• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  *  Copyright IBM Corp. 2012, 2019
4  *  Author(s): Holger Dengler <hd@linux.vnet.ibm.com>
5  */
6 
7 #include <linux/module.h>
8 #include <linux/slab.h>
9 #include <linux/init.h>
10 #include <linux/err.h>
11 #include <linux/atomic.h>
12 #include <linux/uaccess.h>
13 #include <linux/mod_devicetable.h>
14 
15 #include "ap_bus.h"
16 #include "zcrypt_api.h"
17 #include "zcrypt_msgtype6.h"
18 #include "zcrypt_msgtype50.h"
19 #include "zcrypt_error.h"
20 #include "zcrypt_cex4.h"
21 #include "zcrypt_ccamisc.h"
22 #include "zcrypt_ep11misc.h"
23 
24 #define CEX4A_MIN_MOD_SIZE	  1	/*    8 bits	*/
25 #define CEX4A_MAX_MOD_SIZE_2K	256	/* 2048 bits	*/
26 #define CEX4A_MAX_MOD_SIZE_4K	512	/* 4096 bits	*/
27 
28 #define CEX4C_MIN_MOD_SIZE	 16	/*  256 bits	*/
29 #define CEX4C_MAX_MOD_SIZE	512	/* 4096 bits	*/
30 
31 #define CEX4A_MAX_MESSAGE_SIZE	MSGTYPE50_CRB3_MAX_MSG_SIZE
32 #define CEX4C_MAX_MESSAGE_SIZE	MSGTYPE06_MAX_MSG_SIZE
33 
34 /* Waiting time for requests to be processed.
35  * Currently there are some types of request which are not deterministic.
36  * But the maximum time limit managed by the stomper code is set to 60sec.
37  * Hence we have to wait at least that time period.
38  */
39 #define CEX4_CLEANUP_TIME	(900*HZ)
40 
41 MODULE_AUTHOR("IBM Corporation");
42 MODULE_DESCRIPTION("CEX4/CEX5/CEX6/CEX7 Cryptographic Card device driver, " \
43 		   "Copyright IBM Corp. 2019");
44 MODULE_LICENSE("GPL");
45 
46 static struct ap_device_id zcrypt_cex4_card_ids[] = {
47 	{ .dev_type = AP_DEVICE_TYPE_CEX4,
48 	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
49 	{ .dev_type = AP_DEVICE_TYPE_CEX5,
50 	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
51 	{ .dev_type = AP_DEVICE_TYPE_CEX6,
52 	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
53 	{ .dev_type = AP_DEVICE_TYPE_CEX7,
54 	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
55 	{ /* end of list */ },
56 };
57 
58 MODULE_DEVICE_TABLE(ap, zcrypt_cex4_card_ids);
59 
60 static struct ap_device_id zcrypt_cex4_queue_ids[] = {
61 	{ .dev_type = AP_DEVICE_TYPE_CEX4,
62 	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
63 	{ .dev_type = AP_DEVICE_TYPE_CEX5,
64 	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
65 	{ .dev_type = AP_DEVICE_TYPE_CEX6,
66 	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
67 	{ .dev_type = AP_DEVICE_TYPE_CEX7,
68 	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
69 	{ /* end of list */ },
70 };
71 
72 MODULE_DEVICE_TABLE(ap, zcrypt_cex4_queue_ids);
73 
74 /*
75  * CCA card additional device attributes
76  */
cca_serialnr_show(struct device * dev,struct device_attribute * attr,char * buf)77 static ssize_t cca_serialnr_show(struct device *dev,
78 				 struct device_attribute *attr,
79 				 char *buf)
80 {
81 	struct cca_info ci;
82 	struct ap_card *ac = to_ap_card(dev);
83 	struct zcrypt_card *zc = ac->private;
84 
85 	memset(&ci, 0, sizeof(ci));
86 
87 	if (ap_domain_index >= 0)
88 		cca_get_info(ac->id, ap_domain_index, &ci, zc->online);
89 
90 	return scnprintf(buf, PAGE_SIZE, "%s\n", ci.serial);
91 }
92 
93 static struct device_attribute dev_attr_cca_serialnr =
94 	__ATTR(serialnr, 0444, cca_serialnr_show, NULL);
95 
96 static struct attribute *cca_card_attrs[] = {
97 	&dev_attr_cca_serialnr.attr,
98 	NULL,
99 };
100 
101 static const struct attribute_group cca_card_attr_grp = {
102 	.attrs = cca_card_attrs,
103 };
104 
105  /*
106   * CCA queue additional device attributes
107   */
cca_mkvps_show(struct device * dev,struct device_attribute * attr,char * buf)108 static ssize_t cca_mkvps_show(struct device *dev,
109 			      struct device_attribute *attr,
110 			      char *buf)
111 {
112 	int n = 0;
113 	struct cca_info ci;
114 	struct zcrypt_queue *zq = to_ap_queue(dev)->private;
115 	static const char * const cao_state[] = { "invalid", "valid" };
116 	static const char * const new_state[] = { "empty", "partial", "full" };
117 
118 	memset(&ci, 0, sizeof(ci));
119 
120 	cca_get_info(AP_QID_CARD(zq->queue->qid),
121 		     AP_QID_QUEUE(zq->queue->qid),
122 		     &ci, zq->online);
123 
124 	if (ci.new_aes_mk_state >= '1' && ci.new_aes_mk_state <= '3')
125 		n = scnprintf(buf, PAGE_SIZE, "AES NEW: %s 0x%016llx\n",
126 			      new_state[ci.new_aes_mk_state - '1'],
127 			      ci.new_aes_mkvp);
128 	else
129 		n = scnprintf(buf, PAGE_SIZE, "AES NEW: - -\n");
130 
131 	if (ci.cur_aes_mk_state >= '1' && ci.cur_aes_mk_state <= '2')
132 		n += scnprintf(buf + n, PAGE_SIZE - n,
133 			       "AES CUR: %s 0x%016llx\n",
134 			       cao_state[ci.cur_aes_mk_state - '1'],
135 			       ci.cur_aes_mkvp);
136 	else
137 		n += scnprintf(buf + n, PAGE_SIZE - n, "AES CUR: - -\n");
138 
139 	if (ci.old_aes_mk_state >= '1' && ci.old_aes_mk_state <= '2')
140 		n += scnprintf(buf + n, PAGE_SIZE - n,
141 			       "AES OLD: %s 0x%016llx\n",
142 			       cao_state[ci.old_aes_mk_state - '1'],
143 			       ci.old_aes_mkvp);
144 	else
145 		n += scnprintf(buf + n, PAGE_SIZE - n, "AES OLD: - -\n");
146 
147 	if (ci.new_apka_mk_state >= '1' && ci.new_apka_mk_state <= '3')
148 		n += scnprintf(buf + n, PAGE_SIZE - n,
149 			       "APKA NEW: %s 0x%016llx\n",
150 			       new_state[ci.new_apka_mk_state - '1'],
151 			       ci.new_apka_mkvp);
152 	else
153 		n += scnprintf(buf + n, PAGE_SIZE - n, "APKA NEW: - -\n");
154 
155 	if (ci.cur_apka_mk_state >= '1' && ci.cur_apka_mk_state <= '2')
156 		n += scnprintf(buf + n, PAGE_SIZE - n,
157 			       "APKA CUR: %s 0x%016llx\n",
158 			       cao_state[ci.cur_apka_mk_state - '1'],
159 			       ci.cur_apka_mkvp);
160 	else
161 		n += scnprintf(buf + n, PAGE_SIZE - n, "APKA CUR: - -\n");
162 
163 	if (ci.old_apka_mk_state >= '1' && ci.old_apka_mk_state <= '2')
164 		n += scnprintf(buf + n, PAGE_SIZE - n,
165 			       "APKA OLD: %s 0x%016llx\n",
166 			       cao_state[ci.old_apka_mk_state - '1'],
167 			       ci.old_apka_mkvp);
168 	else
169 		n += scnprintf(buf + n, PAGE_SIZE - n, "APKA OLD: - -\n");
170 
171 	return n;
172 }
173 
174 static struct device_attribute dev_attr_cca_mkvps =
175 	__ATTR(mkvps, 0444, cca_mkvps_show, NULL);
176 
177 static struct attribute *cca_queue_attrs[] = {
178 	&dev_attr_cca_mkvps.attr,
179 	NULL,
180 };
181 
182 static const struct attribute_group cca_queue_attr_grp = {
183 	.attrs = cca_queue_attrs,
184 };
185 
186 /*
187  * EP11 card additional device attributes
188  */
ep11_api_ordinalnr_show(struct device * dev,struct device_attribute * attr,char * buf)189 static ssize_t ep11_api_ordinalnr_show(struct device *dev,
190 				       struct device_attribute *attr,
191 				       char *buf)
192 {
193 	struct ep11_card_info ci;
194 	struct ap_card *ac = to_ap_card(dev);
195 	struct zcrypt_card *zc = ac->private;
196 
197 	memset(&ci, 0, sizeof(ci));
198 
199 	ep11_get_card_info(ac->id, &ci, zc->online);
200 
201 	if (ci.API_ord_nr > 0)
202 		return scnprintf(buf, PAGE_SIZE, "%u\n", ci.API_ord_nr);
203 	else
204 		return scnprintf(buf, PAGE_SIZE, "\n");
205 }
206 
207 static struct device_attribute dev_attr_ep11_api_ordinalnr =
208 	__ATTR(API_ordinalnr, 0444, ep11_api_ordinalnr_show, NULL);
209 
ep11_fw_version_show(struct device * dev,struct device_attribute * attr,char * buf)210 static ssize_t ep11_fw_version_show(struct device *dev,
211 				    struct device_attribute *attr,
212 				    char *buf)
213 {
214 	struct ep11_card_info ci;
215 	struct ap_card *ac = to_ap_card(dev);
216 	struct zcrypt_card *zc = ac->private;
217 
218 	memset(&ci, 0, sizeof(ci));
219 
220 	ep11_get_card_info(ac->id, &ci, zc->online);
221 
222 	if (ci.FW_version > 0)
223 		return scnprintf(buf, PAGE_SIZE, "%d.%d\n",
224 				 (int)(ci.FW_version >> 8),
225 				 (int)(ci.FW_version & 0xFF));
226 	else
227 		return scnprintf(buf, PAGE_SIZE, "\n");
228 }
229 
230 static struct device_attribute dev_attr_ep11_fw_version =
231 	__ATTR(FW_version, 0444, ep11_fw_version_show, NULL);
232 
ep11_serialnr_show(struct device * dev,struct device_attribute * attr,char * buf)233 static ssize_t ep11_serialnr_show(struct device *dev,
234 				  struct device_attribute *attr,
235 				  char *buf)
236 {
237 	struct ep11_card_info ci;
238 	struct ap_card *ac = to_ap_card(dev);
239 	struct zcrypt_card *zc = ac->private;
240 
241 	memset(&ci, 0, sizeof(ci));
242 
243 	ep11_get_card_info(ac->id, &ci, zc->online);
244 
245 	if (ci.serial[0])
246 		return scnprintf(buf, PAGE_SIZE, "%16.16s\n", ci.serial);
247 	else
248 		return scnprintf(buf, PAGE_SIZE, "\n");
249 }
250 
251 static struct device_attribute dev_attr_ep11_serialnr =
252 	__ATTR(serialnr, 0444, ep11_serialnr_show, NULL);
253 
254 static const struct {
255 	int	    mode_bit;
256 	const char *mode_txt;
257 } ep11_op_modes[] = {
258 	{ 0, "FIPS2009" },
259 	{ 1, "BSI2009" },
260 	{ 2, "FIPS2011" },
261 	{ 3, "BSI2011" },
262 	{ 6, "BSICC2017" },
263 	{ 0, NULL }
264 };
265 
ep11_card_op_modes_show(struct device * dev,struct device_attribute * attr,char * buf)266 static ssize_t ep11_card_op_modes_show(struct device *dev,
267 				       struct device_attribute *attr,
268 				       char *buf)
269 {
270 	int i, n = 0;
271 	struct ep11_card_info ci;
272 	struct ap_card *ac = to_ap_card(dev);
273 	struct zcrypt_card *zc = ac->private;
274 
275 	memset(&ci, 0, sizeof(ci));
276 
277 	ep11_get_card_info(ac->id, &ci, zc->online);
278 
279 	for (i = 0; ep11_op_modes[i].mode_txt; i++) {
280 		if (ci.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
281 			if (n > 0)
282 				buf[n++] = ' ';
283 			n += scnprintf(buf + n, PAGE_SIZE - n,
284 				       "%s", ep11_op_modes[i].mode_txt);
285 		}
286 	}
287 	n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
288 
289 	return n;
290 }
291 
292 static struct device_attribute dev_attr_ep11_card_op_modes =
293 	__ATTR(op_modes, 0444, ep11_card_op_modes_show, NULL);
294 
295 static struct attribute *ep11_card_attrs[] = {
296 	&dev_attr_ep11_api_ordinalnr.attr,
297 	&dev_attr_ep11_fw_version.attr,
298 	&dev_attr_ep11_serialnr.attr,
299 	&dev_attr_ep11_card_op_modes.attr,
300 	NULL,
301 };
302 
303 static const struct attribute_group ep11_card_attr_grp = {
304 	.attrs = ep11_card_attrs,
305 };
306 
307 /*
308  * EP11 queue additional device attributes
309  */
310 
ep11_mkvps_show(struct device * dev,struct device_attribute * attr,char * buf)311 static ssize_t ep11_mkvps_show(struct device *dev,
312 			       struct device_attribute *attr,
313 			       char *buf)
314 {
315 	int n = 0;
316 	struct ep11_domain_info di;
317 	struct zcrypt_queue *zq = to_ap_queue(dev)->private;
318 	static const char * const cwk_state[] = { "invalid", "valid" };
319 	static const char * const nwk_state[] = { "empty", "uncommitted",
320 						  "committed" };
321 
322 	memset(&di, 0, sizeof(di));
323 
324 	if (zq->online)
325 		ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
326 				     AP_QID_QUEUE(zq->queue->qid),
327 				     &di);
328 
329 	if (di.cur_wk_state == '0') {
330 		n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s -\n",
331 			      cwk_state[di.cur_wk_state - '0']);
332 	} else if (di.cur_wk_state == '1') {
333 		n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s 0x",
334 			      cwk_state[di.cur_wk_state - '0']);
335 		bin2hex(buf + n, di.cur_wkvp, sizeof(di.cur_wkvp));
336 		n += 2 * sizeof(di.cur_wkvp);
337 		n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
338 	} else
339 		n = scnprintf(buf, PAGE_SIZE, "WK CUR: - -\n");
340 
341 	if (di.new_wk_state == '0') {
342 		n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s -\n",
343 			       nwk_state[di.new_wk_state - '0']);
344 	} else if (di.new_wk_state >= '1' && di.new_wk_state <= '2') {
345 		n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s 0x",
346 			       nwk_state[di.new_wk_state - '0']);
347 		bin2hex(buf + n, di.new_wkvp, sizeof(di.new_wkvp));
348 		n += 2 * sizeof(di.new_wkvp);
349 		n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
350 	} else
351 		n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: - -\n");
352 
353 	return n;
354 }
355 
356 static struct device_attribute dev_attr_ep11_mkvps =
357 	__ATTR(mkvps, 0444, ep11_mkvps_show, NULL);
358 
ep11_queue_op_modes_show(struct device * dev,struct device_attribute * attr,char * buf)359 static ssize_t ep11_queue_op_modes_show(struct device *dev,
360 					struct device_attribute *attr,
361 					char *buf)
362 {
363 	int i, n = 0;
364 	struct ep11_domain_info di;
365 	struct zcrypt_queue *zq = to_ap_queue(dev)->private;
366 
367 	memset(&di, 0, sizeof(di));
368 
369 	if (zq->online)
370 		ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
371 				     AP_QID_QUEUE(zq->queue->qid),
372 				     &di);
373 
374 	for (i = 0; ep11_op_modes[i].mode_txt; i++) {
375 		if (di.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
376 			if (n > 0)
377 				buf[n++] = ' ';
378 			n += scnprintf(buf + n, PAGE_SIZE - n,
379 				       "%s", ep11_op_modes[i].mode_txt);
380 		}
381 	}
382 	n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
383 
384 	return n;
385 }
386 
387 static struct device_attribute dev_attr_ep11_queue_op_modes =
388 	__ATTR(op_modes, 0444, ep11_queue_op_modes_show, NULL);
389 
390 static struct attribute *ep11_queue_attrs[] = {
391 	&dev_attr_ep11_mkvps.attr,
392 	&dev_attr_ep11_queue_op_modes.attr,
393 	NULL,
394 };
395 
396 static const struct attribute_group ep11_queue_attr_grp = {
397 	.attrs = ep11_queue_attrs,
398 };
399 
400 /**
401  * Probe function for CEX4/CEX5/CEX6/CEX7 card device. It always
402  * accepts the AP device since the bus_match already checked
403  * the hardware type.
404  * @ap_dev: pointer to the AP device.
405  */
zcrypt_cex4_card_probe(struct ap_device * ap_dev)406 static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
407 {
408 	/*
409 	 * Normalized speed ratings per crypto adapter
410 	 * MEX_1k, MEX_2k, MEX_4k, CRT_1k, CRT_2k, CRT_4k, RNG, SECKEY
411 	 */
412 	static const int CEX4A_SPEED_IDX[NUM_OPS] = {
413 		 14,  19, 249, 42, 228, 1458, 0, 0};
414 	static const int CEX5A_SPEED_IDX[NUM_OPS] = {
415 		  8,   9,  20, 18,  66,	 458, 0, 0};
416 	static const int CEX6A_SPEED_IDX[NUM_OPS] = {
417 		  6,   9,  20, 17,  65,	 438, 0, 0};
418 	static const int CEX7A_SPEED_IDX[NUM_OPS] = {
419 		  6,   8,  17, 15,  54,	 362, 0, 0};
420 
421 	static const int CEX4C_SPEED_IDX[NUM_OPS] = {
422 		 59,  69, 308, 83, 278, 2204, 209, 40};
423 	static const int CEX5C_SPEED_IDX[] = {
424 		 24,  31,  50, 37,  90,	 479,  27, 10};
425 	static const int CEX6C_SPEED_IDX[NUM_OPS] = {
426 		 16,  20,  32, 27,  77,	 455,  24,  9};
427 	static const int CEX7C_SPEED_IDX[NUM_OPS] = {
428 		 14,  16,  26, 23,  64,	 376,  23,  8};
429 
430 	static const int CEX4P_SPEED_IDX[NUM_OPS] = {
431 		  0,   0,   0,	 0,   0,   0,	0,  50};
432 	static const int CEX5P_SPEED_IDX[NUM_OPS] = {
433 		  0,   0,   0,	 0,   0,   0,	0,  10};
434 	static const int CEX6P_SPEED_IDX[NUM_OPS] = {
435 		  0,   0,   0,	 0,   0,   0,	0,   9};
436 	static const int CEX7P_SPEED_IDX[NUM_OPS] = {
437 		  0,   0,   0,	 0,   0,   0,	0,   8};
438 
439 	struct ap_card *ac = to_ap_card(&ap_dev->device);
440 	struct zcrypt_card *zc;
441 	int rc = 0;
442 
443 	zc = zcrypt_card_alloc();
444 	if (!zc)
445 		return -ENOMEM;
446 	zc->card = ac;
447 	ac->private = zc;
448 	if (ap_test_bit(&ac->functions, AP_FUNC_ACCEL)) {
449 		if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
450 			zc->type_string = "CEX4A";
451 			zc->user_space_type = ZCRYPT_CEX4;
452 			zc->speed_rating = CEX4A_SPEED_IDX;
453 		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
454 			zc->type_string = "CEX5A";
455 			zc->user_space_type = ZCRYPT_CEX5;
456 			zc->speed_rating = CEX5A_SPEED_IDX;
457 		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
458 			zc->type_string = "CEX6A";
459 			zc->user_space_type = ZCRYPT_CEX6;
460 			zc->speed_rating = CEX6A_SPEED_IDX;
461 		} else {
462 			zc->type_string = "CEX7A";
463 			/* wrong user space type, just for compatibility
464 			 * with the ZCRYPT_STATUS_MASK ioctl.
465 			 */
466 			zc->user_space_type = ZCRYPT_CEX6;
467 			zc->speed_rating = CEX7A_SPEED_IDX;
468 		}
469 		zc->min_mod_size = CEX4A_MIN_MOD_SIZE;
470 		if (ap_test_bit(&ac->functions, AP_FUNC_MEX4K) &&
471 		    ap_test_bit(&ac->functions, AP_FUNC_CRT4K)) {
472 			zc->max_mod_size = CEX4A_MAX_MOD_SIZE_4K;
473 			zc->max_exp_bit_length =
474 				CEX4A_MAX_MOD_SIZE_4K;
475 		} else {
476 			zc->max_mod_size = CEX4A_MAX_MOD_SIZE_2K;
477 			zc->max_exp_bit_length =
478 				CEX4A_MAX_MOD_SIZE_2K;
479 		}
480 	} else if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) {
481 		if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
482 			zc->type_string = "CEX4C";
483 			/* wrong user space type, must be CEX4
484 			 * just keep it for cca compatibility
485 			 */
486 			zc->user_space_type = ZCRYPT_CEX3C;
487 			zc->speed_rating = CEX4C_SPEED_IDX;
488 		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
489 			zc->type_string = "CEX5C";
490 			/* wrong user space type, must be CEX5
491 			 * just keep it for cca compatibility
492 			 */
493 			zc->user_space_type = ZCRYPT_CEX3C;
494 			zc->speed_rating = CEX5C_SPEED_IDX;
495 		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
496 			zc->type_string = "CEX6C";
497 			/* wrong user space type, must be CEX6
498 			 * just keep it for cca compatibility
499 			 */
500 			zc->user_space_type = ZCRYPT_CEX3C;
501 			zc->speed_rating = CEX6C_SPEED_IDX;
502 		} else {
503 			zc->type_string = "CEX7C";
504 			/* wrong user space type, must be CEX7
505 			 * just keep it for cca compatibility
506 			 */
507 			zc->user_space_type = ZCRYPT_CEX3C;
508 			zc->speed_rating = CEX7C_SPEED_IDX;
509 		}
510 		zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
511 		zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
512 		zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
513 	} else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) {
514 		if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
515 			zc->type_string = "CEX4P";
516 			zc->user_space_type = ZCRYPT_CEX4;
517 			zc->speed_rating = CEX4P_SPEED_IDX;
518 		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
519 			zc->type_string = "CEX5P";
520 			zc->user_space_type = ZCRYPT_CEX5;
521 			zc->speed_rating = CEX5P_SPEED_IDX;
522 		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
523 			zc->type_string = "CEX6P";
524 			zc->user_space_type = ZCRYPT_CEX6;
525 			zc->speed_rating = CEX6P_SPEED_IDX;
526 		} else {
527 			zc->type_string = "CEX7P";
528 			/* wrong user space type, just for compatibility
529 			 * with the ZCRYPT_STATUS_MASK ioctl.
530 			 */
531 			zc->user_space_type = ZCRYPT_CEX6;
532 			zc->speed_rating = CEX7P_SPEED_IDX;
533 		}
534 		zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
535 		zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
536 		zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
537 	} else {
538 		zcrypt_card_free(zc);
539 		return -ENODEV;
540 	}
541 	zc->online = 1;
542 
543 	rc = zcrypt_card_register(zc);
544 	if (rc) {
545 		ac->private = NULL;
546 		zcrypt_card_free(zc);
547 		return rc;
548 	}
549 
550 	if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) {
551 		rc = sysfs_create_group(&ap_dev->device.kobj,
552 					&cca_card_attr_grp);
553 		if (rc) {
554 			zcrypt_card_unregister(zc);
555 			ac->private = NULL;
556 			zcrypt_card_free(zc);
557 		}
558 	} else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) {
559 		rc = sysfs_create_group(&ap_dev->device.kobj,
560 					&ep11_card_attr_grp);
561 		if (rc) {
562 			zcrypt_card_unregister(zc);
563 			ac->private = NULL;
564 			zcrypt_card_free(zc);
565 		}
566 	}
567 
568 	return rc;
569 }
570 
571 /**
572  * This is called to remove the CEX4/CEX5/CEX6/CEX7 card driver
573  * information if an AP card device is removed.
574  */
zcrypt_cex4_card_remove(struct ap_device * ap_dev)575 static void zcrypt_cex4_card_remove(struct ap_device *ap_dev)
576 {
577 	struct ap_card *ac = to_ap_card(&ap_dev->device);
578 	struct zcrypt_card *zc = ac->private;
579 
580 	if (ap_test_bit(&ac->functions, AP_FUNC_COPRO))
581 		sysfs_remove_group(&ap_dev->device.kobj, &cca_card_attr_grp);
582 	else if (ap_test_bit(&ac->functions, AP_FUNC_EP11))
583 		sysfs_remove_group(&ap_dev->device.kobj, &ep11_card_attr_grp);
584 	if (zc)
585 		zcrypt_card_unregister(zc);
586 }
587 
588 static struct ap_driver zcrypt_cex4_card_driver = {
589 	.probe = zcrypt_cex4_card_probe,
590 	.remove = zcrypt_cex4_card_remove,
591 	.ids = zcrypt_cex4_card_ids,
592 	.flags = AP_DRIVER_FLAG_DEFAULT,
593 };
594 
595 /**
596  * Probe function for CEX4/CEX5/CEX6/CEX7 queue device. It always
597  * accepts the AP device since the bus_match already checked
598  * the hardware type.
599  * @ap_dev: pointer to the AP device.
600  */
zcrypt_cex4_queue_probe(struct ap_device * ap_dev)601 static int zcrypt_cex4_queue_probe(struct ap_device *ap_dev)
602 {
603 	struct ap_queue *aq = to_ap_queue(&ap_dev->device);
604 	struct zcrypt_queue *zq;
605 	int rc;
606 
607 	if (ap_test_bit(&aq->card->functions, AP_FUNC_ACCEL)) {
608 		zq = zcrypt_queue_alloc(CEX4A_MAX_MESSAGE_SIZE);
609 		if (!zq)
610 			return -ENOMEM;
611 		zq->ops = zcrypt_msgtype(MSGTYPE50_NAME,
612 					 MSGTYPE50_VARIANT_DEFAULT);
613 	} else if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) {
614 		zq = zcrypt_queue_alloc(CEX4C_MAX_MESSAGE_SIZE);
615 		if (!zq)
616 			return -ENOMEM;
617 		zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
618 					 MSGTYPE06_VARIANT_DEFAULT);
619 	} else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) {
620 		zq = zcrypt_queue_alloc(CEX4C_MAX_MESSAGE_SIZE);
621 		if (!zq)
622 			return -ENOMEM;
623 		zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
624 					 MSGTYPE06_VARIANT_EP11);
625 	} else {
626 		return -ENODEV;
627 	}
628 
629 	zq->queue = aq;
630 	zq->online = 1;
631 	atomic_set(&zq->load, 0);
632 	ap_queue_init_state(aq);
633 	ap_queue_init_reply(aq, &zq->reply);
634 	aq->request_timeout = CEX4_CLEANUP_TIME,
635 	aq->private = zq;
636 	rc = zcrypt_queue_register(zq);
637 	if (rc) {
638 		aq->private = NULL;
639 		zcrypt_queue_free(zq);
640 		return rc;
641 	}
642 
643 	if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) {
644 		rc = sysfs_create_group(&ap_dev->device.kobj,
645 					&cca_queue_attr_grp);
646 		if (rc) {
647 			zcrypt_queue_unregister(zq);
648 			aq->private = NULL;
649 			zcrypt_queue_free(zq);
650 		}
651 	} else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) {
652 		rc = sysfs_create_group(&ap_dev->device.kobj,
653 					&ep11_queue_attr_grp);
654 		if (rc) {
655 			zcrypt_queue_unregister(zq);
656 			aq->private = NULL;
657 			zcrypt_queue_free(zq);
658 		}
659 	}
660 
661 	return rc;
662 }
663 
664 /**
665  * This is called to remove the CEX4/CEX5/CEX6/CEX7 queue driver
666  * information if an AP queue device is removed.
667  */
zcrypt_cex4_queue_remove(struct ap_device * ap_dev)668 static void zcrypt_cex4_queue_remove(struct ap_device *ap_dev)
669 {
670 	struct ap_queue *aq = to_ap_queue(&ap_dev->device);
671 	struct zcrypt_queue *zq = aq->private;
672 
673 	if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO))
674 		sysfs_remove_group(&ap_dev->device.kobj, &cca_queue_attr_grp);
675 	else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11))
676 		sysfs_remove_group(&ap_dev->device.kobj, &ep11_queue_attr_grp);
677 	if (zq)
678 		zcrypt_queue_unregister(zq);
679 }
680 
681 static struct ap_driver zcrypt_cex4_queue_driver = {
682 	.probe = zcrypt_cex4_queue_probe,
683 	.remove = zcrypt_cex4_queue_remove,
684 	.ids = zcrypt_cex4_queue_ids,
685 	.flags = AP_DRIVER_FLAG_DEFAULT,
686 };
687 
zcrypt_cex4_init(void)688 int __init zcrypt_cex4_init(void)
689 {
690 	int rc;
691 
692 	rc = ap_driver_register(&zcrypt_cex4_card_driver,
693 				THIS_MODULE, "cex4card");
694 	if (rc)
695 		return rc;
696 
697 	rc = ap_driver_register(&zcrypt_cex4_queue_driver,
698 				THIS_MODULE, "cex4queue");
699 	if (rc)
700 		ap_driver_unregister(&zcrypt_cex4_card_driver);
701 
702 	return rc;
703 }
704 
zcrypt_cex4_exit(void)705 void __exit zcrypt_cex4_exit(void)
706 {
707 	ap_driver_unregister(&zcrypt_cex4_queue_driver);
708 	ap_driver_unregister(&zcrypt_cex4_card_driver);
709 }
710 
711 module_init(zcrypt_cex4_init);
712 module_exit(zcrypt_cex4_exit);
713