Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 1 | /* |
| 2 | * CAAM control-plane driver backend |
| 3 | * Controller-level driver, kernel property detection, initialization |
| 4 | * |
| 5 | * Copyright 2008-2011 Freescale Semiconductor, Inc. |
| 6 | */ |
| 7 | |
| 8 | #include "compat.h" |
| 9 | #include "regs.h" |
| 10 | #include "intern.h" |
| 11 | #include "jr.h" |
| 12 | |
| 13 | static int caam_remove(struct platform_device *pdev) |
| 14 | { |
| 15 | struct device *ctrldev; |
| 16 | struct caam_drv_private *ctrlpriv; |
| 17 | struct caam_drv_private_jr *jrpriv; |
| 18 | struct caam_full __iomem *topregs; |
| 19 | int ring, ret = 0; |
| 20 | |
| 21 | ctrldev = &pdev->dev; |
| 22 | ctrlpriv = dev_get_drvdata(ctrldev); |
| 23 | topregs = (struct caam_full __iomem *)ctrlpriv->ctrl; |
| 24 | |
| 25 | /* shut down JobRs */ |
| 26 | for (ring = 0; ring < ctrlpriv->total_jobrs; ring++) { |
| 27 | ret |= caam_jr_shutdown(ctrlpriv->jrdev[ring]); |
| 28 | jrpriv = dev_get_drvdata(ctrlpriv->jrdev[ring]); |
| 29 | irq_dispose_mapping(jrpriv->irq); |
| 30 | } |
| 31 | |
| 32 | /* Shut down debug views */ |
| 33 | #ifdef CONFIG_DEBUG_FS |
| 34 | debugfs_remove_recursive(ctrlpriv->dfs_root); |
| 35 | #endif |
| 36 | |
| 37 | /* Unmap controller region */ |
| 38 | iounmap(&topregs->ctrl); |
| 39 | |
| 40 | kfree(ctrlpriv->jrdev); |
| 41 | kfree(ctrlpriv); |
| 42 | |
| 43 | return ret; |
| 44 | } |
| 45 | |
| 46 | /* Probe routine for CAAM top (controller) level */ |
Kim Phillips | 2930d49 | 2011-05-14 22:07:55 -0500 | [diff] [blame] | 47 | static int caam_probe(struct platform_device *pdev) |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 48 | { |
| 49 | int d, ring, rspec; |
| 50 | struct device *dev; |
| 51 | struct device_node *nprop, *np; |
| 52 | struct caam_ctrl __iomem *ctrl; |
| 53 | struct caam_full __iomem *topregs; |
| 54 | struct caam_drv_private *ctrlpriv; |
Kim Phillips | 23457bc | 2011-06-05 16:42:54 -0500 | [diff] [blame] | 55 | #ifdef CONFIG_DEBUG_FS |
| 56 | struct caam_perfmon *perfmon; |
| 57 | #endif |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 58 | |
| 59 | ctrlpriv = kzalloc(sizeof(struct caam_drv_private), GFP_KERNEL); |
| 60 | if (!ctrlpriv) |
| 61 | return -ENOMEM; |
| 62 | |
| 63 | dev = &pdev->dev; |
| 64 | dev_set_drvdata(dev, ctrlpriv); |
| 65 | ctrlpriv->pdev = pdev; |
| 66 | nprop = pdev->dev.of_node; |
| 67 | |
| 68 | /* Get configuration properties from device tree */ |
| 69 | /* First, get register page */ |
| 70 | ctrl = of_iomap(nprop, 0); |
| 71 | if (ctrl == NULL) { |
| 72 | dev_err(dev, "caam: of_iomap() failed\n"); |
| 73 | return -ENOMEM; |
| 74 | } |
| 75 | ctrlpriv->ctrl = (struct caam_ctrl __force *)ctrl; |
| 76 | |
| 77 | /* topregs used to derive pointers to CAAM sub-blocks only */ |
| 78 | topregs = (struct caam_full __iomem *)ctrl; |
| 79 | |
| 80 | /* Get the IRQ of the controller (for security violations only) */ |
| 81 | ctrlpriv->secvio_irq = of_irq_to_resource(nprop, 0, NULL); |
| 82 | |
| 83 | /* |
| 84 | * Enable DECO watchdogs and, if this is a PHYS_ADDR_T_64BIT kernel, |
| 85 | * 36-bit pointers in master configuration register |
| 86 | */ |
| 87 | setbits32(&topregs->ctrl.mcr, MCFGR_WDENABLE | |
| 88 | (sizeof(dma_addr_t) == sizeof(u64) ? MCFGR_LONG_PTR : 0)); |
| 89 | |
| 90 | if (sizeof(dma_addr_t) == sizeof(u64)) |
| 91 | dma_set_mask(dev, DMA_BIT_MASK(36)); |
| 92 | |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 93 | /* |
| 94 | * Detect and enable JobRs |
| 95 | * First, find out how many ring spec'ed, allocate references |
| 96 | * for all, then go probe each one. |
| 97 | */ |
| 98 | rspec = 0; |
Kim Phillips | 54e198d | 2011-03-23 21:15:44 +0800 | [diff] [blame] | 99 | for_each_compatible_node(np, NULL, "fsl,sec-v4.0-job-ring") |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 100 | rspec++; |
| 101 | ctrlpriv->jrdev = kzalloc(sizeof(struct device *) * rspec, GFP_KERNEL); |
| 102 | if (ctrlpriv->jrdev == NULL) { |
| 103 | iounmap(&topregs->ctrl); |
| 104 | return -ENOMEM; |
| 105 | } |
| 106 | |
| 107 | ring = 0; |
| 108 | ctrlpriv->total_jobrs = 0; |
Kim Phillips | 54e198d | 2011-03-23 21:15:44 +0800 | [diff] [blame] | 109 | for_each_compatible_node(np, NULL, "fsl,sec-v4.0-job-ring") { |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 110 | caam_jr_probe(pdev, np, ring); |
| 111 | ctrlpriv->total_jobrs++; |
| 112 | ring++; |
| 113 | } |
| 114 | |
| 115 | /* Check to see if QI present. If so, enable */ |
| 116 | ctrlpriv->qi_present = !!(rd_reg64(&topregs->ctrl.perfmon.comp_parms) & |
| 117 | CTPR_QI_MASK); |
| 118 | if (ctrlpriv->qi_present) { |
| 119 | ctrlpriv->qi = (struct caam_queue_if __force *)&topregs->qi; |
| 120 | /* This is all that's required to physically enable QI */ |
| 121 | wr_reg32(&topregs->qi.qi_control_lo, QICTL_DQEN); |
| 122 | } |
| 123 | |
| 124 | /* If no QI and no rings specified, quit and go home */ |
| 125 | if ((!ctrlpriv->qi_present) && (!ctrlpriv->total_jobrs)) { |
| 126 | dev_err(dev, "no queues configured, terminating\n"); |
| 127 | caam_remove(pdev); |
| 128 | return -ENOMEM; |
| 129 | } |
| 130 | |
| 131 | /* NOTE: RTIC detection ought to go here, around Si time */ |
| 132 | |
| 133 | /* Initialize queue allocator lock */ |
| 134 | spin_lock_init(&ctrlpriv->jr_alloc_lock); |
| 135 | |
| 136 | /* Report "alive" for developer to see */ |
| 137 | dev_info(dev, "device ID = 0x%016llx\n", |
| 138 | rd_reg64(&topregs->ctrl.perfmon.caam_id)); |
| 139 | dev_info(dev, "job rings = %d, qi = %d\n", |
| 140 | ctrlpriv->total_jobrs, ctrlpriv->qi_present); |
| 141 | |
| 142 | #ifdef CONFIG_DEBUG_FS |
| 143 | /* |
| 144 | * FIXME: needs better naming distinction, as some amalgamation of |
| 145 | * "caam" and nprop->full_name. The OF name isn't distinctive, |
| 146 | * but does separate instances |
| 147 | */ |
| 148 | perfmon = (struct caam_perfmon __force *)&ctrl->perfmon; |
| 149 | |
| 150 | ctrlpriv->dfs_root = debugfs_create_dir("caam", NULL); |
| 151 | ctrlpriv->ctl = debugfs_create_dir("ctl", ctrlpriv->dfs_root); |
| 152 | |
| 153 | /* Controller-level - performance monitor counters */ |
| 154 | ctrlpriv->ctl_rq_dequeued = |
| 155 | debugfs_create_u64("rq_dequeued", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 156 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 157 | ctrlpriv->ctl, &perfmon->req_dequeued); |
| 158 | ctrlpriv->ctl_ob_enc_req = |
| 159 | debugfs_create_u64("ob_rq_encrypted", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 160 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 161 | ctrlpriv->ctl, &perfmon->ob_enc_req); |
| 162 | ctrlpriv->ctl_ib_dec_req = |
| 163 | debugfs_create_u64("ib_rq_decrypted", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 164 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 165 | ctrlpriv->ctl, &perfmon->ib_dec_req); |
| 166 | ctrlpriv->ctl_ob_enc_bytes = |
| 167 | debugfs_create_u64("ob_bytes_encrypted", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 168 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 169 | ctrlpriv->ctl, &perfmon->ob_enc_bytes); |
| 170 | ctrlpriv->ctl_ob_prot_bytes = |
| 171 | debugfs_create_u64("ob_bytes_protected", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 172 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 173 | ctrlpriv->ctl, &perfmon->ob_prot_bytes); |
| 174 | ctrlpriv->ctl_ib_dec_bytes = |
| 175 | debugfs_create_u64("ib_bytes_decrypted", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 176 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 177 | ctrlpriv->ctl, &perfmon->ib_dec_bytes); |
| 178 | ctrlpriv->ctl_ib_valid_bytes = |
| 179 | debugfs_create_u64("ib_bytes_validated", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 180 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 181 | ctrlpriv->ctl, &perfmon->ib_valid_bytes); |
| 182 | |
| 183 | /* Controller level - global status values */ |
| 184 | ctrlpriv->ctl_faultaddr = |
| 185 | debugfs_create_u64("fault_addr", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 186 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 187 | ctrlpriv->ctl, &perfmon->faultaddr); |
| 188 | ctrlpriv->ctl_faultdetail = |
| 189 | debugfs_create_u32("fault_detail", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 190 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 191 | ctrlpriv->ctl, &perfmon->faultdetail); |
| 192 | ctrlpriv->ctl_faultstatus = |
| 193 | debugfs_create_u32("fault_status", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 194 | S_IRUSR | S_IRGRP | S_IROTH, |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 195 | ctrlpriv->ctl, &perfmon->status); |
| 196 | |
| 197 | /* Internal covering keys (useful in non-secure mode only) */ |
| 198 | ctrlpriv->ctl_kek_wrap.data = &ctrlpriv->ctrl->kek[0]; |
| 199 | ctrlpriv->ctl_kek_wrap.size = KEK_KEY_SIZE * sizeof(u32); |
| 200 | ctrlpriv->ctl_kek = debugfs_create_blob("kek", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 201 | S_IRUSR | |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 202 | S_IRGRP | S_IROTH, |
| 203 | ctrlpriv->ctl, |
| 204 | &ctrlpriv->ctl_kek_wrap); |
| 205 | |
| 206 | ctrlpriv->ctl_tkek_wrap.data = &ctrlpriv->ctrl->tkek[0]; |
| 207 | ctrlpriv->ctl_tkek_wrap.size = KEK_KEY_SIZE * sizeof(u32); |
| 208 | ctrlpriv->ctl_tkek = debugfs_create_blob("tkek", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 209 | S_IRUSR | |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 210 | S_IRGRP | S_IROTH, |
| 211 | ctrlpriv->ctl, |
| 212 | &ctrlpriv->ctl_tkek_wrap); |
| 213 | |
| 214 | ctrlpriv->ctl_tdsk_wrap.data = &ctrlpriv->ctrl->tdsk[0]; |
| 215 | ctrlpriv->ctl_tdsk_wrap.size = KEK_KEY_SIZE * sizeof(u32); |
| 216 | ctrlpriv->ctl_tdsk = debugfs_create_blob("tdsk", |
Al Viro | eda65cc | 2011-07-24 04:32:53 -0400 | [diff] [blame] | 217 | S_IRUSR | |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 218 | S_IRGRP | S_IROTH, |
| 219 | ctrlpriv->ctl, |
| 220 | &ctrlpriv->ctl_tdsk_wrap); |
| 221 | #endif |
| 222 | return 0; |
| 223 | } |
| 224 | |
| 225 | static struct of_device_id caam_match[] = { |
| 226 | { |
Kim Phillips | 54e198d | 2011-03-23 21:15:44 +0800 | [diff] [blame] | 227 | .compatible = "fsl,sec-v4.0", |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 228 | }, |
| 229 | {}, |
| 230 | }; |
| 231 | MODULE_DEVICE_TABLE(of, caam_match); |
| 232 | |
Kim Phillips | 2930d49 | 2011-05-14 22:07:55 -0500 | [diff] [blame] | 233 | static struct platform_driver caam_driver = { |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 234 | .driver = { |
| 235 | .name = "caam", |
| 236 | .owner = THIS_MODULE, |
| 237 | .of_match_table = caam_match, |
| 238 | }, |
| 239 | .probe = caam_probe, |
| 240 | .remove = __devexit_p(caam_remove), |
| 241 | }; |
| 242 | |
Axel Lin | 741e8c2 | 2011-11-26 21:26:19 +0800 | [diff] [blame] | 243 | module_platform_driver(caam_driver); |
Kim Phillips | 8e8ec59 | 2011-03-13 16:54:26 +0800 | [diff] [blame] | 244 | |
| 245 | MODULE_LICENSE("GPL"); |
| 246 | MODULE_DESCRIPTION("FSL CAAM request backend"); |
| 247 | MODULE_AUTHOR("Freescale Semiconductor - NMG/STC"); |