2 * CAAM control-plane driver backend
3 * Controller-level driver, kernel property detection, initialization
5 * Copyright 2008-2011 Freescale Semiconductor, Inc.
13 static int caam_remove(struct platform_device
*pdev
)
15 struct device
*ctrldev
;
16 struct caam_drv_private
*ctrlpriv
;
17 struct caam_drv_private_jr
*jrpriv
;
18 struct caam_full __iomem
*topregs
;
22 ctrlpriv
= dev_get_drvdata(ctrldev
);
23 topregs
= (struct caam_full __iomem
*)ctrlpriv
->ctrl
;
26 for (ring
= 0; ring
< ctrlpriv
->total_jobrs
; ring
++) {
27 ret
|= caam_jr_shutdown(ctrlpriv
->jrdev
[ring
]);
28 jrpriv
= dev_get_drvdata(ctrlpriv
->jrdev
[ring
]);
29 irq_dispose_mapping(jrpriv
->irq
);
32 /* Shut down debug views */
33 #ifdef CONFIG_DEBUG_FS
34 debugfs_remove_recursive(ctrlpriv
->dfs_root
);
37 /* Unmap controller region */
38 iounmap(&topregs
->ctrl
);
40 kfree(ctrlpriv
->jrdev
);
46 /* Probe routine for CAAM top (controller) level */
47 static int caam_probe(struct platform_device
*pdev
)
51 struct device_node
*nprop
, *np
;
52 struct caam_ctrl __iomem
*ctrl
;
53 struct caam_full __iomem
*topregs
;
54 struct caam_drv_private
*ctrlpriv
;
55 struct caam_perfmon
*perfmon
;
56 struct caam_deco
**deco
;
59 ctrlpriv
= kzalloc(sizeof(struct caam_drv_private
), GFP_KERNEL
);
64 dev_set_drvdata(dev
, ctrlpriv
);
65 ctrlpriv
->pdev
= pdev
;
66 nprop
= pdev
->dev
.of_node
;
68 /* Get configuration properties from device tree */
69 /* First, get register page */
70 ctrl
= of_iomap(nprop
, 0);
72 dev_err(dev
, "caam: of_iomap() failed\n");
75 ctrlpriv
->ctrl
= (struct caam_ctrl __force
*)ctrl
;
77 /* topregs used to derive pointers to CAAM sub-blocks only */
78 topregs
= (struct caam_full __iomem
*)ctrl
;
80 /* Get the IRQ of the controller (for security violations only) */
81 ctrlpriv
->secvio_irq
= of_irq_to_resource(nprop
, 0, NULL
);
84 * Enable DECO watchdogs and, if this is a PHYS_ADDR_T_64BIT kernel,
85 * 36-bit pointers in master configuration register
87 setbits32(&topregs
->ctrl
.mcr
, MCFGR_WDENABLE
|
88 (sizeof(dma_addr_t
) == sizeof(u64
) ? MCFGR_LONG_PTR
: 0));
90 if (sizeof(dma_addr_t
) == sizeof(u64
))
91 dma_set_mask(dev
, DMA_BIT_MASK(36));
93 /* Find out how many DECOs are present */
94 deconum
= (rd_reg64(&topregs
->ctrl
.perfmon
.cha_num
) &
95 CHA_NUM_DECONUM_MASK
) >> CHA_NUM_DECONUM_SHIFT
;
97 ctrlpriv
->deco
= kmalloc(deconum
* sizeof(struct caam_deco
*),
100 deco
= (struct caam_deco __force
**)&topregs
->deco
;
101 for (d
= 0; d
< deconum
; d
++)
102 ctrlpriv
->deco
[d
] = deco
[d
];
105 * Detect and enable JobRs
106 * First, find out how many ring spec'ed, allocate references
107 * for all, then go probe each one.
110 for_each_compatible_node(np
, NULL
, "fsl,sec-v4.0-job-ring")
112 ctrlpriv
->jrdev
= kzalloc(sizeof(struct device
*) * rspec
, GFP_KERNEL
);
113 if (ctrlpriv
->jrdev
== NULL
) {
114 iounmap(&topregs
->ctrl
);
119 ctrlpriv
->total_jobrs
= 0;
120 for_each_compatible_node(np
, NULL
, "fsl,sec-v4.0-job-ring") {
121 caam_jr_probe(pdev
, np
, ring
);
122 ctrlpriv
->total_jobrs
++;
126 /* Check to see if QI present. If so, enable */
127 ctrlpriv
->qi_present
= !!(rd_reg64(&topregs
->ctrl
.perfmon
.comp_parms
) &
129 if (ctrlpriv
->qi_present
) {
130 ctrlpriv
->qi
= (struct caam_queue_if __force
*)&topregs
->qi
;
131 /* This is all that's required to physically enable QI */
132 wr_reg32(&topregs
->qi
.qi_control_lo
, QICTL_DQEN
);
135 /* If no QI and no rings specified, quit and go home */
136 if ((!ctrlpriv
->qi_present
) && (!ctrlpriv
->total_jobrs
)) {
137 dev_err(dev
, "no queues configured, terminating\n");
142 /* NOTE: RTIC detection ought to go here, around Si time */
144 /* Initialize queue allocator lock */
145 spin_lock_init(&ctrlpriv
->jr_alloc_lock
);
147 /* Report "alive" for developer to see */
148 dev_info(dev
, "device ID = 0x%016llx\n",
149 rd_reg64(&topregs
->ctrl
.perfmon
.caam_id
));
150 dev_info(dev
, "job rings = %d, qi = %d\n",
151 ctrlpriv
->total_jobrs
, ctrlpriv
->qi_present
);
153 #ifdef CONFIG_DEBUG_FS
155 * FIXME: needs better naming distinction, as some amalgamation of
156 * "caam" and nprop->full_name. The OF name isn't distinctive,
157 * but does separate instances
159 perfmon
= (struct caam_perfmon __force
*)&ctrl
->perfmon
;
161 ctrlpriv
->dfs_root
= debugfs_create_dir("caam", NULL
);
162 ctrlpriv
->ctl
= debugfs_create_dir("ctl", ctrlpriv
->dfs_root
);
164 /* Controller-level - performance monitor counters */
165 ctrlpriv
->ctl_rq_dequeued
=
166 debugfs_create_u64("rq_dequeued",
167 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
168 ctrlpriv
->ctl
, &perfmon
->req_dequeued
);
169 ctrlpriv
->ctl_ob_enc_req
=
170 debugfs_create_u64("ob_rq_encrypted",
171 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
172 ctrlpriv
->ctl
, &perfmon
->ob_enc_req
);
173 ctrlpriv
->ctl_ib_dec_req
=
174 debugfs_create_u64("ib_rq_decrypted",
175 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
176 ctrlpriv
->ctl
, &perfmon
->ib_dec_req
);
177 ctrlpriv
->ctl_ob_enc_bytes
=
178 debugfs_create_u64("ob_bytes_encrypted",
179 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
180 ctrlpriv
->ctl
, &perfmon
->ob_enc_bytes
);
181 ctrlpriv
->ctl_ob_prot_bytes
=
182 debugfs_create_u64("ob_bytes_protected",
183 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
184 ctrlpriv
->ctl
, &perfmon
->ob_prot_bytes
);
185 ctrlpriv
->ctl_ib_dec_bytes
=
186 debugfs_create_u64("ib_bytes_decrypted",
187 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
188 ctrlpriv
->ctl
, &perfmon
->ib_dec_bytes
);
189 ctrlpriv
->ctl_ib_valid_bytes
=
190 debugfs_create_u64("ib_bytes_validated",
191 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
192 ctrlpriv
->ctl
, &perfmon
->ib_valid_bytes
);
194 /* Controller level - global status values */
195 ctrlpriv
->ctl_faultaddr
=
196 debugfs_create_u64("fault_addr",
197 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
198 ctrlpriv
->ctl
, &perfmon
->faultaddr
);
199 ctrlpriv
->ctl_faultdetail
=
200 debugfs_create_u32("fault_detail",
201 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
202 ctrlpriv
->ctl
, &perfmon
->faultdetail
);
203 ctrlpriv
->ctl_faultstatus
=
204 debugfs_create_u32("fault_status",
205 S_IFCHR
| S_IRUSR
| S_IRGRP
| S_IROTH
,
206 ctrlpriv
->ctl
, &perfmon
->status
);
208 /* Internal covering keys (useful in non-secure mode only) */
209 ctrlpriv
->ctl_kek_wrap
.data
= &ctrlpriv
->ctrl
->kek
[0];
210 ctrlpriv
->ctl_kek_wrap
.size
= KEK_KEY_SIZE
* sizeof(u32
);
211 ctrlpriv
->ctl_kek
= debugfs_create_blob("kek",
215 &ctrlpriv
->ctl_kek_wrap
);
217 ctrlpriv
->ctl_tkek_wrap
.data
= &ctrlpriv
->ctrl
->tkek
[0];
218 ctrlpriv
->ctl_tkek_wrap
.size
= KEK_KEY_SIZE
* sizeof(u32
);
219 ctrlpriv
->ctl_tkek
= debugfs_create_blob("tkek",
223 &ctrlpriv
->ctl_tkek_wrap
);
225 ctrlpriv
->ctl_tdsk_wrap
.data
= &ctrlpriv
->ctrl
->tdsk
[0];
226 ctrlpriv
->ctl_tdsk_wrap
.size
= KEK_KEY_SIZE
* sizeof(u32
);
227 ctrlpriv
->ctl_tdsk
= debugfs_create_blob("tdsk",
231 &ctrlpriv
->ctl_tdsk_wrap
);
236 static struct of_device_id caam_match
[] = {
238 .compatible
= "fsl,sec-v4.0",
242 MODULE_DEVICE_TABLE(of
, caam_match
);
244 static struct platform_driver caam_driver
= {
247 .owner
= THIS_MODULE
,
248 .of_match_table
= caam_match
,
251 .remove
= __devexit_p(caam_remove
),
254 static int __init
caam_base_init(void)
256 return platform_driver_register(&caam_driver
);
259 static void __exit
caam_base_exit(void)
261 return platform_driver_unregister(&caam_driver
);
264 module_init(caam_base_init
);
265 module_exit(caam_base_exit
);
267 MODULE_LICENSE("GPL");
268 MODULE_DESCRIPTION("FSL CAAM request backend");
269 MODULE_AUTHOR("Freescale Semiconductor - NMG/STC");