1 /*- 2 * Copyright (C) 2009-2011 Semihalf. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 */ 26 27 /* 28 * CESA SRAM Memory Map: 29 * 30 * +------------------------+ <= sc->sc_sram_base_va + CESA_SRAM_SIZE 31 * | | 32 * | DATA | 33 * | | 34 * +------------------------+ <= sc->sc_sram_base_va + CESA_DATA(0) 35 * | struct cesa_sa_data | 36 * +------------------------+ 37 * | struct cesa_sa_hdesc | 38 * +------------------------+ <= sc->sc_sram_base_va 39 */ 40 41 #include <sys/cdefs.h> 42 __FBSDID("$FreeBSD$"); 43 44 #include <sys/param.h> 45 #include <sys/systm.h> 46 #include <sys/bus.h> 47 #include <sys/endian.h> 48 #include <sys/kernel.h> 49 #include <sys/lock.h> 50 #include <sys/mbuf.h> 51 #include <sys/module.h> 52 #include <sys/mutex.h> 53 #include <sys/rman.h> 54 55 #include <machine/bus.h> 56 #include <machine/intr.h> 57 #include <machine/resource.h> 58 #include <machine/fdt.h> 59 60 #include <dev/fdt/fdt_common.h> 61 #include <dev/ofw/ofw_bus.h> 62 #include <dev/ofw/ofw_bus_subr.h> 63 64 #include <sys/md5.h> 65 #include <crypto/sha1.h> 66 #include <crypto/sha2/sha256.h> 67 #include <crypto/rijndael/rijndael.h> 68 #include <opencrypto/cryptodev.h> 69 #include "cryptodev_if.h" 70 71 #include <arm/mv/mvreg.h> 72 #include <arm/mv/mvwin.h> 73 #include <arm/mv/mvvar.h> 74 #include "cesa.h" 75 76 static int cesa_probe(device_t); 77 static int cesa_attach(device_t); 78 static int cesa_detach(device_t); 79 static void cesa_intr(void *); 80 static int cesa_newsession(device_t, u_int32_t *, struct cryptoini *); 81 static int cesa_freesession(device_t, u_int64_t); 82 static int cesa_process(device_t, struct cryptop *, int); 83 static int decode_win_cesa_setup(struct cesa_softc *sc); 84 85 static struct resource_spec cesa_res_spec[] = { 86 { SYS_RES_MEMORY, 0, RF_ACTIVE }, 87 { SYS_RES_MEMORY, 1, RF_ACTIVE }, 88 { SYS_RES_IRQ, 0, RF_ACTIVE | RF_SHAREABLE }, 89 { -1, 0 } 90 }; 91 92 static device_method_t cesa_methods[] = { 93 /* Device interface */ 94 DEVMETHOD(device_probe, cesa_probe), 95 DEVMETHOD(device_attach, cesa_attach), 96 DEVMETHOD(device_detach, cesa_detach), 97 98 /* Crypto device methods */ 99 DEVMETHOD(cryptodev_newsession, cesa_newsession), 100 DEVMETHOD(cryptodev_freesession,cesa_freesession), 101 DEVMETHOD(cryptodev_process, cesa_process), 102 103 DEVMETHOD_END 104 }; 105 106 static driver_t cesa_driver = { 107 "cesa", 108 cesa_methods, 109 sizeof (struct cesa_softc) 110 }; 111 static devclass_t cesa_devclass; 112 113 DRIVER_MODULE(cesa, simplebus, cesa_driver, cesa_devclass, 0, 0); 114 MODULE_DEPEND(cesa, crypto, 1, 1, 1); 115 116 static void 117 cesa_dump_cshd(struct cesa_softc *sc, struct cesa_sa_hdesc *cshd) 118 { 119 #ifdef DEBUG 120 device_t dev; 121 122 dev = sc->sc_dev; 123 device_printf(dev, "CESA SA Hardware Descriptor:\n"); 124 device_printf(dev, "\t\tconfig: 0x%08X\n", cshd->cshd_config); 125 device_printf(dev, "\t\te_src: 0x%08X\n", cshd->cshd_enc_src); 126 device_printf(dev, "\t\te_dst: 0x%08X\n", cshd->cshd_enc_dst); 127 device_printf(dev, "\t\te_dlen: 0x%08X\n", cshd->cshd_enc_dlen); 128 device_printf(dev, "\t\te_key: 0x%08X\n", cshd->cshd_enc_key); 129 device_printf(dev, "\t\te_iv_1: 0x%08X\n", cshd->cshd_enc_iv); 130 device_printf(dev, "\t\te_iv_2: 0x%08X\n", cshd->cshd_enc_iv_buf); 131 device_printf(dev, "\t\tm_src: 0x%08X\n", cshd->cshd_mac_src); 132 device_printf(dev, "\t\tm_dst: 0x%08X\n", cshd->cshd_mac_dst); 133 device_printf(dev, "\t\tm_dlen: 0x%08X\n", cshd->cshd_mac_dlen); 134 device_printf(dev, "\t\tm_tlen: 0x%08X\n", cshd->cshd_mac_total_dlen); 135 device_printf(dev, "\t\tm_iv_i: 0x%08X\n", cshd->cshd_mac_iv_in); 136 device_printf(dev, "\t\tm_iv_o: 0x%08X\n", cshd->cshd_mac_iv_out); 137 #endif 138 } 139 140 static void 141 cesa_alloc_dma_mem_cb(void *arg, bus_dma_segment_t *segs, int nseg, int error) 142 { 143 struct cesa_dma_mem *cdm; 144 145 if (error) 146 return; 147 148 KASSERT(nseg == 1, ("Got wrong number of DMA segments, should be 1.")); 149 cdm = arg; 150 cdm->cdm_paddr = segs->ds_addr; 151 } 152 153 static int 154 cesa_alloc_dma_mem(struct cesa_softc *sc, struct cesa_dma_mem *cdm, 155 bus_size_t size) 156 { 157 int error; 158 159 KASSERT(cdm->cdm_vaddr == NULL, 160 ("%s(): DMA memory descriptor in use.", __func__)); 161 162 error = bus_dma_tag_create(bus_get_dma_tag(sc->sc_dev), /* parent */ 163 PAGE_SIZE, 0, /* alignment, boundary */ 164 BUS_SPACE_MAXADDR_32BIT, /* lowaddr */ 165 BUS_SPACE_MAXADDR, /* highaddr */ 166 NULL, NULL, /* filtfunc, filtfuncarg */ 167 size, 1, /* maxsize, nsegments */ 168 size, 0, /* maxsegsz, flags */ 169 NULL, NULL, /* lockfunc, lockfuncarg */ 170 &cdm->cdm_tag); /* dmat */ 171 if (error) { 172 device_printf(sc->sc_dev, "failed to allocate busdma tag, error" 173 " %i!\n", error); 174 175 goto err1; 176 } 177 178 error = bus_dmamem_alloc(cdm->cdm_tag, &cdm->cdm_vaddr, 179 BUS_DMA_NOWAIT | BUS_DMA_ZERO, &cdm->cdm_map); 180 if (error) { 181 device_printf(sc->sc_dev, "failed to allocate DMA safe" 182 " memory, error %i!\n", error); 183 184 goto err2; 185 } 186 187 error = bus_dmamap_load(cdm->cdm_tag, cdm->cdm_map, cdm->cdm_vaddr, 188 size, cesa_alloc_dma_mem_cb, cdm, BUS_DMA_NOWAIT); 189 if (error) { 190 device_printf(sc->sc_dev, "cannot get address of the DMA" 191 " memory, error %i\n", error); 192 193 goto err3; 194 } 195 196 return (0); 197 err3: 198 bus_dmamem_free(cdm->cdm_tag, cdm->cdm_vaddr, cdm->cdm_map); 199 err2: 200 bus_dma_tag_destroy(cdm->cdm_tag); 201 err1: 202 cdm->cdm_vaddr = NULL; 203 return (error); 204 } 205 206 static void 207 cesa_free_dma_mem(struct cesa_dma_mem *cdm) 208 { 209 210 bus_dmamap_unload(cdm->cdm_tag, cdm->cdm_map); 211 bus_dmamem_free(cdm->cdm_tag, cdm->cdm_vaddr, cdm->cdm_map); 212 bus_dma_tag_destroy(cdm->cdm_tag); 213 cdm->cdm_vaddr = NULL; 214 } 215 216 static void 217 cesa_sync_dma_mem(struct cesa_dma_mem *cdm, bus_dmasync_op_t op) 218 { 219 220 /* Sync only if dma memory is valid */ 221 if (cdm->cdm_vaddr != NULL) 222 bus_dmamap_sync(cdm->cdm_tag, cdm->cdm_map, op); 223 } 224 225 static void 226 cesa_sync_desc(struct cesa_softc *sc, bus_dmasync_op_t op) 227 { 228 229 cesa_sync_dma_mem(&sc->sc_tdesc_cdm, op); 230 cesa_sync_dma_mem(&sc->sc_sdesc_cdm, op); 231 cesa_sync_dma_mem(&sc->sc_requests_cdm, op); 232 } 233 234 static struct cesa_session * 235 cesa_alloc_session(struct cesa_softc *sc) 236 { 237 struct cesa_session *cs; 238 239 CESA_GENERIC_ALLOC_LOCKED(sc, cs, sessions); 240 241 return (cs); 242 } 243 244 static struct cesa_session * 245 cesa_get_session(struct cesa_softc *sc, uint32_t sid) 246 { 247 248 if (sid >= CESA_SESSIONS) 249 return (NULL); 250 251 return (&sc->sc_sessions[sid]); 252 } 253 254 static void 255 cesa_free_session(struct cesa_softc *sc, struct cesa_session *cs) 256 { 257 258 CESA_GENERIC_FREE_LOCKED(sc, cs, sessions); 259 } 260 261 static struct cesa_request * 262 cesa_alloc_request(struct cesa_softc *sc) 263 { 264 struct cesa_request *cr; 265 266 CESA_GENERIC_ALLOC_LOCKED(sc, cr, requests); 267 if (!cr) 268 return (NULL); 269 270 STAILQ_INIT(&cr->cr_tdesc); 271 STAILQ_INIT(&cr->cr_sdesc); 272 273 return (cr); 274 } 275 276 static void 277 cesa_free_request(struct cesa_softc *sc, struct cesa_request *cr) 278 { 279 280 /* Free TDMA descriptors assigned to this request */ 281 CESA_LOCK(sc, tdesc); 282 STAILQ_CONCAT(&sc->sc_free_tdesc, &cr->cr_tdesc); 283 CESA_UNLOCK(sc, tdesc); 284 285 /* Free SA descriptors assigned to this request */ 286 CESA_LOCK(sc, sdesc); 287 STAILQ_CONCAT(&sc->sc_free_sdesc, &cr->cr_sdesc); 288 CESA_UNLOCK(sc, sdesc); 289 290 /* Unload DMA memory associated with request */ 291 if (cr->cr_dmap_loaded) { 292 bus_dmamap_unload(sc->sc_data_dtag, cr->cr_dmap); 293 cr->cr_dmap_loaded = 0; 294 } 295 296 CESA_GENERIC_FREE_LOCKED(sc, cr, requests); 297 } 298 299 static void 300 cesa_enqueue_request(struct cesa_softc *sc, struct cesa_request *cr) 301 { 302 303 CESA_LOCK(sc, requests); 304 STAILQ_INSERT_TAIL(&sc->sc_ready_requests, cr, cr_stq); 305 CESA_UNLOCK(sc, requests); 306 } 307 308 static struct cesa_tdma_desc * 309 cesa_alloc_tdesc(struct cesa_softc *sc) 310 { 311 struct cesa_tdma_desc *ctd; 312 313 CESA_GENERIC_ALLOC_LOCKED(sc, ctd, tdesc); 314 315 if (!ctd) 316 device_printf(sc->sc_dev, "TDMA descriptors pool exhaused. " 317 "Consider increasing CESA_TDMA_DESCRIPTORS.\n"); 318 319 return (ctd); 320 } 321 322 static struct cesa_sa_desc * 323 cesa_alloc_sdesc(struct cesa_softc *sc, struct cesa_request *cr) 324 { 325 struct cesa_sa_desc *csd; 326 327 CESA_GENERIC_ALLOC_LOCKED(sc, csd, sdesc); 328 if (!csd) { 329 device_printf(sc->sc_dev, "SA descriptors pool exhaused. " 330 "Consider increasing CESA_SA_DESCRIPTORS.\n"); 331 return (NULL); 332 } 333 334 STAILQ_INSERT_TAIL(&cr->cr_sdesc, csd, csd_stq); 335 336 /* Fill-in SA descriptor with default values */ 337 csd->csd_cshd->cshd_enc_key = CESA_SA_DATA(csd_key); 338 csd->csd_cshd->cshd_enc_iv = CESA_SA_DATA(csd_iv); 339 csd->csd_cshd->cshd_enc_iv_buf = CESA_SA_DATA(csd_iv); 340 csd->csd_cshd->cshd_enc_src = 0; 341 csd->csd_cshd->cshd_enc_dst = 0; 342 csd->csd_cshd->cshd_enc_dlen = 0; 343 csd->csd_cshd->cshd_mac_dst = CESA_SA_DATA(csd_hash); 344 csd->csd_cshd->cshd_mac_iv_in = CESA_SA_DATA(csd_hiv_in); 345 csd->csd_cshd->cshd_mac_iv_out = CESA_SA_DATA(csd_hiv_out); 346 csd->csd_cshd->cshd_mac_src = 0; 347 csd->csd_cshd->cshd_mac_dlen = 0; 348 349 return (csd); 350 } 351 352 static struct cesa_tdma_desc * 353 cesa_tdma_copy(struct cesa_softc *sc, bus_addr_t dst, bus_addr_t src, 354 bus_size_t size) 355 { 356 struct cesa_tdma_desc *ctd; 357 358 ctd = cesa_alloc_tdesc(sc); 359 if (!ctd) 360 return (NULL); 361 362 ctd->ctd_cthd->cthd_dst = dst; 363 ctd->ctd_cthd->cthd_src = src; 364 ctd->ctd_cthd->cthd_byte_count = size; 365 366 /* Handle special control packet */ 367 if (size != 0) 368 ctd->ctd_cthd->cthd_flags = CESA_CTHD_OWNED; 369 else 370 ctd->ctd_cthd->cthd_flags = 0; 371 372 return (ctd); 373 } 374 375 static struct cesa_tdma_desc * 376 cesa_tdma_copyin_sa_data(struct cesa_softc *sc, struct cesa_request *cr) 377 { 378 379 return (cesa_tdma_copy(sc, sc->sc_sram_base_pa + 380 sizeof(struct cesa_sa_hdesc), cr->cr_csd_paddr, 381 sizeof(struct cesa_sa_data))); 382 } 383 384 static struct cesa_tdma_desc * 385 cesa_tdma_copyout_sa_data(struct cesa_softc *sc, struct cesa_request *cr) 386 { 387 388 return (cesa_tdma_copy(sc, cr->cr_csd_paddr, sc->sc_sram_base_pa + 389 sizeof(struct cesa_sa_hdesc), sizeof(struct cesa_sa_data))); 390 } 391 392 static struct cesa_tdma_desc * 393 cesa_tdma_copy_sdesc(struct cesa_softc *sc, struct cesa_sa_desc *csd) 394 { 395 396 return (cesa_tdma_copy(sc, sc->sc_sram_base_pa, csd->csd_cshd_paddr, 397 sizeof(struct cesa_sa_hdesc))); 398 } 399 400 static void 401 cesa_append_tdesc(struct cesa_request *cr, struct cesa_tdma_desc *ctd) 402 { 403 struct cesa_tdma_desc *ctd_prev; 404 405 if (!STAILQ_EMPTY(&cr->cr_tdesc)) { 406 ctd_prev = STAILQ_LAST(&cr->cr_tdesc, cesa_tdma_desc, ctd_stq); 407 ctd_prev->ctd_cthd->cthd_next = ctd->ctd_cthd_paddr; 408 } 409 410 ctd->ctd_cthd->cthd_next = 0; 411 STAILQ_INSERT_TAIL(&cr->cr_tdesc, ctd, ctd_stq); 412 } 413 414 static int 415 cesa_append_packet(struct cesa_softc *sc, struct cesa_request *cr, 416 struct cesa_packet *cp, struct cesa_sa_desc *csd) 417 { 418 struct cesa_tdma_desc *ctd, *tmp; 419 420 /* Copy SA descriptor for this packet */ 421 ctd = cesa_tdma_copy_sdesc(sc, csd); 422 if (!ctd) 423 return (ENOMEM); 424 425 cesa_append_tdesc(cr, ctd); 426 427 /* Copy data to be processed */ 428 STAILQ_FOREACH_SAFE(ctd, &cp->cp_copyin, ctd_stq, tmp) 429 cesa_append_tdesc(cr, ctd); 430 STAILQ_INIT(&cp->cp_copyin); 431 432 /* Insert control descriptor */ 433 ctd = cesa_tdma_copy(sc, 0, 0, 0); 434 if (!ctd) 435 return (ENOMEM); 436 437 cesa_append_tdesc(cr, ctd); 438 439 /* Copy back results */ 440 STAILQ_FOREACH_SAFE(ctd, &cp->cp_copyout, ctd_stq, tmp) 441 cesa_append_tdesc(cr, ctd); 442 STAILQ_INIT(&cp->cp_copyout); 443 444 return (0); 445 } 446 447 static int 448 cesa_set_mkey(struct cesa_session *cs, int alg, const uint8_t *mkey, int mklen) 449 { 450 uint8_t ipad[CESA_MAX_HMAC_BLOCK_LEN]; 451 uint8_t opad[CESA_MAX_HMAC_BLOCK_LEN]; 452 SHA1_CTX sha1ctx; 453 SHA256_CTX sha256ctx; 454 MD5_CTX md5ctx; 455 uint32_t *hout; 456 uint32_t *hin; 457 int i; 458 459 memset(ipad, HMAC_IPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN); 460 memset(opad, HMAC_OPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN); 461 for (i = 0; i < mklen; i++) { 462 ipad[i] ^= mkey[i]; 463 opad[i] ^= mkey[i]; 464 } 465 466 hin = (uint32_t *)cs->cs_hiv_in; 467 hout = (uint32_t *)cs->cs_hiv_out; 468 469 switch (alg) { 470 case CRYPTO_MD5_HMAC: 471 MD5Init(&md5ctx); 472 MD5Update(&md5ctx, ipad, MD5_HMAC_BLOCK_LEN); 473 memcpy(hin, md5ctx.state, sizeof(md5ctx.state)); 474 MD5Init(&md5ctx); 475 MD5Update(&md5ctx, opad, MD5_HMAC_BLOCK_LEN); 476 memcpy(hout, md5ctx.state, sizeof(md5ctx.state)); 477 break; 478 case CRYPTO_SHA1_HMAC: 479 SHA1Init(&sha1ctx); 480 SHA1Update(&sha1ctx, ipad, SHA1_HMAC_BLOCK_LEN); 481 memcpy(hin, sha1ctx.h.b32, sizeof(sha1ctx.h.b32)); 482 SHA1Init(&sha1ctx); 483 SHA1Update(&sha1ctx, opad, SHA1_HMAC_BLOCK_LEN); 484 memcpy(hout, sha1ctx.h.b32, sizeof(sha1ctx.h.b32)); 485 break; 486 case CRYPTO_SHA2_256_HMAC: 487 SHA256_Init(&sha256ctx); 488 SHA256_Update(&sha256ctx, ipad, SHA2_256_HMAC_BLOCK_LEN); 489 memcpy(hin, sha256ctx.state, sizeof(sha256ctx.state)); 490 SHA256_Init(&sha256ctx); 491 SHA256_Update(&sha256ctx, opad, SHA2_256_HMAC_BLOCK_LEN); 492 memcpy(hout, sha256ctx.state, sizeof(sha256ctx.state)); 493 break; 494 default: 495 return (EINVAL); 496 } 497 498 for (i = 0; i < CESA_MAX_HASH_LEN / sizeof(uint32_t); i++) { 499 hin[i] = htobe32(hin[i]); 500 hout[i] = htobe32(hout[i]); 501 } 502 503 return (0); 504 } 505 506 static int 507 cesa_prep_aes_key(struct cesa_session *cs) 508 { 509 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; 510 uint32_t *dkey; 511 int i; 512 513 rijndaelKeySetupEnc(ek, cs->cs_key, cs->cs_klen * 8); 514 515 cs->cs_config &= ~CESA_CSH_AES_KLEN_MASK; 516 dkey = (uint32_t *)cs->cs_aes_dkey; 517 518 switch (cs->cs_klen) { 519 case 16: 520 cs->cs_config |= CESA_CSH_AES_KLEN_128; 521 for (i = 0; i < 4; i++) 522 *dkey++ = htobe32(ek[4 * 10 + i]); 523 break; 524 case 24: 525 cs->cs_config |= CESA_CSH_AES_KLEN_192; 526 for (i = 0; i < 4; i++) 527 *dkey++ = htobe32(ek[4 * 12 + i]); 528 for (i = 0; i < 2; i++) 529 *dkey++ = htobe32(ek[4 * 11 + 2 + i]); 530 break; 531 case 32: 532 cs->cs_config |= CESA_CSH_AES_KLEN_256; 533 for (i = 0; i < 4; i++) 534 *dkey++ = htobe32(ek[4 * 14 + i]); 535 for (i = 0; i < 4; i++) 536 *dkey++ = htobe32(ek[4 * 13 + i]); 537 break; 538 default: 539 return (EINVAL); 540 } 541 542 return (0); 543 } 544 545 static int 546 cesa_is_hash(int alg) 547 { 548 549 switch (alg) { 550 case CRYPTO_MD5: 551 case CRYPTO_MD5_HMAC: 552 case CRYPTO_SHA1: 553 case CRYPTO_SHA1_HMAC: 554 case CRYPTO_SHA2_256_HMAC: 555 return (1); 556 default: 557 return (0); 558 } 559 } 560 561 static void 562 cesa_start_packet(struct cesa_packet *cp, unsigned int size) 563 { 564 565 cp->cp_size = size; 566 cp->cp_offset = 0; 567 STAILQ_INIT(&cp->cp_copyin); 568 STAILQ_INIT(&cp->cp_copyout); 569 } 570 571 static int 572 cesa_fill_packet(struct cesa_softc *sc, struct cesa_packet *cp, 573 bus_dma_segment_t *seg) 574 { 575 struct cesa_tdma_desc *ctd; 576 unsigned int bsize; 577 578 /* Calculate size of block copy */ 579 bsize = MIN(seg->ds_len, cp->cp_size - cp->cp_offset); 580 581 if (bsize > 0) { 582 ctd = cesa_tdma_copy(sc, sc->sc_sram_base_pa + 583 CESA_DATA(cp->cp_offset), seg->ds_addr, bsize); 584 if (!ctd) 585 return (-ENOMEM); 586 587 STAILQ_INSERT_TAIL(&cp->cp_copyin, ctd, ctd_stq); 588 589 ctd = cesa_tdma_copy(sc, seg->ds_addr, sc->sc_sram_base_pa + 590 CESA_DATA(cp->cp_offset), bsize); 591 if (!ctd) 592 return (-ENOMEM); 593 594 STAILQ_INSERT_TAIL(&cp->cp_copyout, ctd, ctd_stq); 595 596 seg->ds_len -= bsize; 597 seg->ds_addr += bsize; 598 cp->cp_offset += bsize; 599 } 600 601 return (bsize); 602 } 603 604 static void 605 cesa_create_chain_cb(void *arg, bus_dma_segment_t *segs, int nseg, int error) 606 { 607 unsigned int mpsize, fragmented; 608 unsigned int mlen, mskip, tmlen; 609 struct cesa_chain_info *cci; 610 unsigned int elen, eskip; 611 unsigned int skip, len; 612 struct cesa_sa_desc *csd; 613 struct cesa_request *cr; 614 struct cesa_softc *sc; 615 struct cesa_packet cp; 616 bus_dma_segment_t seg; 617 uint32_t config; 618 int size; 619 620 cci = arg; 621 sc = cci->cci_sc; 622 cr = cci->cci_cr; 623 624 if (error) { 625 cci->cci_error = error; 626 return; 627 } 628 629 elen = cci->cci_enc ? cci->cci_enc->crd_len : 0; 630 eskip = cci->cci_enc ? cci->cci_enc->crd_skip : 0; 631 mlen = cci->cci_mac ? cci->cci_mac->crd_len : 0; 632 mskip = cci->cci_mac ? cci->cci_mac->crd_skip : 0; 633 634 if (elen && mlen && 635 ((eskip > mskip && ((eskip - mskip) & (cr->cr_cs->cs_ivlen - 1))) || 636 (mskip > eskip && ((mskip - eskip) & (cr->cr_cs->cs_mblen - 1))) || 637 (eskip > (mskip + mlen)) || (mskip > (eskip + elen)))) { 638 /* 639 * Data alignment in the request does not meet CESA requiremnts 640 * for combined encryption/decryption and hashing. We have to 641 * split the request to separate operations and process them 642 * one by one. 643 */ 644 config = cci->cci_config; 645 if ((config & CESA_CSHD_OP_MASK) == CESA_CSHD_MAC_AND_ENC) { 646 config &= ~CESA_CSHD_OP_MASK; 647 648 cci->cci_config = config | CESA_CSHD_MAC; 649 cci->cci_enc = NULL; 650 cci->cci_mac = cr->cr_mac; 651 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 652 653 cci->cci_config = config | CESA_CSHD_ENC; 654 cci->cci_enc = cr->cr_enc; 655 cci->cci_mac = NULL; 656 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 657 } else { 658 config &= ~CESA_CSHD_OP_MASK; 659 660 cci->cci_config = config | CESA_CSHD_ENC; 661 cci->cci_enc = cr->cr_enc; 662 cci->cci_mac = NULL; 663 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 664 665 cci->cci_config = config | CESA_CSHD_MAC; 666 cci->cci_enc = NULL; 667 cci->cci_mac = cr->cr_mac; 668 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 669 } 670 671 return; 672 } 673 674 tmlen = mlen; 675 fragmented = 0; 676 mpsize = CESA_MAX_PACKET_SIZE; 677 mpsize &= ~((cr->cr_cs->cs_ivlen - 1) | (cr->cr_cs->cs_mblen - 1)); 678 679 if (elen && mlen) { 680 skip = MIN(eskip, mskip); 681 len = MAX(elen + eskip, mlen + mskip) - skip; 682 } else if (elen) { 683 skip = eskip; 684 len = elen; 685 } else { 686 skip = mskip; 687 len = mlen; 688 } 689 690 /* Start first packet in chain */ 691 cesa_start_packet(&cp, MIN(mpsize, len)); 692 693 while (nseg-- && len > 0) { 694 seg = *(segs++); 695 696 /* 697 * Skip data in buffer on which neither ENC nor MAC operation 698 * is requested. 699 */ 700 if (skip > 0) { 701 size = MIN(skip, seg.ds_len); 702 skip -= size; 703 704 seg.ds_addr += size; 705 seg.ds_len -= size; 706 707 if (eskip > 0) 708 eskip -= size; 709 710 if (mskip > 0) 711 mskip -= size; 712 713 if (seg.ds_len == 0) 714 continue; 715 } 716 717 while (1) { 718 /* 719 * Fill in current packet with data. Break if there is 720 * no more data in current DMA segment or an error 721 * occurred. 722 */ 723 size = cesa_fill_packet(sc, &cp, &seg); 724 if (size <= 0) { 725 error = -size; 726 break; 727 } 728 729 len -= size; 730 731 /* If packet is full, append it to the chain */ 732 if (cp.cp_size == cp.cp_offset) { 733 csd = cesa_alloc_sdesc(sc, cr); 734 if (!csd) { 735 error = ENOMEM; 736 break; 737 } 738 739 /* Create SA descriptor for this packet */ 740 csd->csd_cshd->cshd_config = cci->cci_config; 741 csd->csd_cshd->cshd_mac_total_dlen = tmlen; 742 743 /* 744 * Enable fragmentation if request will not fit 745 * into one packet. 746 */ 747 if (len > 0) { 748 if (!fragmented) { 749 fragmented = 1; 750 csd->csd_cshd->cshd_config |= 751 CESA_CSHD_FRAG_FIRST; 752 } else 753 csd->csd_cshd->cshd_config |= 754 CESA_CSHD_FRAG_MIDDLE; 755 } else if (fragmented) 756 csd->csd_cshd->cshd_config |= 757 CESA_CSHD_FRAG_LAST; 758 759 if (eskip < cp.cp_size && elen > 0) { 760 csd->csd_cshd->cshd_enc_src = 761 CESA_DATA(eskip); 762 csd->csd_cshd->cshd_enc_dst = 763 CESA_DATA(eskip); 764 csd->csd_cshd->cshd_enc_dlen = 765 MIN(elen, cp.cp_size - eskip); 766 } 767 768 if (mskip < cp.cp_size && mlen > 0) { 769 csd->csd_cshd->cshd_mac_src = 770 CESA_DATA(mskip); 771 csd->csd_cshd->cshd_mac_dlen = 772 MIN(mlen, cp.cp_size - mskip); 773 } 774 775 elen -= csd->csd_cshd->cshd_enc_dlen; 776 eskip -= MIN(eskip, cp.cp_size); 777 mlen -= csd->csd_cshd->cshd_mac_dlen; 778 mskip -= MIN(mskip, cp.cp_size); 779 780 cesa_dump_cshd(sc, csd->csd_cshd); 781 782 /* Append packet to the request */ 783 error = cesa_append_packet(sc, cr, &cp, csd); 784 if (error) 785 break; 786 787 /* Start a new packet, as current is full */ 788 cesa_start_packet(&cp, MIN(mpsize, len)); 789 } 790 } 791 792 if (error) 793 break; 794 } 795 796 if (error) { 797 /* 798 * Move all allocated resources to the request. They will be 799 * freed later. 800 */ 801 STAILQ_CONCAT(&cr->cr_tdesc, &cp.cp_copyin); 802 STAILQ_CONCAT(&cr->cr_tdesc, &cp.cp_copyout); 803 cci->cci_error = error; 804 } 805 } 806 807 static void 808 cesa_create_chain_cb2(void *arg, bus_dma_segment_t *segs, int nseg, 809 bus_size_t size, int error) 810 { 811 812 cesa_create_chain_cb(arg, segs, nseg, error); 813 } 814 815 static int 816 cesa_create_chain(struct cesa_softc *sc, struct cesa_request *cr) 817 { 818 struct cesa_chain_info cci; 819 struct cesa_tdma_desc *ctd; 820 uint32_t config; 821 int error; 822 823 error = 0; 824 CESA_LOCK_ASSERT(sc, sessions); 825 826 /* Create request metadata */ 827 if (cr->cr_enc) { 828 if (cr->cr_enc->crd_alg == CRYPTO_AES_CBC && 829 (cr->cr_enc->crd_flags & CRD_F_ENCRYPT) == 0) 830 memcpy(cr->cr_csd->csd_key, cr->cr_cs->cs_aes_dkey, 831 cr->cr_cs->cs_klen); 832 else 833 memcpy(cr->cr_csd->csd_key, cr->cr_cs->cs_key, 834 cr->cr_cs->cs_klen); 835 } 836 837 if (cr->cr_mac) { 838 memcpy(cr->cr_csd->csd_hiv_in, cr->cr_cs->cs_hiv_in, 839 CESA_MAX_HASH_LEN); 840 memcpy(cr->cr_csd->csd_hiv_out, cr->cr_cs->cs_hiv_out, 841 CESA_MAX_HASH_LEN); 842 } 843 844 ctd = cesa_tdma_copyin_sa_data(sc, cr); 845 if (!ctd) 846 return (ENOMEM); 847 848 cesa_append_tdesc(cr, ctd); 849 850 /* Prepare SA configuration */ 851 config = cr->cr_cs->cs_config; 852 853 if (cr->cr_enc && (cr->cr_enc->crd_flags & CRD_F_ENCRYPT) == 0) 854 config |= CESA_CSHD_DECRYPT; 855 if (cr->cr_enc && !cr->cr_mac) 856 config |= CESA_CSHD_ENC; 857 if (!cr->cr_enc && cr->cr_mac) 858 config |= CESA_CSHD_MAC; 859 if (cr->cr_enc && cr->cr_mac) 860 config |= (config & CESA_CSHD_DECRYPT) ? CESA_CSHD_MAC_AND_ENC : 861 CESA_CSHD_ENC_AND_MAC; 862 863 /* Create data packets */ 864 cci.cci_sc = sc; 865 cci.cci_cr = cr; 866 cci.cci_enc = cr->cr_enc; 867 cci.cci_mac = cr->cr_mac; 868 cci.cci_config = config; 869 cci.cci_error = 0; 870 871 if (cr->cr_crp->crp_flags & CRYPTO_F_IOV) 872 error = bus_dmamap_load_uio(sc->sc_data_dtag, 873 cr->cr_dmap, (struct uio *)cr->cr_crp->crp_buf, 874 cesa_create_chain_cb2, &cci, BUS_DMA_NOWAIT); 875 else if (cr->cr_crp->crp_flags & CRYPTO_F_IMBUF) 876 error = bus_dmamap_load_mbuf(sc->sc_data_dtag, 877 cr->cr_dmap, (struct mbuf *)cr->cr_crp->crp_buf, 878 cesa_create_chain_cb2, &cci, BUS_DMA_NOWAIT); 879 else 880 error = bus_dmamap_load(sc->sc_data_dtag, 881 cr->cr_dmap, cr->cr_crp->crp_buf, 882 cr->cr_crp->crp_ilen, cesa_create_chain_cb, &cci, 883 BUS_DMA_NOWAIT); 884 885 if (!error) 886 cr->cr_dmap_loaded = 1; 887 888 if (cci.cci_error) 889 error = cci.cci_error; 890 891 if (error) 892 return (error); 893 894 /* Read back request metadata */ 895 ctd = cesa_tdma_copyout_sa_data(sc, cr); 896 if (!ctd) 897 return (ENOMEM); 898 899 cesa_append_tdesc(cr, ctd); 900 901 return (0); 902 } 903 904 static void 905 cesa_execute(struct cesa_softc *sc) 906 { 907 struct cesa_tdma_desc *prev_ctd, *ctd; 908 struct cesa_request *prev_cr, *cr; 909 910 CESA_LOCK(sc, requests); 911 912 /* 913 * If ready list is empty, there is nothing to execute. If queued list 914 * is not empty, the hardware is busy and we cannot start another 915 * execution. 916 */ 917 if (STAILQ_EMPTY(&sc->sc_ready_requests) || 918 !STAILQ_EMPTY(&sc->sc_queued_requests)) { 919 CESA_UNLOCK(sc, requests); 920 return; 921 } 922 923 /* Move all ready requests to queued list */ 924 STAILQ_CONCAT(&sc->sc_queued_requests, &sc->sc_ready_requests); 925 STAILQ_INIT(&sc->sc_ready_requests); 926 927 /* Create one execution chain from all requests on the list */ 928 if (STAILQ_FIRST(&sc->sc_queued_requests) != 929 STAILQ_LAST(&sc->sc_queued_requests, cesa_request, cr_stq)) { 930 prev_cr = NULL; 931 cesa_sync_dma_mem(&sc->sc_tdesc_cdm, BUS_DMASYNC_POSTREAD | 932 BUS_DMASYNC_POSTWRITE); 933 934 STAILQ_FOREACH(cr, &sc->sc_queued_requests, cr_stq) { 935 if (prev_cr) { 936 ctd = STAILQ_FIRST(&cr->cr_tdesc); 937 prev_ctd = STAILQ_LAST(&prev_cr->cr_tdesc, 938 cesa_tdma_desc, ctd_stq); 939 940 prev_ctd->ctd_cthd->cthd_next = 941 ctd->ctd_cthd_paddr; 942 } 943 944 prev_cr = cr; 945 } 946 947 cesa_sync_dma_mem(&sc->sc_tdesc_cdm, BUS_DMASYNC_PREREAD | 948 BUS_DMASYNC_PREWRITE); 949 } 950 951 /* Start chain execution in hardware */ 952 cr = STAILQ_FIRST(&sc->sc_queued_requests); 953 ctd = STAILQ_FIRST(&cr->cr_tdesc); 954 955 CESA_TDMA_WRITE(sc, CESA_TDMA_ND, ctd->ctd_cthd_paddr); 956 #if defined (SOC_MV_ARMADA38X) 957 CESA_REG_WRITE(sc, CESA_SA_CMD, CESA_SA_CMD_ACTVATE | CESA_SA_CMD_SHA2); 958 #else 959 CESA_REG_WRITE(sc, CESA_SA_CMD, CESA_SA_CMD_ACTVATE); 960 #endif 961 962 CESA_UNLOCK(sc, requests); 963 } 964 965 static int 966 cesa_setup_sram(struct cesa_softc *sc) 967 { 968 phandle_t sram_node; 969 ihandle_t sram_ihandle; 970 pcell_t sram_handle, sram_reg[2]; 971 int rv; 972 973 rv = OF_getprop(ofw_bus_get_node(sc->sc_dev), "sram-handle", 974 (void *)&sram_handle, sizeof(sram_handle)); 975 if (rv <= 0) 976 return (rv); 977 978 sram_ihandle = (ihandle_t)sram_handle; 979 sram_ihandle = fdt32_to_cpu(sram_ihandle); 980 sram_node = OF_instance_to_package(sram_ihandle); 981 982 rv = OF_getprop(sram_node, "reg", (void *)sram_reg, sizeof(sram_reg)); 983 if (rv <= 0) 984 return (rv); 985 986 sc->sc_sram_base_pa = fdt32_to_cpu(sram_reg[0]); 987 /* Store SRAM size to be able to unmap in detach() */ 988 sc->sc_sram_size = fdt32_to_cpu(sram_reg[1]); 989 990 #if defined(SOC_MV_ARMADA38X) 991 /* SRAM memory was not mapped in platform_sram_devmap(), map it now */ 992 rv = bus_space_map(fdtbus_bs_tag, sc->sc_sram_base_pa, sc->sc_sram_size, 993 0, &(sc->sc_sram_base_va)); 994 if (rv != 0) 995 return (rv); 996 #endif 997 return (0); 998 } 999 1000 static int 1001 cesa_probe(device_t dev) 1002 { 1003 1004 if (!ofw_bus_status_okay(dev)) 1005 return (ENXIO); 1006 1007 if (!ofw_bus_is_compatible(dev, "mrvl,cesa")) 1008 return (ENXIO); 1009 1010 device_set_desc(dev, "Marvell Cryptographic Engine and Security " 1011 "Accelerator"); 1012 1013 return (BUS_PROBE_DEFAULT); 1014 } 1015 1016 static int 1017 cesa_attach(device_t dev) 1018 { 1019 struct cesa_softc *sc; 1020 uint32_t d, r; 1021 int error; 1022 int i; 1023 1024 sc = device_get_softc(dev); 1025 sc->sc_blocked = 0; 1026 sc->sc_error = 0; 1027 sc->sc_dev = dev; 1028 1029 /* Check if CESA peripheral device has power turned on */ 1030 #if defined(SOC_MV_KIRKWOOD) 1031 if (soc_power_ctrl_get(CPU_PM_CTRL_CRYPTO) == CPU_PM_CTRL_CRYPTO) { 1032 device_printf(dev, "not powered on\n"); 1033 return (ENXIO); 1034 } 1035 #else 1036 if (soc_power_ctrl_get(CPU_PM_CTRL_CRYPTO) != CPU_PM_CTRL_CRYPTO) { 1037 device_printf(dev, "not powered on\n"); 1038 return (ENXIO); 1039 } 1040 #endif 1041 soc_id(&d, &r); 1042 1043 switch (d) { 1044 case MV_DEV_88F6281: 1045 case MV_DEV_88F6282: 1046 case MV_DEV_88F6828: 1047 sc->sc_tperr = 0; 1048 break; 1049 case MV_DEV_MV78100: 1050 case MV_DEV_MV78100_Z0: 1051 sc->sc_tperr = CESA_ICR_TPERR; 1052 break; 1053 default: 1054 return (ENXIO); 1055 } 1056 1057 /* Initialize mutexes */ 1058 mtx_init(&sc->sc_sc_lock, device_get_nameunit(dev), 1059 "CESA Shared Data", MTX_DEF); 1060 mtx_init(&sc->sc_tdesc_lock, device_get_nameunit(dev), 1061 "CESA TDMA Descriptors Pool", MTX_DEF); 1062 mtx_init(&sc->sc_sdesc_lock, device_get_nameunit(dev), 1063 "CESA SA Descriptors Pool", MTX_DEF); 1064 mtx_init(&sc->sc_requests_lock, device_get_nameunit(dev), 1065 "CESA Requests Pool", MTX_DEF); 1066 mtx_init(&sc->sc_sessions_lock, device_get_nameunit(dev), 1067 "CESA Sessions Pool", MTX_DEF); 1068 1069 /* Allocate I/O and IRQ resources */ 1070 error = bus_alloc_resources(dev, cesa_res_spec, sc->sc_res); 1071 if (error) { 1072 device_printf(dev, "could not allocate resources\n"); 1073 goto err0; 1074 } 1075 1076 /* Setup CESA decoding windows */ 1077 error = decode_win_cesa_setup(sc); 1078 if (error) { 1079 device_printf(dev, "could not setup decoding windows\n"); 1080 goto err1; 1081 } 1082 1083 /* Acquire SRAM base address */ 1084 error = cesa_setup_sram(sc); 1085 if (error) { 1086 device_printf(dev, "could not setup SRAM\n"); 1087 goto err1; 1088 } 1089 1090 /* Setup interrupt handler */ 1091 error = bus_setup_intr(dev, sc->sc_res[RES_CESA_IRQ], INTR_TYPE_NET | 1092 INTR_MPSAFE, NULL, cesa_intr, sc, &(sc->sc_icookie)); 1093 if (error) { 1094 device_printf(dev, "could not setup engine completion irq\n"); 1095 goto err2; 1096 } 1097 1098 /* Create DMA tag for processed data */ 1099 error = bus_dma_tag_create(bus_get_dma_tag(dev), /* parent */ 1100 1, 0, /* alignment, boundary */ 1101 BUS_SPACE_MAXADDR_32BIT, /* lowaddr */ 1102 BUS_SPACE_MAXADDR, /* highaddr */ 1103 NULL, NULL, /* filtfunc, filtfuncarg */ 1104 CESA_MAX_REQUEST_SIZE, /* maxsize */ 1105 CESA_MAX_FRAGMENTS, /* nsegments */ 1106 CESA_MAX_REQUEST_SIZE, 0, /* maxsegsz, flags */ 1107 NULL, NULL, /* lockfunc, lockfuncarg */ 1108 &sc->sc_data_dtag); /* dmat */ 1109 if (error) 1110 goto err3; 1111 1112 /* Initialize data structures: TDMA Descriptors Pool */ 1113 error = cesa_alloc_dma_mem(sc, &sc->sc_tdesc_cdm, 1114 CESA_TDMA_DESCRIPTORS * sizeof(struct cesa_tdma_hdesc)); 1115 if (error) 1116 goto err4; 1117 1118 STAILQ_INIT(&sc->sc_free_tdesc); 1119 for (i = 0; i < CESA_TDMA_DESCRIPTORS; i++) { 1120 sc->sc_tdesc[i].ctd_cthd = 1121 (struct cesa_tdma_hdesc *)(sc->sc_tdesc_cdm.cdm_vaddr) + i; 1122 sc->sc_tdesc[i].ctd_cthd_paddr = sc->sc_tdesc_cdm.cdm_paddr + 1123 (i * sizeof(struct cesa_tdma_hdesc)); 1124 STAILQ_INSERT_TAIL(&sc->sc_free_tdesc, &sc->sc_tdesc[i], 1125 ctd_stq); 1126 } 1127 1128 /* Initialize data structures: SA Descriptors Pool */ 1129 error = cesa_alloc_dma_mem(sc, &sc->sc_sdesc_cdm, 1130 CESA_SA_DESCRIPTORS * sizeof(struct cesa_sa_hdesc)); 1131 if (error) 1132 goto err5; 1133 1134 STAILQ_INIT(&sc->sc_free_sdesc); 1135 for (i = 0; i < CESA_SA_DESCRIPTORS; i++) { 1136 sc->sc_sdesc[i].csd_cshd = 1137 (struct cesa_sa_hdesc *)(sc->sc_sdesc_cdm.cdm_vaddr) + i; 1138 sc->sc_sdesc[i].csd_cshd_paddr = sc->sc_sdesc_cdm.cdm_paddr + 1139 (i * sizeof(struct cesa_sa_hdesc)); 1140 STAILQ_INSERT_TAIL(&sc->sc_free_sdesc, &sc->sc_sdesc[i], 1141 csd_stq); 1142 } 1143 1144 /* Initialize data structures: Requests Pool */ 1145 error = cesa_alloc_dma_mem(sc, &sc->sc_requests_cdm, 1146 CESA_REQUESTS * sizeof(struct cesa_sa_data)); 1147 if (error) 1148 goto err6; 1149 1150 STAILQ_INIT(&sc->sc_free_requests); 1151 STAILQ_INIT(&sc->sc_ready_requests); 1152 STAILQ_INIT(&sc->sc_queued_requests); 1153 for (i = 0; i < CESA_REQUESTS; i++) { 1154 sc->sc_requests[i].cr_csd = 1155 (struct cesa_sa_data *)(sc->sc_requests_cdm.cdm_vaddr) + i; 1156 sc->sc_requests[i].cr_csd_paddr = 1157 sc->sc_requests_cdm.cdm_paddr + 1158 (i * sizeof(struct cesa_sa_data)); 1159 1160 /* Preallocate DMA maps */ 1161 error = bus_dmamap_create(sc->sc_data_dtag, 0, 1162 &sc->sc_requests[i].cr_dmap); 1163 if (error && i > 0) { 1164 i--; 1165 do { 1166 bus_dmamap_destroy(sc->sc_data_dtag, 1167 sc->sc_requests[i].cr_dmap); 1168 } while (i--); 1169 1170 goto err7; 1171 } 1172 1173 STAILQ_INSERT_TAIL(&sc->sc_free_requests, &sc->sc_requests[i], 1174 cr_stq); 1175 } 1176 1177 /* Initialize data structures: Sessions Pool */ 1178 STAILQ_INIT(&sc->sc_free_sessions); 1179 for (i = 0; i < CESA_SESSIONS; i++) { 1180 sc->sc_sessions[i].cs_sid = i; 1181 STAILQ_INSERT_TAIL(&sc->sc_free_sessions, &sc->sc_sessions[i], 1182 cs_stq); 1183 } 1184 1185 /* 1186 * Initialize TDMA: 1187 * - Burst limit: 128 bytes, 1188 * - Outstanding reads enabled, 1189 * - No byte-swap. 1190 */ 1191 CESA_TDMA_WRITE(sc, CESA_TDMA_CR, CESA_TDMA_CR_DBL128 | 1192 CESA_TDMA_CR_SBL128 | CESA_TDMA_CR_ORDEN | CESA_TDMA_CR_NBS | 1193 #if defined (SOC_MV_ARMADA38X) 1194 CESA_TDMA_NUM_OUTSTAND | 1195 #endif 1196 CESA_TDMA_CR_ENABLE); 1197 1198 /* 1199 * Initialize SA: 1200 * - SA descriptor is present at beginning of CESA SRAM, 1201 * - Multi-packet chain mode, 1202 * - Cooperation with TDMA enabled. 1203 */ 1204 CESA_REG_WRITE(sc, CESA_SA_DPR, 0); 1205 CESA_REG_WRITE(sc, CESA_SA_CR, CESA_SA_CR_ACTIVATE_TDMA | 1206 CESA_SA_CR_WAIT_FOR_TDMA | CESA_SA_CR_MULTI_MODE); 1207 1208 /* Unmask interrupts */ 1209 CESA_REG_WRITE(sc, CESA_ICR, 0); 1210 CESA_REG_WRITE(sc, CESA_ICM, CESA_ICM_ACCTDMA | sc->sc_tperr); 1211 CESA_TDMA_WRITE(sc, CESA_TDMA_ECR, 0); 1212 CESA_TDMA_WRITE(sc, CESA_TDMA_EMR, CESA_TDMA_EMR_MISS | 1213 CESA_TDMA_EMR_DOUBLE_HIT | CESA_TDMA_EMR_BOTH_HIT | 1214 CESA_TDMA_EMR_DATA_ERROR); 1215 1216 /* Register in OCF */ 1217 sc->sc_cid = crypto_get_driverid(dev, CRYPTOCAP_F_HARDWARE); 1218 if (sc->sc_cid < 0) { 1219 device_printf(dev, "could not get crypto driver id\n"); 1220 goto err8; 1221 } 1222 1223 crypto_register(sc->sc_cid, CRYPTO_AES_CBC, 0, 0); 1224 crypto_register(sc->sc_cid, CRYPTO_DES_CBC, 0, 0); 1225 crypto_register(sc->sc_cid, CRYPTO_3DES_CBC, 0, 0); 1226 crypto_register(sc->sc_cid, CRYPTO_MD5, 0, 0); 1227 crypto_register(sc->sc_cid, CRYPTO_MD5_HMAC, 0, 0); 1228 crypto_register(sc->sc_cid, CRYPTO_SHA1, 0, 0); 1229 crypto_register(sc->sc_cid, CRYPTO_SHA1_HMAC, 0, 0); 1230 crypto_register(sc->sc_cid, CRYPTO_SHA2_256_HMAC, 0, 0); 1231 1232 return (0); 1233 err8: 1234 for (i = 0; i < CESA_REQUESTS; i++) 1235 bus_dmamap_destroy(sc->sc_data_dtag, 1236 sc->sc_requests[i].cr_dmap); 1237 err7: 1238 cesa_free_dma_mem(&sc->sc_requests_cdm); 1239 err6: 1240 cesa_free_dma_mem(&sc->sc_sdesc_cdm); 1241 err5: 1242 cesa_free_dma_mem(&sc->sc_tdesc_cdm); 1243 err4: 1244 bus_dma_tag_destroy(sc->sc_data_dtag); 1245 err3: 1246 bus_teardown_intr(dev, sc->sc_res[RES_CESA_IRQ], sc->sc_icookie); 1247 err2: 1248 #if defined(SOC_MV_ARMADA38X) 1249 bus_space_unmap(fdtbus_bs_tag, sc->sc_sram_base_va, sc->sc_sram_size); 1250 #endif 1251 err1: 1252 bus_release_resources(dev, cesa_res_spec, sc->sc_res); 1253 err0: 1254 mtx_destroy(&sc->sc_sessions_lock); 1255 mtx_destroy(&sc->sc_requests_lock); 1256 mtx_destroy(&sc->sc_sdesc_lock); 1257 mtx_destroy(&sc->sc_tdesc_lock); 1258 mtx_destroy(&sc->sc_sc_lock); 1259 return (ENXIO); 1260 } 1261 1262 static int 1263 cesa_detach(device_t dev) 1264 { 1265 struct cesa_softc *sc; 1266 int i; 1267 1268 sc = device_get_softc(dev); 1269 1270 /* TODO: Wait for queued requests completion before shutdown. */ 1271 1272 /* Mask interrupts */ 1273 CESA_REG_WRITE(sc, CESA_ICM, 0); 1274 CESA_TDMA_WRITE(sc, CESA_TDMA_EMR, 0); 1275 1276 /* Unregister from OCF */ 1277 crypto_unregister_all(sc->sc_cid); 1278 1279 /* Free DMA Maps */ 1280 for (i = 0; i < CESA_REQUESTS; i++) 1281 bus_dmamap_destroy(sc->sc_data_dtag, 1282 sc->sc_requests[i].cr_dmap); 1283 1284 /* Free DMA Memory */ 1285 cesa_free_dma_mem(&sc->sc_requests_cdm); 1286 cesa_free_dma_mem(&sc->sc_sdesc_cdm); 1287 cesa_free_dma_mem(&sc->sc_tdesc_cdm); 1288 1289 /* Free DMA Tag */ 1290 bus_dma_tag_destroy(sc->sc_data_dtag); 1291 1292 /* Stop interrupt */ 1293 bus_teardown_intr(dev, sc->sc_res[RES_CESA_IRQ], sc->sc_icookie); 1294 1295 /* Relase I/O and IRQ resources */ 1296 bus_release_resources(dev, cesa_res_spec, sc->sc_res); 1297 1298 #if defined(SOC_MV_ARMADA38X) 1299 /* Unmap SRAM memory */ 1300 bus_space_unmap(fdtbus_bs_tag, sc->sc_sram_base_va, sc->sc_sram_size); 1301 #endif 1302 /* Destroy mutexes */ 1303 mtx_destroy(&sc->sc_sessions_lock); 1304 mtx_destroy(&sc->sc_requests_lock); 1305 mtx_destroy(&sc->sc_sdesc_lock); 1306 mtx_destroy(&sc->sc_tdesc_lock); 1307 mtx_destroy(&sc->sc_sc_lock); 1308 1309 return (0); 1310 } 1311 1312 static void 1313 cesa_intr(void *arg) 1314 { 1315 STAILQ_HEAD(, cesa_request) requests; 1316 struct cesa_request *cr, *tmp; 1317 struct cesa_softc *sc; 1318 uint32_t ecr, icr; 1319 int blocked; 1320 1321 sc = arg; 1322 1323 /* Ack interrupt */ 1324 ecr = CESA_TDMA_READ(sc, CESA_TDMA_ECR); 1325 CESA_TDMA_WRITE(sc, CESA_TDMA_ECR, 0); 1326 icr = CESA_REG_READ(sc, CESA_ICR); 1327 CESA_REG_WRITE(sc, CESA_ICR, 0); 1328 1329 /* Check for TDMA errors */ 1330 if (ecr & CESA_TDMA_ECR_MISS) { 1331 device_printf(sc->sc_dev, "TDMA Miss error detected!\n"); 1332 sc->sc_error = EIO; 1333 } 1334 1335 if (ecr & CESA_TDMA_ECR_DOUBLE_HIT) { 1336 device_printf(sc->sc_dev, "TDMA Double Hit error detected!\n"); 1337 sc->sc_error = EIO; 1338 } 1339 1340 if (ecr & CESA_TDMA_ECR_BOTH_HIT) { 1341 device_printf(sc->sc_dev, "TDMA Both Hit error detected!\n"); 1342 sc->sc_error = EIO; 1343 } 1344 1345 if (ecr & CESA_TDMA_ECR_DATA_ERROR) { 1346 device_printf(sc->sc_dev, "TDMA Data error detected!\n"); 1347 sc->sc_error = EIO; 1348 } 1349 1350 /* Check for CESA errors */ 1351 if (icr & sc->sc_tperr) { 1352 device_printf(sc->sc_dev, "CESA SRAM Parity error detected!\n"); 1353 sc->sc_error = EIO; 1354 } 1355 1356 /* If there is nothing more to do, return */ 1357 if ((icr & CESA_ICR_ACCTDMA) == 0) 1358 return; 1359 1360 /* Get all finished requests */ 1361 CESA_LOCK(sc, requests); 1362 STAILQ_INIT(&requests); 1363 STAILQ_CONCAT(&requests, &sc->sc_queued_requests); 1364 STAILQ_INIT(&sc->sc_queued_requests); 1365 CESA_UNLOCK(sc, requests); 1366 1367 /* Execute all ready requests */ 1368 cesa_execute(sc); 1369 1370 /* Process completed requests */ 1371 cesa_sync_dma_mem(&sc->sc_requests_cdm, BUS_DMASYNC_POSTREAD | 1372 BUS_DMASYNC_POSTWRITE); 1373 1374 STAILQ_FOREACH_SAFE(cr, &requests, cr_stq, tmp) { 1375 bus_dmamap_sync(sc->sc_data_dtag, cr->cr_dmap, 1376 BUS_DMASYNC_POSTREAD | BUS_DMASYNC_POSTWRITE); 1377 1378 cr->cr_crp->crp_etype = sc->sc_error; 1379 if (cr->cr_mac) 1380 crypto_copyback(cr->cr_crp->crp_flags, 1381 cr->cr_crp->crp_buf, cr->cr_mac->crd_inject, 1382 cr->cr_cs->cs_hlen, cr->cr_csd->csd_hash); 1383 1384 crypto_done(cr->cr_crp); 1385 cesa_free_request(sc, cr); 1386 } 1387 1388 cesa_sync_dma_mem(&sc->sc_requests_cdm, BUS_DMASYNC_PREREAD | 1389 BUS_DMASYNC_PREWRITE); 1390 1391 sc->sc_error = 0; 1392 1393 /* Unblock driver if it ran out of resources */ 1394 CESA_LOCK(sc, sc); 1395 blocked = sc->sc_blocked; 1396 sc->sc_blocked = 0; 1397 CESA_UNLOCK(sc, sc); 1398 1399 if (blocked) 1400 crypto_unblock(sc->sc_cid, blocked); 1401 } 1402 1403 static int 1404 cesa_newsession(device_t dev, uint32_t *sidp, struct cryptoini *cri) 1405 { 1406 struct cesa_session *cs; 1407 struct cesa_softc *sc; 1408 struct cryptoini *enc; 1409 struct cryptoini *mac; 1410 int error; 1411 1412 sc = device_get_softc(dev); 1413 enc = NULL; 1414 mac = NULL; 1415 error = 0; 1416 1417 /* Check and parse input */ 1418 if (cesa_is_hash(cri->cri_alg)) 1419 mac = cri; 1420 else 1421 enc = cri; 1422 1423 cri = cri->cri_next; 1424 1425 if (cri) { 1426 if (!enc && !cesa_is_hash(cri->cri_alg)) 1427 enc = cri; 1428 1429 if (!mac && cesa_is_hash(cri->cri_alg)) 1430 mac = cri; 1431 1432 if (cri->cri_next || !(enc && mac)) 1433 return (EINVAL); 1434 } 1435 1436 if ((enc && (enc->cri_klen / 8) > CESA_MAX_KEY_LEN) || 1437 (mac && (mac->cri_klen / 8) > CESA_MAX_MKEY_LEN)) 1438 return (E2BIG); 1439 1440 /* Allocate session */ 1441 cs = cesa_alloc_session(sc); 1442 if (!cs) 1443 return (ENOMEM); 1444 1445 /* Prepare CESA configuration */ 1446 cs->cs_config = 0; 1447 cs->cs_ivlen = 1; 1448 cs->cs_mblen = 1; 1449 1450 if (enc) { 1451 switch (enc->cri_alg) { 1452 case CRYPTO_AES_CBC: 1453 cs->cs_config |= CESA_CSHD_AES | CESA_CSHD_CBC; 1454 cs->cs_ivlen = AES_BLOCK_LEN; 1455 break; 1456 case CRYPTO_DES_CBC: 1457 cs->cs_config |= CESA_CSHD_DES | CESA_CSHD_CBC; 1458 cs->cs_ivlen = DES_BLOCK_LEN; 1459 break; 1460 case CRYPTO_3DES_CBC: 1461 cs->cs_config |= CESA_CSHD_3DES | CESA_CSHD_3DES_EDE | 1462 CESA_CSHD_CBC; 1463 cs->cs_ivlen = DES3_BLOCK_LEN; 1464 break; 1465 default: 1466 error = EINVAL; 1467 break; 1468 } 1469 } 1470 1471 if (!error && mac) { 1472 switch (mac->cri_alg) { 1473 case CRYPTO_MD5: 1474 cs->cs_mblen = 1; 1475 cs->cs_hlen = (mac->cri_mlen == 0) ? MD5_HASH_LEN : 1476 mac->cri_mlen; 1477 cs->cs_config |= CESA_CSHD_MD5; 1478 break; 1479 case CRYPTO_MD5_HMAC: 1480 cs->cs_mblen = MD5_HMAC_BLOCK_LEN; 1481 cs->cs_hlen = (mac->cri_mlen == 0) ? MD5_HASH_LEN : 1482 mac->cri_mlen; 1483 cs->cs_config |= CESA_CSHD_MD5_HMAC; 1484 if (cs->cs_hlen == CESA_HMAC_TRUNC_LEN) 1485 cs->cs_config |= CESA_CSHD_96_BIT_HMAC; 1486 break; 1487 case CRYPTO_SHA1: 1488 cs->cs_mblen = 1; 1489 cs->cs_hlen = (mac->cri_mlen == 0) ? SHA1_HASH_LEN : 1490 mac->cri_mlen; 1491 cs->cs_config |= CESA_CSHD_SHA1; 1492 break; 1493 case CRYPTO_SHA1_HMAC: 1494 cs->cs_mblen = SHA1_HMAC_BLOCK_LEN; 1495 cs->cs_hlen = (mac->cri_mlen == 0) ? SHA1_HASH_LEN : 1496 mac->cri_mlen; 1497 cs->cs_config |= CESA_CSHD_SHA1_HMAC; 1498 if (cs->cs_hlen == CESA_HMAC_TRUNC_LEN) 1499 cs->cs_config |= CESA_CSHD_96_BIT_HMAC; 1500 break; 1501 case CRYPTO_SHA2_256_HMAC: 1502 cs->cs_mblen = SHA2_256_HMAC_BLOCK_LEN; 1503 cs->cs_hlen = (mac->cri_mlen == 0) ? SHA2_256_HASH_LEN : 1504 mac->cri_mlen; 1505 cs->cs_config |= CESA_CSHD_SHA2_256_HMAC; 1506 break; 1507 default: 1508 error = EINVAL; 1509 break; 1510 } 1511 } 1512 1513 /* Save cipher key */ 1514 if (!error && enc && enc->cri_key) { 1515 cs->cs_klen = enc->cri_klen / 8; 1516 memcpy(cs->cs_key, enc->cri_key, cs->cs_klen); 1517 if (enc->cri_alg == CRYPTO_AES_CBC) 1518 error = cesa_prep_aes_key(cs); 1519 } 1520 1521 /* Save digest key */ 1522 if (!error && mac && mac->cri_key) 1523 error = cesa_set_mkey(cs, mac->cri_alg, mac->cri_key, 1524 mac->cri_klen / 8); 1525 1526 if (error) { 1527 cesa_free_session(sc, cs); 1528 return (EINVAL); 1529 } 1530 1531 *sidp = cs->cs_sid; 1532 1533 return (0); 1534 } 1535 1536 static int 1537 cesa_freesession(device_t dev, uint64_t tid) 1538 { 1539 struct cesa_session *cs; 1540 struct cesa_softc *sc; 1541 1542 sc = device_get_softc(dev); 1543 cs = cesa_get_session(sc, CRYPTO_SESID2LID(tid)); 1544 if (!cs) 1545 return (EINVAL); 1546 1547 /* Free session */ 1548 cesa_free_session(sc, cs); 1549 1550 return (0); 1551 } 1552 1553 static int 1554 cesa_process(device_t dev, struct cryptop *crp, int hint) 1555 { 1556 struct cesa_request *cr; 1557 struct cesa_session *cs; 1558 struct cryptodesc *crd; 1559 struct cryptodesc *enc; 1560 struct cryptodesc *mac; 1561 struct cesa_softc *sc; 1562 int error; 1563 1564 sc = device_get_softc(dev); 1565 crd = crp->crp_desc; 1566 enc = NULL; 1567 mac = NULL; 1568 error = 0; 1569 1570 /* Check session ID */ 1571 cs = cesa_get_session(sc, CRYPTO_SESID2LID(crp->crp_sid)); 1572 if (!cs) { 1573 crp->crp_etype = EINVAL; 1574 crypto_done(crp); 1575 return (0); 1576 } 1577 1578 /* Check and parse input */ 1579 if (crp->crp_ilen > CESA_MAX_REQUEST_SIZE) { 1580 crp->crp_etype = E2BIG; 1581 crypto_done(crp); 1582 return (0); 1583 } 1584 1585 if (cesa_is_hash(crd->crd_alg)) 1586 mac = crd; 1587 else 1588 enc = crd; 1589 1590 crd = crd->crd_next; 1591 1592 if (crd) { 1593 if (!enc && !cesa_is_hash(crd->crd_alg)) 1594 enc = crd; 1595 1596 if (!mac && cesa_is_hash(crd->crd_alg)) 1597 mac = crd; 1598 1599 if (crd->crd_next || !(enc && mac)) { 1600 crp->crp_etype = EINVAL; 1601 crypto_done(crp); 1602 return (0); 1603 } 1604 } 1605 1606 /* 1607 * Get request descriptor. Block driver if there is no free 1608 * descriptors in pool. 1609 */ 1610 cr = cesa_alloc_request(sc); 1611 if (!cr) { 1612 CESA_LOCK(sc, sc); 1613 sc->sc_blocked = CRYPTO_SYMQ; 1614 CESA_UNLOCK(sc, sc); 1615 return (ERESTART); 1616 } 1617 1618 /* Prepare request */ 1619 cr->cr_crp = crp; 1620 cr->cr_enc = enc; 1621 cr->cr_mac = mac; 1622 cr->cr_cs = cs; 1623 1624 CESA_LOCK(sc, sessions); 1625 cesa_sync_desc(sc, BUS_DMASYNC_POSTREAD | BUS_DMASYNC_POSTWRITE); 1626 1627 if (enc && enc->crd_flags & CRD_F_ENCRYPT) { 1628 if (enc->crd_flags & CRD_F_IV_EXPLICIT) 1629 memcpy(cr->cr_csd->csd_iv, enc->crd_iv, cs->cs_ivlen); 1630 else 1631 arc4rand(cr->cr_csd->csd_iv, cs->cs_ivlen, 0); 1632 1633 if ((enc->crd_flags & CRD_F_IV_PRESENT) == 0) 1634 crypto_copyback(crp->crp_flags, crp->crp_buf, 1635 enc->crd_inject, cs->cs_ivlen, cr->cr_csd->csd_iv); 1636 } else if (enc) { 1637 if (enc->crd_flags & CRD_F_IV_EXPLICIT) 1638 memcpy(cr->cr_csd->csd_iv, enc->crd_iv, cs->cs_ivlen); 1639 else 1640 crypto_copydata(crp->crp_flags, crp->crp_buf, 1641 enc->crd_inject, cs->cs_ivlen, cr->cr_csd->csd_iv); 1642 } 1643 1644 if (enc && enc->crd_flags & CRD_F_KEY_EXPLICIT) { 1645 if ((enc->crd_klen / 8) <= CESA_MAX_KEY_LEN) { 1646 cs->cs_klen = enc->crd_klen / 8; 1647 memcpy(cs->cs_key, enc->crd_key, cs->cs_klen); 1648 if (enc->crd_alg == CRYPTO_AES_CBC) 1649 error = cesa_prep_aes_key(cs); 1650 } else 1651 error = E2BIG; 1652 } 1653 1654 if (!error && mac && mac->crd_flags & CRD_F_KEY_EXPLICIT) { 1655 if ((mac->crd_klen / 8) <= CESA_MAX_MKEY_LEN) 1656 error = cesa_set_mkey(cs, mac->crd_alg, mac->crd_key, 1657 mac->crd_klen / 8); 1658 else 1659 error = E2BIG; 1660 } 1661 1662 /* Convert request to chain of TDMA and SA descriptors */ 1663 if (!error) 1664 error = cesa_create_chain(sc, cr); 1665 1666 cesa_sync_desc(sc, BUS_DMASYNC_PREREAD | BUS_DMASYNC_PREWRITE); 1667 CESA_UNLOCK(sc, sessions); 1668 1669 if (error) { 1670 cesa_free_request(sc, cr); 1671 crp->crp_etype = error; 1672 crypto_done(crp); 1673 return (0); 1674 } 1675 1676 bus_dmamap_sync(sc->sc_data_dtag, cr->cr_dmap, BUS_DMASYNC_PREREAD | 1677 BUS_DMASYNC_PREWRITE); 1678 1679 /* Enqueue request to execution */ 1680 cesa_enqueue_request(sc, cr); 1681 1682 /* Start execution, if we have no more requests in queue */ 1683 if ((hint & CRYPTO_HINT_MORE) == 0) 1684 cesa_execute(sc); 1685 1686 return (0); 1687 } 1688 1689 /* 1690 * Set CESA TDMA decode windows. 1691 */ 1692 static int 1693 decode_win_cesa_setup(struct cesa_softc *sc) 1694 { 1695 struct mem_region availmem_regions[FDT_MEM_REGIONS]; 1696 int availmem_regions_sz; 1697 uint32_t br, cr, i; 1698 1699 /* Grab physical memory regions information from DTS */ 1700 if (fdt_get_mem_regions(availmem_regions, &availmem_regions_sz, 1701 NULL) != 0) 1702 return (ENXIO); 1703 1704 if (availmem_regions_sz > MV_WIN_CESA_MAX) { 1705 device_printf(sc->sc_dev, "Too much memory regions, cannot " 1706 " set CESA windows to cover whole DRAM \n"); 1707 return (ENXIO); 1708 } 1709 1710 /* Disable and clear all CESA windows */ 1711 for (i = 0; i < MV_WIN_CESA_MAX; i++) { 1712 CESA_TDMA_WRITE(sc, MV_WIN_CESA_BASE(i), 0); 1713 CESA_TDMA_WRITE(sc, MV_WIN_CESA_CTRL(i), 0); 1714 } 1715 1716 /* Fill CESA TDMA decoding windows with information acquired from DTS */ 1717 for (i = 0; i < availmem_regions_sz; i++) { 1718 br = availmem_regions[i].mr_start; 1719 cr = availmem_regions[i].mr_size; 1720 1721 /* Don't add entries with size lower than 64KB */ 1722 if (cr & 0xffff0000) { 1723 cr = (((cr - 1) & 0xffff0000) | 1724 (MV_WIN_DDR_ATTR(i) << MV_WIN_CPU_ATTR_SHIFT) | 1725 (MV_WIN_DDR_TARGET << MV_WIN_CPU_TARGET_SHIFT) | 1726 MV_WIN_CPU_ENABLE_BIT); 1727 CESA_TDMA_WRITE(sc, MV_WIN_CESA_BASE(i), br); 1728 CESA_TDMA_WRITE(sc, MV_WIN_CESA_CTRL(i), cr); 1729 } 1730 } 1731 1732 return (0); 1733 } 1734 1735