cesa.c revision 234559
1/*- 2 * Copyright (C) 2009-2011 Semihalf. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 */ 26 27/* 28 * CESA SRAM Memory Map: 29 * 30 * +------------------------+ <= sc->sc_sram_base + CESA_SRAM_SIZE 31 * | | 32 * | DATA | 33 * | | 34 * +------------------------+ <= sc->sc_sram_base + CESA_DATA(0) 35 * | struct cesa_sa_data | 36 * +------------------------+ 37 * | struct cesa_sa_hdesc | 38 * +------------------------+ <= sc->sc_sram_base 39 */ 40 41#include <sys/cdefs.h> 42__FBSDID("$FreeBSD: stable/9/sys/dev/cesa/cesa.c 227730 2011-11-19 16:30:06Z raj $"); 43 44#include <sys/param.h> 45#include <sys/systm.h> 46#include <sys/bus.h> 47#include <sys/endian.h> 48#include <sys/kernel.h> 49#include <sys/lock.h> 50#include <sys/mbuf.h> 51#include <sys/module.h> 52#include <sys/mutex.h> 53#include <sys/rman.h> 54 55#include <machine/bus.h> 56#include <machine/intr.h> 57#include <machine/resource.h> 58 59#include <dev/fdt/fdt_common.h> 60#include <dev/ofw/ofw_bus.h> 61#include <dev/ofw/ofw_bus_subr.h> 62 63#include <sys/md5.h> 64#include <crypto/sha1.h> 65#include <crypto/rijndael/rijndael.h> 66#include <opencrypto/cryptodev.h> 67#include "cryptodev_if.h" 68 69#include <arm/mv/mvreg.h> 70#include <arm/mv/mvwin.h> 71#include <arm/mv/mvvar.h> 72#include "cesa.h" 73 74#undef DEBUG 75 76static int cesa_probe(device_t); 77static int cesa_attach(device_t); 78static int cesa_detach(device_t); 79static void cesa_intr(void *); 80static int cesa_newsession(device_t, u_int32_t *, struct cryptoini *); 81static int cesa_freesession(device_t, u_int64_t); 82static int cesa_process(device_t, struct cryptop *, int); 83 84static struct resource_spec cesa_res_spec[] = { 85 { SYS_RES_MEMORY, 0, RF_ACTIVE }, 86 { SYS_RES_IRQ, 0, RF_ACTIVE | RF_SHAREABLE }, 87 { -1, 0 } 88}; 89 90static device_method_t cesa_methods[] = { 91 /* Device interface */ 92 DEVMETHOD(device_probe, cesa_probe), 93 DEVMETHOD(device_attach, cesa_attach), 94 DEVMETHOD(device_detach, cesa_detach), 95 96 /* Bus interface */ 97 DEVMETHOD(bus_print_child, bus_generic_print_child), 98 DEVMETHOD(bus_driver_added, bus_generic_driver_added), 99 100 /* Crypto device methods */ 101 DEVMETHOD(cryptodev_newsession, cesa_newsession), 102 DEVMETHOD(cryptodev_freesession,cesa_freesession), 103 DEVMETHOD(cryptodev_process, cesa_process), 104 105 { 0, 0 } 106}; 107 108static driver_t cesa_driver = { 109 "cesa", 110 cesa_methods, 111 sizeof (struct cesa_softc) 112}; 113static devclass_t cesa_devclass; 114 115DRIVER_MODULE(cesa, simplebus, cesa_driver, cesa_devclass, 0, 0); 116MODULE_DEPEND(cesa, crypto, 1, 1, 1); 117 118static void 119cesa_dump_cshd(struct cesa_softc *sc, struct cesa_sa_hdesc *cshd) 120{ 121#ifdef DEBUG 122 device_t dev; 123 124 dev = sc->sc_dev; 125 device_printf(dev, "CESA SA Hardware Descriptor:\n"); 126 device_printf(dev, "\t\tconfig: 0x%08X\n", cshd->cshd_config); 127 device_printf(dev, "\t\te_src: 0x%08X\n", cshd->cshd_enc_src); 128 device_printf(dev, "\t\te_dst: 0x%08X\n", cshd->cshd_enc_dst); 129 device_printf(dev, "\t\te_dlen: 0x%08X\n", cshd->cshd_enc_dlen); 130 device_printf(dev, "\t\te_key: 0x%08X\n", cshd->cshd_enc_key); 131 device_printf(dev, "\t\te_iv_1: 0x%08X\n", cshd->cshd_enc_iv); 132 device_printf(dev, "\t\te_iv_2: 0x%08X\n", cshd->cshd_enc_iv_buf); 133 device_printf(dev, "\t\tm_src: 0x%08X\n", cshd->cshd_mac_src); 134 device_printf(dev, "\t\tm_dst: 0x%08X\n", cshd->cshd_mac_dst); 135 device_printf(dev, "\t\tm_dlen: 0x%08X\n", cshd->cshd_mac_dlen); 136 device_printf(dev, "\t\tm_tlen: 0x%08X\n", cshd->cshd_mac_total_dlen); 137 device_printf(dev, "\t\tm_iv_i: 0x%08X\n", cshd->cshd_mac_iv_in); 138 device_printf(dev, "\t\tm_iv_o: 0x%08X\n", cshd->cshd_mac_iv_out); 139#endif 140} 141 142static void 143cesa_alloc_dma_mem_cb(void *arg, bus_dma_segment_t *segs, int nseg, int error) 144{ 145 struct cesa_dma_mem *cdm; 146 147 if (error) 148 return; 149 150 KASSERT(nseg == 1, ("Got wrong number of DMA segments, should be 1.")); 151 cdm = arg; 152 cdm->cdm_paddr = segs->ds_addr; 153} 154 155static int 156cesa_alloc_dma_mem(struct cesa_softc *sc, struct cesa_dma_mem *cdm, 157 bus_size_t size) 158{ 159 int error; 160 161 KASSERT(cdm->cdm_vaddr == NULL, 162 ("%s(): DMA memory descriptor in use.", __func__)); 163 164 error = bus_dma_tag_create(NULL, /* parent */ 165 PAGE_SIZE, 0, /* alignment, boundary */ 166 BUS_SPACE_MAXADDR_32BIT, /* lowaddr */ 167 BUS_SPACE_MAXADDR, /* highaddr */ 168 NULL, NULL, /* filtfunc, filtfuncarg */ 169 size, 1, /* maxsize, nsegments */ 170 size, 0, /* maxsegsz, flags */ 171 NULL, NULL, /* lockfunc, lockfuncarg */ 172 &cdm->cdm_tag); /* dmat */ 173 if (error) { 174 device_printf(sc->sc_dev, "failed to allocate busdma tag, error" 175 " %i!\n", error); 176 177 goto err1; 178 } 179 180 error = bus_dmamem_alloc(cdm->cdm_tag, &cdm->cdm_vaddr, 181 BUS_DMA_NOWAIT | BUS_DMA_ZERO, &cdm->cdm_map); 182 if (error) { 183 device_printf(sc->sc_dev, "failed to allocate DMA safe" 184 " memory, error %i!\n", error); 185 186 goto err2; 187 } 188 189 error = bus_dmamap_load(cdm->cdm_tag, cdm->cdm_map, cdm->cdm_vaddr, 190 size, cesa_alloc_dma_mem_cb, cdm, BUS_DMA_NOWAIT); 191 if (error) { 192 device_printf(sc->sc_dev, "cannot get address of the DMA" 193 " memory, error %i\n", error); 194 195 goto err3; 196 } 197 198 return (0); 199err3: 200 bus_dmamem_free(cdm->cdm_tag, cdm->cdm_vaddr, cdm->cdm_map); 201err2: 202 bus_dma_tag_destroy(cdm->cdm_tag); 203err1: 204 cdm->cdm_vaddr = NULL; 205 return (error); 206} 207 208static void 209cesa_free_dma_mem(struct cesa_dma_mem *cdm) 210{ 211 212 bus_dmamap_unload(cdm->cdm_tag, cdm->cdm_map); 213 bus_dmamem_free(cdm->cdm_tag, cdm->cdm_vaddr, cdm->cdm_map); 214 bus_dma_tag_destroy(cdm->cdm_tag); 215 cdm->cdm_vaddr = NULL; 216} 217 218static void 219cesa_sync_dma_mem(struct cesa_dma_mem *cdm, bus_dmasync_op_t op) 220{ 221 222 /* Sync only if dma memory is valid */ 223 if (cdm->cdm_vaddr != NULL) 224 bus_dmamap_sync(cdm->cdm_tag, cdm->cdm_map, op); 225} 226 227static void 228cesa_sync_desc(struct cesa_softc *sc, bus_dmasync_op_t op) 229{ 230 231 cesa_sync_dma_mem(&sc->sc_tdesc_cdm, op); 232 cesa_sync_dma_mem(&sc->sc_sdesc_cdm, op); 233 cesa_sync_dma_mem(&sc->sc_requests_cdm, op); 234} 235 236static struct cesa_session * 237cesa_alloc_session(struct cesa_softc *sc) 238{ 239 struct cesa_session *cs; 240 241 CESA_GENERIC_ALLOC_LOCKED(sc, cs, sessions); 242 243 return (cs); 244} 245 246static struct cesa_session * 247cesa_get_session(struct cesa_softc *sc, uint32_t sid) 248{ 249 250 if (sid >= CESA_SESSIONS) 251 return (NULL); 252 253 return (&sc->sc_sessions[sid]); 254} 255 256static void 257cesa_free_session(struct cesa_softc *sc, struct cesa_session *cs) 258{ 259 260 CESA_GENERIC_FREE_LOCKED(sc, cs, sessions); 261} 262 263static struct cesa_request * 264cesa_alloc_request(struct cesa_softc *sc) 265{ 266 struct cesa_request *cr; 267 268 CESA_GENERIC_ALLOC_LOCKED(sc, cr, requests); 269 if (!cr) 270 return (NULL); 271 272 STAILQ_INIT(&cr->cr_tdesc); 273 STAILQ_INIT(&cr->cr_sdesc); 274 275 return (cr); 276} 277 278static void 279cesa_free_request(struct cesa_softc *sc, struct cesa_request *cr) 280{ 281 282 /* Free TDMA descriptors assigned to this request */ 283 CESA_LOCK(sc, tdesc); 284 STAILQ_CONCAT(&sc->sc_free_tdesc, &cr->cr_tdesc); 285 CESA_UNLOCK(sc, tdesc); 286 287 /* Free SA descriptors assigned to this request */ 288 CESA_LOCK(sc, sdesc); 289 STAILQ_CONCAT(&sc->sc_free_sdesc, &cr->cr_sdesc); 290 CESA_UNLOCK(sc, sdesc); 291 292 /* Unload DMA memory asociated with request */ 293 if (cr->cr_dmap_loaded) { 294 bus_dmamap_unload(sc->sc_data_dtag, cr->cr_dmap); 295 cr->cr_dmap_loaded = 0; 296 } 297 298 CESA_GENERIC_FREE_LOCKED(sc, cr, requests); 299} 300 301static void 302cesa_enqueue_request(struct cesa_softc *sc, struct cesa_request *cr) 303{ 304 305 CESA_LOCK(sc, requests); 306 STAILQ_INSERT_TAIL(&sc->sc_ready_requests, cr, cr_stq); 307 CESA_UNLOCK(sc, requests); 308} 309 310static struct cesa_tdma_desc * 311cesa_alloc_tdesc(struct cesa_softc *sc) 312{ 313 struct cesa_tdma_desc *ctd; 314 315 CESA_GENERIC_ALLOC_LOCKED(sc, ctd, tdesc); 316 317 if (!ctd) 318 device_printf(sc->sc_dev, "TDMA descriptors pool exhaused. " 319 "Consider increasing CESA_TDMA_DESCRIPTORS.\n"); 320 321 return (ctd); 322} 323 324static struct cesa_sa_desc * 325cesa_alloc_sdesc(struct cesa_softc *sc, struct cesa_request *cr) 326{ 327 struct cesa_sa_desc *csd; 328 329 CESA_GENERIC_ALLOC_LOCKED(sc, csd, sdesc); 330 if (!csd) { 331 device_printf(sc->sc_dev, "SA descriptors pool exhaused. " 332 "Consider increasing CESA_SA_DESCRIPTORS.\n"); 333 return (NULL); 334 } 335 336 STAILQ_INSERT_TAIL(&cr->cr_sdesc, csd, csd_stq); 337 338 /* Fill-in SA descriptor with default values */ 339 csd->csd_cshd->cshd_enc_key = CESA_SA_DATA(csd_key); 340 csd->csd_cshd->cshd_enc_iv = CESA_SA_DATA(csd_iv); 341 csd->csd_cshd->cshd_enc_iv_buf = CESA_SA_DATA(csd_iv); 342 csd->csd_cshd->cshd_enc_src = 0; 343 csd->csd_cshd->cshd_enc_dst = 0; 344 csd->csd_cshd->cshd_enc_dlen = 0; 345 csd->csd_cshd->cshd_mac_dst = CESA_SA_DATA(csd_hash); 346 csd->csd_cshd->cshd_mac_iv_in = CESA_SA_DATA(csd_hiv_in); 347 csd->csd_cshd->cshd_mac_iv_out = CESA_SA_DATA(csd_hiv_out); 348 csd->csd_cshd->cshd_mac_src = 0; 349 csd->csd_cshd->cshd_mac_dlen = 0; 350 351 return (csd); 352} 353 354static struct cesa_tdma_desc * 355cesa_tdma_copy(struct cesa_softc *sc, bus_addr_t dst, bus_addr_t src, 356 bus_size_t size) 357{ 358 struct cesa_tdma_desc *ctd; 359 360 ctd = cesa_alloc_tdesc(sc); 361 if (!ctd) 362 return (NULL); 363 364 ctd->ctd_cthd->cthd_dst = dst; 365 ctd->ctd_cthd->cthd_src = src; 366 ctd->ctd_cthd->cthd_byte_count = size; 367 368 /* Handle special control packet */ 369 if (size != 0) 370 ctd->ctd_cthd->cthd_flags = CESA_CTHD_OWNED; 371 else 372 ctd->ctd_cthd->cthd_flags = 0; 373 374 return (ctd); 375} 376 377static struct cesa_tdma_desc * 378cesa_tdma_copyin_sa_data(struct cesa_softc *sc, struct cesa_request *cr) 379{ 380 381 return (cesa_tdma_copy(sc, sc->sc_sram_base + 382 sizeof(struct cesa_sa_hdesc), cr->cr_csd_paddr, 383 sizeof(struct cesa_sa_data))); 384} 385 386static struct cesa_tdma_desc * 387cesa_tdma_copyout_sa_data(struct cesa_softc *sc, struct cesa_request *cr) 388{ 389 390 return (cesa_tdma_copy(sc, cr->cr_csd_paddr, sc->sc_sram_base + 391 sizeof(struct cesa_sa_hdesc), sizeof(struct cesa_sa_data))); 392} 393 394static struct cesa_tdma_desc * 395cesa_tdma_copy_sdesc(struct cesa_softc *sc, struct cesa_sa_desc *csd) 396{ 397 398 return (cesa_tdma_copy(sc, sc->sc_sram_base, csd->csd_cshd_paddr, 399 sizeof(struct cesa_sa_hdesc))); 400} 401 402static void 403cesa_append_tdesc(struct cesa_request *cr, struct cesa_tdma_desc *ctd) 404{ 405 struct cesa_tdma_desc *ctd_prev; 406 407 if (!STAILQ_EMPTY(&cr->cr_tdesc)) { 408 ctd_prev = STAILQ_LAST(&cr->cr_tdesc, cesa_tdma_desc, ctd_stq); 409 ctd_prev->ctd_cthd->cthd_next = ctd->ctd_cthd_paddr; 410 } 411 412 ctd->ctd_cthd->cthd_next = 0; 413 STAILQ_INSERT_TAIL(&cr->cr_tdesc, ctd, ctd_stq); 414} 415 416static int 417cesa_append_packet(struct cesa_softc *sc, struct cesa_request *cr, 418 struct cesa_packet *cp, struct cesa_sa_desc *csd) 419{ 420 struct cesa_tdma_desc *ctd, *tmp; 421 422 /* Copy SA descriptor for this packet */ 423 ctd = cesa_tdma_copy_sdesc(sc, csd); 424 if (!ctd) 425 return (ENOMEM); 426 427 cesa_append_tdesc(cr, ctd); 428 429 /* Copy data to be processed */ 430 STAILQ_FOREACH_SAFE(ctd, &cp->cp_copyin, ctd_stq, tmp) 431 cesa_append_tdesc(cr, ctd); 432 STAILQ_INIT(&cp->cp_copyin); 433 434 /* Insert control descriptor */ 435 ctd = cesa_tdma_copy(sc, 0, 0, 0); 436 if (!ctd) 437 return (ENOMEM); 438 439 cesa_append_tdesc(cr, ctd); 440 441 /* Copy back results */ 442 STAILQ_FOREACH_SAFE(ctd, &cp->cp_copyout, ctd_stq, tmp) 443 cesa_append_tdesc(cr, ctd); 444 STAILQ_INIT(&cp->cp_copyout); 445 446 return (0); 447} 448 449static int 450cesa_set_mkey(struct cesa_session *cs, int alg, const uint8_t *mkey, int mklen) 451{ 452 uint8_t ipad[CESA_MAX_HMAC_BLOCK_LEN]; 453 uint8_t opad[CESA_MAX_HMAC_BLOCK_LEN]; 454 SHA1_CTX sha1ctx; 455 MD5_CTX md5ctx; 456 uint32_t *hout; 457 uint32_t *hin; 458 int i; 459 460 memset(ipad, HMAC_IPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN); 461 memset(opad, HMAC_OPAD_VAL, CESA_MAX_HMAC_BLOCK_LEN); 462 for (i = 0; i < mklen; i++) { 463 ipad[i] ^= mkey[i]; 464 opad[i] ^= mkey[i]; 465 } 466 467 hin = (uint32_t *)cs->cs_hiv_in; 468 hout = (uint32_t *)cs->cs_hiv_out; 469 470 switch (alg) { 471 case CRYPTO_MD5_HMAC: 472 MD5Init(&md5ctx); 473 MD5Update(&md5ctx, ipad, MD5_HMAC_BLOCK_LEN); 474 memcpy(hin, md5ctx.state, sizeof(md5ctx.state)); 475 MD5Init(&md5ctx); 476 MD5Update(&md5ctx, opad, MD5_HMAC_BLOCK_LEN); 477 memcpy(hout, md5ctx.state, sizeof(md5ctx.state)); 478 break; 479 case CRYPTO_SHA1_HMAC: 480 SHA1Init(&sha1ctx); 481 SHA1Update(&sha1ctx, ipad, SHA1_HMAC_BLOCK_LEN); 482 memcpy(hin, sha1ctx.h.b32, sizeof(sha1ctx.h.b32)); 483 SHA1Init(&sha1ctx); 484 SHA1Update(&sha1ctx, opad, SHA1_HMAC_BLOCK_LEN); 485 memcpy(hout, sha1ctx.h.b32, sizeof(sha1ctx.h.b32)); 486 break; 487 default: 488 return (EINVAL); 489 } 490 491 for (i = 0; i < CESA_MAX_HASH_LEN / sizeof(uint32_t); i++) { 492 hin[i] = htobe32(hin[i]); 493 hout[i] = htobe32(hout[i]); 494 } 495 496 return (0); 497} 498 499static int 500cesa_prep_aes_key(struct cesa_session *cs) 501{ 502 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; 503 uint32_t *dkey; 504 int i; 505 506 rijndaelKeySetupEnc(ek, cs->cs_key, cs->cs_klen * 8); 507 508 cs->cs_config &= ~CESA_CSH_AES_KLEN_MASK; 509 dkey = (uint32_t *)cs->cs_aes_dkey; 510 511 switch (cs->cs_klen) { 512 case 16: 513 cs->cs_config |= CESA_CSH_AES_KLEN_128; 514 for (i = 0; i < 4; i++) 515 *dkey++ = htobe32(ek[4 * 10 + i]); 516 break; 517 case 24: 518 cs->cs_config |= CESA_CSH_AES_KLEN_192; 519 for (i = 0; i < 4; i++) 520 *dkey++ = htobe32(ek[4 * 12 + i]); 521 for (i = 0; i < 2; i++) 522 *dkey++ = htobe32(ek[4 * 11 + 2 + i]); 523 break; 524 case 32: 525 cs->cs_config |= CESA_CSH_AES_KLEN_256; 526 for (i = 0; i < 4; i++) 527 *dkey++ = htobe32(ek[4 * 14 + i]); 528 for (i = 0; i < 4; i++) 529 *dkey++ = htobe32(ek[4 * 13 + i]); 530 break; 531 default: 532 return (EINVAL); 533 } 534 535 return (0); 536} 537 538static int 539cesa_is_hash(int alg) 540{ 541 542 switch (alg) { 543 case CRYPTO_MD5: 544 case CRYPTO_MD5_HMAC: 545 case CRYPTO_SHA1: 546 case CRYPTO_SHA1_HMAC: 547 return (1); 548 default: 549 return (0); 550 } 551} 552 553static void 554cesa_start_packet(struct cesa_packet *cp, unsigned int size) 555{ 556 557 cp->cp_size = size; 558 cp->cp_offset = 0; 559 STAILQ_INIT(&cp->cp_copyin); 560 STAILQ_INIT(&cp->cp_copyout); 561} 562 563static int 564cesa_fill_packet(struct cesa_softc *sc, struct cesa_packet *cp, 565 bus_dma_segment_t *seg) 566{ 567 struct cesa_tdma_desc *ctd; 568 unsigned int bsize; 569 570 /* Calculate size of block copy */ 571 bsize = MIN(seg->ds_len, cp->cp_size - cp->cp_offset); 572 573 if (bsize > 0) { 574 ctd = cesa_tdma_copy(sc, sc->sc_sram_base + 575 CESA_DATA(cp->cp_offset), seg->ds_addr, bsize); 576 if (!ctd) 577 return (-ENOMEM); 578 579 STAILQ_INSERT_TAIL(&cp->cp_copyin, ctd, ctd_stq); 580 581 ctd = cesa_tdma_copy(sc, seg->ds_addr, sc->sc_sram_base + 582 CESA_DATA(cp->cp_offset), bsize); 583 if (!ctd) 584 return (-ENOMEM); 585 586 STAILQ_INSERT_TAIL(&cp->cp_copyout, ctd, ctd_stq); 587 588 seg->ds_len -= bsize; 589 seg->ds_addr += bsize; 590 cp->cp_offset += bsize; 591 } 592 593 return (bsize); 594} 595 596static void 597cesa_create_chain_cb(void *arg, bus_dma_segment_t *segs, int nseg, int error) 598{ 599 unsigned int mpsize, fragmented; 600 unsigned int mlen, mskip, tmlen; 601 struct cesa_chain_info *cci; 602 unsigned int elen, eskip; 603 unsigned int skip, len; 604 struct cesa_sa_desc *csd; 605 struct cesa_request *cr; 606 struct cesa_softc *sc; 607 struct cesa_packet cp; 608 bus_dma_segment_t seg; 609 uint32_t config; 610 int size; 611 612 cci = arg; 613 sc = cci->cci_sc; 614 cr = cci->cci_cr; 615 616 if (error) { 617 cci->cci_error = error; 618 return; 619 } 620 621 elen = cci->cci_enc ? cci->cci_enc->crd_len : 0; 622 eskip = cci->cci_enc ? cci->cci_enc->crd_skip : 0; 623 mlen = cci->cci_mac ? cci->cci_mac->crd_len : 0; 624 mskip = cci->cci_mac ? cci->cci_mac->crd_skip : 0; 625 626 if (elen && mlen && 627 ((eskip > mskip && ((eskip - mskip) & (cr->cr_cs->cs_ivlen - 1))) || 628 (mskip > eskip && ((mskip - eskip) & (cr->cr_cs->cs_mblen - 1))) || 629 (eskip > (mskip + mlen)) || (mskip > (eskip + elen)))) { 630 /* 631 * Data alignment in the request does not meet CESA requiremnts 632 * for combined encryption/decryption and hashing. We have to 633 * split the request to separate operations and process them 634 * one by one. 635 */ 636 config = cci->cci_config; 637 if ((config & CESA_CSHD_OP_MASK) == CESA_CSHD_MAC_AND_ENC) { 638 config &= ~CESA_CSHD_OP_MASK; 639 640 cci->cci_config = config | CESA_CSHD_MAC; 641 cci->cci_enc = NULL; 642 cci->cci_mac = cr->cr_mac; 643 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 644 645 cci->cci_config = config | CESA_CSHD_ENC; 646 cci->cci_enc = cr->cr_enc; 647 cci->cci_mac = NULL; 648 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 649 } else { 650 config &= ~CESA_CSHD_OP_MASK; 651 652 cci->cci_config = config | CESA_CSHD_ENC; 653 cci->cci_enc = cr->cr_enc; 654 cci->cci_mac = NULL; 655 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 656 657 cci->cci_config = config | CESA_CSHD_MAC; 658 cci->cci_enc = NULL; 659 cci->cci_mac = cr->cr_mac; 660 cesa_create_chain_cb(cci, segs, nseg, cci->cci_error); 661 } 662 663 return; 664 } 665 666 tmlen = mlen; 667 fragmented = 0; 668 mpsize = CESA_MAX_PACKET_SIZE; 669 mpsize &= ~((cr->cr_cs->cs_ivlen - 1) | (cr->cr_cs->cs_mblen - 1)); 670 671 if (elen && mlen) { 672 skip = MIN(eskip, mskip); 673 len = MAX(elen + eskip, mlen + mskip) - skip; 674 } else if (elen) { 675 skip = eskip; 676 len = elen; 677 } else { 678 skip = mskip; 679 len = mlen; 680 } 681 682 /* Start first packet in chain */ 683 cesa_start_packet(&cp, MIN(mpsize, len)); 684 685 while (nseg-- && len > 0) { 686 seg = *(segs++); 687 688 /* 689 * Skip data in buffer on which neither ENC nor MAC operation 690 * is requested. 691 */ 692 if (skip > 0) { 693 size = MIN(skip, seg.ds_len); 694 skip -= size; 695 696 seg.ds_addr += size; 697 seg.ds_len -= size; 698 699 if (eskip > 0) 700 eskip -= size; 701 702 if (mskip > 0) 703 mskip -= size; 704 705 if (seg.ds_len == 0) 706 continue; 707 } 708 709 while (1) { 710 /* 711 * Fill in current packet with data. Break if there is 712 * no more data in current DMA segment or an error 713 * occured. 714 */ 715 size = cesa_fill_packet(sc, &cp, &seg); 716 if (size <= 0) { 717 error = -size; 718 break; 719 } 720 721 len -= size; 722 723 /* If packet is full, append it to the chain */ 724 if (cp.cp_size == cp.cp_offset) { 725 csd = cesa_alloc_sdesc(sc, cr); 726 if (!csd) { 727 error = ENOMEM; 728 break; 729 } 730 731 /* Create SA descriptor for this packet */ 732 csd->csd_cshd->cshd_config = cci->cci_config; 733 csd->csd_cshd->cshd_mac_total_dlen = tmlen; 734 735 /* 736 * Enable fragmentation if request will not fit 737 * into one packet. 738 */ 739 if (len > 0) { 740 if (!fragmented) { 741 fragmented = 1; 742 csd->csd_cshd->cshd_config |= 743 CESA_CSHD_FRAG_FIRST; 744 } else 745 csd->csd_cshd->cshd_config |= 746 CESA_CSHD_FRAG_MIDDLE; 747 } else if (fragmented) 748 csd->csd_cshd->cshd_config |= 749 CESA_CSHD_FRAG_LAST; 750 751 if (eskip < cp.cp_size && elen > 0) { 752 csd->csd_cshd->cshd_enc_src = 753 CESA_DATA(eskip); 754 csd->csd_cshd->cshd_enc_dst = 755 CESA_DATA(eskip); 756 csd->csd_cshd->cshd_enc_dlen = 757 MIN(elen, cp.cp_size - eskip); 758 } 759 760 if (mskip < cp.cp_size && mlen > 0) { 761 csd->csd_cshd->cshd_mac_src = 762 CESA_DATA(mskip); 763 csd->csd_cshd->cshd_mac_dlen = 764 MIN(mlen, cp.cp_size - mskip); 765 } 766 767 elen -= csd->csd_cshd->cshd_enc_dlen; 768 eskip -= MIN(eskip, cp.cp_size); 769 mlen -= csd->csd_cshd->cshd_mac_dlen; 770 mskip -= MIN(mskip, cp.cp_size); 771 772 cesa_dump_cshd(sc, csd->csd_cshd); 773 774 /* Append packet to the request */ 775 error = cesa_append_packet(sc, cr, &cp, csd); 776 if (error) 777 break; 778 779 /* Start a new packet, as current is full */ 780 cesa_start_packet(&cp, MIN(mpsize, len)); 781 } 782 } 783 784 if (error) 785 break; 786 } 787 788 if (error) { 789 /* 790 * Move all allocated resources to the request. They will be 791 * freed later. 792 */ 793 STAILQ_CONCAT(&cr->cr_tdesc, &cp.cp_copyin); 794 STAILQ_CONCAT(&cr->cr_tdesc, &cp.cp_copyout); 795 cci->cci_error = error; 796 } 797} 798 799static void 800cesa_create_chain_cb2(void *arg, bus_dma_segment_t *segs, int nseg, 801 bus_size_t size, int error) 802{ 803 804 cesa_create_chain_cb(arg, segs, nseg, error); 805} 806 807static int 808cesa_create_chain(struct cesa_softc *sc, struct cesa_request *cr) 809{ 810 struct cesa_chain_info cci; 811 struct cesa_tdma_desc *ctd; 812 uint32_t config; 813 int error; 814 815 error = 0; 816 CESA_LOCK_ASSERT(sc, sessions); 817 818 /* Create request metadata */ 819 if (cr->cr_enc) { 820 if (cr->cr_enc->crd_alg == CRYPTO_AES_CBC && 821 (cr->cr_enc->crd_flags & CRD_F_ENCRYPT) == 0) 822 memcpy(cr->cr_csd->csd_key, cr->cr_cs->cs_aes_dkey, 823 cr->cr_cs->cs_klen); 824 else 825 memcpy(cr->cr_csd->csd_key, cr->cr_cs->cs_key, 826 cr->cr_cs->cs_klen); 827 } 828 829 if (cr->cr_mac) { 830 memcpy(cr->cr_csd->csd_hiv_in, cr->cr_cs->cs_hiv_in, 831 CESA_MAX_HASH_LEN); 832 memcpy(cr->cr_csd->csd_hiv_out, cr->cr_cs->cs_hiv_out, 833 CESA_MAX_HASH_LEN); 834 } 835 836 ctd = cesa_tdma_copyin_sa_data(sc, cr); 837 if (!ctd) 838 return (ENOMEM); 839 840 cesa_append_tdesc(cr, ctd); 841 842 /* Prepare SA configuration */ 843 config = cr->cr_cs->cs_config; 844 845 if (cr->cr_enc && (cr->cr_enc->crd_flags & CRD_F_ENCRYPT) == 0) 846 config |= CESA_CSHD_DECRYPT; 847 if (cr->cr_enc && !cr->cr_mac) 848 config |= CESA_CSHD_ENC; 849 if (!cr->cr_enc && cr->cr_mac) 850 config |= CESA_CSHD_MAC; 851 if (cr->cr_enc && cr->cr_mac) 852 config |= (config & CESA_CSHD_DECRYPT) ? CESA_CSHD_MAC_AND_ENC : 853 CESA_CSHD_ENC_AND_MAC; 854 855 /* Create data packets */ 856 cci.cci_sc = sc; 857 cci.cci_cr = cr; 858 cci.cci_enc = cr->cr_enc; 859 cci.cci_mac = cr->cr_mac; 860 cci.cci_config = config; 861 cci.cci_error = 0; 862 863 if (cr->cr_crp->crp_flags & CRYPTO_F_IOV) 864 error = bus_dmamap_load_uio(sc->sc_data_dtag, 865 cr->cr_dmap, (struct uio *)cr->cr_crp->crp_buf, 866 cesa_create_chain_cb2, &cci, BUS_DMA_NOWAIT); 867 else if (cr->cr_crp->crp_flags & CRYPTO_F_IMBUF) 868 error = bus_dmamap_load_mbuf(sc->sc_data_dtag, 869 cr->cr_dmap, (struct mbuf *)cr->cr_crp->crp_buf, 870 cesa_create_chain_cb2, &cci, BUS_DMA_NOWAIT); 871 else 872 error = bus_dmamap_load(sc->sc_data_dtag, 873 cr->cr_dmap, cr->cr_crp->crp_buf, 874 cr->cr_crp->crp_ilen, cesa_create_chain_cb, &cci, 875 BUS_DMA_NOWAIT); 876 877 if (!error) 878 cr->cr_dmap_loaded = 1; 879 880 if (cci.cci_error) 881 error = cci.cci_error; 882 883 if (error) 884 return (error); 885 886 /* Read back request metadata */ 887 ctd = cesa_tdma_copyout_sa_data(sc, cr); 888 if (!ctd) 889 return (ENOMEM); 890 891 cesa_append_tdesc(cr, ctd); 892 893 return (0); 894} 895 896static void 897cesa_execute(struct cesa_softc *sc) 898{ 899 struct cesa_tdma_desc *prev_ctd, *ctd; 900 struct cesa_request *prev_cr, *cr; 901 902 CESA_LOCK(sc, requests); 903 904 /* 905 * If ready list is empty, there is nothing to execute. If queued list 906 * is not empty, the hardware is busy and we cannot start another 907 * execution. 908 */ 909 if (STAILQ_EMPTY(&sc->sc_ready_requests) || 910 !STAILQ_EMPTY(&sc->sc_queued_requests)) { 911 CESA_UNLOCK(sc, requests); 912 return; 913 } 914 915 /* Move all ready requests to queued list */ 916 STAILQ_CONCAT(&sc->sc_queued_requests, &sc->sc_ready_requests); 917 STAILQ_INIT(&sc->sc_ready_requests); 918 919 /* Create one execution chain from all requests on the list */ 920 if (STAILQ_FIRST(&sc->sc_queued_requests) != 921 STAILQ_LAST(&sc->sc_queued_requests, cesa_request, cr_stq)) { 922 prev_cr = NULL; 923 cesa_sync_dma_mem(&sc->sc_tdesc_cdm, BUS_DMASYNC_POSTREAD | 924 BUS_DMASYNC_POSTWRITE); 925 926 STAILQ_FOREACH(cr, &sc->sc_queued_requests, cr_stq) { 927 if (prev_cr) { 928 ctd = STAILQ_FIRST(&cr->cr_tdesc); 929 prev_ctd = STAILQ_LAST(&prev_cr->cr_tdesc, 930 cesa_tdma_desc, ctd_stq); 931 932 prev_ctd->ctd_cthd->cthd_next = 933 ctd->ctd_cthd_paddr; 934 } 935 936 prev_cr = cr; 937 } 938 939 cesa_sync_dma_mem(&sc->sc_tdesc_cdm, BUS_DMASYNC_PREREAD | 940 BUS_DMASYNC_PREWRITE); 941 } 942 943 /* Start chain execution in hardware */ 944 cr = STAILQ_FIRST(&sc->sc_queued_requests); 945 ctd = STAILQ_FIRST(&cr->cr_tdesc); 946 947 CESA_WRITE(sc, CESA_TDMA_ND, ctd->ctd_cthd_paddr); 948 CESA_WRITE(sc, CESA_SA_CMD, CESA_SA_CMD_ACTVATE); 949 950 CESA_UNLOCK(sc, requests); 951} 952 953static int 954cesa_setup_sram(struct cesa_softc *sc) 955{ 956 phandle_t sram_node; 957 ihandle_t sram_ihandle; 958 pcell_t sram_handle, sram_reg; 959 960 if (OF_getprop(ofw_bus_get_node(sc->sc_dev), "sram-handle", 961 (void *)&sram_handle, sizeof(sram_handle)) <= 0) 962 return (ENXIO); 963 964 sram_ihandle = (ihandle_t)sram_handle; 965 sram_ihandle = fdt32_to_cpu(sram_ihandle); 966 sram_node = OF_instance_to_package(sram_ihandle); 967 968 if (OF_getprop(sram_node, "reg", (void *)&sram_reg, 969 sizeof(sram_reg)) <= 0) 970 return (ENXIO); 971 972 sc->sc_sram_base = fdt32_to_cpu(sram_reg); 973 974 return (0); 975} 976 977static int 978cesa_probe(device_t dev) 979{ 980 if (!ofw_bus_is_compatible(dev, "mrvl,cesa")) 981 return (ENXIO); 982 983 device_set_desc(dev, "Marvell Cryptographic Engine and Security " 984 "Accelerator"); 985 986 return (BUS_PROBE_DEFAULT); 987} 988 989static int 990cesa_attach(device_t dev) 991{ 992 struct cesa_softc *sc; 993 uint32_t d, r; 994 int error; 995 int i; 996 997 sc = device_get_softc(dev); 998 sc->sc_blocked = 0; 999 sc->sc_error = 0; 1000 sc->sc_dev = dev; 1001 1002 error = cesa_setup_sram(sc); 1003 if (error) { 1004 device_printf(dev, "could not setup SRAM\n"); 1005 return (error); 1006 } 1007 1008 soc_id(&d, &r); 1009 1010 switch (d) { 1011 case MV_DEV_88F6281: 1012 sc->sc_tperr = 0; 1013 break; 1014 case MV_DEV_MV78100: 1015 case MV_DEV_MV78100_Z0: 1016 sc->sc_tperr = CESA_ICR_TPERR; 1017 break; 1018 default: 1019 return (ENXIO); 1020 } 1021 1022 /* Initialize mutexes */ 1023 mtx_init(&sc->sc_sc_lock, device_get_nameunit(dev), 1024 "CESA Shared Data", MTX_DEF); 1025 mtx_init(&sc->sc_tdesc_lock, device_get_nameunit(dev), 1026 "CESA TDMA Descriptors Pool", MTX_DEF); 1027 mtx_init(&sc->sc_sdesc_lock, device_get_nameunit(dev), 1028 "CESA SA Descriptors Pool", MTX_DEF); 1029 mtx_init(&sc->sc_requests_lock, device_get_nameunit(dev), 1030 "CESA Requests Pool", MTX_DEF); 1031 mtx_init(&sc->sc_sessions_lock, device_get_nameunit(dev), 1032 "CESA Sessions Pool", MTX_DEF); 1033 1034 /* Allocate I/O and IRQ resources */ 1035 error = bus_alloc_resources(dev, cesa_res_spec, sc->sc_res); 1036 if (error) { 1037 device_printf(dev, "could not allocate resources\n"); 1038 goto err0; 1039 } 1040 1041 sc->sc_bsh = rman_get_bushandle(*(sc->sc_res)); 1042 sc->sc_bst = rman_get_bustag(*(sc->sc_res)); 1043 1044 /* Setup interrupt handler */ 1045 error = bus_setup_intr(dev, sc->sc_res[1], INTR_TYPE_NET | INTR_MPSAFE, 1046 NULL, cesa_intr, sc, &(sc->sc_icookie)); 1047 if (error) { 1048 device_printf(dev, "could not setup engine completion irq\n"); 1049 goto err1; 1050 } 1051 1052 /* Create DMA tag for processed data */ 1053 error = bus_dma_tag_create(NULL, /* parent */ 1054 1, 0, /* alignment, boundary */ 1055 BUS_SPACE_MAXADDR_32BIT, /* lowaddr */ 1056 BUS_SPACE_MAXADDR, /* highaddr */ 1057 NULL, NULL, /* filtfunc, filtfuncarg */ 1058 CESA_MAX_REQUEST_SIZE, /* maxsize */ 1059 CESA_MAX_FRAGMENTS, /* nsegments */ 1060 CESA_MAX_REQUEST_SIZE, 0, /* maxsegsz, flags */ 1061 NULL, NULL, /* lockfunc, lockfuncarg */ 1062 &sc->sc_data_dtag); /* dmat */ 1063 if (error) 1064 goto err2; 1065 1066 /* Initialize data structures: TDMA Descriptors Pool */ 1067 error = cesa_alloc_dma_mem(sc, &sc->sc_tdesc_cdm, 1068 CESA_TDMA_DESCRIPTORS * sizeof(struct cesa_tdma_hdesc)); 1069 if (error) 1070 goto err3; 1071 1072 STAILQ_INIT(&sc->sc_free_tdesc); 1073 for (i = 0; i < CESA_TDMA_DESCRIPTORS; i++) { 1074 sc->sc_tdesc[i].ctd_cthd = 1075 (struct cesa_tdma_hdesc *)(sc->sc_tdesc_cdm.cdm_vaddr) + i; 1076 sc->sc_tdesc[i].ctd_cthd_paddr = sc->sc_tdesc_cdm.cdm_paddr + 1077 (i * sizeof(struct cesa_tdma_hdesc)); 1078 STAILQ_INSERT_TAIL(&sc->sc_free_tdesc, &sc->sc_tdesc[i], 1079 ctd_stq); 1080 } 1081 1082 /* Initialize data structures: SA Descriptors Pool */ 1083 error = cesa_alloc_dma_mem(sc, &sc->sc_sdesc_cdm, 1084 CESA_SA_DESCRIPTORS * sizeof(struct cesa_sa_hdesc)); 1085 if (error) 1086 goto err4; 1087 1088 STAILQ_INIT(&sc->sc_free_sdesc); 1089 for (i = 0; i < CESA_SA_DESCRIPTORS; i++) { 1090 sc->sc_sdesc[i].csd_cshd = 1091 (struct cesa_sa_hdesc *)(sc->sc_sdesc_cdm.cdm_vaddr) + i; 1092 sc->sc_sdesc[i].csd_cshd_paddr = sc->sc_sdesc_cdm.cdm_paddr + 1093 (i * sizeof(struct cesa_sa_hdesc)); 1094 STAILQ_INSERT_TAIL(&sc->sc_free_sdesc, &sc->sc_sdesc[i], 1095 csd_stq); 1096 } 1097 1098 /* Initialize data structures: Requests Pool */ 1099 error = cesa_alloc_dma_mem(sc, &sc->sc_requests_cdm, 1100 CESA_REQUESTS * sizeof(struct cesa_sa_data)); 1101 if (error) 1102 goto err5; 1103 1104 STAILQ_INIT(&sc->sc_free_requests); 1105 STAILQ_INIT(&sc->sc_ready_requests); 1106 STAILQ_INIT(&sc->sc_queued_requests); 1107 for (i = 0; i < CESA_REQUESTS; i++) { 1108 sc->sc_requests[i].cr_csd = 1109 (struct cesa_sa_data *)(sc->sc_requests_cdm.cdm_vaddr) + i; 1110 sc->sc_requests[i].cr_csd_paddr = 1111 sc->sc_requests_cdm.cdm_paddr + 1112 (i * sizeof(struct cesa_sa_data)); 1113 1114 /* Preallocate DMA maps */ 1115 error = bus_dmamap_create(sc->sc_data_dtag, 0, 1116 &sc->sc_requests[i].cr_dmap); 1117 if (error && i > 0) { 1118 i--; 1119 do { 1120 bus_dmamap_destroy(sc->sc_data_dtag, 1121 sc->sc_requests[i].cr_dmap); 1122 } while (i--); 1123 1124 goto err6; 1125 } 1126 1127 STAILQ_INSERT_TAIL(&sc->sc_free_requests, &sc->sc_requests[i], 1128 cr_stq); 1129 } 1130 1131 /* Initialize data structures: Sessions Pool */ 1132 STAILQ_INIT(&sc->sc_free_sessions); 1133 for (i = 0; i < CESA_SESSIONS; i++) { 1134 sc->sc_sessions[i].cs_sid = i; 1135 STAILQ_INSERT_TAIL(&sc->sc_free_sessions, &sc->sc_sessions[i], 1136 cs_stq); 1137 } 1138 1139 /* 1140 * Initialize TDMA: 1141 * - Burst limit: 128 bytes, 1142 * - Outstanding reads enabled, 1143 * - No byte-swap. 1144 */ 1145 CESA_WRITE(sc, CESA_TDMA_CR, CESA_TDMA_CR_DBL128 | CESA_TDMA_CR_SBL128 | 1146 CESA_TDMA_CR_ORDEN | CESA_TDMA_CR_NBS | CESA_TDMA_CR_ENABLE); 1147 1148 /* 1149 * Initialize SA: 1150 * - SA descriptor is present at beginning of CESA SRAM, 1151 * - Multi-packet chain mode, 1152 * - Cooperation with TDMA enabled. 1153 */ 1154 CESA_WRITE(sc, CESA_SA_DPR, 0); 1155 CESA_WRITE(sc, CESA_SA_CR, CESA_SA_CR_ACTIVATE_TDMA | 1156 CESA_SA_CR_WAIT_FOR_TDMA | CESA_SA_CR_MULTI_MODE); 1157 1158 /* Unmask interrupts */ 1159 CESA_WRITE(sc, CESA_ICR, 0); 1160 CESA_WRITE(sc, CESA_ICM, CESA_ICM_ACCTDMA | sc->sc_tperr); 1161 CESA_WRITE(sc, CESA_TDMA_ECR, 0); 1162 CESA_WRITE(sc, CESA_TDMA_EMR, CESA_TDMA_EMR_MISS | 1163 CESA_TDMA_EMR_DOUBLE_HIT | CESA_TDMA_EMR_BOTH_HIT | 1164 CESA_TDMA_EMR_DATA_ERROR); 1165 1166 /* Register in OCF */ 1167 sc->sc_cid = crypto_get_driverid(dev, CRYPTOCAP_F_HARDWARE); 1168 if (sc->sc_cid) { 1169 device_printf(dev, "could not get crypto driver id\n"); 1170 goto err7; 1171 } 1172 1173 crypto_register(sc->sc_cid, CRYPTO_AES_CBC, 0, 0); 1174 crypto_register(sc->sc_cid, CRYPTO_DES_CBC, 0, 0); 1175 crypto_register(sc->sc_cid, CRYPTO_3DES_CBC, 0, 0); 1176 crypto_register(sc->sc_cid, CRYPTO_MD5, 0, 0); 1177 crypto_register(sc->sc_cid, CRYPTO_MD5_HMAC, 0, 0); 1178 crypto_register(sc->sc_cid, CRYPTO_SHA1, 0, 0); 1179 crypto_register(sc->sc_cid, CRYPTO_SHA1_HMAC, 0, 0); 1180 1181 return (0); 1182err7: 1183 for (i = 0; i < CESA_REQUESTS; i++) 1184 bus_dmamap_destroy(sc->sc_data_dtag, 1185 sc->sc_requests[i].cr_dmap); 1186err6: 1187 cesa_free_dma_mem(&sc->sc_requests_cdm); 1188err5: 1189 cesa_free_dma_mem(&sc->sc_sdesc_cdm); 1190err4: 1191 cesa_free_dma_mem(&sc->sc_tdesc_cdm); 1192err3: 1193 bus_dma_tag_destroy(sc->sc_data_dtag); 1194err2: 1195 bus_teardown_intr(dev, sc->sc_res[1], sc->sc_icookie); 1196err1: 1197 bus_release_resources(dev, cesa_res_spec, sc->sc_res); 1198err0: 1199 mtx_destroy(&sc->sc_sessions_lock); 1200 mtx_destroy(&sc->sc_requests_lock); 1201 mtx_destroy(&sc->sc_sdesc_lock); 1202 mtx_destroy(&sc->sc_tdesc_lock); 1203 mtx_destroy(&sc->sc_sc_lock); 1204 return (ENXIO); 1205} 1206 1207static int 1208cesa_detach(device_t dev) 1209{ 1210 struct cesa_softc *sc; 1211 int i; 1212 1213 sc = device_get_softc(dev); 1214 1215 /* TODO: Wait for queued requests completion before shutdown. */ 1216 1217 /* Mask interrupts */ 1218 CESA_WRITE(sc, CESA_ICM, 0); 1219 CESA_WRITE(sc, CESA_TDMA_EMR, 0); 1220 1221 /* Unregister from OCF */ 1222 crypto_unregister_all(sc->sc_cid); 1223 1224 /* Free DMA Maps */ 1225 for (i = 0; i < CESA_REQUESTS; i++) 1226 bus_dmamap_destroy(sc->sc_data_dtag, 1227 sc->sc_requests[i].cr_dmap); 1228 1229 /* Free DMA Memory */ 1230 cesa_free_dma_mem(&sc->sc_requests_cdm); 1231 cesa_free_dma_mem(&sc->sc_sdesc_cdm); 1232 cesa_free_dma_mem(&sc->sc_tdesc_cdm); 1233 1234 /* Free DMA Tag */ 1235 bus_dma_tag_destroy(sc->sc_data_dtag); 1236 1237 /* Stop interrupt */ 1238 bus_teardown_intr(dev, sc->sc_res[1], sc->sc_icookie); 1239 1240 /* Relase I/O and IRQ resources */ 1241 bus_release_resources(dev, cesa_res_spec, sc->sc_res); 1242 1243 /* Destory mutexes */ 1244 mtx_destroy(&sc->sc_sessions_lock); 1245 mtx_destroy(&sc->sc_requests_lock); 1246 mtx_destroy(&sc->sc_sdesc_lock); 1247 mtx_destroy(&sc->sc_tdesc_lock); 1248 mtx_destroy(&sc->sc_sc_lock); 1249 1250 return (0); 1251} 1252 1253static void 1254cesa_intr(void *arg) 1255{ 1256 STAILQ_HEAD(, cesa_request) requests; 1257 struct cesa_request *cr, *tmp; 1258 struct cesa_softc *sc; 1259 uint32_t ecr, icr; 1260 int blocked; 1261 1262 sc = arg; 1263 1264 /* Ack interrupt */ 1265 ecr = CESA_READ(sc, CESA_TDMA_ECR); 1266 CESA_WRITE(sc, CESA_TDMA_ECR, 0); 1267 icr = CESA_READ(sc, CESA_ICR); 1268 CESA_WRITE(sc, CESA_ICR, 0); 1269 1270 /* Check for TDMA errors */ 1271 if (ecr & CESA_TDMA_ECR_MISS) { 1272 device_printf(sc->sc_dev, "TDMA Miss error detected!\n"); 1273 sc->sc_error = EIO; 1274 } 1275 1276 if (ecr & CESA_TDMA_ECR_DOUBLE_HIT) { 1277 device_printf(sc->sc_dev, "TDMA Double Hit error detected!\n"); 1278 sc->sc_error = EIO; 1279 } 1280 1281 if (ecr & CESA_TDMA_ECR_BOTH_HIT) { 1282 device_printf(sc->sc_dev, "TDMA Both Hit error detected!\n"); 1283 sc->sc_error = EIO; 1284 } 1285 1286 if (ecr & CESA_TDMA_ECR_DATA_ERROR) { 1287 device_printf(sc->sc_dev, "TDMA Data error detected!\n"); 1288 sc->sc_error = EIO; 1289 } 1290 1291 /* Check for CESA errors */ 1292 if (icr & sc->sc_tperr) { 1293 device_printf(sc->sc_dev, "CESA SRAM Parity error detected!\n"); 1294 sc->sc_error = EIO; 1295 } 1296 1297 /* If there is nothing more to do, return */ 1298 if ((icr & CESA_ICR_ACCTDMA) == 0) 1299 return; 1300 1301 /* Get all finished requests */ 1302 CESA_LOCK(sc, requests); 1303 STAILQ_INIT(&requests); 1304 STAILQ_CONCAT(&requests, &sc->sc_queued_requests); 1305 STAILQ_INIT(&sc->sc_queued_requests); 1306 CESA_UNLOCK(sc, requests); 1307 1308 /* Execute all ready requests */ 1309 cesa_execute(sc); 1310 1311 /* Process completed requests */ 1312 cesa_sync_dma_mem(&sc->sc_requests_cdm, BUS_DMASYNC_POSTREAD | 1313 BUS_DMASYNC_POSTWRITE); 1314 1315 STAILQ_FOREACH_SAFE(cr, &requests, cr_stq, tmp) { 1316 bus_dmamap_sync(sc->sc_data_dtag, cr->cr_dmap, 1317 BUS_DMASYNC_POSTREAD | BUS_DMASYNC_POSTWRITE); 1318 1319 cr->cr_crp->crp_etype = sc->sc_error; 1320 if (cr->cr_mac) 1321 crypto_copyback(cr->cr_crp->crp_flags, 1322 cr->cr_crp->crp_buf, cr->cr_mac->crd_inject, 1323 cr->cr_cs->cs_hlen, cr->cr_csd->csd_hash); 1324 1325 crypto_done(cr->cr_crp); 1326 cesa_free_request(sc, cr); 1327 } 1328 1329 cesa_sync_dma_mem(&sc->sc_requests_cdm, BUS_DMASYNC_PREREAD | 1330 BUS_DMASYNC_PREWRITE); 1331 1332 sc->sc_error = 0; 1333 1334 /* Unblock driver if it ran out of resources */ 1335 CESA_LOCK(sc, sc); 1336 blocked = sc->sc_blocked; 1337 sc->sc_blocked = 0; 1338 CESA_UNLOCK(sc, sc); 1339 1340 if (blocked) 1341 crypto_unblock(sc->sc_cid, blocked); 1342} 1343 1344static int 1345cesa_newsession(device_t dev, uint32_t *sidp, struct cryptoini *cri) 1346{ 1347 struct cesa_session *cs; 1348 struct cesa_softc *sc; 1349 struct cryptoini *enc; 1350 struct cryptoini *mac; 1351 int error; 1352 1353 sc = device_get_softc(dev); 1354 enc = NULL; 1355 mac = NULL; 1356 error = 0; 1357 1358 /* Check and parse input */ 1359 if (cesa_is_hash(cri->cri_alg)) 1360 mac = cri; 1361 else 1362 enc = cri; 1363 1364 cri = cri->cri_next; 1365 1366 if (cri) { 1367 if (!enc && !cesa_is_hash(cri->cri_alg)) 1368 enc = cri; 1369 1370 if (!mac && cesa_is_hash(cri->cri_alg)) 1371 mac = cri; 1372 1373 if (cri->cri_next || !(enc && mac)) 1374 return (EINVAL); 1375 } 1376 1377 if ((enc && (enc->cri_klen / 8) > CESA_MAX_KEY_LEN) || 1378 (mac && (mac->cri_klen / 8) > CESA_MAX_MKEY_LEN)) 1379 return (E2BIG); 1380 1381 /* Allocate session */ 1382 cs = cesa_alloc_session(sc); 1383 if (!cs) 1384 return (ENOMEM); 1385 1386 /* Prepare CESA configuration */ 1387 cs->cs_config = 0; 1388 cs->cs_ivlen = 1; 1389 cs->cs_mblen = 1; 1390 1391 if (enc) { 1392 switch (enc->cri_alg) { 1393 case CRYPTO_AES_CBC: 1394 cs->cs_config |= CESA_CSHD_AES | CESA_CSHD_CBC; 1395 cs->cs_ivlen = AES_BLOCK_LEN; 1396 break; 1397 case CRYPTO_DES_CBC: 1398 cs->cs_config |= CESA_CSHD_DES | CESA_CSHD_CBC; 1399 cs->cs_ivlen = DES_BLOCK_LEN; 1400 break; 1401 case CRYPTO_3DES_CBC: 1402 cs->cs_config |= CESA_CSHD_3DES | CESA_CSHD_3DES_EDE | 1403 CESA_CSHD_CBC; 1404 cs->cs_ivlen = DES3_BLOCK_LEN; 1405 break; 1406 default: 1407 error = EINVAL; 1408 break; 1409 } 1410 } 1411 1412 if (!error && mac) { 1413 switch (mac->cri_alg) { 1414 case CRYPTO_MD5: 1415 cs->cs_config |= CESA_CSHD_MD5; 1416 cs->cs_mblen = 1; 1417 cs->cs_hlen = MD5_HASH_LEN; 1418 break; 1419 case CRYPTO_MD5_HMAC: 1420 cs->cs_config |= CESA_CSHD_MD5_HMAC; 1421 cs->cs_mblen = MD5_HMAC_BLOCK_LEN; 1422 cs->cs_hlen = CESA_HMAC_HASH_LENGTH; 1423 break; 1424 case CRYPTO_SHA1: 1425 cs->cs_config |= CESA_CSHD_SHA1; 1426 cs->cs_mblen = 1; 1427 cs->cs_hlen = SHA1_HASH_LEN; 1428 break; 1429 case CRYPTO_SHA1_HMAC: 1430 cs->cs_config |= CESA_CSHD_SHA1_HMAC; 1431 cs->cs_mblen = SHA1_HMAC_BLOCK_LEN; 1432 cs->cs_hlen = CESA_HMAC_HASH_LENGTH; 1433 break; 1434 default: 1435 error = EINVAL; 1436 break; 1437 } 1438 } 1439 1440 /* Save cipher key */ 1441 if (!error && enc && enc->cri_key) { 1442 cs->cs_klen = enc->cri_klen / 8; 1443 memcpy(cs->cs_key, enc->cri_key, cs->cs_klen); 1444 if (enc->cri_alg == CRYPTO_AES_CBC) 1445 error = cesa_prep_aes_key(cs); 1446 } 1447 1448 /* Save digest key */ 1449 if (!error && mac && mac->cri_key) 1450 error = cesa_set_mkey(cs, mac->cri_alg, mac->cri_key, 1451 mac->cri_klen / 8); 1452 1453 if (error) { 1454 cesa_free_session(sc, cs); 1455 return (EINVAL); 1456 } 1457 1458 *sidp = cs->cs_sid; 1459 1460 return (0); 1461} 1462 1463static int 1464cesa_freesession(device_t dev, uint64_t tid) 1465{ 1466 struct cesa_session *cs; 1467 struct cesa_softc *sc; 1468 1469 sc = device_get_softc(dev); 1470 cs = cesa_get_session(sc, CRYPTO_SESID2LID(tid)); 1471 if (!cs) 1472 return (EINVAL); 1473 1474 /* Free session */ 1475 cesa_free_session(sc, cs); 1476 1477 return (0); 1478} 1479 1480static int 1481cesa_process(device_t dev, struct cryptop *crp, int hint) 1482{ 1483 struct cesa_request *cr; 1484 struct cesa_session *cs; 1485 struct cryptodesc *crd; 1486 struct cryptodesc *enc; 1487 struct cryptodesc *mac; 1488 struct cesa_softc *sc; 1489 int error; 1490 1491 sc = device_get_softc(dev); 1492 crd = crp->crp_desc; 1493 enc = NULL; 1494 mac = NULL; 1495 error = 0; 1496 1497 /* Check session ID */ 1498 cs = cesa_get_session(sc, CRYPTO_SESID2LID(crp->crp_sid)); 1499 if (!cs) { 1500 crp->crp_etype = EINVAL; 1501 crypto_done(crp); 1502 return (0); 1503 } 1504 1505 /* Check and parse input */ 1506 if (crp->crp_ilen > CESA_MAX_REQUEST_SIZE) { 1507 crp->crp_etype = E2BIG; 1508 crypto_done(crp); 1509 return (0); 1510 } 1511 1512 if (cesa_is_hash(crd->crd_alg)) 1513 mac = crd; 1514 else 1515 enc = crd; 1516 1517 crd = crd->crd_next; 1518 1519 if (crd) { 1520 if (!enc && !cesa_is_hash(crd->crd_alg)) 1521 enc = crd; 1522 1523 if (!mac && cesa_is_hash(crd->crd_alg)) 1524 mac = crd; 1525 1526 if (crd->crd_next || !(enc && mac)) { 1527 crp->crp_etype = EINVAL; 1528 crypto_done(crp); 1529 return (0); 1530 } 1531 } 1532 1533 /* 1534 * Get request descriptor. Block driver if there is no free 1535 * descriptors in pool. 1536 */ 1537 cr = cesa_alloc_request(sc); 1538 if (!cr) { 1539 CESA_LOCK(sc, sc); 1540 sc->sc_blocked = CRYPTO_SYMQ; 1541 CESA_UNLOCK(sc, sc); 1542 return (ERESTART); 1543 } 1544 1545 /* Prepare request */ 1546 cr->cr_crp = crp; 1547 cr->cr_enc = enc; 1548 cr->cr_mac = mac; 1549 cr->cr_cs = cs; 1550 1551 CESA_LOCK(sc, sessions); 1552 cesa_sync_desc(sc, BUS_DMASYNC_POSTREAD | BUS_DMASYNC_POSTWRITE); 1553 1554 if (enc && enc->crd_flags & CRD_F_ENCRYPT) { 1555 if (enc->crd_flags & CRD_F_IV_EXPLICIT) 1556 memcpy(cr->cr_csd->csd_iv, enc->crd_iv, cs->cs_ivlen); 1557 else 1558 arc4rand(cr->cr_csd->csd_iv, cs->cs_ivlen, 0); 1559 1560 if ((enc->crd_flags & CRD_F_IV_PRESENT) == 0) 1561 crypto_copyback(crp->crp_flags, crp->crp_buf, 1562 enc->crd_inject, cs->cs_ivlen, cr->cr_csd->csd_iv); 1563 } else if (enc) { 1564 if (enc->crd_flags & CRD_F_IV_EXPLICIT) 1565 memcpy(cr->cr_csd->csd_iv, enc->crd_iv, cs->cs_ivlen); 1566 else 1567 crypto_copydata(crp->crp_flags, crp->crp_buf, 1568 enc->crd_inject, cs->cs_ivlen, cr->cr_csd->csd_iv); 1569 } 1570 1571 if (enc && enc->crd_flags & CRD_F_KEY_EXPLICIT) { 1572 if ((enc->crd_klen / 8) <= CESA_MAX_KEY_LEN) { 1573 cs->cs_klen = enc->crd_klen / 8; 1574 memcpy(cs->cs_key, enc->crd_key, cs->cs_klen); 1575 if (enc->crd_alg == CRYPTO_AES_CBC) 1576 error = cesa_prep_aes_key(cs); 1577 } else 1578 error = E2BIG; 1579 } 1580 1581 if (!error && mac && mac->crd_flags & CRD_F_KEY_EXPLICIT) { 1582 if ((mac->crd_klen / 8) <= CESA_MAX_MKEY_LEN) 1583 error = cesa_set_mkey(cs, mac->crd_alg, mac->crd_key, 1584 mac->crd_klen / 8); 1585 else 1586 error = E2BIG; 1587 } 1588 1589 /* Convert request to chain of TDMA and SA descriptors */ 1590 if (!error) 1591 error = cesa_create_chain(sc, cr); 1592 1593 cesa_sync_desc(sc, BUS_DMASYNC_PREREAD | BUS_DMASYNC_PREWRITE); 1594 CESA_UNLOCK(sc, sessions); 1595 1596 if (error) { 1597 cesa_free_request(sc, cr); 1598 crp->crp_etype = error; 1599 crypto_done(crp); 1600 return (0); 1601 } 1602 1603 bus_dmamap_sync(sc->sc_data_dtag, cr->cr_dmap, BUS_DMASYNC_PREREAD | 1604 BUS_DMASYNC_PREWRITE); 1605 1606 /* Enqueue request to execution */ 1607 cesa_enqueue_request(sc, cr); 1608 1609 /* Start execution, if we have no more requests in queue */ 1610 if ((hint & CRYPTO_HINT_MORE) == 0) 1611 cesa_execute(sc); 1612 1613 return (0); 1614} 1615