411 lines
10 KiB
C
411 lines
10 KiB
C
|
/*
|
||
|
* Crypto acceleration support for Rockchip RK3288
|
||
|
*
|
||
|
* Copyright (c) 2015, Fuzhou Rockchip Electronics Co., Ltd
|
||
|
*
|
||
|
* Author: Zain Wang <zain.wang@rock-chips.com>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify it
|
||
|
* under the terms and conditions of the GNU General Public License,
|
||
|
* version 2, as published by the Free Software Foundation.
|
||
|
*
|
||
|
* Some ideas are from marvell-cesa.c and s5p-sss.c driver.
|
||
|
*/
|
||
|
|
||
|
#include "rk3288_crypto.h"
|
||
|
#include <linux/module.h>
|
||
|
#include <linux/platform_device.h>
|
||
|
#include <linux/of.h>
|
||
|
#include <linux/clk.h>
|
||
|
#include <linux/crypto.h>
|
||
|
#include <linux/reset.h>
|
||
|
|
||
|
static int rk_crypto_enable_clk(struct rk_crypto_info *dev)
|
||
|
{
|
||
|
int err;
|
||
|
|
||
|
err = clk_prepare_enable(dev->sclk);
|
||
|
if (err) {
|
||
|
dev_err(dev->dev, "[%s:%d], Couldn't enable clock sclk\n",
|
||
|
__func__, __LINE__);
|
||
|
goto err_return;
|
||
|
}
|
||
|
err = clk_prepare_enable(dev->aclk);
|
||
|
if (err) {
|
||
|
dev_err(dev->dev, "[%s:%d], Couldn't enable clock aclk\n",
|
||
|
__func__, __LINE__);
|
||
|
goto err_aclk;
|
||
|
}
|
||
|
err = clk_prepare_enable(dev->hclk);
|
||
|
if (err) {
|
||
|
dev_err(dev->dev, "[%s:%d], Couldn't enable clock hclk\n",
|
||
|
__func__, __LINE__);
|
||
|
goto err_hclk;
|
||
|
}
|
||
|
err = clk_prepare_enable(dev->dmaclk);
|
||
|
if (err) {
|
||
|
dev_err(dev->dev, "[%s:%d], Couldn't enable clock dmaclk\n",
|
||
|
__func__, __LINE__);
|
||
|
goto err_dmaclk;
|
||
|
}
|
||
|
return err;
|
||
|
err_dmaclk:
|
||
|
clk_disable_unprepare(dev->hclk);
|
||
|
err_hclk:
|
||
|
clk_disable_unprepare(dev->aclk);
|
||
|
err_aclk:
|
||
|
clk_disable_unprepare(dev->sclk);
|
||
|
err_return:
|
||
|
return err;
|
||
|
}
|
||
|
|
||
|
static void rk_crypto_disable_clk(struct rk_crypto_info *dev)
|
||
|
{
|
||
|
clk_disable_unprepare(dev->dmaclk);
|
||
|
clk_disable_unprepare(dev->hclk);
|
||
|
clk_disable_unprepare(dev->aclk);
|
||
|
clk_disable_unprepare(dev->sclk);
|
||
|
}
|
||
|
|
||
|
static int check_alignment(struct scatterlist *sg_src,
|
||
|
struct scatterlist *sg_dst,
|
||
|
int align_mask)
|
||
|
{
|
||
|
int in, out, align;
|
||
|
|
||
|
in = IS_ALIGNED((uint32_t)sg_src->offset, 4) &&
|
||
|
IS_ALIGNED((uint32_t)sg_src->length, align_mask);
|
||
|
if (!sg_dst)
|
||
|
return in;
|
||
|
out = IS_ALIGNED((uint32_t)sg_dst->offset, 4) &&
|
||
|
IS_ALIGNED((uint32_t)sg_dst->length, align_mask);
|
||
|
align = in && out;
|
||
|
|
||
|
return (align && (sg_src->length == sg_dst->length));
|
||
|
}
|
||
|
|
||
|
static int rk_load_data(struct rk_crypto_info *dev,
|
||
|
struct scatterlist *sg_src,
|
||
|
struct scatterlist *sg_dst)
|
||
|
{
|
||
|
unsigned int count;
|
||
|
|
||
|
dev->aligned = dev->aligned ?
|
||
|
check_alignment(sg_src, sg_dst, dev->align_size) :
|
||
|
dev->aligned;
|
||
|
if (dev->aligned) {
|
||
|
count = min(dev->left_bytes, sg_src->length);
|
||
|
dev->left_bytes -= count;
|
||
|
|
||
|
if (!dma_map_sg(dev->dev, sg_src, 1, DMA_TO_DEVICE)) {
|
||
|
dev_err(dev->dev, "[%s:%d] dma_map_sg(src) error\n",
|
||
|
__func__, __LINE__);
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
dev->addr_in = sg_dma_address(sg_src);
|
||
|
|
||
|
if (sg_dst) {
|
||
|
if (!dma_map_sg(dev->dev, sg_dst, 1, DMA_FROM_DEVICE)) {
|
||
|
dev_err(dev->dev,
|
||
|
"[%s:%d] dma_map_sg(dst) error\n",
|
||
|
__func__, __LINE__);
|
||
|
dma_unmap_sg(dev->dev, sg_src, 1,
|
||
|
DMA_TO_DEVICE);
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
dev->addr_out = sg_dma_address(sg_dst);
|
||
|
}
|
||
|
} else {
|
||
|
count = (dev->left_bytes > PAGE_SIZE) ?
|
||
|
PAGE_SIZE : dev->left_bytes;
|
||
|
|
||
|
if (!sg_pcopy_to_buffer(dev->first, dev->nents,
|
||
|
dev->addr_vir, count,
|
||
|
dev->total - dev->left_bytes)) {
|
||
|
dev_err(dev->dev, "[%s:%d] pcopy err\n",
|
||
|
__func__, __LINE__);
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
dev->left_bytes -= count;
|
||
|
sg_init_one(&dev->sg_tmp, dev->addr_vir, count);
|
||
|
if (!dma_map_sg(dev->dev, &dev->sg_tmp, 1, DMA_TO_DEVICE)) {
|
||
|
dev_err(dev->dev, "[%s:%d] dma_map_sg(sg_tmp) error\n",
|
||
|
__func__, __LINE__);
|
||
|
return -ENOMEM;
|
||
|
}
|
||
|
dev->addr_in = sg_dma_address(&dev->sg_tmp);
|
||
|
|
||
|
if (sg_dst) {
|
||
|
if (!dma_map_sg(dev->dev, &dev->sg_tmp, 1,
|
||
|
DMA_FROM_DEVICE)) {
|
||
|
dev_err(dev->dev,
|
||
|
"[%s:%d] dma_map_sg(sg_tmp) error\n",
|
||
|
__func__, __LINE__);
|
||
|
dma_unmap_sg(dev->dev, &dev->sg_tmp, 1,
|
||
|
DMA_TO_DEVICE);
|
||
|
return -ENOMEM;
|
||
|
}
|
||
|
dev->addr_out = sg_dma_address(&dev->sg_tmp);
|
||
|
}
|
||
|
}
|
||
|
dev->count = count;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static void rk_unload_data(struct rk_crypto_info *dev)
|
||
|
{
|
||
|
struct scatterlist *sg_in, *sg_out;
|
||
|
|
||
|
sg_in = dev->aligned ? dev->sg_src : &dev->sg_tmp;
|
||
|
dma_unmap_sg(dev->dev, sg_in, 1, DMA_TO_DEVICE);
|
||
|
|
||
|
if (dev->sg_dst) {
|
||
|
sg_out = dev->aligned ? dev->sg_dst : &dev->sg_tmp;
|
||
|
dma_unmap_sg(dev->dev, sg_out, 1, DMA_FROM_DEVICE);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
static irqreturn_t rk_crypto_irq_handle(int irq, void *dev_id)
|
||
|
{
|
||
|
struct rk_crypto_info *dev = platform_get_drvdata(dev_id);
|
||
|
u32 interrupt_status;
|
||
|
int err = 0;
|
||
|
|
||
|
spin_lock(&dev->lock);
|
||
|
interrupt_status = CRYPTO_READ(dev, RK_CRYPTO_INTSTS);
|
||
|
CRYPTO_WRITE(dev, RK_CRYPTO_INTSTS, interrupt_status);
|
||
|
if (interrupt_status & 0x0a) {
|
||
|
dev_warn(dev->dev, "DMA Error\n");
|
||
|
err = -EFAULT;
|
||
|
} else if (interrupt_status & 0x05) {
|
||
|
err = dev->update(dev);
|
||
|
}
|
||
|
if (err)
|
||
|
dev->complete(dev, err);
|
||
|
spin_unlock(&dev->lock);
|
||
|
return IRQ_HANDLED;
|
||
|
}
|
||
|
|
||
|
static void rk_crypto_tasklet_cb(unsigned long data)
|
||
|
{
|
||
|
struct rk_crypto_info *dev = (struct rk_crypto_info *)data;
|
||
|
struct crypto_async_request *async_req, *backlog;
|
||
|
unsigned long flags;
|
||
|
int err = 0;
|
||
|
|
||
|
spin_lock_irqsave(&dev->lock, flags);
|
||
|
backlog = crypto_get_backlog(&dev->queue);
|
||
|
async_req = crypto_dequeue_request(&dev->queue);
|
||
|
spin_unlock_irqrestore(&dev->lock, flags);
|
||
|
if (!async_req) {
|
||
|
dev_err(dev->dev, "async_req is NULL !!\n");
|
||
|
return;
|
||
|
}
|
||
|
if (backlog) {
|
||
|
backlog->complete(backlog, -EINPROGRESS);
|
||
|
backlog = NULL;
|
||
|
}
|
||
|
|
||
|
if (crypto_tfm_alg_type(async_req->tfm) == CRYPTO_ALG_TYPE_ABLKCIPHER)
|
||
|
dev->ablk_req = ablkcipher_request_cast(async_req);
|
||
|
else
|
||
|
dev->ahash_req = ahash_request_cast(async_req);
|
||
|
err = dev->start(dev);
|
||
|
if (err)
|
||
|
dev->complete(dev, err);
|
||
|
}
|
||
|
|
||
|
static struct rk_crypto_tmp *rk_cipher_algs[] = {
|
||
|
&rk_ecb_aes_alg,
|
||
|
&rk_cbc_aes_alg,
|
||
|
&rk_ecb_des_alg,
|
||
|
&rk_cbc_des_alg,
|
||
|
&rk_ecb_des3_ede_alg,
|
||
|
&rk_cbc_des3_ede_alg,
|
||
|
&rk_ahash_sha1,
|
||
|
&rk_ahash_sha256,
|
||
|
&rk_ahash_md5,
|
||
|
};
|
||
|
|
||
|
static int rk_crypto_register(struct rk_crypto_info *crypto_info)
|
||
|
{
|
||
|
unsigned int i, k;
|
||
|
int err = 0;
|
||
|
|
||
|
for (i = 0; i < ARRAY_SIZE(rk_cipher_algs); i++) {
|
||
|
rk_cipher_algs[i]->dev = crypto_info;
|
||
|
if (rk_cipher_algs[i]->type == ALG_TYPE_CIPHER)
|
||
|
err = crypto_register_alg(
|
||
|
&rk_cipher_algs[i]->alg.crypto);
|
||
|
else
|
||
|
err = crypto_register_ahash(
|
||
|
&rk_cipher_algs[i]->alg.hash);
|
||
|
if (err)
|
||
|
goto err_cipher_algs;
|
||
|
}
|
||
|
return 0;
|
||
|
|
||
|
err_cipher_algs:
|
||
|
for (k = 0; k < i; k++) {
|
||
|
if (rk_cipher_algs[i]->type == ALG_TYPE_CIPHER)
|
||
|
crypto_unregister_alg(&rk_cipher_algs[k]->alg.crypto);
|
||
|
else
|
||
|
crypto_unregister_ahash(&rk_cipher_algs[i]->alg.hash);
|
||
|
}
|
||
|
return err;
|
||
|
}
|
||
|
|
||
|
static void rk_crypto_unregister(void)
|
||
|
{
|
||
|
unsigned int i;
|
||
|
|
||
|
for (i = 0; i < ARRAY_SIZE(rk_cipher_algs); i++) {
|
||
|
if (rk_cipher_algs[i]->type == ALG_TYPE_CIPHER)
|
||
|
crypto_unregister_alg(&rk_cipher_algs[i]->alg.crypto);
|
||
|
else
|
||
|
crypto_unregister_ahash(&rk_cipher_algs[i]->alg.hash);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
static void rk_crypto_action(void *data)
|
||
|
{
|
||
|
struct rk_crypto_info *crypto_info = data;
|
||
|
|
||
|
reset_control_assert(crypto_info->rst);
|
||
|
}
|
||
|
|
||
|
static const struct of_device_id crypto_of_id_table[] = {
|
||
|
{ .compatible = "rockchip,rk3288-crypto" },
|
||
|
{}
|
||
|
};
|
||
|
MODULE_DEVICE_TABLE(of, crypto_of_id_table);
|
||
|
|
||
|
static int rk_crypto_probe(struct platform_device *pdev)
|
||
|
{
|
||
|
struct resource *res;
|
||
|
struct device *dev = &pdev->dev;
|
||
|
struct rk_crypto_info *crypto_info;
|
||
|
int err = 0;
|
||
|
|
||
|
crypto_info = devm_kzalloc(&pdev->dev,
|
||
|
sizeof(*crypto_info), GFP_KERNEL);
|
||
|
if (!crypto_info) {
|
||
|
err = -ENOMEM;
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->rst = devm_reset_control_get(dev, "crypto-rst");
|
||
|
if (IS_ERR(crypto_info->rst)) {
|
||
|
err = PTR_ERR(crypto_info->rst);
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
reset_control_assert(crypto_info->rst);
|
||
|
usleep_range(10, 20);
|
||
|
reset_control_deassert(crypto_info->rst);
|
||
|
|
||
|
err = devm_add_action_or_reset(dev, rk_crypto_action, crypto_info);
|
||
|
if (err)
|
||
|
goto err_crypto;
|
||
|
|
||
|
spin_lock_init(&crypto_info->lock);
|
||
|
|
||
|
res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
|
||
|
crypto_info->reg = devm_ioremap_resource(&pdev->dev, res);
|
||
|
if (IS_ERR(crypto_info->reg)) {
|
||
|
err = PTR_ERR(crypto_info->reg);
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->aclk = devm_clk_get(&pdev->dev, "aclk");
|
||
|
if (IS_ERR(crypto_info->aclk)) {
|
||
|
err = PTR_ERR(crypto_info->aclk);
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->hclk = devm_clk_get(&pdev->dev, "hclk");
|
||
|
if (IS_ERR(crypto_info->hclk)) {
|
||
|
err = PTR_ERR(crypto_info->hclk);
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->sclk = devm_clk_get(&pdev->dev, "sclk");
|
||
|
if (IS_ERR(crypto_info->sclk)) {
|
||
|
err = PTR_ERR(crypto_info->sclk);
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->dmaclk = devm_clk_get(&pdev->dev, "apb_pclk");
|
||
|
if (IS_ERR(crypto_info->dmaclk)) {
|
||
|
err = PTR_ERR(crypto_info->dmaclk);
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->irq = platform_get_irq(pdev, 0);
|
||
|
if (crypto_info->irq < 0) {
|
||
|
dev_warn(crypto_info->dev,
|
||
|
"control Interrupt is not available.\n");
|
||
|
err = crypto_info->irq;
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
err = devm_request_irq(&pdev->dev, crypto_info->irq,
|
||
|
rk_crypto_irq_handle, IRQF_SHARED,
|
||
|
"rk-crypto", pdev);
|
||
|
|
||
|
if (err) {
|
||
|
dev_err(crypto_info->dev, "irq request failed.\n");
|
||
|
goto err_crypto;
|
||
|
}
|
||
|
|
||
|
crypto_info->dev = &pdev->dev;
|
||
|
platform_set_drvdata(pdev, crypto_info);
|
||
|
|
||
|
tasklet_init(&crypto_info->crypto_tasklet,
|
||
|
rk_crypto_tasklet_cb, (unsigned long)crypto_info);
|
||
|
crypto_init_queue(&crypto_info->queue, 50);
|
||
|
|
||
|
crypto_info->enable_clk = rk_crypto_enable_clk;
|
||
|
crypto_info->disable_clk = rk_crypto_disable_clk;
|
||
|
crypto_info->load_data = rk_load_data;
|
||
|
crypto_info->unload_data = rk_unload_data;
|
||
|
|
||
|
err = rk_crypto_register(crypto_info);
|
||
|
if (err) {
|
||
|
dev_err(dev, "err in register alg");
|
||
|
goto err_register_alg;
|
||
|
}
|
||
|
|
||
|
dev_info(dev, "Crypto Accelerator successfully registered\n");
|
||
|
return 0;
|
||
|
|
||
|
err_register_alg:
|
||
|
tasklet_kill(&crypto_info->crypto_tasklet);
|
||
|
err_crypto:
|
||
|
return err;
|
||
|
}
|
||
|
|
||
|
static int rk_crypto_remove(struct platform_device *pdev)
|
||
|
{
|
||
|
struct rk_crypto_info *crypto_tmp = platform_get_drvdata(pdev);
|
||
|
|
||
|
rk_crypto_unregister();
|
||
|
tasklet_kill(&crypto_tmp->crypto_tasklet);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static struct platform_driver crypto_driver = {
|
||
|
.probe = rk_crypto_probe,
|
||
|
.remove = rk_crypto_remove,
|
||
|
.driver = {
|
||
|
.name = "rk3288-crypto",
|
||
|
.of_match_table = crypto_of_id_table,
|
||
|
},
|
||
|
};
|
||
|
|
||
|
module_platform_driver(crypto_driver);
|
||
|
|
||
|
MODULE_AUTHOR("Zain Wang <zain.wang@rock-chips.com>");
|
||
|
MODULE_DESCRIPTION("Support for Rockchip's cryptographic engine");
|
||
|
MODULE_LICENSE("GPL");
|