1 // SPDX-License-Identifier: GPL-2.0
3 * amlgoic-core.c - hardware cryptographic offloader for Amlogic GXL SoC
5 * Copyright (C) 2018-2019 Corentin Labbe <clabbe@baylibre.com>
7 * Core file which registers crypto algorithms supported by the hardware.
10 #include <linux/crypto.h>
12 #include <linux/interrupt.h>
13 #include <linux/irq.h>
14 #include <linux/module.h>
16 #include <linux/of_device.h>
17 #include <linux/platform_device.h>
18 #include <crypto/internal/skcipher.h>
19 #include <linux/dma-mapping.h>
21 #include "amlogic-gxl.h"
23 static irqreturn_t meson_irq_handler(int irq, void *data)
25 struct meson_dev *mc = (struct meson_dev *)data;
29 for (flow = 0; flow < MAXFLOW; flow++) {
30 if (mc->irqs[flow] == irq) {
31 p = readl(mc->base + ((0x04 + flow) << 2));
33 writel_relaxed(0xF, mc->base + ((0x4 + flow) << 2));
34 mc->chanlist[flow].status = 1;
35 complete(&mc->chanlist[flow].complete);
38 dev_err(mc->dev, "%s %d Got irq for flow %d but ctrl is empty\n", __func__, irq, flow);
42 dev_err(mc->dev, "%s %d from unknown irq\n", __func__, irq);
46 static struct meson_alg_template mc_algs[] = {
48 .type = CRYPTO_ALG_TYPE_SKCIPHER,
49 .blockmode = MESON_OPMODE_CBC,
52 .cra_name = "cbc(aes)",
53 .cra_driver_name = "cbc-aes-gxl",
55 .cra_blocksize = AES_BLOCK_SIZE,
56 .cra_flags = CRYPTO_ALG_TYPE_SKCIPHER |
57 CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK,
58 .cra_ctxsize = sizeof(struct meson_cipher_tfm_ctx),
59 .cra_module = THIS_MODULE,
61 .cra_init = meson_cipher_init,
62 .cra_exit = meson_cipher_exit,
64 .min_keysize = AES_MIN_KEY_SIZE,
65 .max_keysize = AES_MAX_KEY_SIZE,
66 .ivsize = AES_BLOCK_SIZE,
67 .setkey = meson_aes_setkey,
68 .encrypt = meson_skencrypt,
69 .decrypt = meson_skdecrypt,
73 .type = CRYPTO_ALG_TYPE_SKCIPHER,
74 .blockmode = MESON_OPMODE_ECB,
77 .cra_name = "ecb(aes)",
78 .cra_driver_name = "ecb-aes-gxl",
80 .cra_blocksize = AES_BLOCK_SIZE,
81 .cra_flags = CRYPTO_ALG_TYPE_SKCIPHER |
82 CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK,
83 .cra_ctxsize = sizeof(struct meson_cipher_tfm_ctx),
84 .cra_module = THIS_MODULE,
86 .cra_init = meson_cipher_init,
87 .cra_exit = meson_cipher_exit,
89 .min_keysize = AES_MIN_KEY_SIZE,
90 .max_keysize = AES_MAX_KEY_SIZE,
91 .setkey = meson_aes_setkey,
92 .encrypt = meson_skencrypt,
93 .decrypt = meson_skdecrypt,
98 #ifdef CONFIG_CRYPTO_DEV_AMLOGIC_GXL_DEBUG
99 static int meson_dbgfs_read(struct seq_file *seq, void *v)
101 struct meson_dev *mc = seq->private;
104 for (i = 0; i < MAXFLOW; i++)
105 seq_printf(seq, "Channel %d: nreq %lu\n", i, mc->chanlist[i].stat_req);
107 for (i = 0; i < ARRAY_SIZE(mc_algs); i++) {
108 switch (mc_algs[i].type) {
109 case CRYPTO_ALG_TYPE_SKCIPHER:
110 seq_printf(seq, "%s %s %lu %lu\n",
111 mc_algs[i].alg.skcipher.base.cra_driver_name,
112 mc_algs[i].alg.skcipher.base.cra_name,
113 mc_algs[i].stat_req, mc_algs[i].stat_fb);
120 static int meson_dbgfs_open(struct inode *inode, struct file *file)
122 return single_open(file, meson_dbgfs_read, inode->i_private);
125 static const struct file_operations meson_debugfs_fops = {
126 .owner = THIS_MODULE,
127 .open = meson_dbgfs_open,
130 .release = single_release,
134 static void meson_free_chanlist(struct meson_dev *mc, int i)
137 crypto_engine_exit(mc->chanlist[i].engine);
138 if (mc->chanlist[i].tl)
139 dma_free_coherent(mc->dev, sizeof(struct meson_desc) * MAXDESC,
141 mc->chanlist[i].t_phy);
147 * Allocate the channel list structure
149 static int meson_allocate_chanlist(struct meson_dev *mc)
153 mc->chanlist = devm_kcalloc(mc->dev, MAXFLOW,
154 sizeof(struct meson_flow), GFP_KERNEL);
158 for (i = 0; i < MAXFLOW; i++) {
159 init_completion(&mc->chanlist[i].complete);
161 mc->chanlist[i].engine = crypto_engine_alloc_init(mc->dev, true);
162 if (!mc->chanlist[i].engine) {
163 dev_err(mc->dev, "Cannot allocate engine\n");
168 err = crypto_engine_start(mc->chanlist[i].engine);
170 dev_err(mc->dev, "Cannot start engine\n");
173 mc->chanlist[i].tl = dma_alloc_coherent(mc->dev,
174 sizeof(struct meson_desc) * MAXDESC,
175 &mc->chanlist[i].t_phy,
177 if (!mc->chanlist[i].tl) {
184 meson_free_chanlist(mc, i);
188 static int meson_register_algs(struct meson_dev *mc)
192 for (i = 0; i < ARRAY_SIZE(mc_algs); i++) {
194 switch (mc_algs[i].type) {
195 case CRYPTO_ALG_TYPE_SKCIPHER:
196 err = crypto_register_skcipher(&mc_algs[i].alg.skcipher);
198 dev_err(mc->dev, "Fail to register %s\n",
199 mc_algs[i].alg.skcipher.base.cra_name);
200 mc_algs[i].mc = NULL;
210 static void meson_unregister_algs(struct meson_dev *mc)
214 for (i = 0; i < ARRAY_SIZE(mc_algs); i++) {
217 switch (mc_algs[i].type) {
218 case CRYPTO_ALG_TYPE_SKCIPHER:
219 crypto_unregister_skcipher(&mc_algs[i].alg.skcipher);
225 static int meson_crypto_probe(struct platform_device *pdev)
227 struct meson_dev *mc;
230 if (!pdev->dev.of_node)
233 mc = devm_kzalloc(&pdev->dev, sizeof(*mc), GFP_KERNEL);
237 mc->dev = &pdev->dev;
238 platform_set_drvdata(pdev, mc);
240 mc->base = devm_platform_ioremap_resource(pdev, 0);
241 if (IS_ERR(mc->base)) {
242 err = PTR_ERR(mc->base);
243 dev_err(&pdev->dev, "Cannot request MMIO err=%d\n", err);
246 mc->busclk = devm_clk_get(&pdev->dev, "blkmv");
247 if (IS_ERR(mc->busclk)) {
248 err = PTR_ERR(mc->busclk);
249 dev_err(&pdev->dev, "Cannot get core clock err=%d\n", err);
253 mc->irqs = devm_kcalloc(mc->dev, MAXFLOW, sizeof(int), GFP_KERNEL);
254 for (i = 0; i < MAXFLOW; i++) {
255 mc->irqs[i] = platform_get_irq(pdev, i);
256 if (mc->irqs[i] < 0) {
257 dev_err(mc->dev, "Cannot get IRQ for flow %d\n", i);
261 err = devm_request_irq(&pdev->dev, mc->irqs[i], meson_irq_handler, 0,
264 dev_err(mc->dev, "Cannot request IRQ for flow %d\n", i);
269 err = clk_prepare_enable(mc->busclk);
271 dev_err(&pdev->dev, "Cannot prepare_enable busclk\n");
275 err = meson_allocate_chanlist(mc);
279 err = meson_register_algs(mc);
283 #ifdef CONFIG_CRYPTO_DEV_AMLOGIC_GXL_DEBUG
284 mc->dbgfs_dir = debugfs_create_dir("gxl-crypto", NULL);
285 debugfs_create_file("stats", 0444, mc->dbgfs_dir, mc, &meson_debugfs_fops);
290 meson_unregister_algs(mc);
292 meson_free_chanlist(mc, MAXFLOW - 1);
293 clk_disable_unprepare(mc->busclk);
297 static int meson_crypto_remove(struct platform_device *pdev)
299 struct meson_dev *mc = platform_get_drvdata(pdev);
301 #ifdef CONFIG_CRYPTO_DEV_AMLOGIC_GXL_DEBUG
302 debugfs_remove_recursive(mc->dbgfs_dir);
305 meson_unregister_algs(mc);
307 meson_free_chanlist(mc, MAXFLOW - 1);
309 clk_disable_unprepare(mc->busclk);
313 static const struct of_device_id meson_crypto_of_match_table[] = {
314 { .compatible = "amlogic,gxl-crypto", },
317 MODULE_DEVICE_TABLE(of, meson_crypto_of_match_table);
319 static struct platform_driver meson_crypto_driver = {
320 .probe = meson_crypto_probe,
321 .remove = meson_crypto_remove,
323 .name = "gxl-crypto",
324 .of_match_table = meson_crypto_of_match_table,
328 module_platform_driver(meson_crypto_driver);
330 MODULE_DESCRIPTION("Amlogic GXL cryptographic offloader");
331 MODULE_LICENSE("GPL");
332 MODULE_AUTHOR("Corentin Labbe <clabbe@baylibre.com>");