1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * Copyright IBM Corp. 2012, 2022
4 * Author(s): Holger Dengler <hd@linux.vnet.ibm.com>
5 */
6
7 #include <linux/module.h>
8 #include <linux/slab.h>
9 #include <linux/init.h>
10 #include <linux/err.h>
11 #include <linux/atomic.h>
12 #include <linux/uaccess.h>
13 #include <linux/mod_devicetable.h>
14
15 #include "ap_bus.h"
16 #include "zcrypt_api.h"
17 #include "zcrypt_msgtype6.h"
18 #include "zcrypt_msgtype50.h"
19 #include "zcrypt_error.h"
20 #include "zcrypt_cex4.h"
21 #include "zcrypt_ccamisc.h"
22 #include "zcrypt_ep11misc.h"
23
24 #define CEX4A_MIN_MOD_SIZE 1 /* 8 bits */
25 #define CEX4A_MAX_MOD_SIZE_2K 256 /* 2048 bits */
26 #define CEX4A_MAX_MOD_SIZE_4K 512 /* 4096 bits */
27
28 #define CEX4C_MIN_MOD_SIZE 16 /* 256 bits */
29 #define CEX4C_MAX_MOD_SIZE 512 /* 4096 bits */
30
31 /* Waiting time for requests to be processed.
32 * Currently there are some types of request which are not deterministic.
33 * But the maximum time limit managed by the stomper code is set to 60sec.
34 * Hence we have to wait at least that time period.
35 */
36 #define CEX4_CLEANUP_TIME (900 * HZ)
37
38 MODULE_AUTHOR("IBM Corporation");
39 MODULE_DESCRIPTION("CEX[45678] Cryptographic Card device driver, " \
40 "Copyright IBM Corp. 2022");
41 MODULE_LICENSE("GPL");
42
43 static struct ap_device_id zcrypt_cex4_card_ids[] = {
44 { .dev_type = AP_DEVICE_TYPE_CEX4,
45 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
46 { .dev_type = AP_DEVICE_TYPE_CEX5,
47 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
48 { .dev_type = AP_DEVICE_TYPE_CEX6,
49 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
50 { .dev_type = AP_DEVICE_TYPE_CEX7,
51 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
52 { .dev_type = AP_DEVICE_TYPE_CEX8,
53 .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
54 { /* end of list */ },
55 };
56
57 MODULE_DEVICE_TABLE(ap, zcrypt_cex4_card_ids);
58
59 static struct ap_device_id zcrypt_cex4_queue_ids[] = {
60 { .dev_type = AP_DEVICE_TYPE_CEX4,
61 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
62 { .dev_type = AP_DEVICE_TYPE_CEX5,
63 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
64 { .dev_type = AP_DEVICE_TYPE_CEX6,
65 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
66 { .dev_type = AP_DEVICE_TYPE_CEX7,
67 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
68 { .dev_type = AP_DEVICE_TYPE_CEX8,
69 .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
70 { /* end of list */ },
71 };
72
73 MODULE_DEVICE_TABLE(ap, zcrypt_cex4_queue_ids);
74
75 /*
76 * CCA card additional device attributes
77 */
cca_serialnr_show(struct device * dev,struct device_attribute * attr,char * buf)78 static ssize_t cca_serialnr_show(struct device *dev,
79 struct device_attribute *attr,
80 char *buf)
81 {
82 struct zcrypt_card *zc = dev_get_drvdata(dev);
83 struct cca_info ci;
84 struct ap_card *ac = to_ap_card(dev);
85
86 memset(&ci, 0, sizeof(ci));
87
88 if (ap_domain_index >= 0)
89 cca_get_info(ac->id, ap_domain_index, &ci, zc->online);
90
91 return scnprintf(buf, PAGE_SIZE, "%s\n", ci.serial);
92 }
93
94 static struct device_attribute dev_attr_cca_serialnr =
95 __ATTR(serialnr, 0444, cca_serialnr_show, NULL);
96
97 static struct attribute *cca_card_attrs[] = {
98 &dev_attr_cca_serialnr.attr,
99 NULL,
100 };
101
102 static const struct attribute_group cca_card_attr_grp = {
103 .attrs = cca_card_attrs,
104 };
105
106 /*
107 * CCA queue additional device attributes
108 */
cca_mkvps_show(struct device * dev,struct device_attribute * attr,char * buf)109 static ssize_t cca_mkvps_show(struct device *dev,
110 struct device_attribute *attr,
111 char *buf)
112 {
113 struct zcrypt_queue *zq = dev_get_drvdata(dev);
114 int n = 0;
115 struct cca_info ci;
116 static const char * const cao_state[] = { "invalid", "valid" };
117 static const char * const new_state[] = { "empty", "partial", "full" };
118
119 memset(&ci, 0, sizeof(ci));
120
121 cca_get_info(AP_QID_CARD(zq->queue->qid),
122 AP_QID_QUEUE(zq->queue->qid),
123 &ci, zq->online);
124
125 if (ci.new_aes_mk_state >= '1' && ci.new_aes_mk_state <= '3')
126 n += scnprintf(buf + n, PAGE_SIZE,
127 "AES NEW: %s 0x%016llx\n",
128 new_state[ci.new_aes_mk_state - '1'],
129 ci.new_aes_mkvp);
130 else
131 n += scnprintf(buf + n, PAGE_SIZE, "AES NEW: - -\n");
132
133 if (ci.cur_aes_mk_state >= '1' && ci.cur_aes_mk_state <= '2')
134 n += scnprintf(buf + n, PAGE_SIZE - n,
135 "AES CUR: %s 0x%016llx\n",
136 cao_state[ci.cur_aes_mk_state - '1'],
137 ci.cur_aes_mkvp);
138 else
139 n += scnprintf(buf + n, PAGE_SIZE - n, "AES CUR: - -\n");
140
141 if (ci.old_aes_mk_state >= '1' && ci.old_aes_mk_state <= '2')
142 n += scnprintf(buf + n, PAGE_SIZE - n,
143 "AES OLD: %s 0x%016llx\n",
144 cao_state[ci.old_aes_mk_state - '1'],
145 ci.old_aes_mkvp);
146 else
147 n += scnprintf(buf + n, PAGE_SIZE - n, "AES OLD: - -\n");
148
149 if (ci.new_apka_mk_state >= '1' && ci.new_apka_mk_state <= '3')
150 n += scnprintf(buf + n, PAGE_SIZE - n,
151 "APKA NEW: %s 0x%016llx\n",
152 new_state[ci.new_apka_mk_state - '1'],
153 ci.new_apka_mkvp);
154 else
155 n += scnprintf(buf + n, PAGE_SIZE - n, "APKA NEW: - -\n");
156
157 if (ci.cur_apka_mk_state >= '1' && ci.cur_apka_mk_state <= '2')
158 n += scnprintf(buf + n, PAGE_SIZE - n,
159 "APKA CUR: %s 0x%016llx\n",
160 cao_state[ci.cur_apka_mk_state - '1'],
161 ci.cur_apka_mkvp);
162 else
163 n += scnprintf(buf + n, PAGE_SIZE - n, "APKA CUR: - -\n");
164
165 if (ci.old_apka_mk_state >= '1' && ci.old_apka_mk_state <= '2')
166 n += scnprintf(buf + n, PAGE_SIZE - n,
167 "APKA OLD: %s 0x%016llx\n",
168 cao_state[ci.old_apka_mk_state - '1'],
169 ci.old_apka_mkvp);
170 else
171 n += scnprintf(buf + n, PAGE_SIZE - n, "APKA OLD: - -\n");
172
173 if (ci.new_asym_mk_state >= '1' && ci.new_asym_mk_state <= '3')
174 n += scnprintf(buf + n, PAGE_SIZE,
175 "ASYM NEW: %s 0x%016llx%016llx\n",
176 new_state[ci.new_asym_mk_state - '1'],
177 *((u64 *)(ci.new_asym_mkvp)),
178 *((u64 *)(ci.new_asym_mkvp + sizeof(u64))));
179 else
180 n += scnprintf(buf + n, PAGE_SIZE, "ASYM NEW: - -\n");
181
182 if (ci.cur_asym_mk_state >= '1' && ci.cur_asym_mk_state <= '2')
183 n += scnprintf(buf + n, PAGE_SIZE - n,
184 "ASYM CUR: %s 0x%016llx%016llx\n",
185 cao_state[ci.cur_asym_mk_state - '1'],
186 *((u64 *)(ci.cur_asym_mkvp)),
187 *((u64 *)(ci.cur_asym_mkvp + sizeof(u64))));
188 else
189 n += scnprintf(buf + n, PAGE_SIZE - n, "ASYM CUR: - -\n");
190
191 if (ci.old_asym_mk_state >= '1' && ci.old_asym_mk_state <= '2')
192 n += scnprintf(buf + n, PAGE_SIZE - n,
193 "ASYM OLD: %s 0x%016llx%016llx\n",
194 cao_state[ci.old_asym_mk_state - '1'],
195 *((u64 *)(ci.old_asym_mkvp)),
196 *((u64 *)(ci.old_asym_mkvp + sizeof(u64))));
197 else
198 n += scnprintf(buf + n, PAGE_SIZE - n, "ASYM OLD: - -\n");
199
200 return n;
201 }
202
203 static struct device_attribute dev_attr_cca_mkvps =
204 __ATTR(mkvps, 0444, cca_mkvps_show, NULL);
205
206 static struct attribute *cca_queue_attrs[] = {
207 &dev_attr_cca_mkvps.attr,
208 NULL,
209 };
210
211 static const struct attribute_group cca_queue_attr_grp = {
212 .attrs = cca_queue_attrs,
213 };
214
215 /*
216 * EP11 card additional device attributes
217 */
ep11_api_ordinalnr_show(struct device * dev,struct device_attribute * attr,char * buf)218 static ssize_t ep11_api_ordinalnr_show(struct device *dev,
219 struct device_attribute *attr,
220 char *buf)
221 {
222 struct zcrypt_card *zc = dev_get_drvdata(dev);
223 struct ep11_card_info ci;
224 struct ap_card *ac = to_ap_card(dev);
225
226 memset(&ci, 0, sizeof(ci));
227
228 ep11_get_card_info(ac->id, &ci, zc->online);
229
230 if (ci.API_ord_nr > 0)
231 return scnprintf(buf, PAGE_SIZE, "%u\n", ci.API_ord_nr);
232 else
233 return scnprintf(buf, PAGE_SIZE, "\n");
234 }
235
236 static struct device_attribute dev_attr_ep11_api_ordinalnr =
237 __ATTR(API_ordinalnr, 0444, ep11_api_ordinalnr_show, NULL);
238
ep11_fw_version_show(struct device * dev,struct device_attribute * attr,char * buf)239 static ssize_t ep11_fw_version_show(struct device *dev,
240 struct device_attribute *attr,
241 char *buf)
242 {
243 struct zcrypt_card *zc = dev_get_drvdata(dev);
244 struct ep11_card_info ci;
245 struct ap_card *ac = to_ap_card(dev);
246
247 memset(&ci, 0, sizeof(ci));
248
249 ep11_get_card_info(ac->id, &ci, zc->online);
250
251 if (ci.FW_version > 0)
252 return scnprintf(buf, PAGE_SIZE, "%d.%d\n",
253 (int)(ci.FW_version >> 8),
254 (int)(ci.FW_version & 0xFF));
255 else
256 return scnprintf(buf, PAGE_SIZE, "\n");
257 }
258
259 static struct device_attribute dev_attr_ep11_fw_version =
260 __ATTR(FW_version, 0444, ep11_fw_version_show, NULL);
261
ep11_serialnr_show(struct device * dev,struct device_attribute * attr,char * buf)262 static ssize_t ep11_serialnr_show(struct device *dev,
263 struct device_attribute *attr,
264 char *buf)
265 {
266 struct zcrypt_card *zc = dev_get_drvdata(dev);
267 struct ep11_card_info ci;
268 struct ap_card *ac = to_ap_card(dev);
269
270 memset(&ci, 0, sizeof(ci));
271
272 ep11_get_card_info(ac->id, &ci, zc->online);
273
274 if (ci.serial[0])
275 return scnprintf(buf, PAGE_SIZE, "%16.16s\n", ci.serial);
276 else
277 return scnprintf(buf, PAGE_SIZE, "\n");
278 }
279
280 static struct device_attribute dev_attr_ep11_serialnr =
281 __ATTR(serialnr, 0444, ep11_serialnr_show, NULL);
282
283 static const struct {
284 int mode_bit;
285 const char *mode_txt;
286 } ep11_op_modes[] = {
287 { 0, "FIPS2009" },
288 { 1, "BSI2009" },
289 { 2, "FIPS2011" },
290 { 3, "BSI2011" },
291 { 6, "BSICC2017" },
292 { 0, NULL }
293 };
294
ep11_card_op_modes_show(struct device * dev,struct device_attribute * attr,char * buf)295 static ssize_t ep11_card_op_modes_show(struct device *dev,
296 struct device_attribute *attr,
297 char *buf)
298 {
299 struct zcrypt_card *zc = dev_get_drvdata(dev);
300 int i, n = 0;
301 struct ep11_card_info ci;
302 struct ap_card *ac = to_ap_card(dev);
303
304 memset(&ci, 0, sizeof(ci));
305
306 ep11_get_card_info(ac->id, &ci, zc->online);
307
308 for (i = 0; ep11_op_modes[i].mode_txt; i++) {
309 if (ci.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
310 if (n > 0)
311 buf[n++] = ' ';
312 n += scnprintf(buf + n, PAGE_SIZE - n,
313 "%s", ep11_op_modes[i].mode_txt);
314 }
315 }
316 n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
317
318 return n;
319 }
320
321 static struct device_attribute dev_attr_ep11_card_op_modes =
322 __ATTR(op_modes, 0444, ep11_card_op_modes_show, NULL);
323
324 static struct attribute *ep11_card_attrs[] = {
325 &dev_attr_ep11_api_ordinalnr.attr,
326 &dev_attr_ep11_fw_version.attr,
327 &dev_attr_ep11_serialnr.attr,
328 &dev_attr_ep11_card_op_modes.attr,
329 NULL,
330 };
331
332 static const struct attribute_group ep11_card_attr_grp = {
333 .attrs = ep11_card_attrs,
334 };
335
336 /*
337 * EP11 queue additional device attributes
338 */
339
ep11_mkvps_show(struct device * dev,struct device_attribute * attr,char * buf)340 static ssize_t ep11_mkvps_show(struct device *dev,
341 struct device_attribute *attr,
342 char *buf)
343 {
344 struct zcrypt_queue *zq = dev_get_drvdata(dev);
345 int n = 0;
346 struct ep11_domain_info di;
347 static const char * const cwk_state[] = { "invalid", "valid" };
348 static const char * const nwk_state[] = { "empty", "uncommitted",
349 "committed" };
350
351 memset(&di, 0, sizeof(di));
352
353 if (zq->online)
354 ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
355 AP_QID_QUEUE(zq->queue->qid),
356 &di);
357
358 if (di.cur_wk_state == '0') {
359 n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s -\n",
360 cwk_state[di.cur_wk_state - '0']);
361 } else if (di.cur_wk_state == '1') {
362 n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s 0x",
363 cwk_state[di.cur_wk_state - '0']);
364 bin2hex(buf + n, di.cur_wkvp, sizeof(di.cur_wkvp));
365 n += 2 * sizeof(di.cur_wkvp);
366 n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
367 } else {
368 n = scnprintf(buf, PAGE_SIZE, "WK CUR: - -\n");
369 }
370
371 if (di.new_wk_state == '0') {
372 n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s -\n",
373 nwk_state[di.new_wk_state - '0']);
374 } else if (di.new_wk_state >= '1' && di.new_wk_state <= '2') {
375 n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s 0x",
376 nwk_state[di.new_wk_state - '0']);
377 bin2hex(buf + n, di.new_wkvp, sizeof(di.new_wkvp));
378 n += 2 * sizeof(di.new_wkvp);
379 n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
380 } else {
381 n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: - -\n");
382 }
383
384 return n;
385 }
386
387 static struct device_attribute dev_attr_ep11_mkvps =
388 __ATTR(mkvps, 0444, ep11_mkvps_show, NULL);
389
ep11_queue_op_modes_show(struct device * dev,struct device_attribute * attr,char * buf)390 static ssize_t ep11_queue_op_modes_show(struct device *dev,
391 struct device_attribute *attr,
392 char *buf)
393 {
394 struct zcrypt_queue *zq = dev_get_drvdata(dev);
395 int i, n = 0;
396 struct ep11_domain_info di;
397
398 memset(&di, 0, sizeof(di));
399
400 if (zq->online)
401 ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
402 AP_QID_QUEUE(zq->queue->qid),
403 &di);
404
405 for (i = 0; ep11_op_modes[i].mode_txt; i++) {
406 if (di.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
407 if (n > 0)
408 buf[n++] = ' ';
409 n += scnprintf(buf + n, PAGE_SIZE - n,
410 "%s", ep11_op_modes[i].mode_txt);
411 }
412 }
413 n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
414
415 return n;
416 }
417
418 static struct device_attribute dev_attr_ep11_queue_op_modes =
419 __ATTR(op_modes, 0444, ep11_queue_op_modes_show, NULL);
420
421 static struct attribute *ep11_queue_attrs[] = {
422 &dev_attr_ep11_mkvps.attr,
423 &dev_attr_ep11_queue_op_modes.attr,
424 NULL,
425 };
426
427 static const struct attribute_group ep11_queue_attr_grp = {
428 .attrs = ep11_queue_attrs,
429 };
430
431 /*
432 * Probe function for CEX[45678] card device. It always
433 * accepts the AP device since the bus_match already checked
434 * the hardware type.
435 * @ap_dev: pointer to the AP device.
436 */
zcrypt_cex4_card_probe(struct ap_device * ap_dev)437 static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
438 {
439 /*
440 * Normalized speed ratings per crypto adapter
441 * MEX_1k, MEX_2k, MEX_4k, CRT_1k, CRT_2k, CRT_4k, RNG, SECKEY
442 */
443 static const int CEX4A_SPEED_IDX[NUM_OPS] = {
444 14, 19, 249, 42, 228, 1458, 0, 0};
445 static const int CEX5A_SPEED_IDX[NUM_OPS] = {
446 8, 9, 20, 18, 66, 458, 0, 0};
447 static const int CEX6A_SPEED_IDX[NUM_OPS] = {
448 6, 9, 20, 17, 65, 438, 0, 0};
449 static const int CEX7A_SPEED_IDX[NUM_OPS] = {
450 6, 8, 17, 15, 54, 362, 0, 0};
451 static const int CEX8A_SPEED_IDX[NUM_OPS] = {
452 6, 8, 17, 15, 54, 362, 0, 0};
453
454 static const int CEX4C_SPEED_IDX[NUM_OPS] = {
455 59, 69, 308, 83, 278, 2204, 209, 40};
456 static const int CEX5C_SPEED_IDX[] = {
457 24, 31, 50, 37, 90, 479, 27, 10};
458 static const int CEX6C_SPEED_IDX[NUM_OPS] = {
459 16, 20, 32, 27, 77, 455, 24, 9};
460 static const int CEX7C_SPEED_IDX[NUM_OPS] = {
461 14, 16, 26, 23, 64, 376, 23, 8};
462 static const int CEX8C_SPEED_IDX[NUM_OPS] = {
463 14, 16, 26, 23, 64, 376, 23, 8};
464
465 static const int CEX4P_SPEED_IDX[NUM_OPS] = {
466 0, 0, 0, 0, 0, 0, 0, 50};
467 static const int CEX5P_SPEED_IDX[NUM_OPS] = {
468 0, 0, 0, 0, 0, 0, 0, 10};
469 static const int CEX6P_SPEED_IDX[NUM_OPS] = {
470 0, 0, 0, 0, 0, 0, 0, 9};
471 static const int CEX7P_SPEED_IDX[NUM_OPS] = {
472 0, 0, 0, 0, 0, 0, 0, 8};
473 static const int CEX8P_SPEED_IDX[NUM_OPS] = {
474 0, 0, 0, 0, 0, 0, 0, 8};
475
476 struct ap_card *ac = to_ap_card(&ap_dev->device);
477 struct zcrypt_card *zc;
478 int rc = 0;
479
480 zc = zcrypt_card_alloc();
481 if (!zc)
482 return -ENOMEM;
483 zc->card = ac;
484 dev_set_drvdata(&ap_dev->device, zc);
485 if (ap_test_bit(&ac->functions, AP_FUNC_ACCEL)) {
486 if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
487 zc->type_string = "CEX4A";
488 zc->user_space_type = ZCRYPT_CEX4;
489 zc->speed_rating = CEX4A_SPEED_IDX;
490 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
491 zc->type_string = "CEX5A";
492 zc->user_space_type = ZCRYPT_CEX5;
493 zc->speed_rating = CEX5A_SPEED_IDX;
494 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
495 zc->type_string = "CEX6A";
496 zc->user_space_type = ZCRYPT_CEX6;
497 zc->speed_rating = CEX6A_SPEED_IDX;
498 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX7) {
499 zc->type_string = "CEX7A";
500 zc->speed_rating = CEX7A_SPEED_IDX;
501 /* wrong user space type, just for compatibility
502 * with the ZCRYPT_STATUS_MASK ioctl.
503 */
504 zc->user_space_type = ZCRYPT_CEX6;
505 } else {
506 zc->type_string = "CEX8A";
507 zc->speed_rating = CEX8A_SPEED_IDX;
508 /* wrong user space type, just for compatibility
509 * with the ZCRYPT_STATUS_MASK ioctl.
510 */
511 zc->user_space_type = ZCRYPT_CEX6;
512 }
513 zc->min_mod_size = CEX4A_MIN_MOD_SIZE;
514 if (ap_test_bit(&ac->functions, AP_FUNC_MEX4K) &&
515 ap_test_bit(&ac->functions, AP_FUNC_CRT4K)) {
516 zc->max_mod_size = CEX4A_MAX_MOD_SIZE_4K;
517 zc->max_exp_bit_length =
518 CEX4A_MAX_MOD_SIZE_4K;
519 } else {
520 zc->max_mod_size = CEX4A_MAX_MOD_SIZE_2K;
521 zc->max_exp_bit_length =
522 CEX4A_MAX_MOD_SIZE_2K;
523 }
524 } else if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) {
525 if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
526 zc->type_string = "CEX4C";
527 zc->speed_rating = CEX4C_SPEED_IDX;
528 /* wrong user space type, must be CEX3C
529 * just keep it for cca compatibility
530 */
531 zc->user_space_type = ZCRYPT_CEX3C;
532 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
533 zc->type_string = "CEX5C";
534 zc->speed_rating = CEX5C_SPEED_IDX;
535 /* wrong user space type, must be CEX3C
536 * just keep it for cca compatibility
537 */
538 zc->user_space_type = ZCRYPT_CEX3C;
539 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
540 zc->type_string = "CEX6C";
541 zc->speed_rating = CEX6C_SPEED_IDX;
542 /* wrong user space type, must be CEX3C
543 * just keep it for cca compatibility
544 */
545 zc->user_space_type = ZCRYPT_CEX3C;
546 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX7) {
547 zc->type_string = "CEX7C";
548 zc->speed_rating = CEX7C_SPEED_IDX;
549 /* wrong user space type, must be CEX3C
550 * just keep it for cca compatibility
551 */
552 zc->user_space_type = ZCRYPT_CEX3C;
553 } else {
554 zc->type_string = "CEX8C";
555 zc->speed_rating = CEX8C_SPEED_IDX;
556 /* wrong user space type, must be CEX3C
557 * just keep it for cca compatibility
558 */
559 zc->user_space_type = ZCRYPT_CEX3C;
560 }
561 zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
562 zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
563 zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
564 } else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) {
565 if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
566 zc->type_string = "CEX4P";
567 zc->user_space_type = ZCRYPT_CEX4;
568 zc->speed_rating = CEX4P_SPEED_IDX;
569 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
570 zc->type_string = "CEX5P";
571 zc->user_space_type = ZCRYPT_CEX5;
572 zc->speed_rating = CEX5P_SPEED_IDX;
573 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
574 zc->type_string = "CEX6P";
575 zc->user_space_type = ZCRYPT_CEX6;
576 zc->speed_rating = CEX6P_SPEED_IDX;
577 } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX7) {
578 zc->type_string = "CEX7P";
579 zc->speed_rating = CEX7P_SPEED_IDX;
580 /* wrong user space type, just for compatibility
581 * with the ZCRYPT_STATUS_MASK ioctl.
582 */
583 zc->user_space_type = ZCRYPT_CEX6;
584 } else {
585 zc->type_string = "CEX8P";
586 zc->speed_rating = CEX8P_SPEED_IDX;
587 /* wrong user space type, just for compatibility
588 * with the ZCRYPT_STATUS_MASK ioctl.
589 */
590 zc->user_space_type = ZCRYPT_CEX6;
591 }
592 zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
593 zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
594 zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
595 } else {
596 zcrypt_card_free(zc);
597 return -ENODEV;
598 }
599 zc->online = 1;
600
601 rc = zcrypt_card_register(zc);
602 if (rc) {
603 zcrypt_card_free(zc);
604 return rc;
605 }
606
607 if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) {
608 rc = sysfs_create_group(&ap_dev->device.kobj,
609 &cca_card_attr_grp);
610 if (rc) {
611 zcrypt_card_unregister(zc);
612 zcrypt_card_free(zc);
613 }
614 } else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) {
615 rc = sysfs_create_group(&ap_dev->device.kobj,
616 &ep11_card_attr_grp);
617 if (rc) {
618 zcrypt_card_unregister(zc);
619 zcrypt_card_free(zc);
620 }
621 }
622
623 return rc;
624 }
625
626 /*
627 * This is called to remove the CEX[45678] card driver
628 * information if an AP card device is removed.
629 */
zcrypt_cex4_card_remove(struct ap_device * ap_dev)630 static void zcrypt_cex4_card_remove(struct ap_device *ap_dev)
631 {
632 struct zcrypt_card *zc = dev_get_drvdata(&ap_dev->device);
633 struct ap_card *ac = to_ap_card(&ap_dev->device);
634
635 if (ap_test_bit(&ac->functions, AP_FUNC_COPRO))
636 sysfs_remove_group(&ap_dev->device.kobj, &cca_card_attr_grp);
637 else if (ap_test_bit(&ac->functions, AP_FUNC_EP11))
638 sysfs_remove_group(&ap_dev->device.kobj, &ep11_card_attr_grp);
639
640 zcrypt_card_unregister(zc);
641 }
642
643 static struct ap_driver zcrypt_cex4_card_driver = {
644 .probe = zcrypt_cex4_card_probe,
645 .remove = zcrypt_cex4_card_remove,
646 .ids = zcrypt_cex4_card_ids,
647 .flags = AP_DRIVER_FLAG_DEFAULT,
648 };
649
650 /*
651 * Probe function for CEX[45678] queue device. It always
652 * accepts the AP device since the bus_match already checked
653 * the hardware type.
654 * @ap_dev: pointer to the AP device.
655 */
zcrypt_cex4_queue_probe(struct ap_device * ap_dev)656 static int zcrypt_cex4_queue_probe(struct ap_device *ap_dev)
657 {
658 struct ap_queue *aq = to_ap_queue(&ap_dev->device);
659 struct zcrypt_queue *zq;
660 int rc;
661
662 if (ap_test_bit(&aq->card->functions, AP_FUNC_ACCEL)) {
663 zq = zcrypt_queue_alloc(aq->card->maxmsgsize);
664 if (!zq)
665 return -ENOMEM;
666 zq->ops = zcrypt_msgtype(MSGTYPE50_NAME,
667 MSGTYPE50_VARIANT_DEFAULT);
668 } else if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) {
669 zq = zcrypt_queue_alloc(aq->card->maxmsgsize);
670 if (!zq)
671 return -ENOMEM;
672 zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
673 MSGTYPE06_VARIANT_DEFAULT);
674 } else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) {
675 zq = zcrypt_queue_alloc(aq->card->maxmsgsize);
676 if (!zq)
677 return -ENOMEM;
678 zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
679 MSGTYPE06_VARIANT_EP11);
680 } else {
681 return -ENODEV;
682 }
683
684 zq->queue = aq;
685 zq->online = 1;
686 atomic_set(&zq->load, 0);
687 ap_queue_init_state(aq);
688 ap_queue_init_reply(aq, &zq->reply);
689 aq->request_timeout = CEX4_CLEANUP_TIME;
690 dev_set_drvdata(&ap_dev->device, zq);
691 rc = zcrypt_queue_register(zq);
692 if (rc) {
693 zcrypt_queue_free(zq);
694 return rc;
695 }
696
697 if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) {
698 rc = sysfs_create_group(&ap_dev->device.kobj,
699 &cca_queue_attr_grp);
700 if (rc) {
701 zcrypt_queue_unregister(zq);
702 zcrypt_queue_free(zq);
703 }
704 } else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) {
705 rc = sysfs_create_group(&ap_dev->device.kobj,
706 &ep11_queue_attr_grp);
707 if (rc) {
708 zcrypt_queue_unregister(zq);
709 zcrypt_queue_free(zq);
710 }
711 }
712
713 return rc;
714 }
715
716 /*
717 * This is called to remove the CEX[45678] queue driver
718 * information if an AP queue device is removed.
719 */
zcrypt_cex4_queue_remove(struct ap_device * ap_dev)720 static void zcrypt_cex4_queue_remove(struct ap_device *ap_dev)
721 {
722 struct zcrypt_queue *zq = dev_get_drvdata(&ap_dev->device);
723 struct ap_queue *aq = to_ap_queue(&ap_dev->device);
724
725 if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO))
726 sysfs_remove_group(&ap_dev->device.kobj, &cca_queue_attr_grp);
727 else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11))
728 sysfs_remove_group(&ap_dev->device.kobj, &ep11_queue_attr_grp);
729
730 zcrypt_queue_unregister(zq);
731 }
732
733 static struct ap_driver zcrypt_cex4_queue_driver = {
734 .probe = zcrypt_cex4_queue_probe,
735 .remove = zcrypt_cex4_queue_remove,
736 .ids = zcrypt_cex4_queue_ids,
737 .flags = AP_DRIVER_FLAG_DEFAULT,
738 };
739
zcrypt_cex4_init(void)740 int __init zcrypt_cex4_init(void)
741 {
742 int rc;
743
744 rc = ap_driver_register(&zcrypt_cex4_card_driver,
745 THIS_MODULE, "cex4card");
746 if (rc)
747 return rc;
748
749 rc = ap_driver_register(&zcrypt_cex4_queue_driver,
750 THIS_MODULE, "cex4queue");
751 if (rc)
752 ap_driver_unregister(&zcrypt_cex4_card_driver);
753
754 return rc;
755 }
756
zcrypt_cex4_exit(void)757 void __exit zcrypt_cex4_exit(void)
758 {
759 ap_driver_unregister(&zcrypt_cex4_queue_driver);
760 ap_driver_unregister(&zcrypt_cex4_card_driver);
761 }
762
763 module_init(zcrypt_cex4_init);
764 module_exit(zcrypt_cex4_exit);
765