| /* |
| This file is provided under a dual BSD/GPLv2 license. When using or |
| redistributing this file, you may do so under either license. |
| |
| GPL LICENSE SUMMARY |
| Copyright(c) 2014 Intel Corporation. |
| This program is free software; you can redistribute it and/or modify |
| it under the terms of version 2 of the GNU General Public License as |
| published by the Free Software Foundation. |
| |
| This program is distributed in the hope that it will be useful, but |
| WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| General Public License for more details. |
| |
| Contact Information: |
| qat-linux@intel.com |
| |
| BSD LICENSE |
| Copyright(c) 2014 Intel Corporation. |
| Redistribution and use in source and binary forms, with or without |
| modification, are permitted provided that the following conditions |
| are met: |
| |
| * Redistributions of source code must retain the above copyright |
| notice, this list of conditions and the following disclaimer. |
| * Redistributions in binary form must reproduce the above copyright |
| notice, this list of conditions and the following disclaimer in |
| the documentation and/or other materials provided with the |
| distribution. |
| * Neither the name of Intel Corporation nor the names of its |
| contributors may be used to endorse or promote products derived |
| from this software without specific prior written permission. |
| |
| THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| #include <linux/slab.h> |
| #include <linux/ctype.h> |
| #include <linux/kernel.h> |
| #include <linux/delay.h> |
| #include "adf_accel_devices.h" |
| #include "adf_common_drv.h" |
| #include "icp_qat_uclo.h" |
| #include "icp_qat_hal.h" |
| #include "icp_qat_fw_loader_handle.h" |
| |
| #define UWORD_CPYBUF_SIZE 1024 |
| #define INVLD_UWORD 0xffffffffffull |
| #define PID_MINOR_REV 0xf |
| #define PID_MAJOR_REV (0xf << 4) |
| |
| static int qat_uclo_init_ae_data(struct icp_qat_uclo_objhandle *obj_handle, |
| unsigned int ae, unsigned int image_num) |
| { |
| struct icp_qat_uclo_aedata *ae_data; |
| struct icp_qat_uclo_encapme *encap_image; |
| struct icp_qat_uclo_page *page = NULL; |
| struct icp_qat_uclo_aeslice *ae_slice = NULL; |
| |
| ae_data = &obj_handle->ae_data[ae]; |
| encap_image = &obj_handle->ae_uimage[image_num]; |
| ae_slice = &ae_data->ae_slices[ae_data->slice_num]; |
| ae_slice->encap_image = encap_image; |
| |
| if (encap_image->img_ptr) { |
| ae_slice->ctx_mask_assigned = |
| encap_image->img_ptr->ctx_assigned; |
| ae_data->eff_ustore_size = obj_handle->ustore_phy_size; |
| } else { |
| ae_slice->ctx_mask_assigned = 0; |
| } |
| ae_slice->region = kzalloc(sizeof(*ae_slice->region), GFP_KERNEL); |
| if (!ae_slice->region) |
| return -ENOMEM; |
| ae_slice->page = kzalloc(sizeof(*ae_slice->page), GFP_KERNEL); |
| if (!ae_slice->page) |
| goto out_err; |
| page = ae_slice->page; |
| page->encap_page = encap_image->page; |
| ae_slice->page->region = ae_slice->region; |
| ae_data->slice_num++; |
| return 0; |
| out_err: |
| kfree(ae_slice->region); |
| ae_slice->region = NULL; |
| return -ENOMEM; |
| } |
| |
| static int qat_uclo_free_ae_data(struct icp_qat_uclo_aedata *ae_data) |
| { |
| unsigned int i; |
| |
| if (!ae_data) { |
| pr_err("QAT: bad argument, ae_data is NULL\n "); |
| return -EINVAL; |
| } |
| |
| for (i = 0; i < ae_data->slice_num; i++) { |
| kfree(ae_data->ae_slices[i].region); |
| ae_data->ae_slices[i].region = NULL; |
| kfree(ae_data->ae_slices[i].page); |
| ae_data->ae_slices[i].page = NULL; |
| } |
| return 0; |
| } |
| |
| static char *qat_uclo_get_string(struct icp_qat_uof_strtable *str_table, |
| unsigned int str_offset) |
| { |
| if ((!str_table->table_len) || (str_offset > str_table->table_len)) |
| return NULL; |
| return (char *)(((uintptr_t)(str_table->strings)) + str_offset); |
| } |
| |
| static int qat_uclo_check_uof_format(struct icp_qat_uof_filehdr *hdr) |
| { |
| int maj = hdr->maj_ver & 0xff; |
| int min = hdr->min_ver & 0xff; |
| |
| if (hdr->file_id != ICP_QAT_UOF_FID) { |
| pr_err("QAT: Invalid header 0x%x\n", hdr->file_id); |
| return -EINVAL; |
| } |
| if (min != ICP_QAT_UOF_MINVER || maj != ICP_QAT_UOF_MAJVER) { |
| pr_err("QAT: bad UOF version, major 0x%x, minor 0x%x\n", |
| maj, min); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_check_suof_format(struct icp_qat_suof_filehdr *suof_hdr) |
| { |
| int maj = suof_hdr->maj_ver & 0xff; |
| int min = suof_hdr->min_ver & 0xff; |
| |
| if (suof_hdr->file_id != ICP_QAT_SUOF_FID) { |
| pr_err("QAT: invalid header 0x%x\n", suof_hdr->file_id); |
| return -EINVAL; |
| } |
| if (suof_hdr->fw_type != 0) { |
| pr_err("QAT: unsupported firmware type\n"); |
| return -EINVAL; |
| } |
| if (suof_hdr->num_chunks <= 0x1) { |
| pr_err("QAT: SUOF chunk amount is incorrect\n"); |
| return -EINVAL; |
| } |
| if (maj != ICP_QAT_SUOF_MAJVER || min != ICP_QAT_SUOF_MINVER) { |
| pr_err("QAT: bad SUOF version, major 0x%x, minor 0x%x\n", |
| maj, min); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static void qat_uclo_wr_sram_by_words(struct icp_qat_fw_loader_handle *handle, |
| unsigned int addr, unsigned int *val, |
| unsigned int num_in_bytes) |
| { |
| unsigned int outval; |
| unsigned char *ptr = (unsigned char *)val; |
| |
| while (num_in_bytes) { |
| memcpy(&outval, ptr, 4); |
| SRAM_WRITE(handle, addr, outval); |
| num_in_bytes -= 4; |
| ptr += 4; |
| addr += 4; |
| } |
| } |
| |
| static void qat_uclo_wr_umem_by_words(struct icp_qat_fw_loader_handle *handle, |
| unsigned char ae, unsigned int addr, |
| unsigned int *val, |
| unsigned int num_in_bytes) |
| { |
| unsigned int outval; |
| unsigned char *ptr = (unsigned char *)val; |
| |
| addr >>= 0x2; /* convert to uword address */ |
| |
| while (num_in_bytes) { |
| memcpy(&outval, ptr, 4); |
| qat_hal_wr_umem(handle, ae, addr++, 1, &outval); |
| num_in_bytes -= 4; |
| ptr += 4; |
| } |
| } |
| |
| static void qat_uclo_batch_wr_umem(struct icp_qat_fw_loader_handle *handle, |
| unsigned char ae, |
| struct icp_qat_uof_batch_init |
| *umem_init_header) |
| { |
| struct icp_qat_uof_batch_init *umem_init; |
| |
| if (!umem_init_header) |
| return; |
| umem_init = umem_init_header->next; |
| while (umem_init) { |
| unsigned int addr, *value, size; |
| |
| ae = umem_init->ae; |
| addr = umem_init->addr; |
| value = umem_init->value; |
| size = umem_init->size; |
| qat_uclo_wr_umem_by_words(handle, ae, addr, value, size); |
| umem_init = umem_init->next; |
| } |
| } |
| |
| static void |
| qat_uclo_cleanup_batch_init_list(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uof_batch_init **base) |
| { |
| struct icp_qat_uof_batch_init *umem_init; |
| |
| umem_init = *base; |
| while (umem_init) { |
| struct icp_qat_uof_batch_init *pre; |
| |
| pre = umem_init; |
| umem_init = umem_init->next; |
| kfree(pre); |
| } |
| *base = NULL; |
| } |
| |
| static int qat_uclo_parse_num(char *str, unsigned int *num) |
| { |
| char buf[16] = {0}; |
| unsigned long ae = 0; |
| int i; |
| |
| strncpy(buf, str, 15); |
| for (i = 0; i < 16; i++) { |
| if (!isdigit(buf[i])) { |
| buf[i] = '\0'; |
| break; |
| } |
| } |
| if ((kstrtoul(buf, 10, &ae))) |
| return -EFAULT; |
| |
| *num = (unsigned int)ae; |
| return 0; |
| } |
| |
| static int qat_uclo_fetch_initmem_ae(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uof_initmem *init_mem, |
| unsigned int size_range, unsigned int *ae) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| char *str; |
| |
| if ((init_mem->addr + init_mem->num_in_bytes) > (size_range << 0x2)) { |
| pr_err("QAT: initmem is out of range"); |
| return -EINVAL; |
| } |
| if (init_mem->scope != ICP_QAT_UOF_LOCAL_SCOPE) { |
| pr_err("QAT: Memory scope for init_mem error\n"); |
| return -EINVAL; |
| } |
| str = qat_uclo_get_string(&obj_handle->str_table, init_mem->sym_name); |
| if (!str) { |
| pr_err("QAT: AE name assigned in UOF init table is NULL\n"); |
| return -EINVAL; |
| } |
| if (qat_uclo_parse_num(str, ae)) { |
| pr_err("QAT: Parse num for AE number failed\n"); |
| return -EINVAL; |
| } |
| if (*ae >= ICP_QAT_UCLO_MAX_AE) { |
| pr_err("QAT: ae %d out of range\n", *ae); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_create_batch_init_list(struct icp_qat_fw_loader_handle |
| *handle, struct icp_qat_uof_initmem |
| *init_mem, unsigned int ae, |
| struct icp_qat_uof_batch_init |
| **init_tab_base) |
| { |
| struct icp_qat_uof_batch_init *init_header, *tail; |
| struct icp_qat_uof_batch_init *mem_init, *tail_old; |
| struct icp_qat_uof_memvar_attr *mem_val_attr; |
| unsigned int i, flag = 0; |
| |
| mem_val_attr = |
| (struct icp_qat_uof_memvar_attr *)((uintptr_t)init_mem + |
| sizeof(struct icp_qat_uof_initmem)); |
| |
| init_header = *init_tab_base; |
| if (!init_header) { |
| init_header = kzalloc(sizeof(*init_header), GFP_KERNEL); |
| if (!init_header) |
| return -ENOMEM; |
| init_header->size = 1; |
| *init_tab_base = init_header; |
| flag = 1; |
| } |
| tail_old = init_header; |
| while (tail_old->next) |
| tail_old = tail_old->next; |
| tail = tail_old; |
| for (i = 0; i < init_mem->val_attr_num; i++) { |
| mem_init = kzalloc(sizeof(*mem_init), GFP_KERNEL); |
| if (!mem_init) |
| goto out_err; |
| mem_init->ae = ae; |
| mem_init->addr = init_mem->addr + mem_val_attr->offset_in_byte; |
| mem_init->value = &mem_val_attr->value; |
| mem_init->size = 4; |
| mem_init->next = NULL; |
| tail->next = mem_init; |
| tail = mem_init; |
| init_header->size += qat_hal_get_ins_num(); |
| mem_val_attr++; |
| } |
| return 0; |
| out_err: |
| while (tail_old) { |
| mem_init = tail_old->next; |
| kfree(tail_old); |
| tail_old = mem_init; |
| } |
| if (flag) |
| kfree(*init_tab_base); |
| return -ENOMEM; |
| } |
| |
| static int qat_uclo_init_lmem_seg(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uof_initmem *init_mem) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int ae; |
| |
| if (qat_uclo_fetch_initmem_ae(handle, init_mem, |
| ICP_QAT_UCLO_MAX_LMEM_REG, &ae)) |
| return -EINVAL; |
| if (qat_uclo_create_batch_init_list(handle, init_mem, ae, |
| &obj_handle->lm_init_tab[ae])) |
| return -EINVAL; |
| return 0; |
| } |
| |
| static int qat_uclo_init_umem_seg(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uof_initmem *init_mem) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int ae, ustore_size, uaddr, i; |
| |
| ustore_size = obj_handle->ustore_phy_size; |
| if (qat_uclo_fetch_initmem_ae(handle, init_mem, ustore_size, &ae)) |
| return -EINVAL; |
| if (qat_uclo_create_batch_init_list(handle, init_mem, ae, |
| &obj_handle->umem_init_tab[ae])) |
| return -EINVAL; |
| /* set the highest ustore address referenced */ |
| uaddr = (init_mem->addr + init_mem->num_in_bytes) >> 0x2; |
| for (i = 0; i < obj_handle->ae_data[ae].slice_num; i++) { |
| if (obj_handle->ae_data[ae].ae_slices[i]. |
| encap_image->uwords_num < uaddr) |
| obj_handle->ae_data[ae].ae_slices[i]. |
| encap_image->uwords_num = uaddr; |
| } |
| return 0; |
| } |
| |
| #define ICP_DH895XCC_PESRAM_BAR_SIZE 0x80000 |
| static int qat_uclo_init_ae_memory(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uof_initmem *init_mem) |
| { |
| switch (init_mem->region) { |
| case ICP_QAT_UOF_LMEM_REGION: |
| if (qat_uclo_init_lmem_seg(handle, init_mem)) |
| return -EINVAL; |
| break; |
| case ICP_QAT_UOF_UMEM_REGION: |
| if (qat_uclo_init_umem_seg(handle, init_mem)) |
| return -EINVAL; |
| break; |
| default: |
| pr_err("QAT: initmem region error. region type=0x%x\n", |
| init_mem->region); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_init_ustore(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uclo_encapme *image) |
| { |
| unsigned int i; |
| struct icp_qat_uclo_encap_page *page; |
| struct icp_qat_uof_image *uof_image; |
| unsigned char ae; |
| unsigned int ustore_size; |
| unsigned int patt_pos; |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| uint64_t *fill_data; |
| |
| uof_image = image->img_ptr; |
| fill_data = kcalloc(ICP_QAT_UCLO_MAX_USTORE, sizeof(uint64_t), |
| GFP_KERNEL); |
| if (!fill_data) |
| return -ENOMEM; |
| for (i = 0; i < ICP_QAT_UCLO_MAX_USTORE; i++) |
| memcpy(&fill_data[i], &uof_image->fill_pattern, |
| sizeof(uint64_t)); |
| page = image->page; |
| |
| for (ae = 0; ae < handle->hal_handle->ae_max_num; ae++) { |
| if (!test_bit(ae, (unsigned long *)&uof_image->ae_assigned)) |
| continue; |
| ustore_size = obj_handle->ae_data[ae].eff_ustore_size; |
| patt_pos = page->beg_addr_p + page->micro_words_num; |
| |
| qat_hal_wr_uwords(handle, (unsigned char)ae, 0, |
| page->beg_addr_p, &fill_data[0]); |
| qat_hal_wr_uwords(handle, (unsigned char)ae, patt_pos, |
| ustore_size - patt_pos + 1, |
| &fill_data[page->beg_addr_p]); |
| } |
| kfree(fill_data); |
| return 0; |
| } |
| |
| static int qat_uclo_init_memory(struct icp_qat_fw_loader_handle *handle) |
| { |
| int i, ae; |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| struct icp_qat_uof_initmem *initmem = obj_handle->init_mem_tab.init_mem; |
| |
| for (i = 0; i < obj_handle->init_mem_tab.entry_num; i++) { |
| if (initmem->num_in_bytes) { |
| if (qat_uclo_init_ae_memory(handle, initmem)) |
| return -EINVAL; |
| } |
| initmem = (struct icp_qat_uof_initmem *)((uintptr_t)( |
| (uintptr_t)initmem + |
| sizeof(struct icp_qat_uof_initmem)) + |
| (sizeof(struct icp_qat_uof_memvar_attr) * |
| initmem->val_attr_num)); |
| } |
| for (ae = 0; ae < handle->hal_handle->ae_max_num; ae++) { |
| if (qat_hal_batch_wr_lm(handle, ae, |
| obj_handle->lm_init_tab[ae])) { |
| pr_err("QAT: fail to batch init lmem for AE %d\n", ae); |
| return -EINVAL; |
| } |
| qat_uclo_cleanup_batch_init_list(handle, |
| &obj_handle->lm_init_tab[ae]); |
| qat_uclo_batch_wr_umem(handle, ae, |
| obj_handle->umem_init_tab[ae]); |
| qat_uclo_cleanup_batch_init_list(handle, |
| &obj_handle-> |
| umem_init_tab[ae]); |
| } |
| return 0; |
| } |
| |
| static void *qat_uclo_find_chunk(struct icp_qat_uof_objhdr *obj_hdr, |
| char *chunk_id, void *cur) |
| { |
| int i; |
| struct icp_qat_uof_chunkhdr *chunk_hdr = |
| (struct icp_qat_uof_chunkhdr *) |
| ((uintptr_t)obj_hdr + sizeof(struct icp_qat_uof_objhdr)); |
| |
| for (i = 0; i < obj_hdr->num_chunks; i++) { |
| if ((cur < (void *)&chunk_hdr[i]) && |
| !strncmp(chunk_hdr[i].chunk_id, chunk_id, |
| ICP_QAT_UOF_OBJID_LEN)) { |
| return &chunk_hdr[i]; |
| } |
| } |
| return NULL; |
| } |
| |
| static unsigned int qat_uclo_calc_checksum(unsigned int reg, int ch) |
| { |
| int i; |
| unsigned int topbit = 1 << 0xF; |
| unsigned int inbyte = (unsigned int)((reg >> 0x18) ^ ch); |
| |
| reg ^= inbyte << 0x8; |
| for (i = 0; i < 0x8; i++) { |
| if (reg & topbit) |
| reg = (reg << 1) ^ 0x1021; |
| else |
| reg <<= 1; |
| } |
| return reg & 0xFFFF; |
| } |
| |
| static unsigned int qat_uclo_calc_str_checksum(char *ptr, int num) |
| { |
| unsigned int chksum = 0; |
| |
| if (ptr) |
| while (num--) |
| chksum = qat_uclo_calc_checksum(chksum, *ptr++); |
| return chksum; |
| } |
| |
| static struct icp_qat_uclo_objhdr * |
| qat_uclo_map_chunk(char *buf, struct icp_qat_uof_filehdr *file_hdr, |
| char *chunk_id) |
| { |
| struct icp_qat_uof_filechunkhdr *file_chunk; |
| struct icp_qat_uclo_objhdr *obj_hdr; |
| char *chunk; |
| int i; |
| |
| file_chunk = (struct icp_qat_uof_filechunkhdr *) |
| (buf + sizeof(struct icp_qat_uof_filehdr)); |
| for (i = 0; i < file_hdr->num_chunks; i++) { |
| if (!strncmp(file_chunk->chunk_id, chunk_id, |
| ICP_QAT_UOF_OBJID_LEN)) { |
| chunk = buf + file_chunk->offset; |
| if (file_chunk->checksum != qat_uclo_calc_str_checksum( |
| chunk, file_chunk->size)) |
| break; |
| obj_hdr = kzalloc(sizeof(*obj_hdr), GFP_KERNEL); |
| if (!obj_hdr) |
| break; |
| obj_hdr->file_buff = chunk; |
| obj_hdr->checksum = file_chunk->checksum; |
| obj_hdr->size = file_chunk->size; |
| return obj_hdr; |
| } |
| file_chunk++; |
| } |
| return NULL; |
| } |
| |
| static unsigned int |
| qat_uclo_check_image_compat(struct icp_qat_uof_encap_obj *encap_uof_obj, |
| struct icp_qat_uof_image *image) |
| { |
| struct icp_qat_uof_objtable *uc_var_tab, *imp_var_tab, *imp_expr_tab; |
| struct icp_qat_uof_objtable *neigh_reg_tab; |
| struct icp_qat_uof_code_page *code_page; |
| |
| code_page = (struct icp_qat_uof_code_page *) |
| ((char *)image + sizeof(struct icp_qat_uof_image)); |
| uc_var_tab = (struct icp_qat_uof_objtable *)(encap_uof_obj->beg_uof + |
| code_page->uc_var_tab_offset); |
| imp_var_tab = (struct icp_qat_uof_objtable *)(encap_uof_obj->beg_uof + |
| code_page->imp_var_tab_offset); |
| imp_expr_tab = (struct icp_qat_uof_objtable *) |
| (encap_uof_obj->beg_uof + |
| code_page->imp_expr_tab_offset); |
| if (uc_var_tab->entry_num || imp_var_tab->entry_num || |
| imp_expr_tab->entry_num) { |
| pr_err("QAT: UOF can't contain imported variable to be parsed"); |
| return -EINVAL; |
| } |
| neigh_reg_tab = (struct icp_qat_uof_objtable *) |
| (encap_uof_obj->beg_uof + |
| code_page->neigh_reg_tab_offset); |
| if (neigh_reg_tab->entry_num) { |
| pr_err("QAT: UOF can't contain shared control store feature"); |
| return -EINVAL; |
| } |
| if (image->numpages > 1) { |
| pr_err("QAT: UOF can't contain multiple pages"); |
| return -EINVAL; |
| } |
| if (ICP_QAT_SHARED_USTORE_MODE(image->ae_mode)) { |
| pr_err("QAT: UOF can't use shared control store feature"); |
| return -EFAULT; |
| } |
| if (RELOADABLE_CTX_SHARED_MODE(image->ae_mode)) { |
| pr_err("QAT: UOF can't use reloadable feature"); |
| return -EFAULT; |
| } |
| return 0; |
| } |
| |
| static void qat_uclo_map_image_page(struct icp_qat_uof_encap_obj |
| *encap_uof_obj, |
| struct icp_qat_uof_image *img, |
| struct icp_qat_uclo_encap_page *page) |
| { |
| struct icp_qat_uof_code_page *code_page; |
| struct icp_qat_uof_code_area *code_area; |
| struct icp_qat_uof_objtable *uword_block_tab; |
| struct icp_qat_uof_uword_block *uwblock; |
| int i; |
| |
| code_page = (struct icp_qat_uof_code_page *) |
| ((char *)img + sizeof(struct icp_qat_uof_image)); |
| page->def_page = code_page->def_page; |
| page->page_region = code_page->page_region; |
| page->beg_addr_v = code_page->beg_addr_v; |
| page->beg_addr_p = code_page->beg_addr_p; |
| code_area = (struct icp_qat_uof_code_area *)(encap_uof_obj->beg_uof + |
| code_page->code_area_offset); |
| page->micro_words_num = code_area->micro_words_num; |
| uword_block_tab = (struct icp_qat_uof_objtable *) |
| (encap_uof_obj->beg_uof + |
| code_area->uword_block_tab); |
| page->uwblock_num = uword_block_tab->entry_num; |
| uwblock = (struct icp_qat_uof_uword_block *)((char *)uword_block_tab + |
| sizeof(struct icp_qat_uof_objtable)); |
| page->uwblock = (struct icp_qat_uclo_encap_uwblock *)uwblock; |
| for (i = 0; i < uword_block_tab->entry_num; i++) |
| page->uwblock[i].micro_words = |
| (uintptr_t)encap_uof_obj->beg_uof + uwblock[i].uword_offset; |
| } |
| |
| static int qat_uclo_map_uimage(struct icp_qat_uclo_objhandle *obj_handle, |
| struct icp_qat_uclo_encapme *ae_uimage, |
| int max_image) |
| { |
| int i, j; |
| struct icp_qat_uof_chunkhdr *chunk_hdr = NULL; |
| struct icp_qat_uof_image *image; |
| struct icp_qat_uof_objtable *ae_regtab; |
| struct icp_qat_uof_objtable *init_reg_sym_tab; |
| struct icp_qat_uof_objtable *sbreak_tab; |
| struct icp_qat_uof_encap_obj *encap_uof_obj = |
| &obj_handle->encap_uof_obj; |
| |
| for (j = 0; j < max_image; j++) { |
| chunk_hdr = qat_uclo_find_chunk(encap_uof_obj->obj_hdr, |
| ICP_QAT_UOF_IMAG, chunk_hdr); |
| if (!chunk_hdr) |
| break; |
| image = (struct icp_qat_uof_image *)(encap_uof_obj->beg_uof + |
| chunk_hdr->offset); |
| ae_regtab = (struct icp_qat_uof_objtable *) |
| (image->reg_tab_offset + |
| obj_handle->obj_hdr->file_buff); |
| ae_uimage[j].ae_reg_num = ae_regtab->entry_num; |
| ae_uimage[j].ae_reg = (struct icp_qat_uof_ae_reg *) |
| (((char *)ae_regtab) + |
| sizeof(struct icp_qat_uof_objtable)); |
| init_reg_sym_tab = (struct icp_qat_uof_objtable *) |
| (image->init_reg_sym_tab + |
| obj_handle->obj_hdr->file_buff); |
| ae_uimage[j].init_regsym_num = init_reg_sym_tab->entry_num; |
| ae_uimage[j].init_regsym = (struct icp_qat_uof_init_regsym *) |
| (((char *)init_reg_sym_tab) + |
| sizeof(struct icp_qat_uof_objtable)); |
| sbreak_tab = (struct icp_qat_uof_objtable *) |
| (image->sbreak_tab + obj_handle->obj_hdr->file_buff); |
| ae_uimage[j].sbreak_num = sbreak_tab->entry_num; |
| ae_uimage[j].sbreak = (struct icp_qat_uof_sbreak *) |
| (((char *)sbreak_tab) + |
| sizeof(struct icp_qat_uof_objtable)); |
| ae_uimage[j].img_ptr = image; |
| if (qat_uclo_check_image_compat(encap_uof_obj, image)) |
| goto out_err; |
| ae_uimage[j].page = |
| kzalloc(sizeof(struct icp_qat_uclo_encap_page), |
| GFP_KERNEL); |
| if (!ae_uimage[j].page) |
| goto out_err; |
| qat_uclo_map_image_page(encap_uof_obj, image, |
| ae_uimage[j].page); |
| } |
| return j; |
| out_err: |
| for (i = 0; i < j; i++) |
| kfree(ae_uimage[i].page); |
| return 0; |
| } |
| |
| static int qat_uclo_map_ae(struct icp_qat_fw_loader_handle *handle, int max_ae) |
| { |
| int i, ae; |
| int mflag = 0; |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| |
| for (ae = 0; ae < max_ae; ae++) { |
| if (!test_bit(ae, |
| (unsigned long *)&handle->hal_handle->ae_mask)) |
| continue; |
| for (i = 0; i < obj_handle->uimage_num; i++) { |
| if (!test_bit(ae, (unsigned long *) |
| &obj_handle->ae_uimage[i].img_ptr->ae_assigned)) |
| continue; |
| mflag = 1; |
| if (qat_uclo_init_ae_data(obj_handle, ae, i)) |
| return -EINVAL; |
| } |
| } |
| if (!mflag) { |
| pr_err("QAT: uimage uses AE not set"); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static struct icp_qat_uof_strtable * |
| qat_uclo_map_str_table(struct icp_qat_uclo_objhdr *obj_hdr, |
| char *tab_name, struct icp_qat_uof_strtable *str_table) |
| { |
| struct icp_qat_uof_chunkhdr *chunk_hdr; |
| |
| chunk_hdr = qat_uclo_find_chunk((struct icp_qat_uof_objhdr *) |
| obj_hdr->file_buff, tab_name, NULL); |
| if (chunk_hdr) { |
| int hdr_size; |
| |
| memcpy(&str_table->table_len, obj_hdr->file_buff + |
| chunk_hdr->offset, sizeof(str_table->table_len)); |
| hdr_size = (char *)&str_table->strings - (char *)str_table; |
| str_table->strings = (uintptr_t)obj_hdr->file_buff + |
| chunk_hdr->offset + hdr_size; |
| return str_table; |
| } |
| return NULL; |
| } |
| |
| static void |
| qat_uclo_map_initmem_table(struct icp_qat_uof_encap_obj *encap_uof_obj, |
| struct icp_qat_uclo_init_mem_table *init_mem_tab) |
| { |
| struct icp_qat_uof_chunkhdr *chunk_hdr; |
| |
| chunk_hdr = qat_uclo_find_chunk(encap_uof_obj->obj_hdr, |
| ICP_QAT_UOF_IMEM, NULL); |
| if (chunk_hdr) { |
| memmove(&init_mem_tab->entry_num, encap_uof_obj->beg_uof + |
| chunk_hdr->offset, sizeof(unsigned int)); |
| init_mem_tab->init_mem = (struct icp_qat_uof_initmem *) |
| (encap_uof_obj->beg_uof + chunk_hdr->offset + |
| sizeof(unsigned int)); |
| } |
| } |
| |
| static unsigned int |
| qat_uclo_get_dev_type(struct icp_qat_fw_loader_handle *handle) |
| { |
| switch (handle->pci_dev->device) { |
| case ADF_DH895XCC_PCI_DEVICE_ID: |
| return ICP_QAT_AC_895XCC_DEV_TYPE; |
| case ADF_C62X_PCI_DEVICE_ID: |
| return ICP_QAT_AC_C62X_DEV_TYPE; |
| case ADF_C3XXX_PCI_DEVICE_ID: |
| return ICP_QAT_AC_C3XXX_DEV_TYPE; |
| default: |
| pr_err("QAT: unsupported device 0x%x\n", |
| handle->pci_dev->device); |
| return 0; |
| } |
| } |
| |
| static int qat_uclo_check_uof_compat(struct icp_qat_uclo_objhandle *obj_handle) |
| { |
| unsigned int maj_ver, prod_type = obj_handle->prod_type; |
| |
| if (!(prod_type & obj_handle->encap_uof_obj.obj_hdr->ac_dev_type)) { |
| pr_err("QAT: UOF type 0x%x doesn't match with platform 0x%x\n", |
| obj_handle->encap_uof_obj.obj_hdr->ac_dev_type, |
| prod_type); |
| return -EINVAL; |
| } |
| maj_ver = obj_handle->prod_rev & 0xff; |
| if ((obj_handle->encap_uof_obj.obj_hdr->max_cpu_ver < maj_ver) || |
| (obj_handle->encap_uof_obj.obj_hdr->min_cpu_ver > maj_ver)) { |
| pr_err("QAT: UOF majVer 0x%x out of range\n", maj_ver); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_init_reg(struct icp_qat_fw_loader_handle *handle, |
| unsigned char ae, unsigned char ctx_mask, |
| enum icp_qat_uof_regtype reg_type, |
| unsigned short reg_addr, unsigned int value) |
| { |
| switch (reg_type) { |
| case ICP_GPA_ABS: |
| case ICP_GPB_ABS: |
| ctx_mask = 0; |
| case ICP_GPA_REL: |
| case ICP_GPB_REL: |
| return qat_hal_init_gpr(handle, ae, ctx_mask, reg_type, |
| reg_addr, value); |
| case ICP_SR_ABS: |
| case ICP_DR_ABS: |
| case ICP_SR_RD_ABS: |
| case ICP_DR_RD_ABS: |
| ctx_mask = 0; |
| case ICP_SR_REL: |
| case ICP_DR_REL: |
| case ICP_SR_RD_REL: |
| case ICP_DR_RD_REL: |
| return qat_hal_init_rd_xfer(handle, ae, ctx_mask, reg_type, |
| reg_addr, value); |
| case ICP_SR_WR_ABS: |
| case ICP_DR_WR_ABS: |
| ctx_mask = 0; |
| case ICP_SR_WR_REL: |
| case ICP_DR_WR_REL: |
| return qat_hal_init_wr_xfer(handle, ae, ctx_mask, reg_type, |
| reg_addr, value); |
| case ICP_NEIGH_REL: |
| return qat_hal_init_nn(handle, ae, ctx_mask, reg_addr, value); |
| default: |
| pr_err("QAT: UOF uses not supported reg type 0x%x\n", reg_type); |
| return -EFAULT; |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_init_reg_sym(struct icp_qat_fw_loader_handle *handle, |
| unsigned int ae, |
| struct icp_qat_uclo_encapme *encap_ae) |
| { |
| unsigned int i; |
| unsigned char ctx_mask; |
| struct icp_qat_uof_init_regsym *init_regsym; |
| |
| if (ICP_QAT_CTX_MODE(encap_ae->img_ptr->ae_mode) == |
| ICP_QAT_UCLO_MAX_CTX) |
| ctx_mask = 0xff; |
| else |
| ctx_mask = 0x55; |
| |
| for (i = 0; i < encap_ae->init_regsym_num; i++) { |
| unsigned int exp_res; |
| |
| init_regsym = &encap_ae->init_regsym[i]; |
| exp_res = init_regsym->value; |
| switch (init_regsym->init_type) { |
| case ICP_QAT_UOF_INIT_REG: |
| qat_uclo_init_reg(handle, ae, ctx_mask, |
| (enum icp_qat_uof_regtype) |
| init_regsym->reg_type, |
| (unsigned short)init_regsym->reg_addr, |
| exp_res); |
| break; |
| case ICP_QAT_UOF_INIT_REG_CTX: |
| /* check if ctx is appropriate for the ctxMode */ |
| if (!((1 << init_regsym->ctx) & ctx_mask)) { |
| pr_err("QAT: invalid ctx num = 0x%x\n", |
| init_regsym->ctx); |
| return -EINVAL; |
| } |
| qat_uclo_init_reg(handle, ae, |
| (unsigned char) |
| (1 << init_regsym->ctx), |
| (enum icp_qat_uof_regtype) |
| init_regsym->reg_type, |
| (unsigned short)init_regsym->reg_addr, |
| exp_res); |
| break; |
| case ICP_QAT_UOF_INIT_EXPR: |
| pr_err("QAT: INIT_EXPR feature not supported\n"); |
| return -EINVAL; |
| case ICP_QAT_UOF_INIT_EXPR_ENDIAN_SWAP: |
| pr_err("QAT: INIT_EXPR_ENDIAN_SWAP feature not supported\n"); |
| return -EINVAL; |
| default: |
| break; |
| } |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_init_globals(struct icp_qat_fw_loader_handle *handle) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int s, ae; |
| |
| if (obj_handle->global_inited) |
| return 0; |
| if (obj_handle->init_mem_tab.entry_num) { |
| if (qat_uclo_init_memory(handle)) { |
| pr_err("QAT: initialize memory failed\n"); |
| return -EINVAL; |
| } |
| } |
| for (ae = 0; ae < handle->hal_handle->ae_max_num; ae++) { |
| for (s = 0; s < obj_handle->ae_data[ae].slice_num; s++) { |
| if (!obj_handle->ae_data[ae].ae_slices[s].encap_image) |
| continue; |
| if (qat_uclo_init_reg_sym(handle, ae, |
| obj_handle->ae_data[ae]. |
| ae_slices[s].encap_image)) |
| return -EINVAL; |
| } |
| } |
| obj_handle->global_inited = 1; |
| return 0; |
| } |
| |
| static int qat_uclo_set_ae_mode(struct icp_qat_fw_loader_handle *handle) |
| { |
| unsigned char ae, nn_mode, s; |
| struct icp_qat_uof_image *uof_image; |
| struct icp_qat_uclo_aedata *ae_data; |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| |
| for (ae = 0; ae < handle->hal_handle->ae_max_num; ae++) { |
| if (!test_bit(ae, |
| (unsigned long *)&handle->hal_handle->ae_mask)) |
| continue; |
| ae_data = &obj_handle->ae_data[ae]; |
| for (s = 0; s < min_t(unsigned int, ae_data->slice_num, |
| ICP_QAT_UCLO_MAX_CTX); s++) { |
| if (!obj_handle->ae_data[ae].ae_slices[s].encap_image) |
| continue; |
| uof_image = ae_data->ae_slices[s].encap_image->img_ptr; |
| if (qat_hal_set_ae_ctx_mode(handle, ae, |
| (char)ICP_QAT_CTX_MODE |
| (uof_image->ae_mode))) { |
| pr_err("QAT: qat_hal_set_ae_ctx_mode error\n"); |
| return -EFAULT; |
| } |
| nn_mode = ICP_QAT_NN_MODE(uof_image->ae_mode); |
| if (qat_hal_set_ae_nn_mode(handle, ae, nn_mode)) { |
| pr_err("QAT: qat_hal_set_ae_nn_mode error\n"); |
| return -EFAULT; |
| } |
| if (qat_hal_set_ae_lm_mode(handle, ae, ICP_LMEM0, |
| (char)ICP_QAT_LOC_MEM0_MODE |
| (uof_image->ae_mode))) { |
| pr_err("QAT: qat_hal_set_ae_lm_mode LMEM0 error\n"); |
| return -EFAULT; |
| } |
| if (qat_hal_set_ae_lm_mode(handle, ae, ICP_LMEM1, |
| (char)ICP_QAT_LOC_MEM1_MODE |
| (uof_image->ae_mode))) { |
| pr_err("QAT: qat_hal_set_ae_lm_mode LMEM1 error\n"); |
| return -EFAULT; |
| } |
| } |
| } |
| return 0; |
| } |
| |
| static void qat_uclo_init_uword_num(struct icp_qat_fw_loader_handle *handle) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| struct icp_qat_uclo_encapme *image; |
| int a; |
| |
| for (a = 0; a < obj_handle->uimage_num; a++) { |
| image = &obj_handle->ae_uimage[a]; |
| image->uwords_num = image->page->beg_addr_p + |
| image->page->micro_words_num; |
| } |
| } |
| |
| static int qat_uclo_parse_uof_obj(struct icp_qat_fw_loader_handle *handle) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int ae; |
| |
| obj_handle->uword_buf = kcalloc(UWORD_CPYBUF_SIZE, sizeof(uint64_t), |
| GFP_KERNEL); |
| if (!obj_handle->uword_buf) |
| return -ENOMEM; |
| obj_handle->encap_uof_obj.beg_uof = obj_handle->obj_hdr->file_buff; |
| obj_handle->encap_uof_obj.obj_hdr = (struct icp_qat_uof_objhdr *) |
| obj_handle->obj_hdr->file_buff; |
| obj_handle->uword_in_bytes = 6; |
| obj_handle->prod_type = qat_uclo_get_dev_type(handle); |
| obj_handle->prod_rev = PID_MAJOR_REV | |
| (PID_MINOR_REV & handle->hal_handle->revision_id); |
| if (qat_uclo_check_uof_compat(obj_handle)) { |
| pr_err("QAT: UOF incompatible\n"); |
| return -EINVAL; |
| } |
| obj_handle->ustore_phy_size = ICP_QAT_UCLO_MAX_USTORE; |
| if (!obj_handle->obj_hdr->file_buff || |
| !qat_uclo_map_str_table(obj_handle->obj_hdr, ICP_QAT_UOF_STRT, |
| &obj_handle->str_table)) { |
| pr_err("QAT: UOF doesn't have effective images\n"); |
| goto out_err; |
| } |
| obj_handle->uimage_num = |
| qat_uclo_map_uimage(obj_handle, obj_handle->ae_uimage, |
| ICP_QAT_UCLO_MAX_AE * ICP_QAT_UCLO_MAX_CTX); |
| if (!obj_handle->uimage_num) |
| goto out_err; |
| if (qat_uclo_map_ae(handle, handle->hal_handle->ae_max_num)) { |
| pr_err("QAT: Bad object\n"); |
| goto out_check_uof_aemask_err; |
| } |
| qat_uclo_init_uword_num(handle); |
| qat_uclo_map_initmem_table(&obj_handle->encap_uof_obj, |
| &obj_handle->init_mem_tab); |
| if (qat_uclo_set_ae_mode(handle)) |
| goto out_check_uof_aemask_err; |
| return 0; |
| out_check_uof_aemask_err: |
| for (ae = 0; ae < obj_handle->uimage_num; ae++) |
| kfree(obj_handle->ae_uimage[ae].page); |
| out_err: |
| kfree(obj_handle->uword_buf); |
| return -EFAULT; |
| } |
| |
| static int qat_uclo_map_suof_file_hdr(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_suof_filehdr *suof_ptr, |
| int suof_size) |
| { |
| unsigned int check_sum = 0; |
| unsigned int min_ver_offset = 0; |
| struct icp_qat_suof_handle *suof_handle = handle->sobj_handle; |
| |
| suof_handle->file_id = ICP_QAT_SUOF_FID; |
| suof_handle->suof_buf = (char *)suof_ptr; |
| suof_handle->suof_size = suof_size; |
| min_ver_offset = suof_size - offsetof(struct icp_qat_suof_filehdr, |
| min_ver); |
| check_sum = qat_uclo_calc_str_checksum((char *)&suof_ptr->min_ver, |
| min_ver_offset); |
| if (check_sum != suof_ptr->check_sum) { |
| pr_err("QAT: incorrect SUOF checksum\n"); |
| return -EINVAL; |
| } |
| suof_handle->check_sum = suof_ptr->check_sum; |
| suof_handle->min_ver = suof_ptr->min_ver; |
| suof_handle->maj_ver = suof_ptr->maj_ver; |
| suof_handle->fw_type = suof_ptr->fw_type; |
| return 0; |
| } |
| |
| static void qat_uclo_map_simg(struct icp_qat_suof_handle *suof_handle, |
| struct icp_qat_suof_img_hdr *suof_img_hdr, |
| struct icp_qat_suof_chunk_hdr *suof_chunk_hdr) |
| { |
| struct icp_qat_simg_ae_mode *ae_mode; |
| struct icp_qat_suof_objhdr *suof_objhdr; |
| |
| suof_img_hdr->simg_buf = (suof_handle->suof_buf + |
| suof_chunk_hdr->offset + |
| sizeof(*suof_objhdr)); |
| suof_img_hdr->simg_len = ((struct icp_qat_suof_objhdr *)(uintptr_t) |
| (suof_handle->suof_buf + |
| suof_chunk_hdr->offset))->img_length; |
| |
| suof_img_hdr->css_header = suof_img_hdr->simg_buf; |
| suof_img_hdr->css_key = (suof_img_hdr->css_header + |
| sizeof(struct icp_qat_css_hdr)); |
| suof_img_hdr->css_signature = suof_img_hdr->css_key + |
| ICP_QAT_CSS_FWSK_MODULUS_LEN + |
| ICP_QAT_CSS_FWSK_EXPONENT_LEN; |
| suof_img_hdr->css_simg = suof_img_hdr->css_signature + |
| ICP_QAT_CSS_SIGNATURE_LEN; |
| |
| ae_mode = (struct icp_qat_simg_ae_mode *)(suof_img_hdr->css_simg); |
| suof_img_hdr->ae_mask = ae_mode->ae_mask; |
| suof_img_hdr->simg_name = (unsigned long)&ae_mode->simg_name; |
| suof_img_hdr->appmeta_data = (unsigned long)&ae_mode->appmeta_data; |
| suof_img_hdr->fw_type = ae_mode->fw_type; |
| } |
| |
| static void |
| qat_uclo_map_suof_symobjs(struct icp_qat_suof_handle *suof_handle, |
| struct icp_qat_suof_chunk_hdr *suof_chunk_hdr) |
| { |
| char **sym_str = (char **)&suof_handle->sym_str; |
| unsigned int *sym_size = &suof_handle->sym_size; |
| struct icp_qat_suof_strtable *str_table_obj; |
| |
| *sym_size = *(unsigned int *)(uintptr_t) |
| (suof_chunk_hdr->offset + suof_handle->suof_buf); |
| *sym_str = (char *)(uintptr_t) |
| (suof_handle->suof_buf + suof_chunk_hdr->offset + |
| sizeof(str_table_obj->tab_length)); |
| } |
| |
| static int qat_uclo_check_simg_compat(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_suof_img_hdr *img_hdr) |
| { |
| struct icp_qat_simg_ae_mode *img_ae_mode = NULL; |
| unsigned int prod_rev, maj_ver, prod_type; |
| |
| prod_type = qat_uclo_get_dev_type(handle); |
| img_ae_mode = (struct icp_qat_simg_ae_mode *)img_hdr->css_simg; |
| prod_rev = PID_MAJOR_REV | |
| (PID_MINOR_REV & handle->hal_handle->revision_id); |
| if (img_ae_mode->dev_type != prod_type) { |
| pr_err("QAT: incompatible product type %x\n", |
| img_ae_mode->dev_type); |
| return -EINVAL; |
| } |
| maj_ver = prod_rev & 0xff; |
| if ((maj_ver > img_ae_mode->devmax_ver) || |
| (maj_ver < img_ae_mode->devmin_ver)) { |
| pr_err("QAT: incompatible device majver 0x%x\n", maj_ver); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| static void qat_uclo_del_suof(struct icp_qat_fw_loader_handle *handle) |
| { |
| struct icp_qat_suof_handle *sobj_handle = handle->sobj_handle; |
| |
| kfree(sobj_handle->img_table.simg_hdr); |
| sobj_handle->img_table.simg_hdr = NULL; |
| kfree(handle->sobj_handle); |
| handle->sobj_handle = NULL; |
| } |
| |
| static void qat_uclo_tail_img(struct icp_qat_suof_img_hdr *suof_img_hdr, |
| unsigned int img_id, unsigned int num_simgs) |
| { |
| struct icp_qat_suof_img_hdr img_header; |
| |
| if (img_id != num_simgs - 1) { |
| memcpy(&img_header, &suof_img_hdr[num_simgs - 1], |
| sizeof(*suof_img_hdr)); |
| memcpy(&suof_img_hdr[num_simgs - 1], &suof_img_hdr[img_id], |
| sizeof(*suof_img_hdr)); |
| memcpy(&suof_img_hdr[img_id], &img_header, |
| sizeof(*suof_img_hdr)); |
| } |
| } |
| |
| static int qat_uclo_map_suof(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_suof_filehdr *suof_ptr, |
| int suof_size) |
| { |
| struct icp_qat_suof_handle *suof_handle = handle->sobj_handle; |
| struct icp_qat_suof_chunk_hdr *suof_chunk_hdr = NULL; |
| struct icp_qat_suof_img_hdr *suof_img_hdr = NULL; |
| int ret = 0, ae0_img = ICP_QAT_UCLO_MAX_AE; |
| unsigned int i = 0; |
| struct icp_qat_suof_img_hdr img_header; |
| |
| if (!suof_ptr || (suof_size == 0)) { |
| pr_err("QAT: input parameter SUOF pointer/size is NULL\n"); |
| return -EINVAL; |
| } |
| if (qat_uclo_check_suof_format(suof_ptr)) |
| return -EINVAL; |
| ret = qat_uclo_map_suof_file_hdr(handle, suof_ptr, suof_size); |
| if (ret) |
| return ret; |
| suof_chunk_hdr = (struct icp_qat_suof_chunk_hdr *) |
| ((uintptr_t)suof_ptr + sizeof(*suof_ptr)); |
| |
| qat_uclo_map_suof_symobjs(suof_handle, suof_chunk_hdr); |
| suof_handle->img_table.num_simgs = suof_ptr->num_chunks - 1; |
| |
| if (suof_handle->img_table.num_simgs != 0) { |
| suof_img_hdr = kzalloc(suof_handle->img_table.num_simgs * |
| sizeof(img_header), GFP_KERNEL); |
| if (!suof_img_hdr) |
| return -ENOMEM; |
| suof_handle->img_table.simg_hdr = suof_img_hdr; |
| } |
| |
| for (i = 0; i < suof_handle->img_table.num_simgs; i++) { |
| qat_uclo_map_simg(handle->sobj_handle, &suof_img_hdr[i], |
| &suof_chunk_hdr[1 + i]); |
| ret = qat_uclo_check_simg_compat(handle, |
| &suof_img_hdr[i]); |
| if (ret) |
| return ret; |
| if ((suof_img_hdr[i].ae_mask & 0x1) != 0) |
| ae0_img = i; |
| } |
| qat_uclo_tail_img(suof_img_hdr, ae0_img, |
| suof_handle->img_table.num_simgs); |
| return 0; |
| } |
| |
| #define ADD_ADDR(high, low) ((((uint64_t)high) << 32) + low) |
| #define BITS_IN_DWORD 32 |
| |
| static int qat_uclo_auth_fw(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_fw_auth_desc *desc) |
| { |
| unsigned int fcu_sts, retry = 0; |
| u64 bus_addr; |
| |
| bus_addr = ADD_ADDR(desc->css_hdr_high, desc->css_hdr_low) |
| - sizeof(struct icp_qat_auth_chunk); |
| SET_CAP_CSR(handle, FCU_DRAM_ADDR_HI, (bus_addr >> BITS_IN_DWORD)); |
| SET_CAP_CSR(handle, FCU_DRAM_ADDR_LO, bus_addr); |
| SET_CAP_CSR(handle, FCU_CONTROL, FCU_CTRL_CMD_AUTH); |
| |
| do { |
| msleep(FW_AUTH_WAIT_PERIOD); |
| fcu_sts = GET_CAP_CSR(handle, FCU_STATUS); |
| if ((fcu_sts & FCU_AUTH_STS_MASK) == FCU_STS_VERI_FAIL) |
| goto auth_fail; |
| if (((fcu_sts >> FCU_STS_AUTHFWLD_POS) & 0x1)) |
| if ((fcu_sts & FCU_AUTH_STS_MASK) == FCU_STS_VERI_DONE) |
| return 0; |
| } while (retry++ < FW_AUTH_MAX_RETRY); |
| auth_fail: |
| pr_err("QAT: authentication error (FCU_STATUS = 0x%x),retry = %d\n", |
| fcu_sts & FCU_AUTH_STS_MASK, retry); |
| return -EINVAL; |
| } |
| |
| static int qat_uclo_simg_alloc(struct icp_qat_fw_loader_handle *handle, |
| struct icp_firml_dram_desc *dram_desc, |
| unsigned int size) |
| { |
| void *vptr; |
| dma_addr_t ptr; |
| |
| vptr = dma_alloc_coherent(&handle->pci_dev->dev, |
| size, &ptr, GFP_KERNEL); |
| if (!vptr) |
| return -ENOMEM; |
| dram_desc->dram_base_addr_v = vptr; |
| dram_desc->dram_bus_addr = ptr; |
| dram_desc->dram_size = size; |
| return 0; |
| } |
| |
| static void qat_uclo_simg_free(struct icp_qat_fw_loader_handle *handle, |
| struct icp_firml_dram_desc *dram_desc) |
| { |
| dma_free_coherent(&handle->pci_dev->dev, |
| (size_t)(dram_desc->dram_size), |
| (dram_desc->dram_base_addr_v), |
| dram_desc->dram_bus_addr); |
| memset(dram_desc, 0, sizeof(*dram_desc)); |
| } |
| |
| static void qat_uclo_ummap_auth_fw(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_fw_auth_desc **desc) |
| { |
| struct icp_firml_dram_desc dram_desc; |
| |
| dram_desc.dram_base_addr_v = *desc; |
| dram_desc.dram_bus_addr = ((struct icp_qat_auth_chunk *) |
| (*desc))->chunk_bus_addr; |
| dram_desc.dram_size = ((struct icp_qat_auth_chunk *) |
| (*desc))->chunk_size; |
| qat_uclo_simg_free(handle, &dram_desc); |
| } |
| |
| static int qat_uclo_map_auth_fw(struct icp_qat_fw_loader_handle *handle, |
| char *image, unsigned int size, |
| struct icp_qat_fw_auth_desc **desc) |
| { |
| struct icp_qat_css_hdr *css_hdr = (struct icp_qat_css_hdr *)image; |
| struct icp_qat_fw_auth_desc *auth_desc; |
| struct icp_qat_auth_chunk *auth_chunk; |
| u64 virt_addr, bus_addr, virt_base; |
| unsigned int length, simg_offset = sizeof(*auth_chunk); |
| struct icp_firml_dram_desc img_desc; |
| |
| if (size > (ICP_QAT_AE_IMG_OFFSET + ICP_QAT_CSS_MAX_IMAGE_LEN)) { |
| pr_err("QAT: error, input image size overflow %d\n", size); |
| return -EINVAL; |
| } |
| length = (css_hdr->fw_type == CSS_AE_FIRMWARE) ? |
| ICP_QAT_CSS_AE_SIMG_LEN + simg_offset : |
| size + ICP_QAT_CSS_FWSK_PAD_LEN + simg_offset; |
| if (qat_uclo_simg_alloc(handle, &img_desc, length)) { |
| pr_err("QAT: error, allocate continuous dram fail\n"); |
| return -ENOMEM; |
| } |
| |
| auth_chunk = img_desc.dram_base_addr_v; |
| auth_chunk->chunk_size = img_desc.dram_size; |
| auth_chunk->chunk_bus_addr = img_desc.dram_bus_addr; |
| virt_base = (uintptr_t)img_desc.dram_base_addr_v + simg_offset; |
| bus_addr = img_desc.dram_bus_addr + simg_offset; |
| auth_desc = img_desc.dram_base_addr_v; |
| auth_desc->css_hdr_high = (unsigned int)(bus_addr >> BITS_IN_DWORD); |
| auth_desc->css_hdr_low = (unsigned int)bus_addr; |
| virt_addr = virt_base; |
| |
| memcpy((void *)(uintptr_t)virt_addr, image, sizeof(*css_hdr)); |
| /* pub key */ |
| bus_addr = ADD_ADDR(auth_desc->css_hdr_high, auth_desc->css_hdr_low) + |
| sizeof(*css_hdr); |
| virt_addr = virt_addr + sizeof(*css_hdr); |
| |
| auth_desc->fwsk_pub_high = (unsigned int)(bus_addr >> BITS_IN_DWORD); |
| auth_desc->fwsk_pub_low = (unsigned int)bus_addr; |
| |
| memcpy((void *)(uintptr_t)virt_addr, |
| (void *)(image + sizeof(*css_hdr)), |
| ICP_QAT_CSS_FWSK_MODULUS_LEN); |
| /* padding */ |
| memset((void *)(uintptr_t)(virt_addr + ICP_QAT_CSS_FWSK_MODULUS_LEN), |
| 0, ICP_QAT_CSS_FWSK_PAD_LEN); |
| |
| /* exponent */ |
| memcpy((void *)(uintptr_t)(virt_addr + ICP_QAT_CSS_FWSK_MODULUS_LEN + |
| ICP_QAT_CSS_FWSK_PAD_LEN), |
| (void *)(image + sizeof(*css_hdr) + |
| ICP_QAT_CSS_FWSK_MODULUS_LEN), |
| sizeof(unsigned int)); |
| |
| /* signature */ |
| bus_addr = ADD_ADDR(auth_desc->fwsk_pub_high, |
| auth_desc->fwsk_pub_low) + |
| ICP_QAT_CSS_FWSK_PUB_LEN; |
| virt_addr = virt_addr + ICP_QAT_CSS_FWSK_PUB_LEN; |
| auth_desc->signature_high = (unsigned int)(bus_addr >> BITS_IN_DWORD); |
| auth_desc->signature_low = (unsigned int)bus_addr; |
| |
| memcpy((void *)(uintptr_t)virt_addr, |
| (void *)(image + sizeof(*css_hdr) + |
| ICP_QAT_CSS_FWSK_MODULUS_LEN + |
| ICP_QAT_CSS_FWSK_EXPONENT_LEN), |
| ICP_QAT_CSS_SIGNATURE_LEN); |
| |
| bus_addr = ADD_ADDR(auth_desc->signature_high, |
| auth_desc->signature_low) + |
| ICP_QAT_CSS_SIGNATURE_LEN; |
| virt_addr += ICP_QAT_CSS_SIGNATURE_LEN; |
| |
| auth_desc->img_high = (unsigned int)(bus_addr >> BITS_IN_DWORD); |
| auth_desc->img_low = (unsigned int)bus_addr; |
| auth_desc->img_len = size - ICP_QAT_AE_IMG_OFFSET; |
| memcpy((void *)(uintptr_t)virt_addr, |
| (void *)(image + ICP_QAT_AE_IMG_OFFSET), |
| auth_desc->img_len); |
| virt_addr = virt_base; |
| /* AE firmware */ |
| if (((struct icp_qat_css_hdr *)(uintptr_t)virt_addr)->fw_type == |
| CSS_AE_FIRMWARE) { |
| auth_desc->img_ae_mode_data_high = auth_desc->img_high; |
| auth_desc->img_ae_mode_data_low = auth_desc->img_low; |
| bus_addr = ADD_ADDR(auth_desc->img_ae_mode_data_high, |
| auth_desc->img_ae_mode_data_low) + |
| sizeof(struct icp_qat_simg_ae_mode); |
| |
| auth_desc->img_ae_init_data_high = (unsigned int) |
| (bus_addr >> BITS_IN_DWORD); |
| auth_desc->img_ae_init_data_low = (unsigned int)bus_addr; |
| bus_addr += ICP_QAT_SIMG_AE_INIT_SEQ_LEN; |
| auth_desc->img_ae_insts_high = (unsigned int) |
| (bus_addr >> BITS_IN_DWORD); |
| auth_desc->img_ae_insts_low = (unsigned int)bus_addr; |
| } else { |
| auth_desc->img_ae_insts_high = auth_desc->img_high; |
| auth_desc->img_ae_insts_low = auth_desc->img_low; |
| } |
| *desc = auth_desc; |
| return 0; |
| } |
| |
| static int qat_uclo_load_fw(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_fw_auth_desc *desc) |
| { |
| unsigned int i; |
| unsigned int fcu_sts; |
| struct icp_qat_simg_ae_mode *virt_addr; |
| unsigned int fcu_loaded_ae_pos = FCU_LOADED_AE_POS; |
| |
| virt_addr = (void *)((uintptr_t)desc + |
| sizeof(struct icp_qat_auth_chunk) + |
| sizeof(struct icp_qat_css_hdr) + |
| ICP_QAT_CSS_FWSK_PUB_LEN + |
| ICP_QAT_CSS_SIGNATURE_LEN); |
| for (i = 0; i < handle->hal_handle->ae_max_num; i++) { |
| int retry = 0; |
| |
| if (!((virt_addr->ae_mask >> i) & 0x1)) |
| continue; |
| if (qat_hal_check_ae_active(handle, i)) { |
| pr_err("QAT: AE %d is active\n", i); |
| return -EINVAL; |
| } |
| SET_CAP_CSR(handle, FCU_CONTROL, |
| (FCU_CTRL_CMD_LOAD | (i << FCU_CTRL_AE_POS))); |
| |
| do { |
| msleep(FW_AUTH_WAIT_PERIOD); |
| fcu_sts = GET_CAP_CSR(handle, FCU_STATUS); |
| if (((fcu_sts & FCU_AUTH_STS_MASK) == |
| FCU_STS_LOAD_DONE) && |
| ((fcu_sts >> fcu_loaded_ae_pos) & (1 << i))) |
| break; |
| } while (retry++ < FW_AUTH_MAX_RETRY); |
| if (retry > FW_AUTH_MAX_RETRY) { |
| pr_err("QAT: firmware load failed timeout %x\n", retry); |
| return -EINVAL; |
| } |
| } |
| return 0; |
| } |
| |
| static int qat_uclo_map_suof_obj(struct icp_qat_fw_loader_handle *handle, |
| void *addr_ptr, int mem_size) |
| { |
| struct icp_qat_suof_handle *suof_handle; |
| |
| suof_handle = kzalloc(sizeof(*suof_handle), GFP_KERNEL); |
| if (!suof_handle) |
| return -ENOMEM; |
| handle->sobj_handle = suof_handle; |
| if (qat_uclo_map_suof(handle, addr_ptr, mem_size)) { |
| qat_uclo_del_suof(handle); |
| pr_err("QAT: map SUOF failed\n"); |
| return -EINVAL; |
| } |
| return 0; |
| } |
| |
| int qat_uclo_wr_mimage(struct icp_qat_fw_loader_handle *handle, |
| void *addr_ptr, int mem_size) |
| { |
| struct icp_qat_fw_auth_desc *desc = NULL; |
| int status = 0; |
| |
| if (handle->fw_auth) { |
| if (!qat_uclo_map_auth_fw(handle, addr_ptr, mem_size, &desc)) |
| status = qat_uclo_auth_fw(handle, desc); |
| qat_uclo_ummap_auth_fw(handle, &desc); |
| } else { |
| if (handle->pci_dev->device == ADF_C3XXX_PCI_DEVICE_ID) { |
| pr_err("QAT: C3XXX doesn't support unsigned MMP\n"); |
| return -EINVAL; |
| } |
| qat_uclo_wr_sram_by_words(handle, 0, addr_ptr, mem_size); |
| } |
| return status; |
| } |
| |
| static int qat_uclo_map_uof_obj(struct icp_qat_fw_loader_handle *handle, |
| void *addr_ptr, int mem_size) |
| { |
| struct icp_qat_uof_filehdr *filehdr; |
| struct icp_qat_uclo_objhandle *objhdl; |
| |
| objhdl = kzalloc(sizeof(*objhdl), GFP_KERNEL); |
| if (!objhdl) |
| return -ENOMEM; |
| objhdl->obj_buf = kmemdup(addr_ptr, mem_size, GFP_KERNEL); |
| if (!objhdl->obj_buf) |
| goto out_objbuf_err; |
| filehdr = (struct icp_qat_uof_filehdr *)objhdl->obj_buf; |
| if (qat_uclo_check_uof_format(filehdr)) |
| goto out_objhdr_err; |
| objhdl->obj_hdr = qat_uclo_map_chunk((char *)objhdl->obj_buf, filehdr, |
| ICP_QAT_UOF_OBJS); |
| if (!objhdl->obj_hdr) { |
| pr_err("QAT: object file chunk is null\n"); |
| goto out_objhdr_err; |
| } |
| handle->obj_handle = objhdl; |
| if (qat_uclo_parse_uof_obj(handle)) |
| goto out_overlay_obj_err; |
| return 0; |
| |
| out_overlay_obj_err: |
| handle->obj_handle = NULL; |
| kfree(objhdl->obj_hdr); |
| out_objhdr_err: |
| kfree(objhdl->obj_buf); |
| out_objbuf_err: |
| kfree(objhdl); |
| return -ENOMEM; |
| } |
| |
| int qat_uclo_map_obj(struct icp_qat_fw_loader_handle *handle, |
| void *addr_ptr, int mem_size) |
| { |
| BUILD_BUG_ON(ICP_QAT_UCLO_MAX_AE >= |
| (sizeof(handle->hal_handle->ae_mask) * 8)); |
| |
| if (!handle || !addr_ptr || mem_size < 24) |
| return -EINVAL; |
| |
| return (handle->fw_auth) ? |
| qat_uclo_map_suof_obj(handle, addr_ptr, mem_size) : |
| qat_uclo_map_uof_obj(handle, addr_ptr, mem_size); |
| } |
| |
| void qat_uclo_del_uof_obj(struct icp_qat_fw_loader_handle *handle) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int a; |
| |
| if (handle->sobj_handle) |
| qat_uclo_del_suof(handle); |
| if (!obj_handle) |
| return; |
| |
| kfree(obj_handle->uword_buf); |
| for (a = 0; a < obj_handle->uimage_num; a++) |
| kfree(obj_handle->ae_uimage[a].page); |
| |
| for (a = 0; a < handle->hal_handle->ae_max_num; a++) |
| qat_uclo_free_ae_data(&obj_handle->ae_data[a]); |
| |
| kfree(obj_handle->obj_hdr); |
| kfree(obj_handle->obj_buf); |
| kfree(obj_handle); |
| handle->obj_handle = NULL; |
| } |
| |
| static void qat_uclo_fill_uwords(struct icp_qat_uclo_objhandle *obj_handle, |
| struct icp_qat_uclo_encap_page *encap_page, |
| uint64_t *uword, unsigned int addr_p, |
| unsigned int raddr, uint64_t fill) |
| { |
| uint64_t uwrd = 0; |
| unsigned int i; |
| |
| if (!encap_page) { |
| *uword = fill; |
| return; |
| } |
| for (i = 0; i < encap_page->uwblock_num; i++) { |
| if (raddr >= encap_page->uwblock[i].start_addr && |
| raddr <= encap_page->uwblock[i].start_addr + |
| encap_page->uwblock[i].words_num - 1) { |
| raddr -= encap_page->uwblock[i].start_addr; |
| raddr *= obj_handle->uword_in_bytes; |
| memcpy(&uwrd, (void *)(((uintptr_t) |
| encap_page->uwblock[i].micro_words) + raddr), |
| obj_handle->uword_in_bytes); |
| uwrd = uwrd & 0xbffffffffffull; |
| } |
| } |
| *uword = uwrd; |
| if (*uword == INVLD_UWORD) |
| *uword = fill; |
| } |
| |
| static void qat_uclo_wr_uimage_raw_page(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uclo_encap_page |
| *encap_page, unsigned int ae) |
| { |
| unsigned int uw_physical_addr, uw_relative_addr, i, words_num, cpylen; |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| uint64_t fill_pat; |
| |
| /* load the page starting at appropriate ustore address */ |
| /* get fill-pattern from an image -- they are all the same */ |
| memcpy(&fill_pat, obj_handle->ae_uimage[0].img_ptr->fill_pattern, |
| sizeof(uint64_t)); |
| uw_physical_addr = encap_page->beg_addr_p; |
| uw_relative_addr = 0; |
| words_num = encap_page->micro_words_num; |
| while (words_num) { |
| if (words_num < UWORD_CPYBUF_SIZE) |
| cpylen = words_num; |
| else |
| cpylen = UWORD_CPYBUF_SIZE; |
| |
| /* load the buffer */ |
| for (i = 0; i < cpylen; i++) |
| qat_uclo_fill_uwords(obj_handle, encap_page, |
| &obj_handle->uword_buf[i], |
| uw_physical_addr + i, |
| uw_relative_addr + i, fill_pat); |
| |
| /* copy the buffer to ustore */ |
| qat_hal_wr_uwords(handle, (unsigned char)ae, |
| uw_physical_addr, cpylen, |
| obj_handle->uword_buf); |
| |
| uw_physical_addr += cpylen; |
| uw_relative_addr += cpylen; |
| words_num -= cpylen; |
| } |
| } |
| |
| static void qat_uclo_wr_uimage_page(struct icp_qat_fw_loader_handle *handle, |
| struct icp_qat_uof_image *image) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int ctx_mask, s; |
| struct icp_qat_uclo_page *page; |
| unsigned char ae; |
| int ctx; |
| |
| if (ICP_QAT_CTX_MODE(image->ae_mode) == ICP_QAT_UCLO_MAX_CTX) |
| ctx_mask = 0xff; |
| else |
| ctx_mask = 0x55; |
| /* load the default page and set assigned CTX PC |
| * to the entrypoint address */ |
| for (ae = 0; ae < handle->hal_handle->ae_max_num; ae++) { |
| if (!test_bit(ae, (unsigned long *)&image->ae_assigned)) |
| continue; |
| /* find the slice to which this image is assigned */ |
| for (s = 0; s < obj_handle->ae_data[ae].slice_num; s++) { |
| if (image->ctx_assigned & obj_handle->ae_data[ae]. |
| ae_slices[s].ctx_mask_assigned) |
| break; |
| } |
| if (s >= obj_handle->ae_data[ae].slice_num) |
| continue; |
| page = obj_handle->ae_data[ae].ae_slices[s].page; |
| if (!page->encap_page->def_page) |
| continue; |
| qat_uclo_wr_uimage_raw_page(handle, page->encap_page, ae); |
| |
| page = obj_handle->ae_data[ae].ae_slices[s].page; |
| for (ctx = 0; ctx < ICP_QAT_UCLO_MAX_CTX; ctx++) |
| obj_handle->ae_data[ae].ae_slices[s].cur_page[ctx] = |
| (ctx_mask & (1 << ctx)) ? page : NULL; |
| qat_hal_set_live_ctx(handle, (unsigned char)ae, |
| image->ctx_assigned); |
| qat_hal_set_pc(handle, (unsigned char)ae, image->ctx_assigned, |
| image->entry_address); |
| } |
| } |
| |
| static int qat_uclo_wr_suof_img(struct icp_qat_fw_loader_handle *handle) |
| { |
| unsigned int i; |
| struct icp_qat_fw_auth_desc *desc = NULL; |
| struct icp_qat_suof_handle *sobj_handle = handle->sobj_handle; |
| struct icp_qat_suof_img_hdr *simg_hdr = sobj_handle->img_table.simg_hdr; |
| |
| for (i = 0; i < sobj_handle->img_table.num_simgs; i++) { |
| if (qat_uclo_map_auth_fw(handle, |
| (char *)simg_hdr[i].simg_buf, |
| (unsigned int) |
| (simg_hdr[i].simg_len), |
| &desc)) |
| goto wr_err; |
| if (qat_uclo_auth_fw(handle, desc)) |
| goto wr_err; |
| if (qat_uclo_load_fw(handle, desc)) |
| goto wr_err; |
| qat_uclo_ummap_auth_fw(handle, &desc); |
| } |
| return 0; |
| wr_err: |
| qat_uclo_ummap_auth_fw(handle, &desc); |
| return -EINVAL; |
| } |
| |
| static int qat_uclo_wr_uof_img(struct icp_qat_fw_loader_handle *handle) |
| { |
| struct icp_qat_uclo_objhandle *obj_handle = handle->obj_handle; |
| unsigned int i; |
| |
| if (qat_uclo_init_globals(handle)) |
| return -EINVAL; |
| for (i = 0; i < obj_handle->uimage_num; i++) { |
| if (!obj_handle->ae_uimage[i].img_ptr) |
| return -EINVAL; |
| if (qat_uclo_init_ustore(handle, &obj_handle->ae_uimage[i])) |
| return -EINVAL; |
| qat_uclo_wr_uimage_page(handle, |
| obj_handle->ae_uimage[i].img_ptr); |
| } |
| return 0; |
| } |
| |
| int qat_uclo_wr_all_uimage(struct icp_qat_fw_loader_handle *handle) |
| { |
| return (handle->fw_auth) ? qat_uclo_wr_suof_img(handle) : |
| qat_uclo_wr_uof_img(handle); |
| } |