forked from Minki/linux
a103950e0d
Pull crypto updates from Herbert Xu: "API: - Enforce the setting of keys for keyed aead/hash/skcipher algorithms. - Add multibuf speed tests in tcrypt. Algorithms: - Improve performance of sha3-generic. - Add native sha512 support on arm64. - Add v8.2 Crypto Extentions version of sha3/sm3 on arm64. - Avoid hmac nesting by requiring underlying algorithm to be unkeyed. - Add cryptd_max_cpu_qlen module parameter to cryptd. Drivers: - Add support for EIP97 engine in inside-secure. - Add inline IPsec support to chelsio. - Add RevB core support to crypto4xx. - Fix AEAD ICV check in crypto4xx. - Add stm32 crypto driver. - Add support for BCM63xx platforms in bcm2835 and remove bcm63xx. - Add Derived Key Protocol (DKP) support in caam. - Add Samsung Exynos True RNG driver. - Add support for Exynos5250+ SoCs in exynos PRNG driver" * 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (166 commits) crypto: picoxcell - Fix error handling in spacc_probe() crypto: arm64/sha512 - fix/improve new v8.2 Crypto Extensions code crypto: arm64/sm3 - new v8.2 Crypto Extensions implementation crypto: arm64/sha3 - new v8.2 Crypto Extensions implementation crypto: testmgr - add new testcases for sha3 crypto: sha3-generic - export init/update/final routines crypto: sha3-generic - simplify code crypto: sha3-generic - rewrite KECCAK transform to help the compiler optimize crypto: sha3-generic - fixes for alignment and big endian operation crypto: aesni - handle zero length dst buffer crypto: artpec6 - remove select on non-existing CRYPTO_SHA384 hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe() crypto: stm32 - remove redundant dev_err call in stm32_cryp_probe() crypto: axis - remove unnecessary platform_get_resource() error check crypto: testmgr - test misuse of result in ahash crypto: inside-secure - make function safexcel_try_push_requests static crypto: aes-generic - fix aes-generic regression on powerpc crypto: chelsio - Fix indentation warning crypto: arm64/sha1-ce - get rid of literal pool crypto: arm64/sha2-ce - move the round constant table to .rodata section ...
620 lines
15 KiB
C
620 lines
15 KiB
C
/*
|
|
* Support for Marvell's Cryptographic Engine and Security Accelerator (CESA)
|
|
* that can be found on the following platform: Orion, Kirkwood, Armada. This
|
|
* driver supports the TDMA engine on platforms on which it is available.
|
|
*
|
|
* Author: Boris Brezillon <boris.brezillon@free-electrons.com>
|
|
* Author: Arnaud Ebalard <arno@natisbad.org>
|
|
*
|
|
* This work is based on an initial version written by
|
|
* Sebastian Andrzej Siewior < sebastian at breakpoint dot cc >
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 as published
|
|
* by the Free Software Foundation.
|
|
*/
|
|
|
|
#include <linux/delay.h>
|
|
#include <linux/dma-mapping.h>
|
|
#include <linux/genalloc.h>
|
|
#include <linux/interrupt.h>
|
|
#include <linux/io.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/mbus.h>
|
|
#include <linux/platform_device.h>
|
|
#include <linux/scatterlist.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/module.h>
|
|
#include <linux/dma-direct.h> /* XXX: drivers shall never use this directly! */
|
|
#include <linux/clk.h>
|
|
#include <linux/of.h>
|
|
#include <linux/of_platform.h>
|
|
#include <linux/of_irq.h>
|
|
|
|
#include "cesa.h"
|
|
|
|
/* Limit of the crypto queue before reaching the backlog */
|
|
#define CESA_CRYPTO_DEFAULT_MAX_QLEN 128
|
|
|
|
struct mv_cesa_dev *cesa_dev;
|
|
|
|
struct crypto_async_request *
|
|
mv_cesa_dequeue_req_locked(struct mv_cesa_engine *engine,
|
|
struct crypto_async_request **backlog)
|
|
{
|
|
struct crypto_async_request *req;
|
|
|
|
*backlog = crypto_get_backlog(&engine->queue);
|
|
req = crypto_dequeue_request(&engine->queue);
|
|
|
|
if (!req)
|
|
return NULL;
|
|
|
|
return req;
|
|
}
|
|
|
|
static void mv_cesa_rearm_engine(struct mv_cesa_engine *engine)
|
|
{
|
|
struct crypto_async_request *req = NULL, *backlog = NULL;
|
|
struct mv_cesa_ctx *ctx;
|
|
|
|
|
|
spin_lock_bh(&engine->lock);
|
|
if (!engine->req) {
|
|
req = mv_cesa_dequeue_req_locked(engine, &backlog);
|
|
engine->req = req;
|
|
}
|
|
spin_unlock_bh(&engine->lock);
|
|
|
|
if (!req)
|
|
return;
|
|
|
|
if (backlog)
|
|
backlog->complete(backlog, -EINPROGRESS);
|
|
|
|
ctx = crypto_tfm_ctx(req->tfm);
|
|
ctx->ops->step(req);
|
|
}
|
|
|
|
static int mv_cesa_std_process(struct mv_cesa_engine *engine, u32 status)
|
|
{
|
|
struct crypto_async_request *req;
|
|
struct mv_cesa_ctx *ctx;
|
|
int res;
|
|
|
|
req = engine->req;
|
|
ctx = crypto_tfm_ctx(req->tfm);
|
|
res = ctx->ops->process(req, status);
|
|
|
|
if (res == 0) {
|
|
ctx->ops->complete(req);
|
|
mv_cesa_engine_enqueue_complete_request(engine, req);
|
|
} else if (res == -EINPROGRESS) {
|
|
ctx->ops->step(req);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
static int mv_cesa_int_process(struct mv_cesa_engine *engine, u32 status)
|
|
{
|
|
if (engine->chain.first && engine->chain.last)
|
|
return mv_cesa_tdma_process(engine, status);
|
|
|
|
return mv_cesa_std_process(engine, status);
|
|
}
|
|
|
|
static inline void
|
|
mv_cesa_complete_req(struct mv_cesa_ctx *ctx, struct crypto_async_request *req,
|
|
int res)
|
|
{
|
|
ctx->ops->cleanup(req);
|
|
local_bh_disable();
|
|
req->complete(req, res);
|
|
local_bh_enable();
|
|
}
|
|
|
|
static irqreturn_t mv_cesa_int(int irq, void *priv)
|
|
{
|
|
struct mv_cesa_engine *engine = priv;
|
|
struct crypto_async_request *req;
|
|
struct mv_cesa_ctx *ctx;
|
|
u32 status, mask;
|
|
irqreturn_t ret = IRQ_NONE;
|
|
|
|
while (true) {
|
|
int res;
|
|
|
|
mask = mv_cesa_get_int_mask(engine);
|
|
status = readl(engine->regs + CESA_SA_INT_STATUS);
|
|
|
|
if (!(status & mask))
|
|
break;
|
|
|
|
/*
|
|
* TODO: avoid clearing the FPGA_INT_STATUS if this not
|
|
* relevant on some platforms.
|
|
*/
|
|
writel(~status, engine->regs + CESA_SA_FPGA_INT_STATUS);
|
|
writel(~status, engine->regs + CESA_SA_INT_STATUS);
|
|
|
|
/* Process fetched requests */
|
|
res = mv_cesa_int_process(engine, status & mask);
|
|
ret = IRQ_HANDLED;
|
|
|
|
spin_lock_bh(&engine->lock);
|
|
req = engine->req;
|
|
if (res != -EINPROGRESS)
|
|
engine->req = NULL;
|
|
spin_unlock_bh(&engine->lock);
|
|
|
|
ctx = crypto_tfm_ctx(req->tfm);
|
|
|
|
if (res && res != -EINPROGRESS)
|
|
mv_cesa_complete_req(ctx, req, res);
|
|
|
|
/* Launch the next pending request */
|
|
mv_cesa_rearm_engine(engine);
|
|
|
|
/* Iterate over the complete queue */
|
|
while (true) {
|
|
req = mv_cesa_engine_dequeue_complete_request(engine);
|
|
if (!req)
|
|
break;
|
|
|
|
ctx = crypto_tfm_ctx(req->tfm);
|
|
mv_cesa_complete_req(ctx, req, 0);
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int mv_cesa_queue_req(struct crypto_async_request *req,
|
|
struct mv_cesa_req *creq)
|
|
{
|
|
int ret;
|
|
struct mv_cesa_engine *engine = creq->engine;
|
|
|
|
spin_lock_bh(&engine->lock);
|
|
ret = crypto_enqueue_request(&engine->queue, req);
|
|
if ((mv_cesa_req_get_type(creq) == CESA_DMA_REQ) &&
|
|
(ret == -EINPROGRESS || ret == -EBUSY))
|
|
mv_cesa_tdma_chain(engine, creq);
|
|
spin_unlock_bh(&engine->lock);
|
|
|
|
if (ret != -EINPROGRESS)
|
|
return ret;
|
|
|
|
mv_cesa_rearm_engine(engine);
|
|
|
|
return -EINPROGRESS;
|
|
}
|
|
|
|
static int mv_cesa_add_algs(struct mv_cesa_dev *cesa)
|
|
{
|
|
int ret;
|
|
int i, j;
|
|
|
|
for (i = 0; i < cesa->caps->ncipher_algs; i++) {
|
|
ret = crypto_register_skcipher(cesa->caps->cipher_algs[i]);
|
|
if (ret)
|
|
goto err_unregister_crypto;
|
|
}
|
|
|
|
for (i = 0; i < cesa->caps->nahash_algs; i++) {
|
|
ret = crypto_register_ahash(cesa->caps->ahash_algs[i]);
|
|
if (ret)
|
|
goto err_unregister_ahash;
|
|
}
|
|
|
|
return 0;
|
|
|
|
err_unregister_ahash:
|
|
for (j = 0; j < i; j++)
|
|
crypto_unregister_ahash(cesa->caps->ahash_algs[j]);
|
|
i = cesa->caps->ncipher_algs;
|
|
|
|
err_unregister_crypto:
|
|
for (j = 0; j < i; j++)
|
|
crypto_unregister_skcipher(cesa->caps->cipher_algs[j]);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void mv_cesa_remove_algs(struct mv_cesa_dev *cesa)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < cesa->caps->nahash_algs; i++)
|
|
crypto_unregister_ahash(cesa->caps->ahash_algs[i]);
|
|
|
|
for (i = 0; i < cesa->caps->ncipher_algs; i++)
|
|
crypto_unregister_skcipher(cesa->caps->cipher_algs[i]);
|
|
}
|
|
|
|
static struct skcipher_alg *orion_cipher_algs[] = {
|
|
&mv_cesa_ecb_des_alg,
|
|
&mv_cesa_cbc_des_alg,
|
|
&mv_cesa_ecb_des3_ede_alg,
|
|
&mv_cesa_cbc_des3_ede_alg,
|
|
&mv_cesa_ecb_aes_alg,
|
|
&mv_cesa_cbc_aes_alg,
|
|
};
|
|
|
|
static struct ahash_alg *orion_ahash_algs[] = {
|
|
&mv_md5_alg,
|
|
&mv_sha1_alg,
|
|
&mv_ahmac_md5_alg,
|
|
&mv_ahmac_sha1_alg,
|
|
};
|
|
|
|
static struct skcipher_alg *armada_370_cipher_algs[] = {
|
|
&mv_cesa_ecb_des_alg,
|
|
&mv_cesa_cbc_des_alg,
|
|
&mv_cesa_ecb_des3_ede_alg,
|
|
&mv_cesa_cbc_des3_ede_alg,
|
|
&mv_cesa_ecb_aes_alg,
|
|
&mv_cesa_cbc_aes_alg,
|
|
};
|
|
|
|
static struct ahash_alg *armada_370_ahash_algs[] = {
|
|
&mv_md5_alg,
|
|
&mv_sha1_alg,
|
|
&mv_sha256_alg,
|
|
&mv_ahmac_md5_alg,
|
|
&mv_ahmac_sha1_alg,
|
|
&mv_ahmac_sha256_alg,
|
|
};
|
|
|
|
static const struct mv_cesa_caps orion_caps = {
|
|
.nengines = 1,
|
|
.cipher_algs = orion_cipher_algs,
|
|
.ncipher_algs = ARRAY_SIZE(orion_cipher_algs),
|
|
.ahash_algs = orion_ahash_algs,
|
|
.nahash_algs = ARRAY_SIZE(orion_ahash_algs),
|
|
.has_tdma = false,
|
|
};
|
|
|
|
static const struct mv_cesa_caps kirkwood_caps = {
|
|
.nengines = 1,
|
|
.cipher_algs = orion_cipher_algs,
|
|
.ncipher_algs = ARRAY_SIZE(orion_cipher_algs),
|
|
.ahash_algs = orion_ahash_algs,
|
|
.nahash_algs = ARRAY_SIZE(orion_ahash_algs),
|
|
.has_tdma = true,
|
|
};
|
|
|
|
static const struct mv_cesa_caps armada_370_caps = {
|
|
.nengines = 1,
|
|
.cipher_algs = armada_370_cipher_algs,
|
|
.ncipher_algs = ARRAY_SIZE(armada_370_cipher_algs),
|
|
.ahash_algs = armada_370_ahash_algs,
|
|
.nahash_algs = ARRAY_SIZE(armada_370_ahash_algs),
|
|
.has_tdma = true,
|
|
};
|
|
|
|
static const struct mv_cesa_caps armada_xp_caps = {
|
|
.nengines = 2,
|
|
.cipher_algs = armada_370_cipher_algs,
|
|
.ncipher_algs = ARRAY_SIZE(armada_370_cipher_algs),
|
|
.ahash_algs = armada_370_ahash_algs,
|
|
.nahash_algs = ARRAY_SIZE(armada_370_ahash_algs),
|
|
.has_tdma = true,
|
|
};
|
|
|
|
static const struct of_device_id mv_cesa_of_match_table[] = {
|
|
{ .compatible = "marvell,orion-crypto", .data = &orion_caps },
|
|
{ .compatible = "marvell,kirkwood-crypto", .data = &kirkwood_caps },
|
|
{ .compatible = "marvell,dove-crypto", .data = &kirkwood_caps },
|
|
{ .compatible = "marvell,armada-370-crypto", .data = &armada_370_caps },
|
|
{ .compatible = "marvell,armada-xp-crypto", .data = &armada_xp_caps },
|
|
{ .compatible = "marvell,armada-375-crypto", .data = &armada_xp_caps },
|
|
{ .compatible = "marvell,armada-38x-crypto", .data = &armada_xp_caps },
|
|
{}
|
|
};
|
|
MODULE_DEVICE_TABLE(of, mv_cesa_of_match_table);
|
|
|
|
static void
|
|
mv_cesa_conf_mbus_windows(struct mv_cesa_engine *engine,
|
|
const struct mbus_dram_target_info *dram)
|
|
{
|
|
void __iomem *iobase = engine->regs;
|
|
int i;
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
writel(0, iobase + CESA_TDMA_WINDOW_CTRL(i));
|
|
writel(0, iobase + CESA_TDMA_WINDOW_BASE(i));
|
|
}
|
|
|
|
for (i = 0; i < dram->num_cs; i++) {
|
|
const struct mbus_dram_window *cs = dram->cs + i;
|
|
|
|
writel(((cs->size - 1) & 0xffff0000) |
|
|
(cs->mbus_attr << 8) |
|
|
(dram->mbus_dram_target_id << 4) | 1,
|
|
iobase + CESA_TDMA_WINDOW_CTRL(i));
|
|
writel(cs->base, iobase + CESA_TDMA_WINDOW_BASE(i));
|
|
}
|
|
}
|
|
|
|
static int mv_cesa_dev_dma_init(struct mv_cesa_dev *cesa)
|
|
{
|
|
struct device *dev = cesa->dev;
|
|
struct mv_cesa_dev_dma *dma;
|
|
|
|
if (!cesa->caps->has_tdma)
|
|
return 0;
|
|
|
|
dma = devm_kzalloc(dev, sizeof(*dma), GFP_KERNEL);
|
|
if (!dma)
|
|
return -ENOMEM;
|
|
|
|
dma->tdma_desc_pool = dmam_pool_create("tdma_desc", dev,
|
|
sizeof(struct mv_cesa_tdma_desc),
|
|
16, 0);
|
|
if (!dma->tdma_desc_pool)
|
|
return -ENOMEM;
|
|
|
|
dma->op_pool = dmam_pool_create("cesa_op", dev,
|
|
sizeof(struct mv_cesa_op_ctx), 16, 0);
|
|
if (!dma->op_pool)
|
|
return -ENOMEM;
|
|
|
|
dma->cache_pool = dmam_pool_create("cesa_cache", dev,
|
|
CESA_MAX_HASH_BLOCK_SIZE, 1, 0);
|
|
if (!dma->cache_pool)
|
|
return -ENOMEM;
|
|
|
|
dma->padding_pool = dmam_pool_create("cesa_padding", dev, 72, 1, 0);
|
|
if (!dma->padding_pool)
|
|
return -ENOMEM;
|
|
|
|
cesa->dma = dma;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mv_cesa_get_sram(struct platform_device *pdev, int idx)
|
|
{
|
|
struct mv_cesa_dev *cesa = platform_get_drvdata(pdev);
|
|
struct mv_cesa_engine *engine = &cesa->engines[idx];
|
|
const char *res_name = "sram";
|
|
struct resource *res;
|
|
|
|
engine->pool = of_gen_pool_get(cesa->dev->of_node,
|
|
"marvell,crypto-srams", idx);
|
|
if (engine->pool) {
|
|
engine->sram = gen_pool_dma_alloc(engine->pool,
|
|
cesa->sram_size,
|
|
&engine->sram_dma);
|
|
if (engine->sram)
|
|
return 0;
|
|
|
|
engine->pool = NULL;
|
|
return -ENOMEM;
|
|
}
|
|
|
|
if (cesa->caps->nengines > 1) {
|
|
if (!idx)
|
|
res_name = "sram0";
|
|
else
|
|
res_name = "sram1";
|
|
}
|
|
|
|
res = platform_get_resource_byname(pdev, IORESOURCE_MEM,
|
|
res_name);
|
|
if (!res || resource_size(res) < cesa->sram_size)
|
|
return -EINVAL;
|
|
|
|
engine->sram = devm_ioremap_resource(cesa->dev, res);
|
|
if (IS_ERR(engine->sram))
|
|
return PTR_ERR(engine->sram);
|
|
|
|
engine->sram_dma = dma_map_resource(cesa->dev, res->start,
|
|
cesa->sram_size,
|
|
DMA_BIDIRECTIONAL, 0);
|
|
if (dma_mapping_error(cesa->dev, engine->sram_dma))
|
|
return -ENOMEM;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void mv_cesa_put_sram(struct platform_device *pdev, int idx)
|
|
{
|
|
struct mv_cesa_dev *cesa = platform_get_drvdata(pdev);
|
|
struct mv_cesa_engine *engine = &cesa->engines[idx];
|
|
|
|
if (engine->pool)
|
|
gen_pool_free(engine->pool, (unsigned long)engine->sram,
|
|
cesa->sram_size);
|
|
else
|
|
dma_unmap_resource(cesa->dev, engine->sram_dma,
|
|
cesa->sram_size, DMA_BIDIRECTIONAL, 0);
|
|
}
|
|
|
|
static int mv_cesa_probe(struct platform_device *pdev)
|
|
{
|
|
const struct mv_cesa_caps *caps = &orion_caps;
|
|
const struct mbus_dram_target_info *dram;
|
|
const struct of_device_id *match;
|
|
struct device *dev = &pdev->dev;
|
|
struct mv_cesa_dev *cesa;
|
|
struct mv_cesa_engine *engines;
|
|
struct resource *res;
|
|
int irq, ret, i;
|
|
u32 sram_size;
|
|
|
|
if (cesa_dev) {
|
|
dev_err(&pdev->dev, "Only one CESA device authorized\n");
|
|
return -EEXIST;
|
|
}
|
|
|
|
if (dev->of_node) {
|
|
match = of_match_node(mv_cesa_of_match_table, dev->of_node);
|
|
if (!match || !match->data)
|
|
return -ENOTSUPP;
|
|
|
|
caps = match->data;
|
|
}
|
|
|
|
cesa = devm_kzalloc(dev, sizeof(*cesa), GFP_KERNEL);
|
|
if (!cesa)
|
|
return -ENOMEM;
|
|
|
|
cesa->caps = caps;
|
|
cesa->dev = dev;
|
|
|
|
sram_size = CESA_SA_DEFAULT_SRAM_SIZE;
|
|
of_property_read_u32(cesa->dev->of_node, "marvell,crypto-sram-size",
|
|
&sram_size);
|
|
if (sram_size < CESA_SA_MIN_SRAM_SIZE)
|
|
sram_size = CESA_SA_MIN_SRAM_SIZE;
|
|
|
|
cesa->sram_size = sram_size;
|
|
cesa->engines = devm_kzalloc(dev, caps->nengines * sizeof(*engines),
|
|
GFP_KERNEL);
|
|
if (!cesa->engines)
|
|
return -ENOMEM;
|
|
|
|
spin_lock_init(&cesa->lock);
|
|
|
|
res = platform_get_resource_byname(pdev, IORESOURCE_MEM, "regs");
|
|
cesa->regs = devm_ioremap_resource(dev, res);
|
|
if (IS_ERR(cesa->regs))
|
|
return PTR_ERR(cesa->regs);
|
|
|
|
ret = mv_cesa_dev_dma_init(cesa);
|
|
if (ret)
|
|
return ret;
|
|
|
|
dram = mv_mbus_dram_info_nooverlap();
|
|
|
|
platform_set_drvdata(pdev, cesa);
|
|
|
|
for (i = 0; i < caps->nengines; i++) {
|
|
struct mv_cesa_engine *engine = &cesa->engines[i];
|
|
char res_name[7];
|
|
|
|
engine->id = i;
|
|
spin_lock_init(&engine->lock);
|
|
|
|
ret = mv_cesa_get_sram(pdev, i);
|
|
if (ret)
|
|
goto err_cleanup;
|
|
|
|
irq = platform_get_irq(pdev, i);
|
|
if (irq < 0) {
|
|
ret = irq;
|
|
goto err_cleanup;
|
|
}
|
|
|
|
/*
|
|
* Not all platforms can gate the CESA clocks: do not complain
|
|
* if the clock does not exist.
|
|
*/
|
|
snprintf(res_name, sizeof(res_name), "cesa%d", i);
|
|
engine->clk = devm_clk_get(dev, res_name);
|
|
if (IS_ERR(engine->clk)) {
|
|
engine->clk = devm_clk_get(dev, NULL);
|
|
if (IS_ERR(engine->clk))
|
|
engine->clk = NULL;
|
|
}
|
|
|
|
snprintf(res_name, sizeof(res_name), "cesaz%d", i);
|
|
engine->zclk = devm_clk_get(dev, res_name);
|
|
if (IS_ERR(engine->zclk))
|
|
engine->zclk = NULL;
|
|
|
|
ret = clk_prepare_enable(engine->clk);
|
|
if (ret)
|
|
goto err_cleanup;
|
|
|
|
ret = clk_prepare_enable(engine->zclk);
|
|
if (ret)
|
|
goto err_cleanup;
|
|
|
|
engine->regs = cesa->regs + CESA_ENGINE_OFF(i);
|
|
|
|
if (dram && cesa->caps->has_tdma)
|
|
mv_cesa_conf_mbus_windows(engine, dram);
|
|
|
|
writel(0, engine->regs + CESA_SA_INT_STATUS);
|
|
writel(CESA_SA_CFG_STOP_DIG_ERR,
|
|
engine->regs + CESA_SA_CFG);
|
|
writel(engine->sram_dma & CESA_SA_SRAM_MSK,
|
|
engine->regs + CESA_SA_DESC_P0);
|
|
|
|
ret = devm_request_threaded_irq(dev, irq, NULL, mv_cesa_int,
|
|
IRQF_ONESHOT,
|
|
dev_name(&pdev->dev),
|
|
engine);
|
|
if (ret)
|
|
goto err_cleanup;
|
|
|
|
crypto_init_queue(&engine->queue, CESA_CRYPTO_DEFAULT_MAX_QLEN);
|
|
atomic_set(&engine->load, 0);
|
|
INIT_LIST_HEAD(&engine->complete_queue);
|
|
}
|
|
|
|
cesa_dev = cesa;
|
|
|
|
ret = mv_cesa_add_algs(cesa);
|
|
if (ret) {
|
|
cesa_dev = NULL;
|
|
goto err_cleanup;
|
|
}
|
|
|
|
dev_info(dev, "CESA device successfully registered\n");
|
|
|
|
return 0;
|
|
|
|
err_cleanup:
|
|
for (i = 0; i < caps->nengines; i++) {
|
|
clk_disable_unprepare(cesa->engines[i].zclk);
|
|
clk_disable_unprepare(cesa->engines[i].clk);
|
|
mv_cesa_put_sram(pdev, i);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int mv_cesa_remove(struct platform_device *pdev)
|
|
{
|
|
struct mv_cesa_dev *cesa = platform_get_drvdata(pdev);
|
|
int i;
|
|
|
|
mv_cesa_remove_algs(cesa);
|
|
|
|
for (i = 0; i < cesa->caps->nengines; i++) {
|
|
clk_disable_unprepare(cesa->engines[i].zclk);
|
|
clk_disable_unprepare(cesa->engines[i].clk);
|
|
mv_cesa_put_sram(pdev, i);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct platform_device_id mv_cesa_plat_id_table[] = {
|
|
{ .name = "mv_crypto" },
|
|
{ /* sentinel */ },
|
|
};
|
|
MODULE_DEVICE_TABLE(platform, mv_cesa_plat_id_table);
|
|
|
|
static struct platform_driver marvell_cesa = {
|
|
.probe = mv_cesa_probe,
|
|
.remove = mv_cesa_remove,
|
|
.id_table = mv_cesa_plat_id_table,
|
|
.driver = {
|
|
.name = "marvell-cesa",
|
|
.of_match_table = mv_cesa_of_match_table,
|
|
},
|
|
};
|
|
module_platform_driver(marvell_cesa);
|
|
|
|
MODULE_ALIAS("platform:mv_crypto");
|
|
MODULE_AUTHOR("Boris Brezillon <boris.brezillon@free-electrons.com>");
|
|
MODULE_AUTHOR("Arnaud Ebalard <arno@natisbad.org>");
|
|
MODULE_DESCRIPTION("Support for Marvell's cryptographic engine");
|
|
MODULE_LICENSE("GPL v2");
|