1/*-
2 * Copyright (C) 2009-2011 Semihalf.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 */
26
27/*
28 * CESA SRAM Memory Map:
29 *
30 * +------------------------+ <= sc->sc_sram_base_va + CESA_SRAM_SIZE
31 * |                        |
32 * |          DATA          |
33 * |                        |
34 * +------------------------+ <= sc->sc_sram_base_va + CESA_DATA(0)
35 * |  struct cesa_sa_data   |
36 * +------------------------+
37 * |  struct cesa_sa_hdesc  |
38 * +------------------------+ <= sc->sc_sram_base_va
39 */
40
41#include <sys/cdefs.h>
42__FBSDID("$FreeBSD$");
43
44#include <sys/param.h>
45#include <sys/systm.h>
46#include <sys/bus.h>
47#include <sys/endian.h>
48#include <sys/kernel.h>
49#include <sys/lock.h>
50#include <sys/mbuf.h>
51#include <sys/module.h>
52#include <sys/mutex.h>
53#include <sys/rman.h>
54
55#include <machine/bus.h>
56#include <machine/intr.h>
57#include <machine/resource.h>
58#include <machine/fdt.h>
59
60#include <dev/fdt/fdt_common.h>
61#include <dev/ofw/ofw_bus.h>
62#include <dev/ofw/ofw_bus_subr.h>
63
64#include <sys/md5.h>
65#include <crypto/sha1.h>
66#include <crypto/sha2/sha256.h>
67#include <crypto/rijndael/rijndael.h>
68#include <opencrypto/cryptodev.h>
69#include "cryptodev_if.h"
70
71#include <arm/mv/mvreg.h>
72#include <arm/mv/mvwin.h>
73#include <arm/mv/mvvar.h>
74#include "cesa.h"
75
76static int	cesa_probe(device_t);
77static int	cesa_attach(device_t);
78static int	cesa_detach(device_t);
79static void	cesa_intr(void *);
80static int	cesa_newsession(device_t, u_int32_t *, struct cryptoini *);
81static int	cesa_freesession(device_t, u_int64_t);
82static int	cesa_process(device_t, struct cryptop *, int);
83static int	decode_win_cesa_setup(struct cesa_softc *sc);
84
85static struct resource_spec cesa_res_spec[] = {
86	{ SYS_RES_MEMORY, 0, RF_ACTIVE },
87	{ SYS_RES_MEMORY, 1, RF_ACTIVE },
88	{ SYS_RES_IRQ, 0, RF_ACTIVE | RF_SHAREABLE },
89	{ -1, 0 }
90};
91
92static device_method_t cesa_methods[] = {
93	/* Device interface */
94	DEVMETHOD(device_probe,		cesa_probe),
95	DEVMETHOD(device_attach,	cesa_attach),
96	DEVMETHOD(device_detach,	cesa_detach),
97
98	/* Crypto device methods */
99	DEVMETHOD(cryptodev_newsession,	cesa_newsession),
100	DEVMETHOD(cryptodev_freesession,cesa_freesession),
101	DEVMETHOD(cryptodev_process,	cesa_process),
102
103	DEVMETHOD_END
104};
105
106static driver_t cesa_driver = {
107	"cesa",
108	cesa_methods,
109	sizeof (struct cesa_softc)
110};
111static devclass_t cesa_devclass;
112
113DRIVER_MODULE(cesa, simplebus, cesa_driver, cesa_devclass, 0, 0);
114MODULE_DEPEND(cesa, crypto, 1, 1, 1);
115
116static void
117cesa_dump_cshd(struct cesa_softc *sc, struct cesa_sa_hdesc *cshd)
118{
119#ifdef DEBUG
120	device_t dev;
121
122	dev = sc->sc_dev;
123	device_printf(dev, "CESA SA Hardware Descriptor:\n");
124	device_printf(dev, "\t\tconfig: 0x%08X\n", cshd->cshd_config);
125	device_printf(dev, "\t\te_src:  0x%08X\n", cshd->cshd_enc_src);
126	device_printf(dev, "\t\te_dst:  0x%08X\n", cshd->cshd_enc_dst);
127	device_printf(dev, "\t\te_dlen: 0x%08X\n", cshd->cshd_enc_dlen);
128	device_printf(dev, "\t\te_key:  0x%08X\n", cshd->cshd_enc_key);
129	device_printf(dev, "\t\te_iv_1: 0x%08X\n", cshd->cshd_enc_iv);
130	device_printf(dev, "\t\te_iv_2: 0x%08X\n", cshd->cshd_enc_iv_buf);
131	device_printf(dev, "\t\tm_src:  0x%08X\n", cshd->cshd_mac_src);
132	device_printf(dev, "\t\tm_dst:  0x%08X\n", cshd->cshd_mac_dst);
133	device_printf(dev, "\t\tm_dlen: 0x%08X\n", cshd->cshd_mac_dlen);
134	device_printf(dev, "\t\tm_tlen: 0x%08X\n", cshd->cshd_mac_total_dlen);
135	device_printf(dev, "\t\tm_iv_i: 0x%08X\n", cshd->cshd_mac_iv_in);
136	device_printf(dev, "\t\tm_iv_o: 0x%08X\n", cshd->cshd_mac_iv_out);
137#endif
138}
139
140static void
141cesa_alloc_dma_mem_cb(void *arg, bus_dma_segment_t *segs, int nseg, int error)
142{
143	struct cesa_dma_mem *cdm;
144
145	if (error)
146		return;
147
148	KASSERT(nseg == 1, ("Got wrong number of DMA segments, should be 1."));
149	cdm = arg;
150	cdm->cdm_paddr = segs->ds_addr;
151}
152
153static int
154cesa_alloc_dma_mem(struct cesa_softc *sc, struct cesa_dma_mem *cdm,
155    bus_size_t size)
156{
157	int error;
158
159	KASSERT(cdm->cdm_vaddr == NULL,
160	    ("%s(): DMA memory descriptor in use.", __func__));
161
162	error = bus_dma_tag_create(bus_get_dma_tag(sc->sc_dev),	/* parent */
163	    PAGE_SIZE, 0,			/* alignment, boundary */
164	    BUS_SPACE_MAXADDR_32BIT,		/* lowaddr */
165	    BUS_SPACE_MAXADDR,			/* highaddr */
166	    NULL, NULL,				/* filtfunc, filtfuncarg */
167	    size, 1,				/* maxsize, nsegments */
168	    size, 0,				/* maxsegsz, flags */
169	    NULL, NULL,				/* lockfunc, lockfuncarg */
170	    &cdm->cdm_tag);			/* dmat */
171	if (error) {
172		device_printf(sc->sc_dev, "failed to allocate busdma tag, error"
173		    " %i!\n", error);
174
175		goto err1;
176	}
177
178	error = bus_dmamem_alloc(cdm->cdm_tag, &cdm->cdm_vaddr,
179	    BUS_DMA_NOWAIT | BUS_DMA_ZERO, &cdm->cdm_map);
180	if (error) {
181		device_printf(sc->sc_dev, "failed to allocate DMA safe"
182		    " memory, error %i!\n", error);
183
184		goto err2;
185	}
186
187	error = bus_dmamap_load(cdm->cdm_tag, cdm->cdm_map, cdm->cdm_vaddr,
188	    size, cesa_alloc_dma_mem_cb, cdm, BUS_DMA_NOWAIT);
189	if (error) {
190		device_printf(sc->sc_dev, "cannot get address of the DMA"
191		    " memory, error %i\n", error);
192
193		goto err3;
194	}
195
196	return (0);
197err3:
198	bus_dmamem_free(cdm->cdm_tag, cdm->cdm_vaddr, cdm->cdm_map);
199err2:
200	bus_dma_tag_destroy(cdm->cdm_tag);
201err1:
202	cdm->cdm_vaddr = NULL;
203	return (error);
204}
205
206static void
207cesa_free_dma_mem(struct cesa_dma_mem *cdm)
208{
209
210	bus_dmamap_unload(cdm->cdm_tag, cdm->cdm_map);
211	bus_dmamem_free(cdm->cdm_tag, cdm->cdm_vaddr, cdm->cdm_map);
212	bus_dma_tag_destroy(cdm->cdm_tag);
213	cdm->cdm_vaddr = NULL;
214}
215
216static void
217cesa_sync_dma_mem(struct cesa_dma_mem *cdm, bus_dmasync_op_t op)
218{
219
220	/* Sync only if dma memory is valid */
221        if (cdm->cdm_vaddr != NULL)
222		bus_dmamap_sync(cdm->cdm_tag, cdm->cdm_map, op);
223}
224
225static void
226cesa_sync_desc(struct cesa_softc *sc, bus_dmasync_op_t op)
227{
228
229	cesa_sync_dma_mem(&sc->sc_tdesc_cdm, op);
230	cesa_sync_dma_mem(&sc->sc_sdesc_cdm, op);
231	cesa_sync_dma_mem(&sc->sc_requests_cdm, op);
232}
233
234static struct cesa_session *
235cesa_alloc_session(struct cesa_softc *sc)
236{
237	struct cesa_session *cs;
238
239	CESA_GENERIC_ALLOC_LOCKED(sc, cs, sessions);
240
241	return (cs);
242}
243
244static struct cesa_session *
245cesa_get_session(struct cesa_softc *sc, uint32_t sid)
246{
247
248	if (sid >= CESA_SESSIONS)
249		return (NULL);
250
251	return (&sc->sc_sessions[sid]);
252}
253
254static void
255cesa_free_session(struct cesa_softc *sc, struct cesa_session *cs)
256{
257
258	CESA_GENERIC_FREE_LOCKED(sc, cs, sessions);
259}
260
261static struct cesa_request *
262cesa_alloc_request(struct cesa_softc *sc)
263{
264	struct cesa_request *cr;
265
266	CESA_GENERIC_ALLOC_LOCKED(sc, cr, requests);
267	if (!cr)
268		return (NULL);
269
270	STAILQ_INIT(&cr->cr_tdesc);
271	STAILQ_INIT(&cr->cr_sdesc);
272
273	return (cr);
274}
275
276static void
277cesa_free_request(struct cesa_softc *sc, struct cesa_request *cr)
278{
279
280	/* Free TDMA descriptors assigned to this request */
281	CESA_LOCK(sc, tdesc);
282	STAILQ_CONCAT(&sc->sc_free_tdesc, &cr->cr_tdesc);
283	CESA_UNLOCK(sc, tdesc);
284
285	/* Free SA descriptors assigned to this request */
286	CESA_LOCK(sc, sdesc);
287	STAILQ_CONCAT(&sc->sc_free_sdesc, &cr->cr_sdesc);
288	CESA_UNLOCK(sc, sdesc);
289
290	/* Unload DMA memory associated with request */
291	if (cr->cr_dmap_loaded) {
292		bus_dmamap_unload(sc->sc_data_dtag, cr->cr_dmap);
293		cr->cr_dmap_loaded = 0;
294	}
295
296	CESA_GENERIC_FREE_LOCKED(sc, cr, requests);
297}
298
299static void
300cesa_enqueue_request(struct cesa_softc *sc, struct cesa_request *cr)
301{
302
303	CESA_LOCK(sc, requests);
304	STAILQ_INSERT_TAIL(&sc->sc_ready_requests, cr, cr_stq);
305	CESA_UNLOCK(sc, requests);
306}
307
308static struct cesa_tdma_desc *
309cesa_alloc_tdesc(struct cesa_softc *sc)
310{
311	struct cesa_tdma_desc *ctd;
312
313	CESA_GENERIC_ALLOC_LOCKED(sc, ctd, tdesc);
314
315	if (!ctd)
316		device_printf(sc->sc_dev, "TDMA descriptors pool exhaused. "
317		    "Consider increasing CESA_TDMA_DESCRIPTORS.\n");
318
319	return (ctd);
320}
321
322static struct cesa_sa_desc *
323cesa_alloc_sdesc(struct cesa_softc *sc, struct cesa_request *cr)
324{
325	struct cesa_sa_desc *csd;
326
327	CESA_GENERIC_ALLOC_LOCKED(sc, csd, sdesc);
328	if (!csd) {
329		device_printf(sc->sc_dev, "SA descriptors pool exhaused. "
330		    "Consider increasing CESA_SA_DESCRIPTORS.\n");
331		return (NULL);
332	}
333
334	STAILQ_INSERT_TAIL(&cr->cr_sdesc, csd, csd_stq);
335
336	/* Fill-in SA descriptor with default values */
337	csd->csd_cshd->cshd_enc_key = CESA_SA_DATA(csd_key);
338	csd->csd_cshd->cshd_enc_iv = CESA_SA_DATA(csd_iv);
339	csd->csd_cshd->cshd_enc_iv_buf = CESA_SA_DATA(csd_iv);
340	csd->csd_cshd->cshd_enc_src = 0;
341	csd->csd_cshd->cshd_enc_dst = 0;
342	csd->csd_cshd->cshd_enc_dlen = 0;
343	csd->csd_cshd->cshd_mac_dst = CESA_SA_DATA(csd_hash);
344	csd->csd_cshd->cshd_mac_iv_in = CESA_SA_DATA(csd_hiv_in);
345	csd->csd_cshd->cshd_mac_iv_out = CESA_SA_DATA(csd_hiv_out);
346	csd->csd_cshd->cshd_mac_src = 0;
347	csd->csd_cshd->cshd_mac_dlen = 0;
348
349	return (csd);
350}
351
352static struct cesa_tdma_desc *
353cesa_tdma_copy(struct cesa_softc *sc, bus_addr_t dst, bus_addr_t src,
354    bus_size_t size)
355{
356	struct cesa_tdma_desc *ctd;
357
358	ctd = cesa_alloc_tdesc(sc);
359	if (!ctd)
360		return (NULL);
361
362	ctd->ctd_cthd->cthd_dst = dst;
363	ctd->ctd_cthd->cthd_src = src;
364	ctd->ctd_cthd->cthd_byte_count = size;
365
366	/* Handle special control packet */
367	if (size != 0)
368		ctd->ctd_cthd->cthd_flags = CESA_CTHD_OWNED;
369	else
370		ctd->ctd_cthd->cthd_flags = 0;
371
372	return (ctd);
373}
374
375static struct cesa_tdma_desc *
376cesa_tdma_copyin_sa_data(struct cesa_softc *sc, struct cesa_request *cr)
377{
378
379	return (cesa_tdma_copy(sc, sc->sc_sram_base_pa +
380	    sizeof(struct cesa_sa_hdesc), cr->cr_csd_paddr,
381	    sizeof(struct cesa_sa_data)));
382}
383
384static struct cesa_tdma_desc *
385cesa_tdma_copyout_sa_data(struct cesa_softc *sc, struct cesa_request *cr)
386{
387
388	return (cesa_tdma_copy(sc, cr->cr_csd_paddr, sc->sc_sram_base_pa +
389	    sizeof(struct cesa_sa_hdesc), sizeof(struct cesa_sa_data)));
390}
391
392static struct cesa_tdma_desc *
393cesa_tdma_copy_sdesc(struct cesa_softc *sc, struct cesa_sa_desc *csd)
394{
395
396	return (cesa_tdma_copy(sc, sc->sc_sram_base_pa, csd->csd_cshd_paddr,
397	    sizeof(struct cesa_sa_hdesc)));
398}
399
400static void
401cesa_append_tdesc(struct cesa_request *cr, struct cesa_tdma_desc *ctd)
402{
403	struct cesa_tdma_desc *ctd_prev;
404
405	if (!STAILQ_EMPTY(&cr->cr_tdesc)) {
406		ctd_prev = STAILQ_LAST(&cr->cr_tdesc, cesa_tdma_desc, ctd_stq);
407		ctd_prev->ctd_cthd->cthd_next = ctd->ctd_cthd_paddr;
408	}
409
410	ctd->ctd_cthd->cthd_next = 0;
411	STAILQ_INSERT_TAIL(&cr->cr_tdesc, ctd, ctd_stq);
412}
413
414static int
415cesa_append_packet(struct cesa_softc *sc, struct cesa_request *cr,
416    struct cesa_packet *cp, struct cesa_sa_desc *csd)
417{
418	struct cesa_tdma_desc *ctd, *tmp;
419
420	/* Copy SA descriptor for this packet */
421	ctd = cesa_tdma_copy_sdesc(sc, csd);
422	if (!ctd)
423		return (ENOMEM);
424
425	cesa_append_tdesc(cr, ctd);
426
427	/* Copy data to be processed */
428	STAILQ_FOREACH_SAFE(ctd, &cp->cp_copyin, ctd_stq, tmp)
429		cesa_append_tdesc(cr, ctd);
430	STAILQ_INIT(&cp->cp_copyin);
431
432	/* Insert control descriptor */
433	ctd = cesa_tdma_copy(sc, 0, 0, 0);
434	if (!ctd)
435		return (ENOMEM);
436
437	cesa_append_tdesc(cr, ctd);
438
439	/* Copy back results */
440	STAILQ_FOREACH_SAFE(ctd, &cp->cp_copyout, ctd_stq, tmp)
441		cesa_append_tdesc(cr, ctd);
442	STAILQ_INIT(&cp->cp_copyout);
443
444	return (0);
445}
446
447static int
448cesa_set_mkey(struct cesa_session *cs, int alg, const uint8_t *mkey, int mklen)
449{
450	uint8_t ipad[CESA_MAX_HMAC_BLOCK_LEN];
451	uint8_t opad[CESA_MAX_HMAC_BLOCK_LEN];
452	SHA1_CTX sha1ctx;
453	SHA256_CTX sha256ctx;
454	MD5_CTX md5ctx;
455	uint32_t *hout;
456	uint32_t *hin;
457	int i;
458
459	memset(ipad, HMAC_IPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN);
460	memset(opad, HMAC_OPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN);
461	for (i = 0; i < mklen; i++) {
462		ipad[i] ^= mkey[i];
463		opad[i] ^= mkey[i];
464	}
465
466	hin = (uint32_t *)cs->cs_hiv_in;
467	hout = (uint32_t *)cs->cs_hiv_out;
468
469	switch (alg) {
470	case CRYPTO_MD5_HMAC:
471		MD5Init(&md5ctx);
472		MD5Update(&md5ctx, ipad, MD5_HMAC_BLOCK_LEN);
473		memcpy(hin, md5ctx.state, sizeof(md5ctx.state));
474		MD5Init(&md5ctx);
475		MD5Update(&md5ctx, opad, MD5_HMAC_BLOCK_LEN);
476		memcpy(hout, md5ctx.state, sizeof(md5ctx.state));
477		break;
478	case CRYPTO_SHA1_HMAC:
479		SHA1Init(&sha1ctx);
480		SHA1Update(&sha1ctx, ipad, SHA1_HMAC_BLOCK_LEN);
481		memcpy(hin, sha1ctx.h.b32, sizeof(sha1ctx.h.b32));
482		SHA1Init(&sha1ctx);
483		SHA1Update(&sha1ctx, opad, SHA1_HMAC_BLOCK_LEN);
484		memcpy(hout, sha1ctx.h.b32, sizeof(sha1ctx.h.b32));
485		break;
486	case CRYPTO_SHA2_256_HMAC:
487		SHA256_Init(&sha256ctx);
488		SHA256_Update(&sha256ctx, ipad, SHA2_256_HMAC_BLOCK_LEN);
489		memcpy(hin, sha256ctx.state, sizeof(sha256ctx.state));
490		SHA256_Init(&sha256ctx);
491		SHA256_Update(&sha256ctx, opad, SHA2_256_HMAC_BLOCK_LEN);
492		memcpy(hout, sha256ctx.state, sizeof(sha256ctx.state));
493		break;
494	default:
495		return (EINVAL);
496	}
497
498	for (i = 0; i < CESA_MAX_HASH_LEN / sizeof(uint32_t); i++) {
499		hin[i] = htobe32(hin[i]);
500		hout[i] = htobe32(hout[i]);
501	}
502
503	return (0);
504}
505
506static int
507cesa_prep_aes_key(struct cesa_session *cs)
508{
509	uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)];
510	uint32_t *dkey;
511	int i;
512
513	rijndaelKeySetupEnc(ek, cs->cs_key, cs->cs_klen * 8);
514
515	cs->cs_config &= ~CESA_CSH_AES_KLEN_MASK;
516	dkey = (uint32_t *)cs->cs_aes_dkey;
517
518	switch (cs->cs_klen) {
519	case 16:
520		cs->cs_config |= CESA_CSH_AES_KLEN_128;
521		for (i = 0; i < 4; i++)
522			*dkey++ = htobe32(ek[4 * 10 + i]);
523		break;
524	case 24:
525		cs->cs_config |= CESA_CSH_AES_KLEN_192;
526		for (i = 0; i < 4; i++)
527			*dkey++ = htobe32(ek[4 * 12 + i]);
528		for (i = 0; i < 2; i++)
529			*dkey++ = htobe32(ek[4 * 11 + 2 + i]);
530		break;
531	case 32:
532		cs->cs_config |= CESA_CSH_AES_KLEN_256;
533		for (i = 0; i < 4; i++)
534			*dkey++ = htobe32(ek[4 * 14 + i]);
535		for (i = 0; i < 4; i++)
536			*dkey++ = htobe32(ek[4 * 13 + i]);
537		break;
538	default:
539		return (EINVAL);
540	}
541
542	return (0);
543}
544
545static int
546cesa_is_hash(int alg)
547{
548
549	switch (alg) {
550	case CRYPTO_MD5:
551	case CRYPTO_MD5_HMAC:
552	case CRYPTO_SHA1:
553	case CRYPTO_SHA1_HMAC:
554	case CRYPTO_SHA2_256_HMAC:
555		return (1);
556	default:
557		return (0);
558	}
559}
560
561static void
562cesa_start_packet(struct cesa_packet *cp, unsigned int size)
563{
564
565	cp->cp_size = size;
566	cp->cp_offset = 0;
567	STAILQ_INIT(&cp->cp_copyin);
568	STAILQ_INIT(&cp->cp_copyout);
569}
570
571static int
572cesa_fill_packet(struct cesa_softc *sc, struct cesa_packet *cp,
573    bus_dma_segment_t *seg)
574{
575	struct cesa_tdma_desc *ctd;
576	unsigned int bsize;
577
578	/* Calculate size of block copy */
579	bsize = MIN(seg->ds_len, cp->cp_size - cp->cp_offset);
580
581	if (bsize > 0) {
582		ctd = cesa_tdma_copy(sc, sc->sc_sram_base_pa +
583		    CESA_DATA(cp->cp_offset), seg->ds_addr, bsize);
584		if (!ctd)
585			return (-ENOMEM);
586
587		STAILQ_INSERT_TAIL(&cp->cp_copyin, ctd, ctd_stq);
588
589		ctd = cesa_tdma_copy(sc, seg->ds_addr, sc->sc_sram_base_pa +
590		    CESA_DATA(cp->cp_offset), bsize);
591		if (!ctd)
592			return (-ENOMEM);
593
594		STAILQ_INSERT_TAIL(&cp->cp_copyout, ctd, ctd_stq);
595
596		seg->ds_len -= bsize;
597		seg->ds_addr += bsize;
598		cp->cp_offset += bsize;
599	}
600
601	return (bsize);
602}
603
604static void
605cesa_create_chain_cb(void *arg, bus_dma_segment_t *segs, int nseg, int error)
606{
607	unsigned int mpsize, fragmented;
608	unsigned int mlen, mskip, tmlen;
609	struct cesa_chain_info *cci;
610	unsigned int elen, eskip;
611	unsigned int skip, len;
612	struct cesa_sa_desc *csd;
613	struct cesa_request *cr;
614	struct cesa_softc *sc;
615	struct cesa_packet cp;
616	bus_dma_segment_t seg;
617	uint32_t config;
618	int size;
619
620	cci = arg;
621	sc = cci->cci_sc;
622	cr = cci->cci_cr;
623
624	if (error) {
625		cci->cci_error = error;
626		return;
627	}
628
629	elen = cci->cci_enc ? cci->cci_enc->crd_len : 0;
630	eskip = cci->cci_enc ? cci->cci_enc->crd_skip : 0;
631	mlen = cci->cci_mac ? cci->cci_mac->crd_len : 0;
632	mskip = cci->cci_mac ? cci->cci_mac->crd_skip : 0;
633
634	if (elen && mlen &&
635	    ((eskip > mskip && ((eskip - mskip) & (cr->cr_cs->cs_ivlen - 1))) ||
636	    (mskip > eskip && ((mskip - eskip) & (cr->cr_cs->cs_mblen - 1))) ||
637	    (eskip > (mskip + mlen)) || (mskip > (eskip + elen)))) {
638		/*
639		 * Data alignment in the request does not meet CESA requiremnts
640		 * for combined encryption/decryption and hashing. We have to
641		 * split the request to separate operations and process them
642		 * one by one.
643		 */
644		config = cci->cci_config;
645		if ((config & CESA_CSHD_OP_MASK) == CESA_CSHD_MAC_AND_ENC) {
646			config &= ~CESA_CSHD_OP_MASK;
647
648			cci->cci_config = config | CESA_CSHD_MAC;
649			cci->cci_enc = NULL;
650			cci->cci_mac = cr->cr_mac;
651			cesa_create_chain_cb(cci, segs, nseg, cci->cci_error);
652
653			cci->cci_config = config | CESA_CSHD_ENC;
654			cci->cci_enc = cr->cr_enc;
655			cci->cci_mac = NULL;
656			cesa_create_chain_cb(cci, segs, nseg, cci->cci_error);
657		} else {
658			config &= ~CESA_CSHD_OP_MASK;
659
660			cci->cci_config = config | CESA_CSHD_ENC;
661			cci->cci_enc = cr->cr_enc;
662			cci->cci_mac = NULL;
663			cesa_create_chain_cb(cci, segs, nseg, cci->cci_error);
664
665			cci->cci_config = config | CESA_CSHD_MAC;
666			cci->cci_enc = NULL;
667			cci->cci_mac = cr->cr_mac;
668			cesa_create_chain_cb(cci, segs, nseg, cci->cci_error);
669		}
670
671		return;
672	}
673
674	tmlen = mlen;
675	fragmented = 0;
676	mpsize = CESA_MAX_PACKET_SIZE;
677	mpsize &= ~((cr->cr_cs->cs_ivlen - 1) | (cr->cr_cs->cs_mblen - 1));
678
679	if (elen && mlen) {
680		skip = MIN(eskip, mskip);
681		len = MAX(elen + eskip, mlen + mskip) - skip;
682	} else if (elen) {
683		skip = eskip;
684		len = elen;
685	} else {
686		skip = mskip;
687		len = mlen;
688	}
689
690	/* Start first packet in chain */
691	cesa_start_packet(&cp, MIN(mpsize, len));
692
693	while (nseg-- && len > 0) {
694		seg = *(segs++);
695
696		/*
697		 * Skip data in buffer on which neither ENC nor MAC operation
698		 * is requested.
699		 */
700		if (skip > 0) {
701			size = MIN(skip, seg.ds_len);
702			skip -= size;
703
704			seg.ds_addr += size;
705			seg.ds_len -= size;
706
707			if (eskip > 0)
708				eskip -= size;
709
710			if (mskip > 0)
711				mskip -= size;
712
713			if (seg.ds_len == 0)
714				continue;
715		}
716
717		while (1) {
718			/*
719			 * Fill in current packet with data. Break if there is
720			 * no more data in current DMA segment or an error
721			 * occurred.
722			 */
723			size = cesa_fill_packet(sc, &cp, &seg);
724			if (size <= 0) {
725				error = -size;
726				break;
727			}
728
729			len -= size;
730
731			/* If packet is full, append it to the chain */
732			if (cp.cp_size == cp.cp_offset) {
733				csd = cesa_alloc_sdesc(sc, cr);
734				if (!csd) {
735					error = ENOMEM;
736					break;
737				}
738
739				/* Create SA descriptor for this packet */
740				csd->csd_cshd->cshd_config = cci->cci_config;
741				csd->csd_cshd->cshd_mac_total_dlen = tmlen;
742
743				/*
744				 * Enable fragmentation if request will not fit
745				 * into one packet.
746				 */
747				if (len > 0) {
748					if (!fragmented) {
749						fragmented = 1;
750						csd->csd_cshd->cshd_config |=
751						    CESA_CSHD_FRAG_FIRST;
752					} else
753						csd->csd_cshd->cshd_config |=
754						    CESA_CSHD_FRAG_MIDDLE;
755				} else if (fragmented)
756					csd->csd_cshd->cshd_config |=
757					    CESA_CSHD_FRAG_LAST;
758
759				if (eskip < cp.cp_size && elen > 0) {
760					csd->csd_cshd->cshd_enc_src =
761					    CESA_DATA(eskip);
762					csd->csd_cshd->cshd_enc_dst =
763					    CESA_DATA(eskip);
764					csd->csd_cshd->cshd_enc_dlen =
765					    MIN(elen, cp.cp_size - eskip);
766				}
767
768				if (mskip < cp.cp_size && mlen > 0) {
769					csd->csd_cshd->cshd_mac_src =
770					    CESA_DATA(mskip);
771					csd->csd_cshd->cshd_mac_dlen =
772					    MIN(mlen, cp.cp_size - mskip);
773				}
774
775				elen -= csd->csd_cshd->cshd_enc_dlen;
776				eskip -= MIN(eskip, cp.cp_size);
777				mlen -= csd->csd_cshd->cshd_mac_dlen;
778				mskip -= MIN(mskip, cp.cp_size);
779
780				cesa_dump_cshd(sc, csd->csd_cshd);
781
782				/* Append packet to the request */
783				error = cesa_append_packet(sc, cr, &cp, csd);
784				if (error)
785					break;
786
787				/* Start a new packet, as current is full */
788				cesa_start_packet(&cp, MIN(mpsize, len));
789			}
790		}
791
792		if (error)
793			break;
794	}
795
796	if (error) {
797		/*
798		 * Move all allocated resources to the request. They will be
799		 * freed later.
800		 */
801		STAILQ_CONCAT(&cr->cr_tdesc, &cp.cp_copyin);
802		STAILQ_CONCAT(&cr->cr_tdesc, &cp.cp_copyout);
803		cci->cci_error = error;
804	}
805}
806
807static void
808cesa_create_chain_cb2(void *arg, bus_dma_segment_t *segs, int nseg,
809    bus_size_t size, int error)
810{
811
812	cesa_create_chain_cb(arg, segs, nseg, error);
813}
814
815static int
816cesa_create_chain(struct cesa_softc *sc, struct cesa_request *cr)
817{
818	struct cesa_chain_info cci;
819	struct cesa_tdma_desc *ctd;
820	uint32_t config;
821	int error;
822
823	error = 0;
824	CESA_LOCK_ASSERT(sc, sessions);
825
826	/* Create request metadata */
827	if (cr->cr_enc) {
828		if (cr->cr_enc->crd_alg == CRYPTO_AES_CBC &&
829		    (cr->cr_enc->crd_flags & CRD_F_ENCRYPT) == 0)
830			memcpy(cr->cr_csd->csd_key, cr->cr_cs->cs_aes_dkey,
831			    cr->cr_cs->cs_klen);
832		else
833			memcpy(cr->cr_csd->csd_key, cr->cr_cs->cs_key,
834			    cr->cr_cs->cs_klen);
835	}
836
837	if (cr->cr_mac) {
838		memcpy(cr->cr_csd->csd_hiv_in, cr->cr_cs->cs_hiv_in,
839		    CESA_MAX_HASH_LEN);
840		memcpy(cr->cr_csd->csd_hiv_out, cr->cr_cs->cs_hiv_out,
841		    CESA_MAX_HASH_LEN);
842	}
843
844	ctd = cesa_tdma_copyin_sa_data(sc, cr);
845	if (!ctd)
846		return (ENOMEM);
847
848	cesa_append_tdesc(cr, ctd);
849
850	/* Prepare SA configuration */
851	config = cr->cr_cs->cs_config;
852
853	if (cr->cr_enc && (cr->cr_enc->crd_flags & CRD_F_ENCRYPT) == 0)
854		config |= CESA_CSHD_DECRYPT;
855	if (cr->cr_enc && !cr->cr_mac)
856		config |= CESA_CSHD_ENC;
857	if (!cr->cr_enc && cr->cr_mac)
858		config |= CESA_CSHD_MAC;
859	if (cr->cr_enc && cr->cr_mac)
860		config |= (config & CESA_CSHD_DECRYPT) ? CESA_CSHD_MAC_AND_ENC :
861		    CESA_CSHD_ENC_AND_MAC;
862
863	/* Create data packets */
864	cci.cci_sc = sc;
865	cci.cci_cr = cr;
866	cci.cci_enc = cr->cr_enc;
867	cci.cci_mac = cr->cr_mac;
868	cci.cci_config = config;
869	cci.cci_error = 0;
870
871	if (cr->cr_crp->crp_flags & CRYPTO_F_IOV)
872		error = bus_dmamap_load_uio(sc->sc_data_dtag,
873		    cr->cr_dmap, (struct uio *)cr->cr_crp->crp_buf,
874		    cesa_create_chain_cb2, &cci, BUS_DMA_NOWAIT);
875	else if (cr->cr_crp->crp_flags & CRYPTO_F_IMBUF)
876		error = bus_dmamap_load_mbuf(sc->sc_data_dtag,
877		    cr->cr_dmap, (struct mbuf *)cr->cr_crp->crp_buf,
878		    cesa_create_chain_cb2, &cci, BUS_DMA_NOWAIT);
879	else
880		error = bus_dmamap_load(sc->sc_data_dtag,
881		    cr->cr_dmap, cr->cr_crp->crp_buf,
882		    cr->cr_crp->crp_ilen, cesa_create_chain_cb, &cci,
883		    BUS_DMA_NOWAIT);
884
885	if (!error)
886		cr->cr_dmap_loaded = 1;
887
888	if (cci.cci_error)
889		error = cci.cci_error;
890
891	if (error)
892		return (error);
893
894	/* Read back request metadata */
895	ctd = cesa_tdma_copyout_sa_data(sc, cr);
896	if (!ctd)
897		return (ENOMEM);
898
899	cesa_append_tdesc(cr, ctd);
900
901	return (0);
902}
903
904static void
905cesa_execute(struct cesa_softc *sc)
906{
907	struct cesa_tdma_desc *prev_ctd, *ctd;
908	struct cesa_request *prev_cr, *cr;
909
910	CESA_LOCK(sc, requests);
911
912	/*
913	 * If ready list is empty, there is nothing to execute. If queued list
914	 * is not empty, the hardware is busy and we cannot start another
915	 * execution.
916	 */
917	if (STAILQ_EMPTY(&sc->sc_ready_requests) ||
918	    !STAILQ_EMPTY(&sc->sc_queued_requests)) {
919		CESA_UNLOCK(sc, requests);
920		return;
921	}
922
923	/* Move all ready requests to queued list */
924	STAILQ_CONCAT(&sc->sc_queued_requests, &sc->sc_ready_requests);
925	STAILQ_INIT(&sc->sc_ready_requests);
926
927	/* Create one execution chain from all requests on the list */
928	if (STAILQ_FIRST(&sc->sc_queued_requests) !=
929	    STAILQ_LAST(&sc->sc_queued_requests, cesa_request, cr_stq)) {
930		prev_cr = NULL;
931		cesa_sync_dma_mem(&sc->sc_tdesc_cdm, BUS_DMASYNC_POSTREAD |
932		    BUS_DMASYNC_POSTWRITE);
933
934		STAILQ_FOREACH(cr, &sc->sc_queued_requests, cr_stq) {
935			if (prev_cr) {
936				ctd = STAILQ_FIRST(&cr->cr_tdesc);
937				prev_ctd = STAILQ_LAST(&prev_cr->cr_tdesc,
938				    cesa_tdma_desc, ctd_stq);
939
940				prev_ctd->ctd_cthd->cthd_next =
941				    ctd->ctd_cthd_paddr;
942			}
943
944			prev_cr = cr;
945		}
946
947		cesa_sync_dma_mem(&sc->sc_tdesc_cdm, BUS_DMASYNC_PREREAD |
948		    BUS_DMASYNC_PREWRITE);
949	}
950
951	/* Start chain execution in hardware */
952	cr = STAILQ_FIRST(&sc->sc_queued_requests);
953	ctd = STAILQ_FIRST(&cr->cr_tdesc);
954
955	CESA_TDMA_WRITE(sc, CESA_TDMA_ND, ctd->ctd_cthd_paddr);
956#if defined (SOC_MV_ARMADA38X)
957	CESA_REG_WRITE(sc, CESA_SA_CMD, CESA_SA_CMD_ACTVATE | CESA_SA_CMD_SHA2);
958#else
959	CESA_REG_WRITE(sc, CESA_SA_CMD, CESA_SA_CMD_ACTVATE);
960#endif
961
962	CESA_UNLOCK(sc, requests);
963}
964
965static int
966cesa_setup_sram(struct cesa_softc *sc)
967{
968	phandle_t sram_node;
969	ihandle_t sram_ihandle;
970	pcell_t sram_handle, sram_reg[2];
971	int rv;
972
973	rv = OF_getencprop(ofw_bus_get_node(sc->sc_dev), "sram-handle",
974	    (void *)&sram_handle, sizeof(sram_handle));
975	if (rv <= 0)
976		return (rv);
977
978	sram_ihandle = (ihandle_t)sram_handle;
979	sram_node = OF_instance_to_package(sram_ihandle);
980
981	rv = OF_getencprop(sram_node, "reg", (void *)sram_reg, sizeof(sram_reg));
982	if (rv <= 0)
983		return (rv);
984
985	sc->sc_sram_base_pa = sram_reg[0];
986	/* Store SRAM size to be able to unmap in detach() */
987	sc->sc_sram_size = sram_reg[1];
988
989#if defined(SOC_MV_ARMADA38X)
990	void *sram_va;
991
992	/* SRAM memory was not mapped in platform_sram_devmap(), map it now */
993	sram_va = pmap_mapdev(sc->sc_sram_base_pa, sc->sc_sram_size);
994	if (sram_va == NULL)
995		return (ENOMEM);
996	sc->sc_sram_base_va = (vm_offset_t)sram_va;
997#endif
998	return (0);
999}
1000
1001static int
1002cesa_probe(device_t dev)
1003{
1004
1005	if (!ofw_bus_status_okay(dev))
1006		return (ENXIO);
1007
1008	if (!ofw_bus_is_compatible(dev, "mrvl,cesa"))
1009		return (ENXIO);
1010
1011	device_set_desc(dev, "Marvell Cryptographic Engine and Security "
1012	    "Accelerator");
1013
1014	return (BUS_PROBE_DEFAULT);
1015}
1016
1017static int
1018cesa_attach(device_t dev)
1019{
1020	struct cesa_softc *sc;
1021	uint32_t d, r;
1022	int error;
1023	int i;
1024
1025	sc = device_get_softc(dev);
1026	sc->sc_blocked = 0;
1027	sc->sc_error = 0;
1028	sc->sc_dev = dev;
1029
1030	/* Check if CESA peripheral device has power turned on */
1031#if defined(SOC_MV_KIRKWOOD)
1032	if (soc_power_ctrl_get(CPU_PM_CTRL_CRYPTO) == CPU_PM_CTRL_CRYPTO) {
1033		device_printf(dev, "not powered on\n");
1034		return (ENXIO);
1035	}
1036#else
1037	if (soc_power_ctrl_get(CPU_PM_CTRL_CRYPTO) != CPU_PM_CTRL_CRYPTO) {
1038		device_printf(dev, "not powered on\n");
1039		return (ENXIO);
1040	}
1041#endif
1042	soc_id(&d, &r);
1043
1044	switch (d) {
1045	case MV_DEV_88F6281:
1046	case MV_DEV_88F6282:
1047	case MV_DEV_88F6828:
1048		sc->sc_tperr = 0;
1049		break;
1050	case MV_DEV_MV78100:
1051	case MV_DEV_MV78100_Z0:
1052		sc->sc_tperr = CESA_ICR_TPERR;
1053		break;
1054	default:
1055		return (ENXIO);
1056	}
1057
1058	/* Initialize mutexes */
1059	mtx_init(&sc->sc_sc_lock, device_get_nameunit(dev),
1060	    "CESA Shared Data", MTX_DEF);
1061	mtx_init(&sc->sc_tdesc_lock, device_get_nameunit(dev),
1062	    "CESA TDMA Descriptors Pool", MTX_DEF);
1063	mtx_init(&sc->sc_sdesc_lock, device_get_nameunit(dev),
1064	    "CESA SA Descriptors Pool", MTX_DEF);
1065	mtx_init(&sc->sc_requests_lock, device_get_nameunit(dev),
1066	    "CESA Requests Pool", MTX_DEF);
1067	mtx_init(&sc->sc_sessions_lock, device_get_nameunit(dev),
1068	    "CESA Sessions Pool", MTX_DEF);
1069
1070	/* Allocate I/O and IRQ resources */
1071	error = bus_alloc_resources(dev, cesa_res_spec, sc->sc_res);
1072	if (error) {
1073		device_printf(dev, "could not allocate resources\n");
1074		goto err0;
1075	}
1076
1077	/* Setup CESA decoding windows */
1078	error = decode_win_cesa_setup(sc);
1079	if (error) {
1080		device_printf(dev, "could not setup decoding windows\n");
1081		goto err1;
1082	}
1083
1084	/* Acquire SRAM base address */
1085	error = cesa_setup_sram(sc);
1086	if (error) {
1087		device_printf(dev, "could not setup SRAM\n");
1088		goto err1;
1089	}
1090
1091	/* Setup interrupt handler */
1092	error = bus_setup_intr(dev, sc->sc_res[RES_CESA_IRQ], INTR_TYPE_NET |
1093	    INTR_MPSAFE, NULL, cesa_intr, sc, &(sc->sc_icookie));
1094	if (error) {
1095		device_printf(dev, "could not setup engine completion irq\n");
1096		goto err2;
1097	}
1098
1099	/* Create DMA tag for processed data */
1100	error = bus_dma_tag_create(bus_get_dma_tag(dev),	/* parent */
1101	    1, 0,				/* alignment, boundary */
1102	    BUS_SPACE_MAXADDR_32BIT,		/* lowaddr */
1103	    BUS_SPACE_MAXADDR,			/* highaddr */
1104	    NULL, NULL,				/* filtfunc, filtfuncarg */
1105	    CESA_MAX_REQUEST_SIZE,		/* maxsize */
1106	    CESA_MAX_FRAGMENTS,			/* nsegments */
1107	    CESA_MAX_REQUEST_SIZE, 0,		/* maxsegsz, flags */
1108	    NULL, NULL,				/* lockfunc, lockfuncarg */
1109	    &sc->sc_data_dtag);			/* dmat */
1110	if (error)
1111		goto err3;
1112
1113	/* Initialize data structures: TDMA Descriptors Pool */
1114	error = cesa_alloc_dma_mem(sc, &sc->sc_tdesc_cdm,
1115	    CESA_TDMA_DESCRIPTORS * sizeof(struct cesa_tdma_hdesc));
1116	if (error)
1117		goto err4;
1118
1119	STAILQ_INIT(&sc->sc_free_tdesc);
1120	for (i = 0; i < CESA_TDMA_DESCRIPTORS; i++) {
1121		sc->sc_tdesc[i].ctd_cthd =
1122		    (struct cesa_tdma_hdesc *)(sc->sc_tdesc_cdm.cdm_vaddr) + i;
1123		sc->sc_tdesc[i].ctd_cthd_paddr = sc->sc_tdesc_cdm.cdm_paddr +
1124		    (i * sizeof(struct cesa_tdma_hdesc));
1125		STAILQ_INSERT_TAIL(&sc->sc_free_tdesc, &sc->sc_tdesc[i],
1126		    ctd_stq);
1127	}
1128
1129	/* Initialize data structures: SA Descriptors Pool */
1130	error = cesa_alloc_dma_mem(sc, &sc->sc_sdesc_cdm,
1131	    CESA_SA_DESCRIPTORS * sizeof(struct cesa_sa_hdesc));
1132	if (error)
1133		goto err5;
1134
1135	STAILQ_INIT(&sc->sc_free_sdesc);
1136	for (i = 0; i < CESA_SA_DESCRIPTORS; i++) {
1137		sc->sc_sdesc[i].csd_cshd =
1138		    (struct cesa_sa_hdesc *)(sc->sc_sdesc_cdm.cdm_vaddr) + i;
1139		sc->sc_sdesc[i].csd_cshd_paddr = sc->sc_sdesc_cdm.cdm_paddr +
1140		    (i * sizeof(struct cesa_sa_hdesc));
1141		STAILQ_INSERT_TAIL(&sc->sc_free_sdesc, &sc->sc_sdesc[i],
1142		    csd_stq);
1143	}
1144
1145	/* Initialize data structures: Requests Pool */
1146	error = cesa_alloc_dma_mem(sc, &sc->sc_requests_cdm,
1147	    CESA_REQUESTS * sizeof(struct cesa_sa_data));
1148	if (error)
1149		goto err6;
1150
1151	STAILQ_INIT(&sc->sc_free_requests);
1152	STAILQ_INIT(&sc->sc_ready_requests);
1153	STAILQ_INIT(&sc->sc_queued_requests);
1154	for (i = 0; i < CESA_REQUESTS; i++) {
1155		sc->sc_requests[i].cr_csd =
1156		    (struct cesa_sa_data *)(sc->sc_requests_cdm.cdm_vaddr) + i;
1157		sc->sc_requests[i].cr_csd_paddr =
1158		    sc->sc_requests_cdm.cdm_paddr +
1159		    (i * sizeof(struct cesa_sa_data));
1160
1161		/* Preallocate DMA maps */
1162		error = bus_dmamap_create(sc->sc_data_dtag, 0,
1163		    &sc->sc_requests[i].cr_dmap);
1164		if (error && i > 0) {
1165			i--;
1166			do {
1167				bus_dmamap_destroy(sc->sc_data_dtag,
1168				    sc->sc_requests[i].cr_dmap);
1169			} while (i--);
1170
1171			goto err7;
1172		}
1173
1174		STAILQ_INSERT_TAIL(&sc->sc_free_requests, &sc->sc_requests[i],
1175		    cr_stq);
1176	}
1177
1178	/* Initialize data structures: Sessions Pool */
1179	STAILQ_INIT(&sc->sc_free_sessions);
1180	for (i = 0; i < CESA_SESSIONS; i++) {
1181		sc->sc_sessions[i].cs_sid = i;
1182		STAILQ_INSERT_TAIL(&sc->sc_free_sessions, &sc->sc_sessions[i],
1183		    cs_stq);
1184	}
1185
1186	/*
1187	 * Initialize TDMA:
1188	 * - Burst limit: 128 bytes,
1189	 * - Outstanding reads enabled,
1190	 * - No byte-swap.
1191	 */
1192	CESA_TDMA_WRITE(sc, CESA_TDMA_CR, CESA_TDMA_CR_DBL128 |
1193	    CESA_TDMA_CR_SBL128 | CESA_TDMA_CR_ORDEN | CESA_TDMA_CR_NBS |
1194#if defined (SOC_MV_ARMADA38X)
1195	    CESA_TDMA_NUM_OUTSTAND |
1196#endif
1197	    CESA_TDMA_CR_ENABLE);
1198
1199	/*
1200	 * Initialize SA:
1201	 * - SA descriptor is present at beginning of CESA SRAM,
1202	 * - Multi-packet chain mode,
1203	 * - Cooperation with TDMA enabled.
1204	 */
1205	CESA_REG_WRITE(sc, CESA_SA_DPR, 0);
1206	CESA_REG_WRITE(sc, CESA_SA_CR, CESA_SA_CR_ACTIVATE_TDMA |
1207	    CESA_SA_CR_WAIT_FOR_TDMA | CESA_SA_CR_MULTI_MODE);
1208
1209	/* Unmask interrupts */
1210	CESA_REG_WRITE(sc, CESA_ICR, 0);
1211	CESA_REG_WRITE(sc, CESA_ICM, CESA_ICM_ACCTDMA | sc->sc_tperr);
1212	CESA_TDMA_WRITE(sc, CESA_TDMA_ECR, 0);
1213	CESA_TDMA_WRITE(sc, CESA_TDMA_EMR, CESA_TDMA_EMR_MISS |
1214	    CESA_TDMA_EMR_DOUBLE_HIT | CESA_TDMA_EMR_BOTH_HIT |
1215	    CESA_TDMA_EMR_DATA_ERROR);
1216
1217	/* Register in OCF */
1218	sc->sc_cid = crypto_get_driverid(dev, CRYPTOCAP_F_HARDWARE);
1219	if (sc->sc_cid < 0) {
1220		device_printf(dev, "could not get crypto driver id\n");
1221		goto err8;
1222	}
1223
1224	crypto_register(sc->sc_cid, CRYPTO_AES_CBC, 0, 0);
1225	crypto_register(sc->sc_cid, CRYPTO_DES_CBC, 0, 0);
1226	crypto_register(sc->sc_cid, CRYPTO_3DES_CBC, 0, 0);
1227	crypto_register(sc->sc_cid, CRYPTO_MD5, 0, 0);
1228	crypto_register(sc->sc_cid, CRYPTO_MD5_HMAC, 0, 0);
1229	crypto_register(sc->sc_cid, CRYPTO_SHA1, 0, 0);
1230	crypto_register(sc->sc_cid, CRYPTO_SHA1_HMAC, 0, 0);
1231	crypto_register(sc->sc_cid, CRYPTO_SHA2_256_HMAC, 0, 0);
1232
1233	return (0);
1234err8:
1235	for (i = 0; i < CESA_REQUESTS; i++)
1236		bus_dmamap_destroy(sc->sc_data_dtag,
1237		    sc->sc_requests[i].cr_dmap);
1238err7:
1239	cesa_free_dma_mem(&sc->sc_requests_cdm);
1240err6:
1241	cesa_free_dma_mem(&sc->sc_sdesc_cdm);
1242err5:
1243	cesa_free_dma_mem(&sc->sc_tdesc_cdm);
1244err4:
1245	bus_dma_tag_destroy(sc->sc_data_dtag);
1246err3:
1247	bus_teardown_intr(dev, sc->sc_res[RES_CESA_IRQ], sc->sc_icookie);
1248err2:
1249#if defined(SOC_MV_ARMADA38X)
1250	pmap_unmapdev(sc->sc_sram_base_va, sc->sc_sram_size);
1251#endif
1252err1:
1253	bus_release_resources(dev, cesa_res_spec, sc->sc_res);
1254err0:
1255	mtx_destroy(&sc->sc_sessions_lock);
1256	mtx_destroy(&sc->sc_requests_lock);
1257	mtx_destroy(&sc->sc_sdesc_lock);
1258	mtx_destroy(&sc->sc_tdesc_lock);
1259	mtx_destroy(&sc->sc_sc_lock);
1260	return (ENXIO);
1261}
1262
1263static int
1264cesa_detach(device_t dev)
1265{
1266	struct cesa_softc *sc;
1267	int i;
1268
1269	sc = device_get_softc(dev);
1270
1271	/* TODO: Wait for queued requests completion before shutdown. */
1272
1273	/* Mask interrupts */
1274	CESA_REG_WRITE(sc, CESA_ICM, 0);
1275	CESA_TDMA_WRITE(sc, CESA_TDMA_EMR, 0);
1276
1277	/* Unregister from OCF */
1278	crypto_unregister_all(sc->sc_cid);
1279
1280	/* Free DMA Maps */
1281	for (i = 0; i < CESA_REQUESTS; i++)
1282		bus_dmamap_destroy(sc->sc_data_dtag,
1283		    sc->sc_requests[i].cr_dmap);
1284
1285	/* Free DMA Memory */
1286	cesa_free_dma_mem(&sc->sc_requests_cdm);
1287	cesa_free_dma_mem(&sc->sc_sdesc_cdm);
1288	cesa_free_dma_mem(&sc->sc_tdesc_cdm);
1289
1290	/* Free DMA Tag */
1291	bus_dma_tag_destroy(sc->sc_data_dtag);
1292
1293	/* Stop interrupt */
1294	bus_teardown_intr(dev, sc->sc_res[RES_CESA_IRQ], sc->sc_icookie);
1295
1296	/* Relase I/O and IRQ resources */
1297	bus_release_resources(dev, cesa_res_spec, sc->sc_res);
1298
1299#if defined(SOC_MV_ARMADA38X)
1300	/* Unmap SRAM memory */
1301	pmap_unmapdev(sc->sc_sram_base_va, sc->sc_sram_size);
1302#endif
1303	/* Destroy mutexes */
1304	mtx_destroy(&sc->sc_sessions_lock);
1305	mtx_destroy(&sc->sc_requests_lock);
1306	mtx_destroy(&sc->sc_sdesc_lock);
1307	mtx_destroy(&sc->sc_tdesc_lock);
1308	mtx_destroy(&sc->sc_sc_lock);
1309
1310	return (0);
1311}
1312
1313static void
1314cesa_intr(void *arg)
1315{
1316	STAILQ_HEAD(, cesa_request) requests;
1317	struct cesa_request *cr, *tmp;
1318	struct cesa_softc *sc;
1319	uint32_t ecr, icr;
1320	int blocked;
1321
1322	sc = arg;
1323
1324	/* Ack interrupt */
1325	ecr = CESA_TDMA_READ(sc, CESA_TDMA_ECR);
1326	CESA_TDMA_WRITE(sc, CESA_TDMA_ECR, 0);
1327	icr = CESA_REG_READ(sc, CESA_ICR);
1328	CESA_REG_WRITE(sc, CESA_ICR, 0);
1329
1330	/* Check for TDMA errors */
1331	if (ecr & CESA_TDMA_ECR_MISS) {
1332		device_printf(sc->sc_dev, "TDMA Miss error detected!\n");
1333		sc->sc_error = EIO;
1334	}
1335
1336	if (ecr & CESA_TDMA_ECR_DOUBLE_HIT) {
1337		device_printf(sc->sc_dev, "TDMA Double Hit error detected!\n");
1338		sc->sc_error = EIO;
1339	}
1340
1341	if (ecr & CESA_TDMA_ECR_BOTH_HIT) {
1342		device_printf(sc->sc_dev, "TDMA Both Hit error detected!\n");
1343		sc->sc_error = EIO;
1344	}
1345
1346	if (ecr & CESA_TDMA_ECR_DATA_ERROR) {
1347		device_printf(sc->sc_dev, "TDMA Data error detected!\n");
1348		sc->sc_error = EIO;
1349	}
1350
1351	/* Check for CESA errors */
1352	if (icr & sc->sc_tperr) {
1353		device_printf(sc->sc_dev, "CESA SRAM Parity error detected!\n");
1354		sc->sc_error = EIO;
1355	}
1356
1357	/* If there is nothing more to do, return */
1358	if ((icr & CESA_ICR_ACCTDMA) == 0)
1359		return;
1360
1361	/* Get all finished requests */
1362	CESA_LOCK(sc, requests);
1363	STAILQ_INIT(&requests);
1364	STAILQ_CONCAT(&requests, &sc->sc_queued_requests);
1365	STAILQ_INIT(&sc->sc_queued_requests);
1366	CESA_UNLOCK(sc, requests);
1367
1368	/* Execute all ready requests */
1369	cesa_execute(sc);
1370
1371	/* Process completed requests */
1372	cesa_sync_dma_mem(&sc->sc_requests_cdm, BUS_DMASYNC_POSTREAD |
1373	    BUS_DMASYNC_POSTWRITE);
1374
1375	STAILQ_FOREACH_SAFE(cr, &requests, cr_stq, tmp) {
1376		bus_dmamap_sync(sc->sc_data_dtag, cr->cr_dmap,
1377		    BUS_DMASYNC_POSTREAD | BUS_DMASYNC_POSTWRITE);
1378
1379		cr->cr_crp->crp_etype = sc->sc_error;
1380		if (cr->cr_mac)
1381			crypto_copyback(cr->cr_crp->crp_flags,
1382			    cr->cr_crp->crp_buf, cr->cr_mac->crd_inject,
1383			    cr->cr_cs->cs_hlen, cr->cr_csd->csd_hash);
1384
1385		crypto_done(cr->cr_crp);
1386		cesa_free_request(sc, cr);
1387	}
1388
1389	cesa_sync_dma_mem(&sc->sc_requests_cdm, BUS_DMASYNC_PREREAD |
1390	    BUS_DMASYNC_PREWRITE);
1391
1392	sc->sc_error = 0;
1393
1394	/* Unblock driver if it ran out of resources */
1395	CESA_LOCK(sc, sc);
1396	blocked = sc->sc_blocked;
1397	sc->sc_blocked = 0;
1398	CESA_UNLOCK(sc, sc);
1399
1400	if (blocked)
1401		crypto_unblock(sc->sc_cid, blocked);
1402}
1403
1404static int
1405cesa_newsession(device_t dev, uint32_t *sidp, struct cryptoini *cri)
1406{
1407	struct cesa_session *cs;
1408	struct cesa_softc *sc;
1409	struct cryptoini *enc;
1410	struct cryptoini *mac;
1411	int error;
1412
1413	sc = device_get_softc(dev);
1414	enc = NULL;
1415	mac = NULL;
1416	error = 0;
1417
1418	/* Check and parse input */
1419	if (cesa_is_hash(cri->cri_alg))
1420		mac = cri;
1421	else
1422		enc = cri;
1423
1424	cri = cri->cri_next;
1425
1426	if (cri) {
1427		if (!enc && !cesa_is_hash(cri->cri_alg))
1428			enc = cri;
1429
1430		if (!mac && cesa_is_hash(cri->cri_alg))
1431			mac = cri;
1432
1433		if (cri->cri_next || !(enc && mac))
1434			return (EINVAL);
1435	}
1436
1437	if ((enc && (enc->cri_klen / 8) > CESA_MAX_KEY_LEN) ||
1438	    (mac && (mac->cri_klen / 8) > CESA_MAX_MKEY_LEN))
1439		return (E2BIG);
1440
1441	/* Allocate session */
1442	cs = cesa_alloc_session(sc);
1443	if (!cs)
1444		return (ENOMEM);
1445
1446	/* Prepare CESA configuration */
1447	cs->cs_config = 0;
1448	cs->cs_ivlen = 1;
1449	cs->cs_mblen = 1;
1450
1451	if (enc) {
1452		switch (enc->cri_alg) {
1453		case CRYPTO_AES_CBC:
1454			cs->cs_config |= CESA_CSHD_AES | CESA_CSHD_CBC;
1455			cs->cs_ivlen = AES_BLOCK_LEN;
1456			break;
1457		case CRYPTO_DES_CBC:
1458			cs->cs_config |= CESA_CSHD_DES | CESA_CSHD_CBC;
1459			cs->cs_ivlen = DES_BLOCK_LEN;
1460			break;
1461		case CRYPTO_3DES_CBC:
1462			cs->cs_config |= CESA_CSHD_3DES | CESA_CSHD_3DES_EDE |
1463			    CESA_CSHD_CBC;
1464			cs->cs_ivlen = DES3_BLOCK_LEN;
1465			break;
1466		default:
1467			error = EINVAL;
1468			break;
1469		}
1470	}
1471
1472	if (!error && mac) {
1473		switch (mac->cri_alg) {
1474		case CRYPTO_MD5:
1475			cs->cs_mblen = 1;
1476			cs->cs_hlen = (mac->cri_mlen == 0) ? MD5_HASH_LEN :
1477			    mac->cri_mlen;
1478			cs->cs_config |= CESA_CSHD_MD5;
1479			break;
1480		case CRYPTO_MD5_HMAC:
1481			cs->cs_mblen = MD5_HMAC_BLOCK_LEN;
1482			cs->cs_hlen = (mac->cri_mlen == 0) ? MD5_HASH_LEN :
1483			    mac->cri_mlen;
1484			cs->cs_config |= CESA_CSHD_MD5_HMAC;
1485			if (cs->cs_hlen == CESA_HMAC_TRUNC_LEN)
1486				cs->cs_config |= CESA_CSHD_96_BIT_HMAC;
1487			break;
1488		case CRYPTO_SHA1:
1489			cs->cs_mblen = 1;
1490			cs->cs_hlen = (mac->cri_mlen == 0) ? SHA1_HASH_LEN :
1491			    mac->cri_mlen;
1492			cs->cs_config |= CESA_CSHD_SHA1;
1493			break;
1494		case CRYPTO_SHA1_HMAC:
1495			cs->cs_mblen = SHA1_HMAC_BLOCK_LEN;
1496			cs->cs_hlen = (mac->cri_mlen == 0) ? SHA1_HASH_LEN :
1497			    mac->cri_mlen;
1498			cs->cs_config |= CESA_CSHD_SHA1_HMAC;
1499			if (cs->cs_hlen == CESA_HMAC_TRUNC_LEN)
1500				cs->cs_config |= CESA_CSHD_96_BIT_HMAC;
1501			break;
1502		case CRYPTO_SHA2_256_HMAC:
1503			cs->cs_mblen = SHA2_256_HMAC_BLOCK_LEN;
1504			cs->cs_hlen = (mac->cri_mlen == 0) ? SHA2_256_HASH_LEN :
1505			    mac->cri_mlen;
1506			cs->cs_config |= CESA_CSHD_SHA2_256_HMAC;
1507			break;
1508		default:
1509			error = EINVAL;
1510			break;
1511		}
1512	}
1513
1514	/* Save cipher key */
1515	if (!error && enc && enc->cri_key) {
1516		cs->cs_klen = enc->cri_klen / 8;
1517		memcpy(cs->cs_key, enc->cri_key, cs->cs_klen);
1518		if (enc->cri_alg == CRYPTO_AES_CBC)
1519			error = cesa_prep_aes_key(cs);
1520	}
1521
1522	/* Save digest key */
1523	if (!error && mac && mac->cri_key)
1524		error = cesa_set_mkey(cs, mac->cri_alg, mac->cri_key,
1525		    mac->cri_klen / 8);
1526
1527	if (error) {
1528		cesa_free_session(sc, cs);
1529		return (EINVAL);
1530	}
1531
1532	*sidp = cs->cs_sid;
1533
1534	return (0);
1535}
1536
1537static int
1538cesa_freesession(device_t dev, uint64_t tid)
1539{
1540	struct cesa_session *cs;
1541	struct cesa_softc *sc;
1542
1543	sc = device_get_softc(dev);
1544	cs = cesa_get_session(sc, CRYPTO_SESID2LID(tid));
1545	if (!cs)
1546		return (EINVAL);
1547
1548	/* Free session */
1549	cesa_free_session(sc, cs);
1550
1551	return (0);
1552}
1553
1554static int
1555cesa_process(device_t dev, struct cryptop *crp, int hint)
1556{
1557	struct cesa_request *cr;
1558	struct cesa_session *cs;
1559	struct cryptodesc *crd;
1560	struct cryptodesc *enc;
1561	struct cryptodesc *mac;
1562	struct cesa_softc *sc;
1563	int error;
1564
1565	sc = device_get_softc(dev);
1566	crd = crp->crp_desc;
1567	enc = NULL;
1568	mac = NULL;
1569	error = 0;
1570
1571	/* Check session ID */
1572	cs = cesa_get_session(sc, CRYPTO_SESID2LID(crp->crp_sid));
1573	if (!cs) {
1574		crp->crp_etype = EINVAL;
1575		crypto_done(crp);
1576		return (0);
1577	}
1578
1579	/* Check and parse input */
1580	if (crp->crp_ilen > CESA_MAX_REQUEST_SIZE) {
1581		crp->crp_etype = E2BIG;
1582		crypto_done(crp);
1583		return (0);
1584	}
1585
1586	if (cesa_is_hash(crd->crd_alg))
1587		mac = crd;
1588	else
1589		enc = crd;
1590
1591	crd = crd->crd_next;
1592
1593	if (crd) {
1594		if (!enc && !cesa_is_hash(crd->crd_alg))
1595			enc = crd;
1596
1597		if (!mac && cesa_is_hash(crd->crd_alg))
1598			mac = crd;
1599
1600		if (crd->crd_next || !(enc && mac)) {
1601			crp->crp_etype = EINVAL;
1602			crypto_done(crp);
1603			return (0);
1604		}
1605	}
1606
1607	/*
1608	 * Get request descriptor. Block driver if there is no free
1609	 * descriptors in pool.
1610	 */
1611	cr = cesa_alloc_request(sc);
1612	if (!cr) {
1613		CESA_LOCK(sc, sc);
1614		sc->sc_blocked = CRYPTO_SYMQ;
1615		CESA_UNLOCK(sc, sc);
1616		return (ERESTART);
1617	}
1618
1619	/* Prepare request */
1620	cr->cr_crp = crp;
1621	cr->cr_enc = enc;
1622	cr->cr_mac = mac;
1623	cr->cr_cs = cs;
1624
1625	CESA_LOCK(sc, sessions);
1626	cesa_sync_desc(sc, BUS_DMASYNC_POSTREAD | BUS_DMASYNC_POSTWRITE);
1627
1628	if (enc && enc->crd_flags & CRD_F_ENCRYPT) {
1629		if (enc->crd_flags & CRD_F_IV_EXPLICIT)
1630			memcpy(cr->cr_csd->csd_iv, enc->crd_iv, cs->cs_ivlen);
1631		else
1632			arc4rand(cr->cr_csd->csd_iv, cs->cs_ivlen, 0);
1633
1634		if ((enc->crd_flags & CRD_F_IV_PRESENT) == 0)
1635			crypto_copyback(crp->crp_flags, crp->crp_buf,
1636			    enc->crd_inject, cs->cs_ivlen, cr->cr_csd->csd_iv);
1637	} else if (enc) {
1638		if (enc->crd_flags & CRD_F_IV_EXPLICIT)
1639			memcpy(cr->cr_csd->csd_iv, enc->crd_iv, cs->cs_ivlen);
1640		else
1641			crypto_copydata(crp->crp_flags, crp->crp_buf,
1642			    enc->crd_inject, cs->cs_ivlen, cr->cr_csd->csd_iv);
1643	}
1644
1645	if (enc && enc->crd_flags & CRD_F_KEY_EXPLICIT) {
1646		if ((enc->crd_klen / 8) <= CESA_MAX_KEY_LEN) {
1647			cs->cs_klen = enc->crd_klen / 8;
1648			memcpy(cs->cs_key, enc->crd_key, cs->cs_klen);
1649			if (enc->crd_alg == CRYPTO_AES_CBC)
1650				error = cesa_prep_aes_key(cs);
1651		} else
1652			error = E2BIG;
1653	}
1654
1655	if (!error && mac && mac->crd_flags & CRD_F_KEY_EXPLICIT) {
1656		if ((mac->crd_klen / 8) <= CESA_MAX_MKEY_LEN)
1657			error = cesa_set_mkey(cs, mac->crd_alg, mac->crd_key,
1658			    mac->crd_klen / 8);
1659		else
1660			error = E2BIG;
1661	}
1662
1663	/* Convert request to chain of TDMA and SA descriptors */
1664	if (!error)
1665		error = cesa_create_chain(sc, cr);
1666
1667	cesa_sync_desc(sc, BUS_DMASYNC_PREREAD | BUS_DMASYNC_PREWRITE);
1668	CESA_UNLOCK(sc, sessions);
1669
1670	if (error) {
1671		cesa_free_request(sc, cr);
1672		crp->crp_etype = error;
1673		crypto_done(crp);
1674		return (0);
1675	}
1676
1677	bus_dmamap_sync(sc->sc_data_dtag, cr->cr_dmap, BUS_DMASYNC_PREREAD |
1678	    BUS_DMASYNC_PREWRITE);
1679
1680	/* Enqueue request to execution */
1681	cesa_enqueue_request(sc, cr);
1682
1683	/* Start execution, if we have no more requests in queue */
1684	if ((hint & CRYPTO_HINT_MORE) == 0)
1685		cesa_execute(sc);
1686
1687	return (0);
1688}
1689
1690/*
1691 * Set CESA TDMA decode windows.
1692 */
1693static int
1694decode_win_cesa_setup(struct cesa_softc *sc)
1695{
1696	struct mem_region availmem_regions[FDT_MEM_REGIONS];
1697	int availmem_regions_sz;
1698	uint32_t br, cr, i;
1699
1700	/* Grab physical memory regions information from DTS */
1701	if (fdt_get_mem_regions(availmem_regions, &availmem_regions_sz,
1702	    NULL) != 0)
1703		return (ENXIO);
1704
1705	if (availmem_regions_sz > MV_WIN_CESA_MAX) {
1706		device_printf(sc->sc_dev, "Too much memory regions, cannot "
1707		    " set CESA windows to cover whole DRAM \n");
1708		return (ENXIO);
1709	}
1710
1711	/* Disable and clear all CESA windows */
1712	for (i = 0; i < MV_WIN_CESA_MAX; i++) {
1713		CESA_TDMA_WRITE(sc, MV_WIN_CESA_BASE(i), 0);
1714		CESA_TDMA_WRITE(sc, MV_WIN_CESA_CTRL(i), 0);
1715	}
1716
1717	/* Fill CESA TDMA decoding windows with information acquired from DTS */
1718	for (i = 0; i < availmem_regions_sz; i++) {
1719		br = availmem_regions[i].mr_start;
1720		cr = availmem_regions[i].mr_size;
1721
1722		/* Don't add entries with size lower than 64KB */
1723		if (cr & 0xffff0000) {
1724			cr = (((cr - 1) & 0xffff0000) |
1725			(MV_WIN_DDR_ATTR(i) << MV_WIN_CPU_ATTR_SHIFT) |
1726			    (MV_WIN_DDR_TARGET << MV_WIN_CPU_TARGET_SHIFT) |
1727			    MV_WIN_CPU_ENABLE_BIT);
1728			CESA_TDMA_WRITE(sc, MV_WIN_CESA_BASE(i), br);
1729			CESA_TDMA_WRITE(sc, MV_WIN_CESA_CTRL(i), cr);
1730		}
1731	}
1732
1733	return (0);
1734}
1735
1736