| // SPDX-License-Identifier: GPL-2.0 |
| /* |
| * Copyright IBM Corp. 2012, 2019 |
| * Author(s): Holger Dengler <hd@linux.vnet.ibm.com> |
| */ |
| |
| #include <linux/module.h> |
| #include <linux/slab.h> |
| #include <linux/init.h> |
| #include <linux/err.h> |
| #include <linux/atomic.h> |
| #include <linux/uaccess.h> |
| #include <linux/mod_devicetable.h> |
| |
| #include "ap_bus.h" |
| #include "zcrypt_api.h" |
| #include "zcrypt_msgtype6.h" |
| #include "zcrypt_msgtype50.h" |
| #include "zcrypt_error.h" |
| #include "zcrypt_cex4.h" |
| #include "zcrypt_ccamisc.h" |
| #include "zcrypt_ep11misc.h" |
| |
| #define CEX4A_MIN_MOD_SIZE 1 /* 8 bits */ |
| #define CEX4A_MAX_MOD_SIZE_2K 256 /* 2048 bits */ |
| #define CEX4A_MAX_MOD_SIZE_4K 512 /* 4096 bits */ |
| |
| #define CEX4C_MIN_MOD_SIZE 16 /* 256 bits */ |
| #define CEX4C_MAX_MOD_SIZE 512 /* 4096 bits */ |
| |
| #define CEX4A_MAX_MESSAGE_SIZE MSGTYPE50_CRB3_MAX_MSG_SIZE |
| #define CEX4C_MAX_MESSAGE_SIZE MSGTYPE06_MAX_MSG_SIZE |
| |
| /* Waiting time for requests to be processed. |
| * Currently there are some types of request which are not deterministic. |
| * But the maximum time limit managed by the stomper code is set to 60sec. |
| * Hence we have to wait at least that time period. |
| */ |
| #define CEX4_CLEANUP_TIME (900*HZ) |
| |
| MODULE_AUTHOR("IBM Corporation"); |
| MODULE_DESCRIPTION("CEX4/CEX5/CEX6/CEX7 Cryptographic Card device driver, " \ |
| "Copyright IBM Corp. 2019"); |
| MODULE_LICENSE("GPL"); |
| |
| static struct ap_device_id zcrypt_cex4_card_ids[] = { |
| { .dev_type = AP_DEVICE_TYPE_CEX4, |
| .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE }, |
| { .dev_type = AP_DEVICE_TYPE_CEX5, |
| .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE }, |
| { .dev_type = AP_DEVICE_TYPE_CEX6, |
| .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE }, |
| { .dev_type = AP_DEVICE_TYPE_CEX7, |
| .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE }, |
| { /* end of list */ }, |
| }; |
| |
| MODULE_DEVICE_TABLE(ap, zcrypt_cex4_card_ids); |
| |
| static struct ap_device_id zcrypt_cex4_queue_ids[] = { |
| { .dev_type = AP_DEVICE_TYPE_CEX4, |
| .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE }, |
| { .dev_type = AP_DEVICE_TYPE_CEX5, |
| .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE }, |
| { .dev_type = AP_DEVICE_TYPE_CEX6, |
| .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE }, |
| { .dev_type = AP_DEVICE_TYPE_CEX7, |
| .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE }, |
| { /* end of list */ }, |
| }; |
| |
| MODULE_DEVICE_TABLE(ap, zcrypt_cex4_queue_ids); |
| |
| /* |
| * CCA card additional device attributes |
| */ |
| static ssize_t cca_serialnr_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| struct cca_info ci; |
| struct ap_card *ac = to_ap_card(dev); |
| struct zcrypt_card *zc = ac->private; |
| |
| memset(&ci, 0, sizeof(ci)); |
| |
| if (ap_domain_index >= 0) |
| cca_get_info(ac->id, ap_domain_index, &ci, zc->online); |
| |
| return scnprintf(buf, PAGE_SIZE, "%s\n", ci.serial); |
| } |
| |
| static struct device_attribute dev_attr_cca_serialnr = |
| __ATTR(serialnr, 0444, cca_serialnr_show, NULL); |
| |
| static struct attribute *cca_card_attrs[] = { |
| &dev_attr_cca_serialnr.attr, |
| NULL, |
| }; |
| |
| static const struct attribute_group cca_card_attr_grp = { |
| .attrs = cca_card_attrs, |
| }; |
| |
| /* |
| * CCA queue additional device attributes |
| */ |
| static ssize_t cca_mkvps_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| int n = 0; |
| struct cca_info ci; |
| struct zcrypt_queue *zq = to_ap_queue(dev)->private; |
| static const char * const cao_state[] = { "invalid", "valid" }; |
| static const char * const new_state[] = { "empty", "partial", "full" }; |
| |
| memset(&ci, 0, sizeof(ci)); |
| |
| cca_get_info(AP_QID_CARD(zq->queue->qid), |
| AP_QID_QUEUE(zq->queue->qid), |
| &ci, zq->online); |
| |
| if (ci.new_aes_mk_state >= '1' && ci.new_aes_mk_state <= '3') |
| n = scnprintf(buf, PAGE_SIZE, "AES NEW: %s 0x%016llx\n", |
| new_state[ci.new_aes_mk_state - '1'], |
| ci.new_aes_mkvp); |
| else |
| n = scnprintf(buf, PAGE_SIZE, "AES NEW: - -\n"); |
| |
| if (ci.cur_aes_mk_state >= '1' && ci.cur_aes_mk_state <= '2') |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "AES CUR: %s 0x%016llx\n", |
| cao_state[ci.cur_aes_mk_state - '1'], |
| ci.cur_aes_mkvp); |
| else |
| n += scnprintf(buf + n, PAGE_SIZE - n, "AES CUR: - -\n"); |
| |
| if (ci.old_aes_mk_state >= '1' && ci.old_aes_mk_state <= '2') |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "AES OLD: %s 0x%016llx\n", |
| cao_state[ci.old_aes_mk_state - '1'], |
| ci.old_aes_mkvp); |
| else |
| n += scnprintf(buf + n, PAGE_SIZE - n, "AES OLD: - -\n"); |
| |
| if (ci.new_apka_mk_state >= '1' && ci.new_apka_mk_state <= '3') |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "APKA NEW: %s 0x%016llx\n", |
| new_state[ci.new_apka_mk_state - '1'], |
| ci.new_apka_mkvp); |
| else |
| n += scnprintf(buf + n, PAGE_SIZE - n, "APKA NEW: - -\n"); |
| |
| if (ci.cur_apka_mk_state >= '1' && ci.cur_apka_mk_state <= '2') |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "APKA CUR: %s 0x%016llx\n", |
| cao_state[ci.cur_apka_mk_state - '1'], |
| ci.cur_apka_mkvp); |
| else |
| n += scnprintf(buf + n, PAGE_SIZE - n, "APKA CUR: - -\n"); |
| |
| if (ci.old_apka_mk_state >= '1' && ci.old_apka_mk_state <= '2') |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "APKA OLD: %s 0x%016llx\n", |
| cao_state[ci.old_apka_mk_state - '1'], |
| ci.old_apka_mkvp); |
| else |
| n += scnprintf(buf + n, PAGE_SIZE - n, "APKA OLD: - -\n"); |
| |
| return n; |
| } |
| |
| static struct device_attribute dev_attr_cca_mkvps = |
| __ATTR(mkvps, 0444, cca_mkvps_show, NULL); |
| |
| static struct attribute *cca_queue_attrs[] = { |
| &dev_attr_cca_mkvps.attr, |
| NULL, |
| }; |
| |
| static const struct attribute_group cca_queue_attr_grp = { |
| .attrs = cca_queue_attrs, |
| }; |
| |
| /* |
| * EP11 card additional device attributes |
| */ |
| static ssize_t ep11_api_ordinalnr_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| struct ep11_card_info ci; |
| struct ap_card *ac = to_ap_card(dev); |
| struct zcrypt_card *zc = ac->private; |
| |
| memset(&ci, 0, sizeof(ci)); |
| |
| ep11_get_card_info(ac->id, &ci, zc->online); |
| |
| if (ci.API_ord_nr > 0) |
| return scnprintf(buf, PAGE_SIZE, "%u\n", ci.API_ord_nr); |
| else |
| return scnprintf(buf, PAGE_SIZE, "\n"); |
| } |
| |
| static struct device_attribute dev_attr_ep11_api_ordinalnr = |
| __ATTR(API_ordinalnr, 0444, ep11_api_ordinalnr_show, NULL); |
| |
| static ssize_t ep11_fw_version_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| struct ep11_card_info ci; |
| struct ap_card *ac = to_ap_card(dev); |
| struct zcrypt_card *zc = ac->private; |
| |
| memset(&ci, 0, sizeof(ci)); |
| |
| ep11_get_card_info(ac->id, &ci, zc->online); |
| |
| if (ci.FW_version > 0) |
| return scnprintf(buf, PAGE_SIZE, "%d.%d\n", |
| (int)(ci.FW_version >> 8), |
| (int)(ci.FW_version & 0xFF)); |
| else |
| return scnprintf(buf, PAGE_SIZE, "\n"); |
| } |
| |
| static struct device_attribute dev_attr_ep11_fw_version = |
| __ATTR(FW_version, 0444, ep11_fw_version_show, NULL); |
| |
| static ssize_t ep11_serialnr_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| struct ep11_card_info ci; |
| struct ap_card *ac = to_ap_card(dev); |
| struct zcrypt_card *zc = ac->private; |
| |
| memset(&ci, 0, sizeof(ci)); |
| |
| ep11_get_card_info(ac->id, &ci, zc->online); |
| |
| if (ci.serial[0]) |
| return scnprintf(buf, PAGE_SIZE, "%16.16s\n", ci.serial); |
| else |
| return scnprintf(buf, PAGE_SIZE, "\n"); |
| } |
| |
| static struct device_attribute dev_attr_ep11_serialnr = |
| __ATTR(serialnr, 0444, ep11_serialnr_show, NULL); |
| |
| static const struct { |
| int mode_bit; |
| const char *mode_txt; |
| } ep11_op_modes[] = { |
| { 0, "FIPS2009" }, |
| { 1, "BSI2009" }, |
| { 2, "FIPS2011" }, |
| { 3, "BSI2011" }, |
| { 6, "BSICC2017" }, |
| { 0, NULL } |
| }; |
| |
| static ssize_t ep11_card_op_modes_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| int i, n = 0; |
| struct ep11_card_info ci; |
| struct ap_card *ac = to_ap_card(dev); |
| struct zcrypt_card *zc = ac->private; |
| |
| memset(&ci, 0, sizeof(ci)); |
| |
| ep11_get_card_info(ac->id, &ci, zc->online); |
| |
| for (i = 0; ep11_op_modes[i].mode_txt; i++) { |
| if (ci.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) { |
| if (n > 0) |
| buf[n++] = ' '; |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "%s", ep11_op_modes[i].mode_txt); |
| } |
| } |
| n += scnprintf(buf + n, PAGE_SIZE - n, "\n"); |
| |
| return n; |
| } |
| |
| static struct device_attribute dev_attr_ep11_card_op_modes = |
| __ATTR(op_modes, 0444, ep11_card_op_modes_show, NULL); |
| |
| static struct attribute *ep11_card_attrs[] = { |
| &dev_attr_ep11_api_ordinalnr.attr, |
| &dev_attr_ep11_fw_version.attr, |
| &dev_attr_ep11_serialnr.attr, |
| &dev_attr_ep11_card_op_modes.attr, |
| NULL, |
| }; |
| |
| static const struct attribute_group ep11_card_attr_grp = { |
| .attrs = ep11_card_attrs, |
| }; |
| |
| /* |
| * EP11 queue additional device attributes |
| */ |
| |
| static ssize_t ep11_mkvps_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| int n = 0; |
| struct ep11_domain_info di; |
| struct zcrypt_queue *zq = to_ap_queue(dev)->private; |
| static const char * const cwk_state[] = { "invalid", "valid" }; |
| static const char * const nwk_state[] = { "empty", "uncommitted", |
| "committed" }; |
| |
| memset(&di, 0, sizeof(di)); |
| |
| if (zq->online) |
| ep11_get_domain_info(AP_QID_CARD(zq->queue->qid), |
| AP_QID_QUEUE(zq->queue->qid), |
| &di); |
| |
| if (di.cur_wk_state == '0') { |
| n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s -\n", |
| cwk_state[di.cur_wk_state - '0']); |
| } else if (di.cur_wk_state == '1') { |
| n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s 0x", |
| cwk_state[di.cur_wk_state - '0']); |
| bin2hex(buf + n, di.cur_wkvp, sizeof(di.cur_wkvp)); |
| n += 2 * sizeof(di.cur_wkvp); |
| n += scnprintf(buf + n, PAGE_SIZE - n, "\n"); |
| } else |
| n = scnprintf(buf, PAGE_SIZE, "WK CUR: - -\n"); |
| |
| if (di.new_wk_state == '0') { |
| n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s -\n", |
| nwk_state[di.new_wk_state - '0']); |
| } else if (di.new_wk_state >= '1' && di.new_wk_state <= '2') { |
| n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s 0x", |
| nwk_state[di.new_wk_state - '0']); |
| bin2hex(buf + n, di.new_wkvp, sizeof(di.new_wkvp)); |
| n += 2 * sizeof(di.new_wkvp); |
| n += scnprintf(buf + n, PAGE_SIZE - n, "\n"); |
| } else |
| n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: - -\n"); |
| |
| return n; |
| } |
| |
| static struct device_attribute dev_attr_ep11_mkvps = |
| __ATTR(mkvps, 0444, ep11_mkvps_show, NULL); |
| |
| static ssize_t ep11_queue_op_modes_show(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| int i, n = 0; |
| struct ep11_domain_info di; |
| struct zcrypt_queue *zq = to_ap_queue(dev)->private; |
| |
| memset(&di, 0, sizeof(di)); |
| |
| if (zq->online) |
| ep11_get_domain_info(AP_QID_CARD(zq->queue->qid), |
| AP_QID_QUEUE(zq->queue->qid), |
| &di); |
| |
| for (i = 0; ep11_op_modes[i].mode_txt; i++) { |
| if (di.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) { |
| if (n > 0) |
| buf[n++] = ' '; |
| n += scnprintf(buf + n, PAGE_SIZE - n, |
| "%s", ep11_op_modes[i].mode_txt); |
| } |
| } |
| n += scnprintf(buf + n, PAGE_SIZE - n, "\n"); |
| |
| return n; |
| } |
| |
| static struct device_attribute dev_attr_ep11_queue_op_modes = |
| __ATTR(op_modes, 0444, ep11_queue_op_modes_show, NULL); |
| |
| static struct attribute *ep11_queue_attrs[] = { |
| &dev_attr_ep11_mkvps.attr, |
| &dev_attr_ep11_queue_op_modes.attr, |
| NULL, |
| }; |
| |
| static const struct attribute_group ep11_queue_attr_grp = { |
| .attrs = ep11_queue_attrs, |
| }; |
| |
| /** |
| * Probe function for CEX4/CEX5/CEX6/CEX7 card device. It always |
| * accepts the AP device since the bus_match already checked |
| * the hardware type. |
| * @ap_dev: pointer to the AP device. |
| */ |
| static int zcrypt_cex4_card_probe(struct ap_device *ap_dev) |
| { |
| /* |
| * Normalized speed ratings per crypto adapter |
| * MEX_1k, MEX_2k, MEX_4k, CRT_1k, CRT_2k, CRT_4k, RNG, SECKEY |
| */ |
| static const int CEX4A_SPEED_IDX[NUM_OPS] = { |
| 14, 19, 249, 42, 228, 1458, 0, 0}; |
| static const int CEX5A_SPEED_IDX[NUM_OPS] = { |
| 8, 9, 20, 18, 66, 458, 0, 0}; |
| static const int CEX6A_SPEED_IDX[NUM_OPS] = { |
| 6, 9, 20, 17, 65, 438, 0, 0}; |
| static const int CEX7A_SPEED_IDX[NUM_OPS] = { |
| 6, 8, 17, 15, 54, 362, 0, 0}; |
| |
| static const int CEX4C_SPEED_IDX[NUM_OPS] = { |
| 59, 69, 308, 83, 278, 2204, 209, 40}; |
| static const int CEX5C_SPEED_IDX[] = { |
| 24, 31, 50, 37, 90, 479, 27, 10}; |
| static const int CEX6C_SPEED_IDX[NUM_OPS] = { |
| 16, 20, 32, 27, 77, 455, 24, 9}; |
| static const int CEX7C_SPEED_IDX[NUM_OPS] = { |
| 14, 16, 26, 23, 64, 376, 23, 8}; |
| |
| static const int CEX4P_SPEED_IDX[NUM_OPS] = { |
| 0, 0, 0, 0, 0, 0, 0, 50}; |
| static const int CEX5P_SPEED_IDX[NUM_OPS] = { |
| 0, 0, 0, 0, 0, 0, 0, 10}; |
| static const int CEX6P_SPEED_IDX[NUM_OPS] = { |
| 0, 0, 0, 0, 0, 0, 0, 9}; |
| static const int CEX7P_SPEED_IDX[NUM_OPS] = { |
| 0, 0, 0, 0, 0, 0, 0, 8}; |
| |
| struct ap_card *ac = to_ap_card(&ap_dev->device); |
| struct zcrypt_card *zc; |
| int rc = 0; |
| |
| zc = zcrypt_card_alloc(); |
| if (!zc) |
| return -ENOMEM; |
| zc->card = ac; |
| ac->private = zc; |
| if (ap_test_bit(&ac->functions, AP_FUNC_ACCEL)) { |
| if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) { |
| zc->type_string = "CEX4A"; |
| zc->user_space_type = ZCRYPT_CEX4; |
| zc->speed_rating = CEX4A_SPEED_IDX; |
| } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) { |
| zc->type_string = "CEX5A"; |
| zc->user_space_type = ZCRYPT_CEX5; |
| zc->speed_rating = CEX5A_SPEED_IDX; |
| } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) { |
| zc->type_string = "CEX6A"; |
| zc->user_space_type = ZCRYPT_CEX6; |
| zc->speed_rating = CEX6A_SPEED_IDX; |
| } else { |
| zc->type_string = "CEX7A"; |
| /* wrong user space type, just for compatibility |
| * with the ZCRYPT_STATUS_MASK ioctl. |
| */ |
| zc->user_space_type = ZCRYPT_CEX6; |
| zc->speed_rating = CEX7A_SPEED_IDX; |
| } |
| zc->min_mod_size = CEX4A_MIN_MOD_SIZE; |
| if (ap_test_bit(&ac->functions, AP_FUNC_MEX4K) && |
| ap_test_bit(&ac->functions, AP_FUNC_CRT4K)) { |
| zc->max_mod_size = CEX4A_MAX_MOD_SIZE_4K; |
| zc->max_exp_bit_length = |
| CEX4A_MAX_MOD_SIZE_4K; |
| } else { |
| zc->max_mod_size = CEX4A_MAX_MOD_SIZE_2K; |
| zc->max_exp_bit_length = |
| CEX4A_MAX_MOD_SIZE_2K; |
| } |
| } else if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) { |
| if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) { |
| zc->type_string = "CEX4C"; |
| /* wrong user space type, must be CEX4 |
| * just keep it for cca compatibility |
| */ |
| zc->user_space_type = ZCRYPT_CEX3C; |
| zc->speed_rating = CEX4C_SPEED_IDX; |
| } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) { |
| zc->type_string = "CEX5C"; |
| /* wrong user space type, must be CEX5 |
| * just keep it for cca compatibility |
| */ |
| zc->user_space_type = ZCRYPT_CEX3C; |
| zc->speed_rating = CEX5C_SPEED_IDX; |
| } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) { |
| zc->type_string = "CEX6C"; |
| /* wrong user space type, must be CEX6 |
| * just keep it for cca compatibility |
| */ |
| zc->user_space_type = ZCRYPT_CEX3C; |
| zc->speed_rating = CEX6C_SPEED_IDX; |
| } else { |
| zc->type_string = "CEX7C"; |
| /* wrong user space type, must be CEX7 |
| * just keep it for cca compatibility |
| */ |
| zc->user_space_type = ZCRYPT_CEX3C; |
| zc->speed_rating = CEX7C_SPEED_IDX; |
| } |
| zc->min_mod_size = CEX4C_MIN_MOD_SIZE; |
| zc->max_mod_size = CEX4C_MAX_MOD_SIZE; |
| zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE; |
| } else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) { |
| if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) { |
| zc->type_string = "CEX4P"; |
| zc->user_space_type = ZCRYPT_CEX4; |
| zc->speed_rating = CEX4P_SPEED_IDX; |
| } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) { |
| zc->type_string = "CEX5P"; |
| zc->user_space_type = ZCRYPT_CEX5; |
| zc->speed_rating = CEX5P_SPEED_IDX; |
| } else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) { |
| zc->type_string = "CEX6P"; |
| zc->user_space_type = ZCRYPT_CEX6; |
| zc->speed_rating = CEX6P_SPEED_IDX; |
| } else { |
| zc->type_string = "CEX7P"; |
| /* wrong user space type, just for compatibility |
| * with the ZCRYPT_STATUS_MASK ioctl. |
| */ |
| zc->user_space_type = ZCRYPT_CEX6; |
| zc->speed_rating = CEX7P_SPEED_IDX; |
| } |
| zc->min_mod_size = CEX4C_MIN_MOD_SIZE; |
| zc->max_mod_size = CEX4C_MAX_MOD_SIZE; |
| zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE; |
| } else { |
| zcrypt_card_free(zc); |
| return -ENODEV; |
| } |
| zc->online = 1; |
| |
| rc = zcrypt_card_register(zc); |
| if (rc) { |
| ac->private = NULL; |
| zcrypt_card_free(zc); |
| return rc; |
| } |
| |
| if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) { |
| rc = sysfs_create_group(&ap_dev->device.kobj, |
| &cca_card_attr_grp); |
| if (rc) { |
| zcrypt_card_unregister(zc); |
| ac->private = NULL; |
| zcrypt_card_free(zc); |
| } |
| } else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) { |
| rc = sysfs_create_group(&ap_dev->device.kobj, |
| &ep11_card_attr_grp); |
| if (rc) { |
| zcrypt_card_unregister(zc); |
| ac->private = NULL; |
| zcrypt_card_free(zc); |
| } |
| } |
| |
| return rc; |
| } |
| |
| /** |
| * This is called to remove the CEX4/CEX5/CEX6/CEX7 card driver |
| * information if an AP card device is removed. |
| */ |
| static void zcrypt_cex4_card_remove(struct ap_device *ap_dev) |
| { |
| struct ap_card *ac = to_ap_card(&ap_dev->device); |
| struct zcrypt_card *zc = ac->private; |
| |
| if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) |
| sysfs_remove_group(&ap_dev->device.kobj, &cca_card_attr_grp); |
| else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) |
| sysfs_remove_group(&ap_dev->device.kobj, &ep11_card_attr_grp); |
| if (zc) |
| zcrypt_card_unregister(zc); |
| } |
| |
| static struct ap_driver zcrypt_cex4_card_driver = { |
| .probe = zcrypt_cex4_card_probe, |
| .remove = zcrypt_cex4_card_remove, |
| .ids = zcrypt_cex4_card_ids, |
| .flags = AP_DRIVER_FLAG_DEFAULT, |
| }; |
| |
| /** |
| * Probe function for CEX4/CEX5/CEX6/CEX7 queue device. It always |
| * accepts the AP device since the bus_match already checked |
| * the hardware type. |
| * @ap_dev: pointer to the AP device. |
| */ |
| static int zcrypt_cex4_queue_probe(struct ap_device *ap_dev) |
| { |
| struct ap_queue *aq = to_ap_queue(&ap_dev->device); |
| struct zcrypt_queue *zq; |
| int rc; |
| |
| if (ap_test_bit(&aq->card->functions, AP_FUNC_ACCEL)) { |
| zq = zcrypt_queue_alloc(CEX4A_MAX_MESSAGE_SIZE); |
| if (!zq) |
| return -ENOMEM; |
| zq->ops = zcrypt_msgtype(MSGTYPE50_NAME, |
| MSGTYPE50_VARIANT_DEFAULT); |
| } else if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) { |
| zq = zcrypt_queue_alloc(CEX4C_MAX_MESSAGE_SIZE); |
| if (!zq) |
| return -ENOMEM; |
| zq->ops = zcrypt_msgtype(MSGTYPE06_NAME, |
| MSGTYPE06_VARIANT_DEFAULT); |
| } else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) { |
| zq = zcrypt_queue_alloc(CEX4C_MAX_MESSAGE_SIZE); |
| if (!zq) |
| return -ENOMEM; |
| zq->ops = zcrypt_msgtype(MSGTYPE06_NAME, |
| MSGTYPE06_VARIANT_EP11); |
| } else { |
| return -ENODEV; |
| } |
| |
| zq->queue = aq; |
| zq->online = 1; |
| atomic_set(&zq->load, 0); |
| ap_queue_init_state(aq); |
| ap_queue_init_reply(aq, &zq->reply); |
| aq->request_timeout = CEX4_CLEANUP_TIME; |
| aq->private = zq; |
| rc = zcrypt_queue_register(zq); |
| if (rc) { |
| aq->private = NULL; |
| zcrypt_queue_free(zq); |
| return rc; |
| } |
| |
| if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) { |
| rc = sysfs_create_group(&ap_dev->device.kobj, |
| &cca_queue_attr_grp); |
| if (rc) { |
| zcrypt_queue_unregister(zq); |
| aq->private = NULL; |
| zcrypt_queue_free(zq); |
| } |
| } else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) { |
| rc = sysfs_create_group(&ap_dev->device.kobj, |
| &ep11_queue_attr_grp); |
| if (rc) { |
| zcrypt_queue_unregister(zq); |
| aq->private = NULL; |
| zcrypt_queue_free(zq); |
| } |
| } |
| |
| return rc; |
| } |
| |
| /** |
| * This is called to remove the CEX4/CEX5/CEX6/CEX7 queue driver |
| * information if an AP queue device is removed. |
| */ |
| static void zcrypt_cex4_queue_remove(struct ap_device *ap_dev) |
| { |
| struct ap_queue *aq = to_ap_queue(&ap_dev->device); |
| struct zcrypt_queue *zq = aq->private; |
| |
| if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) |
| sysfs_remove_group(&ap_dev->device.kobj, &cca_queue_attr_grp); |
| else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) |
| sysfs_remove_group(&ap_dev->device.kobj, &ep11_queue_attr_grp); |
| if (zq) |
| zcrypt_queue_unregister(zq); |
| } |
| |
| static struct ap_driver zcrypt_cex4_queue_driver = { |
| .probe = zcrypt_cex4_queue_probe, |
| .remove = zcrypt_cex4_queue_remove, |
| .ids = zcrypt_cex4_queue_ids, |
| .flags = AP_DRIVER_FLAG_DEFAULT, |
| }; |
| |
| int __init zcrypt_cex4_init(void) |
| { |
| int rc; |
| |
| rc = ap_driver_register(&zcrypt_cex4_card_driver, |
| THIS_MODULE, "cex4card"); |
| if (rc) |
| return rc; |
| |
| rc = ap_driver_register(&zcrypt_cex4_queue_driver, |
| THIS_MODULE, "cex4queue"); |
| if (rc) |
| ap_driver_unregister(&zcrypt_cex4_card_driver); |
| |
| return rc; |
| } |
| |
| void __exit zcrypt_cex4_exit(void) |
| { |
| ap_driver_unregister(&zcrypt_cex4_queue_driver); |
| ap_driver_unregister(&zcrypt_cex4_card_driver); |
| } |
| |
| module_init(zcrypt_cex4_init); |
| module_exit(zcrypt_cex4_exit); |