq);
691 zcrypt_queue_free(zq);
692 }
693 } else if (aq->card->hwinfo.ep11) {
694 rc = sysfs_create_group(&ap_dev->device.kobj,
695 &ep11_queue_attr_grp);
696 if (rc) {
697 zcrypt_queue_unregister(zq);
698 zcrypt_queue_free(zq);
699 }
700 }
701
702 return rc;
703 }
704
705 /*
706 * This is called to remove the CEX[45678] queue driver
707 * information if an AP queue device is removed.
708 */
zcrypt_cex4_queue_remove(struct ap_device * ap_dev)709 static void zcrypt_cex4_queue_remove(struct ap_device *ap_dev)
710 {
711 struct zcrypt_queue *zq = dev_get_drvdata(&ap_dev->device);
712 struct ap_queue *aq = to_ap_queue(&ap_dev->device);
713
714 if (aq->card->hwinfo.cca)
715 sysfs_remove_group(&ap_dev->device.kobj, &cca_queue_attr_grp);
716 else if (aq->card->hwinfo.ep11)
717 sysfs_remove_group(&ap_dev->device.kobj, &ep11_queue_attr_grp);
718
719 zcrypt_queue_unregister(zq);
720 }
721
722 static struct ap_driver zcrypt_cex4_queue_driver = {
723 .probe = zcrypt_cex4_queue_probe,
724 .remove = zcrypt_cex4_queue_remove,
725 .ids = zcrypt_cex4_queue_ids,
726 .flags = AP_DRIVER_FLAG_DEFAULT,
727 };
728
zcrypt_cex4_init(void)729 int __init zcrypt_cex4_init(void)
730 {
731 int rc;
732
733 rc = ap_driver_register(&zcrypt_cex4_card_driver,
734 THIS_MODULE, "cex4card");
735 if (rc)
736 return rc;
737
738 rc = ap_driver_register(&zcrypt_cex4_queue_driver,
739 THIS_MODULE, "cex4queue");
740 if (rc)
741 ap_driver_unregister(&zcrypt_cex4_card_driver);
742
743 return rc;
744 }
745
zcrypt_cex4_exit(void)746 void __exit zcrypt_cex4_exit(void)
747 {
748 ap_driver_unregister(&zcrypt_cex4_queue_driver);
749 ap_driver_unregister(&zcrypt_cex4_card_driver);
750 }
751
752 module_init(zcrypt_cex4_init);
753 module_exit(zcrypt_cex4_exit);
754