Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v5.0-rc5 767 lines 19 kB view raw
1/* 2 * Copyright (C) 2016 Pengutronix, Steffen Trumtrar <kernel@pengutronix.de> 3 * 4 * The driver is based on information gathered from 5 * drivers/mxc/security/mxc_scc.c which can be found in 6 * the Freescale linux-2.6-imx.git in the imx_2.6.35_maintain branch. 7 * 8 * This program is free software; you can redistribute it and/or 9 * modify it under the terms of the GNU General Public License 10 * version 2, as published by the Free Software Foundation. 11 * 12 * This program is distributed in the hope that it will be useful, 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 15 * GNU General Public License for more details. 16 * 17 */ 18#include <linux/clk.h> 19#include <linux/crypto.h> 20#include <linux/interrupt.h> 21#include <linux/io.h> 22#include <linux/irq.h> 23#include <linux/kernel.h> 24#include <linux/module.h> 25#include <linux/mutex.h> 26#include <linux/of.h> 27#include <linux/of_device.h> 28#include <linux/platform_device.h> 29 30#include <crypto/algapi.h> 31#include <crypto/des.h> 32 33/* Secure Memory (SCM) registers */ 34#define SCC_SCM_RED_START 0x0000 35#define SCC_SCM_BLACK_START 0x0004 36#define SCC_SCM_LENGTH 0x0008 37#define SCC_SCM_CTRL 0x000C 38#define SCC_SCM_STATUS 0x0010 39#define SCC_SCM_ERROR_STATUS 0x0014 40#define SCC_SCM_INTR_CTRL 0x0018 41#define SCC_SCM_CFG 0x001C 42#define SCC_SCM_INIT_VECTOR_0 0x0020 43#define SCC_SCM_INIT_VECTOR_1 0x0024 44#define SCC_SCM_RED_MEMORY 0x0400 45#define SCC_SCM_BLACK_MEMORY 0x0800 46 47/* Security Monitor (SMN) Registers */ 48#define SCC_SMN_STATUS 0x1000 49#define SCC_SMN_COMMAND 0x1004 50#define SCC_SMN_SEQ_START 0x1008 51#define SCC_SMN_SEQ_END 0x100C 52#define SCC_SMN_SEQ_CHECK 0x1010 53#define SCC_SMN_BIT_COUNT 0x1014 54#define SCC_SMN_BITBANK_INC_SIZE 0x1018 55#define SCC_SMN_BITBANK_DECREMENT 0x101C 56#define SCC_SMN_COMPARE_SIZE 0x1020 57#define SCC_SMN_PLAINTEXT_CHECK 0x1024 58#define SCC_SMN_CIPHERTEXT_CHECK 0x1028 59#define SCC_SMN_TIMER_IV 0x102C 60#define SCC_SMN_TIMER_CONTROL 0x1030 61#define SCC_SMN_DEBUG_DETECT_STAT 0x1034 62#define SCC_SMN_TIMER 0x1038 63 64#define SCC_SCM_CTRL_START_CIPHER BIT(2) 65#define SCC_SCM_CTRL_CBC_MODE BIT(1) 66#define SCC_SCM_CTRL_DECRYPT_MODE BIT(0) 67 68#define SCC_SCM_STATUS_LEN_ERR BIT(12) 69#define SCC_SCM_STATUS_SMN_UNBLOCKED BIT(11) 70#define SCC_SCM_STATUS_CIPHERING_DONE BIT(10) 71#define SCC_SCM_STATUS_ZEROIZING_DONE BIT(9) 72#define SCC_SCM_STATUS_INTR_STATUS BIT(8) 73#define SCC_SCM_STATUS_SEC_KEY BIT(7) 74#define SCC_SCM_STATUS_INTERNAL_ERR BIT(6) 75#define SCC_SCM_STATUS_BAD_SEC_KEY BIT(5) 76#define SCC_SCM_STATUS_ZEROIZE_FAIL BIT(4) 77#define SCC_SCM_STATUS_SMN_BLOCKED BIT(3) 78#define SCC_SCM_STATUS_CIPHERING BIT(2) 79#define SCC_SCM_STATUS_ZEROIZING BIT(1) 80#define SCC_SCM_STATUS_BUSY BIT(0) 81 82#define SCC_SMN_STATUS_STATE_MASK 0x0000001F 83#define SCC_SMN_STATE_START 0x0 84/* The SMN is zeroizing its RAM during reset */ 85#define SCC_SMN_STATE_ZEROIZE_RAM 0x5 86/* SMN has passed internal checks */ 87#define SCC_SMN_STATE_HEALTH_CHECK 0x6 88/* Fatal Security Violation. SMN is locked, SCM is inoperative. */ 89#define SCC_SMN_STATE_FAIL 0x9 90/* SCC is in secure state. SCM is using secret key. */ 91#define SCC_SMN_STATE_SECURE 0xA 92/* SCC is not secure. SCM is using default key. */ 93#define SCC_SMN_STATE_NON_SECURE 0xC 94 95#define SCC_SCM_INTR_CTRL_ZEROIZE_MEM BIT(2) 96#define SCC_SCM_INTR_CTRL_CLR_INTR BIT(1) 97#define SCC_SCM_INTR_CTRL_MASK_INTR BIT(0) 98 99/* Size, in blocks, of Red memory. */ 100#define SCC_SCM_CFG_BLACK_SIZE_MASK 0x07fe0000 101#define SCC_SCM_CFG_BLACK_SIZE_SHIFT 17 102/* Size, in blocks, of Black memory. */ 103#define SCC_SCM_CFG_RED_SIZE_MASK 0x0001ff80 104#define SCC_SCM_CFG_RED_SIZE_SHIFT 7 105/* Number of bytes per block. */ 106#define SCC_SCM_CFG_BLOCK_SIZE_MASK 0x0000007f 107 108#define SCC_SMN_COMMAND_TAMPER_LOCK BIT(4) 109#define SCC_SMN_COMMAND_CLR_INTR BIT(3) 110#define SCC_SMN_COMMAND_CLR_BIT_BANK BIT(2) 111#define SCC_SMN_COMMAND_EN_INTR BIT(1) 112#define SCC_SMN_COMMAND_SET_SOFTWARE_ALARM BIT(0) 113 114#define SCC_KEY_SLOTS 20 115#define SCC_MAX_KEY_SIZE 32 116#define SCC_KEY_SLOT_SIZE 32 117 118#define SCC_CRC_CCITT_START 0xFFFF 119 120/* 121 * Offset into each RAM of the base of the area which is not 122 * used for Stored Keys. 123 */ 124#define SCC_NON_RESERVED_OFFSET (SCC_KEY_SLOTS * SCC_KEY_SLOT_SIZE) 125 126/* Fixed padding for appending to plaintext to fill out a block */ 127static char scc_block_padding[8] = { 0x80, 0, 0, 0, 0, 0, 0, 0 }; 128 129enum mxc_scc_state { 130 SCC_STATE_OK, 131 SCC_STATE_UNIMPLEMENTED, 132 SCC_STATE_FAILED 133}; 134 135struct mxc_scc { 136 struct device *dev; 137 void __iomem *base; 138 struct clk *clk; 139 bool hw_busy; 140 spinlock_t lock; 141 struct crypto_queue queue; 142 struct crypto_async_request *req; 143 int block_size_bytes; 144 int black_ram_size_blocks; 145 int memory_size_bytes; 146 int bytes_remaining; 147 148 void __iomem *red_memory; 149 void __iomem *black_memory; 150}; 151 152struct mxc_scc_ctx { 153 struct mxc_scc *scc; 154 struct scatterlist *sg_src; 155 size_t src_nents; 156 struct scatterlist *sg_dst; 157 size_t dst_nents; 158 unsigned int offset; 159 unsigned int size; 160 unsigned int ctrl; 161}; 162 163struct mxc_scc_crypto_tmpl { 164 struct mxc_scc *scc; 165 struct crypto_alg alg; 166}; 167 168static int mxc_scc_get_data(struct mxc_scc_ctx *ctx, 169 struct crypto_async_request *req) 170{ 171 struct ablkcipher_request *ablkreq = ablkcipher_request_cast(req); 172 struct mxc_scc *scc = ctx->scc; 173 size_t len; 174 void __iomem *from; 175 176 if (ctx->ctrl & SCC_SCM_CTRL_DECRYPT_MODE) 177 from = scc->red_memory; 178 else 179 from = scc->black_memory; 180 181 dev_dbg(scc->dev, "pcopy: from 0x%p %zu bytes\n", from, 182 ctx->dst_nents * 8); 183 len = sg_pcopy_from_buffer(ablkreq->dst, ctx->dst_nents, 184 from, ctx->size, ctx->offset); 185 if (!len) { 186 dev_err(scc->dev, "pcopy err from 0x%p (len=%zu)\n", from, len); 187 return -EINVAL; 188 } 189 190#ifdef DEBUG 191 print_hex_dump(KERN_ERR, 192 "red memory@"__stringify(__LINE__)": ", 193 DUMP_PREFIX_ADDRESS, 16, 4, 194 scc->red_memory, ctx->size, 1); 195 print_hex_dump(KERN_ERR, 196 "black memory@"__stringify(__LINE__)": ", 197 DUMP_PREFIX_ADDRESS, 16, 4, 198 scc->black_memory, ctx->size, 1); 199#endif 200 201 ctx->offset += len; 202 203 if (ctx->offset < ablkreq->nbytes) 204 return -EINPROGRESS; 205 206 return 0; 207} 208 209static int mxc_scc_ablkcipher_req_init(struct ablkcipher_request *req, 210 struct mxc_scc_ctx *ctx) 211{ 212 struct mxc_scc *scc = ctx->scc; 213 int nents; 214 215 nents = sg_nents_for_len(req->src, req->nbytes); 216 if (nents < 0) { 217 dev_err(scc->dev, "Invalid number of src SC"); 218 return nents; 219 } 220 ctx->src_nents = nents; 221 222 nents = sg_nents_for_len(req->dst, req->nbytes); 223 if (nents < 0) { 224 dev_err(scc->dev, "Invalid number of dst SC"); 225 return nents; 226 } 227 ctx->dst_nents = nents; 228 229 ctx->size = 0; 230 ctx->offset = 0; 231 232 return 0; 233} 234 235static int mxc_scc_ablkcipher_req_complete(struct crypto_async_request *req, 236 struct mxc_scc_ctx *ctx, 237 int result) 238{ 239 struct ablkcipher_request *ablkreq = ablkcipher_request_cast(req); 240 struct mxc_scc *scc = ctx->scc; 241 242 scc->req = NULL; 243 scc->bytes_remaining = scc->memory_size_bytes; 244 245 if (ctx->ctrl & SCC_SCM_CTRL_CBC_MODE) 246 memcpy(ablkreq->info, scc->base + SCC_SCM_INIT_VECTOR_0, 247 scc->block_size_bytes); 248 249 req->complete(req, result); 250 scc->hw_busy = false; 251 252 return 0; 253} 254 255static int mxc_scc_put_data(struct mxc_scc_ctx *ctx, 256 struct ablkcipher_request *req) 257{ 258 u8 padding_buffer[sizeof(u16) + sizeof(scc_block_padding)]; 259 size_t len = min_t(size_t, req->nbytes - ctx->offset, 260 ctx->scc->bytes_remaining); 261 unsigned int padding_byte_count = 0; 262 struct mxc_scc *scc = ctx->scc; 263 void __iomem *to; 264 265 if (ctx->ctrl & SCC_SCM_CTRL_DECRYPT_MODE) 266 to = scc->black_memory; 267 else 268 to = scc->red_memory; 269 270 if (ctx->ctrl & SCC_SCM_CTRL_CBC_MODE && req->info) 271 memcpy(scc->base + SCC_SCM_INIT_VECTOR_0, req->info, 272 scc->block_size_bytes); 273 274 len = sg_pcopy_to_buffer(req->src, ctx->src_nents, 275 to, len, ctx->offset); 276 if (!len) { 277 dev_err(scc->dev, "pcopy err to 0x%p (len=%zu)\n", to, len); 278 return -EINVAL; 279 } 280 281 ctx->size = len; 282 283#ifdef DEBUG 284 dev_dbg(scc->dev, "copied %d bytes to 0x%p\n", len, to); 285 print_hex_dump(KERN_ERR, 286 "init vector0@"__stringify(__LINE__)": ", 287 DUMP_PREFIX_ADDRESS, 16, 4, 288 scc->base + SCC_SCM_INIT_VECTOR_0, scc->block_size_bytes, 289 1); 290 print_hex_dump(KERN_ERR, 291 "red memory@"__stringify(__LINE__)": ", 292 DUMP_PREFIX_ADDRESS, 16, 4, 293 scc->red_memory, ctx->size, 1); 294 print_hex_dump(KERN_ERR, 295 "black memory@"__stringify(__LINE__)": ", 296 DUMP_PREFIX_ADDRESS, 16, 4, 297 scc->black_memory, ctx->size, 1); 298#endif 299 300 scc->bytes_remaining -= len; 301 302 padding_byte_count = len % scc->block_size_bytes; 303 304 if (padding_byte_count) { 305 memcpy(padding_buffer, scc_block_padding, padding_byte_count); 306 memcpy(to + len, padding_buffer, padding_byte_count); 307 ctx->size += padding_byte_count; 308 } 309 310#ifdef DEBUG 311 print_hex_dump(KERN_ERR, 312 "data to encrypt@"__stringify(__LINE__)": ", 313 DUMP_PREFIX_ADDRESS, 16, 4, 314 to, ctx->size, 1); 315#endif 316 317 return 0; 318} 319 320static void mxc_scc_ablkcipher_next(struct mxc_scc_ctx *ctx, 321 struct crypto_async_request *req) 322{ 323 struct ablkcipher_request *ablkreq = ablkcipher_request_cast(req); 324 struct mxc_scc *scc = ctx->scc; 325 int err; 326 327 dev_dbg(scc->dev, "dispatch request (nbytes=%d, src=%p, dst=%p)\n", 328 ablkreq->nbytes, ablkreq->src, ablkreq->dst); 329 330 writel(0, scc->base + SCC_SCM_ERROR_STATUS); 331 332 err = mxc_scc_put_data(ctx, ablkreq); 333 if (err) { 334 mxc_scc_ablkcipher_req_complete(req, ctx, err); 335 return; 336 } 337 338 dev_dbg(scc->dev, "Start encryption (0x%x/0x%x)\n", 339 readl(scc->base + SCC_SCM_RED_START), 340 readl(scc->base + SCC_SCM_BLACK_START)); 341 342 /* clear interrupt control registers */ 343 writel(SCC_SCM_INTR_CTRL_CLR_INTR, 344 scc->base + SCC_SCM_INTR_CTRL); 345 346 writel((ctx->size / ctx->scc->block_size_bytes) - 1, 347 scc->base + SCC_SCM_LENGTH); 348 349 dev_dbg(scc->dev, "Process %d block(s) in 0x%p\n", 350 ctx->size / ctx->scc->block_size_bytes, 351 (ctx->ctrl & SCC_SCM_CTRL_DECRYPT_MODE) ? scc->black_memory : 352 scc->red_memory); 353 354 writel(ctx->ctrl, scc->base + SCC_SCM_CTRL); 355} 356 357static irqreturn_t mxc_scc_int(int irq, void *priv) 358{ 359 struct crypto_async_request *req; 360 struct mxc_scc_ctx *ctx; 361 struct mxc_scc *scc = priv; 362 int status; 363 int ret; 364 365 status = readl(scc->base + SCC_SCM_STATUS); 366 367 /* clear interrupt control registers */ 368 writel(SCC_SCM_INTR_CTRL_CLR_INTR, scc->base + SCC_SCM_INTR_CTRL); 369 370 if (status & SCC_SCM_STATUS_BUSY) 371 return IRQ_NONE; 372 373 req = scc->req; 374 if (req) { 375 ctx = crypto_tfm_ctx(req->tfm); 376 ret = mxc_scc_get_data(ctx, req); 377 if (ret != -EINPROGRESS) 378 mxc_scc_ablkcipher_req_complete(req, ctx, ret); 379 else 380 mxc_scc_ablkcipher_next(ctx, req); 381 } 382 383 return IRQ_HANDLED; 384} 385 386static int mxc_scc_cra_init(struct crypto_tfm *tfm) 387{ 388 struct mxc_scc_ctx *ctx = crypto_tfm_ctx(tfm); 389 struct crypto_alg *alg = tfm->__crt_alg; 390 struct mxc_scc_crypto_tmpl *algt; 391 392 algt = container_of(alg, struct mxc_scc_crypto_tmpl, alg); 393 394 ctx->scc = algt->scc; 395 return 0; 396} 397 398static void mxc_scc_dequeue_req_unlocked(struct mxc_scc_ctx *ctx) 399{ 400 struct crypto_async_request *req, *backlog; 401 402 if (ctx->scc->hw_busy) 403 return; 404 405 spin_lock_bh(&ctx->scc->lock); 406 backlog = crypto_get_backlog(&ctx->scc->queue); 407 req = crypto_dequeue_request(&ctx->scc->queue); 408 ctx->scc->req = req; 409 ctx->scc->hw_busy = true; 410 spin_unlock_bh(&ctx->scc->lock); 411 412 if (!req) 413 return; 414 415 if (backlog) 416 backlog->complete(backlog, -EINPROGRESS); 417 418 mxc_scc_ablkcipher_next(ctx, req); 419} 420 421static int mxc_scc_queue_req(struct mxc_scc_ctx *ctx, 422 struct crypto_async_request *req) 423{ 424 int ret; 425 426 spin_lock_bh(&ctx->scc->lock); 427 ret = crypto_enqueue_request(&ctx->scc->queue, req); 428 spin_unlock_bh(&ctx->scc->lock); 429 430 if (ret != -EINPROGRESS) 431 return ret; 432 433 mxc_scc_dequeue_req_unlocked(ctx); 434 435 return -EINPROGRESS; 436} 437 438static int mxc_scc_des3_op(struct mxc_scc_ctx *ctx, 439 struct ablkcipher_request *req) 440{ 441 int err; 442 443 err = mxc_scc_ablkcipher_req_init(req, ctx); 444 if (err) 445 return err; 446 447 return mxc_scc_queue_req(ctx, &req->base); 448} 449 450static int mxc_scc_ecb_des_encrypt(struct ablkcipher_request *req) 451{ 452 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); 453 struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); 454 455 ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; 456 457 return mxc_scc_des3_op(ctx, req); 458} 459 460static int mxc_scc_ecb_des_decrypt(struct ablkcipher_request *req) 461{ 462 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); 463 struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); 464 465 ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; 466 ctx->ctrl |= SCC_SCM_CTRL_DECRYPT_MODE; 467 468 return mxc_scc_des3_op(ctx, req); 469} 470 471static int mxc_scc_cbc_des_encrypt(struct ablkcipher_request *req) 472{ 473 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); 474 struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); 475 476 ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; 477 ctx->ctrl |= SCC_SCM_CTRL_CBC_MODE; 478 479 return mxc_scc_des3_op(ctx, req); 480} 481 482static int mxc_scc_cbc_des_decrypt(struct ablkcipher_request *req) 483{ 484 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); 485 struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); 486 487 ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; 488 ctx->ctrl |= SCC_SCM_CTRL_CBC_MODE; 489 ctx->ctrl |= SCC_SCM_CTRL_DECRYPT_MODE; 490 491 return mxc_scc_des3_op(ctx, req); 492} 493 494static void mxc_scc_hw_init(struct mxc_scc *scc) 495{ 496 int offset; 497 498 offset = SCC_NON_RESERVED_OFFSET / scc->block_size_bytes; 499 500 /* Fill the RED_START register */ 501 writel(offset, scc->base + SCC_SCM_RED_START); 502 503 /* Fill the BLACK_START register */ 504 writel(offset, scc->base + SCC_SCM_BLACK_START); 505 506 scc->red_memory = scc->base + SCC_SCM_RED_MEMORY + 507 SCC_NON_RESERVED_OFFSET; 508 509 scc->black_memory = scc->base + SCC_SCM_BLACK_MEMORY + 510 SCC_NON_RESERVED_OFFSET; 511 512 scc->bytes_remaining = scc->memory_size_bytes; 513} 514 515static int mxc_scc_get_config(struct mxc_scc *scc) 516{ 517 int config; 518 519 config = readl(scc->base + SCC_SCM_CFG); 520 521 scc->block_size_bytes = config & SCC_SCM_CFG_BLOCK_SIZE_MASK; 522 523 scc->black_ram_size_blocks = config & SCC_SCM_CFG_BLACK_SIZE_MASK; 524 525 scc->memory_size_bytes = (scc->block_size_bytes * 526 scc->black_ram_size_blocks) - 527 SCC_NON_RESERVED_OFFSET; 528 529 return 0; 530} 531 532static enum mxc_scc_state mxc_scc_get_state(struct mxc_scc *scc) 533{ 534 enum mxc_scc_state state; 535 int status; 536 537 status = readl(scc->base + SCC_SMN_STATUS) & 538 SCC_SMN_STATUS_STATE_MASK; 539 540 /* If in Health Check, try to bringup to secure state */ 541 if (status & SCC_SMN_STATE_HEALTH_CHECK) { 542 /* 543 * Write a simple algorithm to the Algorithm Sequence 544 * Checker (ASC) 545 */ 546 writel(0xaaaa, scc->base + SCC_SMN_SEQ_START); 547 writel(0x5555, scc->base + SCC_SMN_SEQ_END); 548 writel(0x5555, scc->base + SCC_SMN_SEQ_CHECK); 549 550 status = readl(scc->base + SCC_SMN_STATUS) & 551 SCC_SMN_STATUS_STATE_MASK; 552 } 553 554 switch (status) { 555 case SCC_SMN_STATE_NON_SECURE: 556 case SCC_SMN_STATE_SECURE: 557 state = SCC_STATE_OK; 558 break; 559 case SCC_SMN_STATE_FAIL: 560 state = SCC_STATE_FAILED; 561 break; 562 default: 563 state = SCC_STATE_UNIMPLEMENTED; 564 break; 565 } 566 567 return state; 568} 569 570static struct mxc_scc_crypto_tmpl scc_ecb_des = { 571 .alg = { 572 .cra_name = "ecb(des3_ede)", 573 .cra_driver_name = "ecb-des3-scc", 574 .cra_priority = 300, 575 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER, 576 .cra_blocksize = DES3_EDE_BLOCK_SIZE, 577 .cra_ctxsize = sizeof(struct mxc_scc_ctx), 578 .cra_alignmask = 0, 579 .cra_type = &crypto_ablkcipher_type, 580 .cra_module = THIS_MODULE, 581 .cra_init = mxc_scc_cra_init, 582 .cra_u.ablkcipher = { 583 .min_keysize = DES3_EDE_KEY_SIZE, 584 .max_keysize = DES3_EDE_KEY_SIZE, 585 .encrypt = mxc_scc_ecb_des_encrypt, 586 .decrypt = mxc_scc_ecb_des_decrypt, 587 } 588 } 589}; 590 591static struct mxc_scc_crypto_tmpl scc_cbc_des = { 592 .alg = { 593 .cra_name = "cbc(des3_ede)", 594 .cra_driver_name = "cbc-des3-scc", 595 .cra_priority = 300, 596 .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER, 597 .cra_blocksize = DES3_EDE_BLOCK_SIZE, 598 .cra_ctxsize = sizeof(struct mxc_scc_ctx), 599 .cra_alignmask = 0, 600 .cra_type = &crypto_ablkcipher_type, 601 .cra_module = THIS_MODULE, 602 .cra_init = mxc_scc_cra_init, 603 .cra_u.ablkcipher = { 604 .min_keysize = DES3_EDE_KEY_SIZE, 605 .max_keysize = DES3_EDE_KEY_SIZE, 606 .encrypt = mxc_scc_cbc_des_encrypt, 607 .decrypt = mxc_scc_cbc_des_decrypt, 608 } 609 } 610}; 611 612static struct mxc_scc_crypto_tmpl *scc_crypto_algs[] = { 613 &scc_ecb_des, 614 &scc_cbc_des, 615}; 616 617static int mxc_scc_crypto_register(struct mxc_scc *scc) 618{ 619 int i; 620 int err = 0; 621 622 for (i = 0; i < ARRAY_SIZE(scc_crypto_algs); i++) { 623 scc_crypto_algs[i]->scc = scc; 624 err = crypto_register_alg(&scc_crypto_algs[i]->alg); 625 if (err) 626 goto err_out; 627 } 628 629 return 0; 630 631err_out: 632 while (--i >= 0) 633 crypto_unregister_alg(&scc_crypto_algs[i]->alg); 634 635 return err; 636} 637 638static void mxc_scc_crypto_unregister(void) 639{ 640 unsigned int i; 641 642 for (i = 0; i < ARRAY_SIZE(scc_crypto_algs); i++) 643 crypto_unregister_alg(&scc_crypto_algs[i]->alg); 644} 645 646static int mxc_scc_probe(struct platform_device *pdev) 647{ 648 struct device *dev = &pdev->dev; 649 struct resource *res; 650 struct mxc_scc *scc; 651 enum mxc_scc_state state; 652 int irq; 653 int ret; 654 int i; 655 656 scc = devm_kzalloc(dev, sizeof(*scc), GFP_KERNEL); 657 if (!scc) 658 return -ENOMEM; 659 660 res = platform_get_resource(pdev, IORESOURCE_MEM, 0); 661 scc->base = devm_ioremap_resource(dev, res); 662 if (IS_ERR(scc->base)) 663 return PTR_ERR(scc->base); 664 665 scc->clk = devm_clk_get(&pdev->dev, "ipg"); 666 if (IS_ERR(scc->clk)) { 667 dev_err(dev, "Could not get ipg clock\n"); 668 return PTR_ERR(scc->clk); 669 } 670 671 ret = clk_prepare_enable(scc->clk); 672 if (ret) 673 return ret; 674 675 /* clear error status register */ 676 writel(0x0, scc->base + SCC_SCM_ERROR_STATUS); 677 678 /* clear interrupt control registers */ 679 writel(SCC_SCM_INTR_CTRL_CLR_INTR | 680 SCC_SCM_INTR_CTRL_MASK_INTR, 681 scc->base + SCC_SCM_INTR_CTRL); 682 683 writel(SCC_SMN_COMMAND_CLR_INTR | 684 SCC_SMN_COMMAND_EN_INTR, 685 scc->base + SCC_SMN_COMMAND); 686 687 scc->dev = dev; 688 platform_set_drvdata(pdev, scc); 689 690 ret = mxc_scc_get_config(scc); 691 if (ret) 692 goto err_out; 693 694 state = mxc_scc_get_state(scc); 695 696 if (state != SCC_STATE_OK) { 697 dev_err(dev, "SCC in unusable state %d\n", state); 698 ret = -EINVAL; 699 goto err_out; 700 } 701 702 mxc_scc_hw_init(scc); 703 704 spin_lock_init(&scc->lock); 705 /* FIXME: calculate queue from RAM slots */ 706 crypto_init_queue(&scc->queue, 50); 707 708 for (i = 0; i < 2; i++) { 709 irq = platform_get_irq(pdev, i); 710 if (irq < 0) { 711 dev_err(dev, "failed to get irq resource: %d\n", irq); 712 ret = irq; 713 goto err_out; 714 } 715 716 ret = devm_request_threaded_irq(dev, irq, NULL, mxc_scc_int, 717 IRQF_ONESHOT, dev_name(dev), scc); 718 if (ret) 719 goto err_out; 720 } 721 722 ret = mxc_scc_crypto_register(scc); 723 if (ret) { 724 dev_err(dev, "could not register algorithms"); 725 goto err_out; 726 } 727 728 dev_info(dev, "registered successfully.\n"); 729 730 return 0; 731 732err_out: 733 clk_disable_unprepare(scc->clk); 734 735 return ret; 736} 737 738static int mxc_scc_remove(struct platform_device *pdev) 739{ 740 struct mxc_scc *scc = platform_get_drvdata(pdev); 741 742 mxc_scc_crypto_unregister(); 743 744 clk_disable_unprepare(scc->clk); 745 746 return 0; 747} 748 749static const struct of_device_id mxc_scc_dt_ids[] = { 750 { .compatible = "fsl,imx25-scc", .data = NULL, }, 751 { /* sentinel */ } 752}; 753MODULE_DEVICE_TABLE(of, mxc_scc_dt_ids); 754 755static struct platform_driver mxc_scc_driver = { 756 .probe = mxc_scc_probe, 757 .remove = mxc_scc_remove, 758 .driver = { 759 .name = "mxc-scc", 760 .of_match_table = mxc_scc_dt_ids, 761 }, 762}; 763 764module_platform_driver(mxc_scc_driver); 765MODULE_AUTHOR("Steffen Trumtrar <kernel@pengutronix.de>"); 766MODULE_DESCRIPTION("Freescale i.MX25 SCC Crypto driver"); 767MODULE_LICENSE("GPL v2");