1
0
Fork 0
alistair23-linux/drivers/crypto/caam/regs.h

1169 lines
37 KiB
C
Raw Normal View History

License cleanup: add SPDX GPL-2.0 license identifier to files with no license Many source files in the tree are missing licensing information, which makes it harder for compliance tools to determine the correct license. By default all files without license information are under the default license of the kernel, which is GPL version 2. Update the files which contain no license information with the 'GPL-2.0' SPDX license identifier. The SPDX identifier is a legally binding shorthand, which can be used instead of the full boiler plate text. This patch is based on work done by Thomas Gleixner and Kate Stewart and Philippe Ombredanne. How this work was done: Patches were generated and checked against linux-4.14-rc6 for a subset of the use cases: - file had no licensing information it it. - file was a */uapi/* one with no licensing information in it, - file was a */uapi/* one with existing licensing information, Further patches will be generated in subsequent months to fix up cases where non-standard license headers were used, and references to license had to be inferred by heuristics based on keywords. The analysis to determine which SPDX License Identifier to be applied to a file was done in a spreadsheet of side by side results from of the output of two independent scanners (ScanCode & Windriver) producing SPDX tag:value files created by Philippe Ombredanne. Philippe prepared the base worksheet, and did an initial spot review of a few 1000 files. The 4.13 kernel was the starting point of the analysis with 60,537 files assessed. Kate Stewart did a file by file comparison of the scanner results in the spreadsheet to determine which SPDX license identifier(s) to be applied to the file. She confirmed any determination that was not immediately clear with lawyers working with the Linux Foundation. Criteria used to select files for SPDX license identifier tagging was: - Files considered eligible had to be source code files. - Make and config files were included as candidates if they contained >5 lines of source - File already had some variant of a license header in it (even if <5 lines). All documentation files were explicitly excluded. The following heuristics were used to determine which SPDX license identifiers to apply. - when both scanners couldn't find any license traces, file was considered to have no license information in it, and the top level COPYING file license applied. For non */uapi/* files that summary was: SPDX license identifier # files ---------------------------------------------------|------- GPL-2.0 11139 and resulted in the first patch in this series. If that file was a */uapi/* path one, it was "GPL-2.0 WITH Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was: SPDX license identifier # files ---------------------------------------------------|------- GPL-2.0 WITH Linux-syscall-note 930 and resulted in the second patch in this series. - if a file had some form of licensing information in it, and was one of the */uapi/* ones, it was denoted with the Linux-syscall-note if any GPL family license was found in the file or had no licensing in it (per prior point). Results summary: SPDX license identifier # files ---------------------------------------------------|------ GPL-2.0 WITH Linux-syscall-note 270 GPL-2.0+ WITH Linux-syscall-note 169 ((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21 ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17 LGPL-2.1+ WITH Linux-syscall-note 15 GPL-1.0+ WITH Linux-syscall-note 14 ((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5 LGPL-2.0+ WITH Linux-syscall-note 4 LGPL-2.1 WITH Linux-syscall-note 3 ((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3 ((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1 and that resulted in the third patch in this series. - when the two scanners agreed on the detected license(s), that became the concluded license(s). - when there was disagreement between the two scanners (one detected a license but the other didn't, or they both detected different licenses) a manual inspection of the file occurred. - In most cases a manual inspection of the information in the file resulted in a clear resolution of the license that should apply (and which scanner probably needed to revisit its heuristics). - When it was not immediately clear, the license identifier was confirmed with lawyers working with the Linux Foundation. - If there was any question as to the appropriate license identifier, the file was flagged for further research and to be revisited later in time. In total, over 70 hours of logged manual review was done on the spreadsheet to determine the SPDX license identifiers to apply to the source files by Kate, Philippe, Thomas and, in some cases, confirmation by lawyers working with the Linux Foundation. Kate also obtained a third independent scan of the 4.13 code base from FOSSology, and compared selected files where the other two scanners disagreed against that SPDX file, to see if there was new insights. The Windriver scanner is based on an older version of FOSSology in part, so they are related. Thomas did random spot checks in about 500 files from the spreadsheets for the uapi headers and agreed with SPDX license identifier in the files he inspected. For the non-uapi files Thomas did random spot checks in about 15000 files. In initial set of patches against 4.14-rc6, 3 files were found to have copy/paste license identifier errors, and have been fixed to reflect the correct identifier. Additionally Philippe spent 10 hours this week doing a detailed manual inspection and review of the 12,461 patched files from the initial patch version early this week with: - a full scancode scan run, collecting the matched texts, detected license ids and scores - reviewing anything where there was a license detected (about 500+ files) to ensure that the applied SPDX license was correct - reviewing anything where there was no detection but the patch license was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied SPDX license was correct This produced a worksheet with 20 files needing minor correction. This worksheet was then exported into 3 different .csv files for the different types of files to be modified. These .csv files were then reviewed by Greg. Thomas wrote a script to parse the csv files and add the proper SPDX tag to the file, in the format that the file expected. This script was further refined by Greg based on the output to detect more types of files automatically and to distinguish between header and source .c files (which need different comment types.) Finally Greg ran the script using the .csv files to generate the patches. Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org> Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com> Reviewed-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 08:07:57 -06:00
/* SPDX-License-Identifier: GPL-2.0 */
/*
* CAAM hardware register-level view
*
* Copyright 2008-2011 Freescale Semiconductor, Inc.
* Copyright 2018 NXP
*/
#ifndef REGS_H
#define REGS_H
#include <linux/types.h>
#include <linux/bitops.h>
#include <linux/io.h>
crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64 In order to be able to unify 64 and 32 bit implementations of wr_reg64, let's convert it to use helpers from <linux/io-64-nonatomic-hi-lo.h> first. Here are the steps of the transformation: 1. Inline wr_reg32 helpers: if (!caam_imx && caam_little_end) { if (caam_little_end) { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } else { iowrite32be(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32be(data, (u32 __iomem *)(reg)); } } else { if (caam_little_end) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } } 2. Transfrom the conditionals such that the check for 'caam_little_end' is at the top level: if (caam_little_end) { if (!caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } else { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } 3. Invert the check for !caam_imx: if (caam_little_end) { if (caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } 4. Make use of iowrite64* helpers from <linux/io-64-nonatomic-hi-lo.h> if (caam_little_end) { if (caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite64(data, reg); } } else { iowrite64be(data, reg); } No functional change intended. Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> Reviewed-by: Horia Geantă <horia.geanta@nxp.com> Cc: Chris Spencer <christopher.spencer@sea.co.uk> Cc: Cory Tusar <cory.tusar@zii.aero> Cc: Chris Healy <cphealy@gmail.com> Cc: Lucas Stach <l.stach@pengutronix.de> Cc: Horia Geantă <horia.geanta@nxp.com> Cc: Aymen Sghaier <aymen.sghaier@nxp.com> Cc: Leonard Crestez <leonard.crestez@nxp.com> Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2019-08-20 14:23:51 -06:00
#include <linux/io-64-nonatomic-hi-lo.h>
/*
* Architecture-specific register access methods
*
* CAAM's bus-addressable registers are 64 bits internally.
* They have been wired to be safely accessible on 32-bit
* architectures, however. Registers were organized such
* that (a) they can be contained in 32 bits, (b) if not, then they
* can be treated as two 32-bit entities, or finally (c) if they
* must be treated as a single 64-bit value, then this can safely
* be done with two 32-bit cycles.
*
* For 32-bit operations on 64-bit values, CAAM follows the same
* 64-bit register access conventions as it's predecessors, in that
* writes are "triggered" by a write to the register at the numerically
* higher address, thus, a full 64-bit write cycle requires a write
* to the lower address, followed by a write to the higher address,
* which will latch/execute the write cycle.
*
* For example, let's assume a SW reset of CAAM through the master
* configuration register.
* - SWRST is in bit 31 of MCFG.
* - MCFG begins at base+0x0000.
* - Bits 63-32 are a 32-bit word at base+0x0000 (numerically-lower)
* - Bits 31-0 are a 32-bit word at base+0x0004 (numerically-higher)
*
* (and on Power, the convention is 0-31, 32-63, I know...)
*
* Assuming a 64-bit write to this MCFG to perform a software reset
* would then require a write of 0 to base+0x0000, followed by a
* write of 0x80000000 to base+0x0004, which would "execute" the
* reset.
*
* Of course, since MCFG 63-32 is all zero, we could cheat and simply
* write 0x8000000 to base+0x0004, and the reset would work fine.
* However, since CAAM does contain some write-and-read-intended
* 64-bit registers, this code defines 64-bit access methods for
* the sake of internal consistency and simplicity, and so that a
* clean transition to 64-bit is possible when it becomes necessary.
*
* There are limitations to this that the developer must recognize.
* 32-bit architectures cannot enforce an atomic-64 operation,
* Therefore:
*
* - On writes, since the HW is assumed to latch the cycle on the
* write of the higher-numeric-address word, then ordered
* writes work OK.
*
* - For reads, where a register contains a relevant value of more
* that 32 bits, the hardware employs logic to latch the other
* "half" of the data until read, ensuring an accurate value.
* This is of particular relevance when dealing with CAAM's
* performance counters.
*
*/
extern bool caam_little_end;
extern bool caam_imx;
extern size_t caam_ptr_sz;
#define caam_to_cpu(len) \
static inline u##len caam##len ## _to_cpu(u##len val) \
{ \
if (caam_little_end) \
return le##len ## _to_cpu((__force __le##len)val); \
else \
return be##len ## _to_cpu((__force __be##len)val); \
}
#define cpu_to_caam(len) \
static inline u##len cpu_to_caam##len(u##len val) \
{ \
if (caam_little_end) \
return (__force u##len)cpu_to_le##len(val); \
else \
return (__force u##len)cpu_to_be##len(val); \
}
caam_to_cpu(16)
caam_to_cpu(32)
caam_to_cpu(64)
cpu_to_caam(16)
cpu_to_caam(32)
cpu_to_caam(64)
static inline void wr_reg32(void __iomem *reg, u32 data)
{
if (caam_little_end)
iowrite32(data, reg);
else
iowrite32be(data, reg);
}
static inline u32 rd_reg32(void __iomem *reg)
{
if (caam_little_end)
return ioread32(reg);
return ioread32be(reg);
}
static inline void clrsetbits_32(void __iomem *reg, u32 clear, u32 set)
{
if (caam_little_end)
iowrite32((ioread32(reg) & ~clear) | set, reg);
else
iowrite32be((ioread32be(reg) & ~clear) | set, reg);
}
/*
* The only users of these wr/rd_reg64 functions is the Job Ring (JR).
* The DMA address registers in the JR are handled differently depending on
* platform:
*
* 1. All BE CAAM platforms and i.MX platforms (LE CAAM):
*
* base + 0x0000 : most-significant 32 bits
* base + 0x0004 : least-significant 32 bits
*
* The 32-bit version of this core therefore has to write to base + 0x0004
* to set the 32-bit wide DMA address.
*
* 2. All other LE CAAM platforms (LS1021A etc.)
* base + 0x0000 : least-significant 32 bits
* base + 0x0004 : most-significant 32 bits
*/
static inline void wr_reg64(void __iomem *reg, u64 data)
{
crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64 In order to be able to unify 64 and 32 bit implementations of wr_reg64, let's convert it to use helpers from <linux/io-64-nonatomic-hi-lo.h> first. Here are the steps of the transformation: 1. Inline wr_reg32 helpers: if (!caam_imx && caam_little_end) { if (caam_little_end) { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } else { iowrite32be(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32be(data, (u32 __iomem *)(reg)); } } else { if (caam_little_end) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } } 2. Transfrom the conditionals such that the check for 'caam_little_end' is at the top level: if (caam_little_end) { if (!caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } else { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } 3. Invert the check for !caam_imx: if (caam_little_end) { if (caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } 4. Make use of iowrite64* helpers from <linux/io-64-nonatomic-hi-lo.h> if (caam_little_end) { if (caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite64(data, reg); } } else { iowrite64be(data, reg); } No functional change intended. Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> Reviewed-by: Horia Geantă <horia.geanta@nxp.com> Cc: Chris Spencer <christopher.spencer@sea.co.uk> Cc: Cory Tusar <cory.tusar@zii.aero> Cc: Chris Healy <cphealy@gmail.com> Cc: Lucas Stach <l.stach@pengutronix.de> Cc: Horia Geantă <horia.geanta@nxp.com> Cc: Aymen Sghaier <aymen.sghaier@nxp.com> Cc: Leonard Crestez <leonard.crestez@nxp.com> Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2019-08-20 14:23:51 -06:00
if (caam_little_end) {
if (caam_imx) {
iowrite32(data >> 32, (u32 __iomem *)(reg));
iowrite32(data, (u32 __iomem *)(reg) + 1);
} else {
iowrite64(data, reg);
}
} else {
crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64 In order to be able to unify 64 and 32 bit implementations of wr_reg64, let's convert it to use helpers from <linux/io-64-nonatomic-hi-lo.h> first. Here are the steps of the transformation: 1. Inline wr_reg32 helpers: if (!caam_imx && caam_little_end) { if (caam_little_end) { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } else { iowrite32be(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32be(data, (u32 __iomem *)(reg)); } } else { if (caam_little_end) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } } 2. Transfrom the conditionals such that the check for 'caam_little_end' is at the top level: if (caam_little_end) { if (!caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } else { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } 3. Invert the check for !caam_imx: if (caam_little_end) { if (caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite32(data >> 32, (u32 __iomem *)(reg) + 1); iowrite32(data, (u32 __iomem *)(reg)); } } else { iowrite32be(data >> 32, (u32 __iomem *)(reg)); iowrite32be(data, (u32 __iomem *)(reg) + 1); } 4. Make use of iowrite64* helpers from <linux/io-64-nonatomic-hi-lo.h> if (caam_little_end) { if (caam_imx) { iowrite32(data >> 32, (u32 __iomem *)(reg)); iowrite32(data, (u32 __iomem *)(reg) + 1); } else { iowrite64(data, reg); } } else { iowrite64be(data, reg); } No functional change intended. Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> Reviewed-by: Horia Geantă <horia.geanta@nxp.com> Cc: Chris Spencer <christopher.spencer@sea.co.uk> Cc: Cory Tusar <cory.tusar@zii.aero> Cc: Chris Healy <cphealy@gmail.com> Cc: Lucas Stach <l.stach@pengutronix.de> Cc: Horia Geantă <horia.geanta@nxp.com> Cc: Aymen Sghaier <aymen.sghaier@nxp.com> Cc: Leonard Crestez <leonard.crestez@nxp.com> Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2019-08-20 14:23:51 -06:00
iowrite64be(data, reg);
}
}
static inline u64 rd_reg64(void __iomem *reg)
{
if (caam_little_end) {
if (caam_imx) {
u32 low, high;
high = ioread32(reg);
low = ioread32(reg + sizeof(u32));
return low + ((u64)high << 32);
} else {
return ioread64(reg);
}
} else {
return ioread64be(reg);
}
}
static inline u64 cpu_to_caam_dma64(dma_addr_t value)
{
if (caam_imx) {
u64 ret_val = (u64)cpu_to_caam32(lower_32_bits(value)) << 32;
if (IS_ENABLED(CONFIG_ARCH_DMA_ADDR_T_64BIT))
ret_val |= (u64)cpu_to_caam32(upper_32_bits(value));
return ret_val;
}
return cpu_to_caam64(value);
}
static inline u64 caam_dma64_to_cpu(u64 value)
{
if (caam_imx)
return (((u64)caam32_to_cpu(lower_32_bits(value)) << 32) |
(u64)caam32_to_cpu(upper_32_bits(value)));
return caam64_to_cpu(value);
}
static inline u64 cpu_to_caam_dma(u64 value)
{
if (IS_ENABLED(CONFIG_ARCH_DMA_ADDR_T_64BIT) &&
caam_ptr_sz == sizeof(u64))
return cpu_to_caam_dma64(value);
else
return cpu_to_caam32(value);
}
static inline u64 caam_dma_to_cpu(u64 value)
{
if (IS_ENABLED(CONFIG_ARCH_DMA_ADDR_T_64BIT) &&
caam_ptr_sz == sizeof(u64))
return caam_dma64_to_cpu(value);
else
return caam32_to_cpu(value);
}
/*
* jr_outentry
* Represents each entry in a JobR output ring
*/
static inline void jr_outentry_get(void *outring, int hw_idx, dma_addr_t *desc,
u32 *jrstatus)
{
if (caam_ptr_sz == sizeof(u32)) {
struct {
u32 desc;
u32 jrstatus;
} __packed *outentry = outring;
*desc = outentry[hw_idx].desc;
*jrstatus = outentry[hw_idx].jrstatus;
} else {
struct {
dma_addr_t desc;/* Pointer to completed descriptor */
u32 jrstatus; /* Status for completed descriptor */
} __packed *outentry = outring;
*desc = outentry[hw_idx].desc;
*jrstatus = outentry[hw_idx].jrstatus;
}
}
#define SIZEOF_JR_OUTENTRY (caam_ptr_sz + sizeof(u32))
static inline dma_addr_t jr_outentry_desc(void *outring, int hw_idx)
{
dma_addr_t desc;
u32 unused;
jr_outentry_get(outring, hw_idx, &desc, &unused);
return desc;
}
static inline u32 jr_outentry_jrstatus(void *outring, int hw_idx)
{
dma_addr_t unused;
u32 jrstatus;
jr_outentry_get(outring, hw_idx, &unused, &jrstatus);
return jrstatus;
}
static inline void jr_inpentry_set(void *inpring, int hw_idx, dma_addr_t val)
{
if (caam_ptr_sz == sizeof(u32)) {
u32 *inpentry = inpring;
inpentry[hw_idx] = val;
} else {
dma_addr_t *inpentry = inpring;
inpentry[hw_idx] = val;
}
}
#define SIZEOF_JR_INPENTRY caam_ptr_sz
/* Version registers (Era 10+) e80-eff */
struct version_regs {
u32 crca; /* CRCA_VERSION */
u32 afha; /* AFHA_VERSION */
u32 kfha; /* KFHA_VERSION */
u32 pkha; /* PKHA_VERSION */
u32 aesa; /* AESA_VERSION */
u32 mdha; /* MDHA_VERSION */
u32 desa; /* DESA_VERSION */
u32 snw8a; /* SNW8A_VERSION */
u32 snw9a; /* SNW9A_VERSION */
u32 zuce; /* ZUCE_VERSION */
u32 zuca; /* ZUCA_VERSION */
u32 ccha; /* CCHA_VERSION */
u32 ptha; /* PTHA_VERSION */
u32 rng; /* RNG_VERSION */
u32 trng; /* TRNG_VERSION */
u32 aaha; /* AAHA_VERSION */
u32 rsvd[10];
u32 sr; /* SR_VERSION */
u32 dma; /* DMA_VERSION */
u32 ai; /* AI_VERSION */
u32 qi; /* QI_VERSION */
u32 jr; /* JR_VERSION */
u32 deco; /* DECO_VERSION */
};
/* Version registers bitfields */
/* Number of CHAs instantiated */
#define CHA_VER_NUM_MASK 0xffull
/* CHA Miscellaneous Information */
#define CHA_VER_MISC_SHIFT 8
#define CHA_VER_MISC_MASK (0xffull << CHA_VER_MISC_SHIFT)
/* CHA Revision Number */
#define CHA_VER_REV_SHIFT 16
#define CHA_VER_REV_MASK (0xffull << CHA_VER_REV_SHIFT)
/* CHA Version ID */
#define CHA_VER_VID_SHIFT 24
#define CHA_VER_VID_MASK (0xffull << CHA_VER_VID_SHIFT)
/* CHA Miscellaneous Information - AESA_MISC specific */
#define CHA_VER_MISC_AES_GCM BIT(1 + CHA_VER_MISC_SHIFT)
/*
* caam_perfmon - Performance Monitor/Secure Memory Status/
* CAAM Global Status/Component Version IDs
*
* Spans f00-fff wherever instantiated
*/
/* Number of DECOs */
#define CHA_NUM_MS_DECONUM_SHIFT 24
#define CHA_NUM_MS_DECONUM_MASK (0xfull << CHA_NUM_MS_DECONUM_SHIFT)
/*
* CHA version IDs / instantiation bitfields (< Era 10)
* Defined for use with the cha_id fields in perfmon, but the same shift/mask
* selectors can be used to pull out the number of instantiated blocks within
* cha_num fields in perfmon because the locations are the same.
*/
#define CHA_ID_LS_AES_SHIFT 0
#define CHA_ID_LS_AES_MASK (0xfull << CHA_ID_LS_AES_SHIFT)
#define CHA_ID_LS_DES_SHIFT 4
#define CHA_ID_LS_DES_MASK (0xfull << CHA_ID_LS_DES_SHIFT)
#define CHA_ID_LS_ARC4_SHIFT 8
#define CHA_ID_LS_ARC4_MASK (0xfull << CHA_ID_LS_ARC4_SHIFT)
#define CHA_ID_LS_MD_SHIFT 12
#define CHA_ID_LS_MD_MASK (0xfull << CHA_ID_LS_MD_SHIFT)
#define CHA_ID_LS_RNG_SHIFT 16
#define CHA_ID_LS_RNG_MASK (0xfull << CHA_ID_LS_RNG_SHIFT)
#define CHA_ID_LS_SNW8_SHIFT 20
#define CHA_ID_LS_SNW8_MASK (0xfull << CHA_ID_LS_SNW8_SHIFT)
#define CHA_ID_LS_KAS_SHIFT 24
#define CHA_ID_LS_KAS_MASK (0xfull << CHA_ID_LS_KAS_SHIFT)
#define CHA_ID_LS_PK_SHIFT 28
#define CHA_ID_LS_PK_MASK (0xfull << CHA_ID_LS_PK_SHIFT)
#define CHA_ID_MS_CRC_SHIFT 0
#define CHA_ID_MS_CRC_MASK (0xfull << CHA_ID_MS_CRC_SHIFT)
#define CHA_ID_MS_SNW9_SHIFT 4
#define CHA_ID_MS_SNW9_MASK (0xfull << CHA_ID_MS_SNW9_SHIFT)
#define CHA_ID_MS_DECO_SHIFT 24
#define CHA_ID_MS_DECO_MASK (0xfull << CHA_ID_MS_DECO_SHIFT)
#define CHA_ID_MS_JR_SHIFT 28
#define CHA_ID_MS_JR_MASK (0xfull << CHA_ID_MS_JR_SHIFT)
/* Specific CHA version IDs */
#define CHA_VER_VID_AES_LP 0x3ull
#define CHA_VER_VID_AES_HP 0x4ull
#define CHA_VER_VID_MD_LP256 0x0ull
#define CHA_VER_VID_MD_LP512 0x1ull
#define CHA_VER_VID_MD_HP 0x2ull
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
/*
* caam_perfmon - Performance Monitor/Secure Memory Status/
* CAAM Global Status/Component Version IDs
*
* Spans f00-fff wherever instantiated
*/
struct sec_vid {
u16 ip_id;
u8 maj_rev;
u8 min_rev;
};
struct caam_perfmon {
/* Performance Monitor Registers f00-f9f */
u64 req_dequeued; /* PC_REQ_DEQ - Dequeued Requests */
u64 ob_enc_req; /* PC_OB_ENC_REQ - Outbound Encrypt Requests */
u64 ib_dec_req; /* PC_IB_DEC_REQ - Inbound Decrypt Requests */
u64 ob_enc_bytes; /* PC_OB_ENCRYPT - Outbound Bytes Encrypted */
u64 ob_prot_bytes; /* PC_OB_PROTECT - Outbound Bytes Protected */
u64 ib_dec_bytes; /* PC_IB_DECRYPT - Inbound Bytes Decrypted */
u64 ib_valid_bytes; /* PC_IB_VALIDATED Inbound Bytes Validated */
u64 rsvd[13];
/* CAAM Hardware Instantiation Parameters fa0-fbf */
u32 cha_rev_ms; /* CRNR - CHA Rev No. Most significant half*/
u32 cha_rev_ls; /* CRNR - CHA Rev No. Least significant half*/
#define CTPR_MS_QI_SHIFT 25
#define CTPR_MS_QI_MASK (0x1ull << CTPR_MS_QI_SHIFT)
#define CTPR_MS_PS BIT(17)
#define CTPR_MS_DPAA2 BIT(13)
#define CTPR_MS_VIRT_EN_INCL 0x00000001
#define CTPR_MS_VIRT_EN_POR 0x00000002
#define CTPR_MS_PG_SZ_MASK 0x10
#define CTPR_MS_PG_SZ_SHIFT 4
u32 comp_parms_ms; /* CTPR - Compile Parameters Register */
u32 comp_parms_ls; /* CTPR - Compile Parameters Register */
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
/* Secure Memory State Visibility */
u32 rsvd1;
u32 smstatus; /* Secure memory status */
u32 rsvd2;
u32 smpartown; /* Secure memory partition owner */
/* CAAM Global Status fc0-fdf */
u64 faultaddr; /* FAR - Fault Address */
u32 faultliodn; /* FALR - Fault Address LIODN */
u32 faultdetail; /* FADR - Fault Addr Detail */
#define CSTA_PLEND BIT(10)
#define CSTA_ALT_PLEND BIT(18)
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
u32 rsvd3;
u32 status; /* CSTA - CAAM Status */
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
u32 smpart; /* Secure Memory Partition Parameters */
u32 smvid; /* Secure Memory Version ID */
/* Component Instantiation Parameters fe0-fff */
u32 rtic_id; /* RVID - RTIC Version ID */
#define CCBVID_ERA_MASK 0xff000000
#define CCBVID_ERA_SHIFT 24
u32 ccb_id; /* CCBVID - CCB Version ID */
u32 cha_id_ms; /* CHAVID - CHA Version ID Most Significant*/
u32 cha_id_ls; /* CHAVID - CHA Version ID Least Significant*/
u32 cha_num_ms; /* CHANUM - CHA Number Most Significant */
u32 cha_num_ls; /* CHANUM - CHA Number Least Significant*/
#define SECVID_MS_IPID_MASK 0xffff0000
#define SECVID_MS_IPID_SHIFT 16
#define SECVID_MS_MAJ_REV_MASK 0x0000ff00
#define SECVID_MS_MAJ_REV_SHIFT 8
u32 caam_id_ms; /* CAAMVID - CAAM Version ID MS */
u32 caam_id_ls; /* CAAMVID - CAAM Version ID LS */
};
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
#define SMSTATUS_PART_SHIFT 28
#define SMSTATUS_PART_MASK (0xf << SMSTATUS_PART_SHIFT)
#define SMSTATUS_PAGE_SHIFT 16
#define SMSTATUS_PAGE_MASK (0x7ff << SMSTATUS_PAGE_SHIFT)
#define SMSTATUS_MID_SHIFT 8
#define SMSTATUS_MID_MASK (0x3f << SMSTATUS_MID_SHIFT)
#define SMSTATUS_ACCERR_SHIFT 4
#define SMSTATUS_ACCERR_MASK (0xf << SMSTATUS_ACCERR_SHIFT)
#define SMSTATUS_ACCERR_NONE 0
#define SMSTATUS_ACCERR_ALLOC 1 /* Page not allocated */
#define SMSTATUS_ACCESS_ID 2 /* Not granted by ID */
#define SMSTATUS_ACCESS_WRITE 3 /* Writes not allowed */
#define SMSTATUS_ACCESS_READ 4 /* Reads not allowed */
#define SMSTATUS_ACCESS_NONKEY 6 /* Non-key reads not allowed */
#define SMSTATUS_ACCESS_BLOB 9 /* Blob access not allowed */
#define SMSTATUS_ACCESS_DESCB 10 /* Descriptor Blob access spans pages */
#define SMSTATUS_ACCESS_NON_SM 11 /* Outside Secure Memory range */
#define SMSTATUS_ACCESS_XPAGE 12 /* Access crosses pages */
#define SMSTATUS_ACCESS_INITPG 13 /* Page still initializing */
#define SMSTATUS_STATE_SHIFT 0
#define SMSTATUS_STATE_MASK (0xf << SMSTATUS_STATE_SHIFT)
#define SMSTATUS_STATE_RESET 0
#define SMSTATUS_STATE_INIT 1
#define SMSTATUS_STATE_NORMAL 2
#define SMSTATUS_STATE_FAIL 3
/* up to 15 rings, 2 bits shifted by ring number */
#define SMPARTOWN_RING_SHIFT 2
#define SMPARTOWN_RING_MASK 3
#define SMPARTOWN_AVAILABLE 0
#define SMPARTOWN_NOEXIST 1
#define SMPARTOWN_UNAVAILABLE 2
#define SMPARTOWN_OURS 3
/* Maximum number of pages possible */
#define SMPART_MAX_NUMPG_SHIFT 16
#define SMPART_MAX_NUMPG_MASK (0x3f << SMPART_MAX_NUMPG_SHIFT)
/* Maximum partition number */
#define SMPART_MAX_PNUM_SHIFT 12
#define SMPART_MAX_PNUM_MASK (0xf << SMPART_MAX_PNUM_SHIFT)
/* Highest possible page number */
#define SMPART_MAX_PG_SHIFT 0
#define SMPART_MAX_PG_MASK (0x3f << SMPART_MAX_PG_SHIFT)
/* Max size of a page */
#define SMVID_PG_SIZE_SHIFT 16
#define SMVID_PG_SIZE_MASK (0x7 << SMVID_PG_SIZE_SHIFT)
/* Major/Minor Version ID */
#define SMVID_MAJ_VERS_SHIFT 8
#define SMVID_MAJ_VERS (0xf << SMVID_MAJ_VERS_SHIFT)
#define SMVID_MIN_VERS_SHIFT 0
#define SMVID_MIN_VERS (0xf << SMVID_MIN_VERS_SHIFT)
/* LIODN programming for DMA configuration */
#define MSTRID_LOCK_LIODN 0x80000000
#define MSTRID_LOCK_MAKETRUSTED 0x00010000 /* only for JR masterid */
#define MSTRID_LIODN_MASK 0x0fff
struct masterid {
u32 liodn_ms; /* lock and make-trusted control bits */
u32 liodn_ls; /* LIODN for non-sequence and seq access */
};
/* RNGB test mode (replicated twice in some configurations) */
/* Padded out to 0x100 */
struct rngtst {
u32 mode; /* RTSTMODEx - Test mode */
u32 rsvd1[3];
u32 reset; /* RTSTRESETx - Test reset control */
u32 rsvd2[3];
u32 status; /* RTSTSSTATUSx - Test status */
u32 rsvd3;
u32 errstat; /* RTSTERRSTATx - Test error status */
u32 rsvd4;
u32 errctl; /* RTSTERRCTLx - Test error control */
u32 rsvd5;
u32 entropy; /* RTSTENTROPYx - Test entropy */
u32 rsvd6[15];
u32 verifctl; /* RTSTVERIFCTLx - Test verification control */
u32 rsvd7;
u32 verifstat; /* RTSTVERIFSTATx - Test verification status */
u32 rsvd8;
u32 verifdata; /* RTSTVERIFDx - Test verification data */
u32 rsvd9;
u32 xkey; /* RTSTXKEYx - Test XKEY */
u32 rsvd10;
u32 oscctctl; /* RTSTOSCCTCTLx - Test osc. counter control */
u32 rsvd11;
u32 oscct; /* RTSTOSCCTx - Test oscillator counter */
u32 rsvd12;
u32 oscctstat; /* RTSTODCCTSTATx - Test osc counter status */
u32 rsvd13[2];
u32 ofifo[4]; /* RTSTOFIFOx - Test output FIFO */
u32 rsvd14[15];
};
/* RNG4 TRNG test registers */
struct rng4tst {
#define RTMCTL_ACC BIT(5) /* TRNG access mode */
#define RTMCTL_PRGM BIT(16) /* 1 -> program mode, 0 -> run mode */
#define RTMCTL_SAMP_MODE_VON_NEUMANN_ES_SC 0 /* use von Neumann data in
both entropy shifter and
statistical checker */
#define RTMCTL_SAMP_MODE_RAW_ES_SC 1 /* use raw data in both
entropy shifter and
statistical checker */
#define RTMCTL_SAMP_MODE_VON_NEUMANN_ES_RAW_SC 2 /* use von Neumann data in
entropy shifter, raw data
in statistical checker */
#define RTMCTL_SAMP_MODE_INVALID 3 /* invalid combination */
u32 rtmctl; /* misc. control register */
u32 rtscmisc; /* statistical check misc. register */
u32 rtpkrrng; /* poker range register */
union {
u32 rtpkrmax; /* PRGM=1: poker max. limit register */
u32 rtpkrsq; /* PRGM=0: poker square calc. result register */
};
#define RTSDCTL_ENT_DLY_SHIFT 16
#define RTSDCTL_ENT_DLY_MASK (0xffff << RTSDCTL_ENT_DLY_SHIFT)
#define RTSDCTL_ENT_DLY_MIN 3200
#define RTSDCTL_ENT_DLY_MAX 12800
u32 rtsdctl; /* seed control register */
union {
u32 rtsblim; /* PRGM=1: sparse bit limit register */
u32 rttotsam; /* PRGM=0: total samples register */
};
u32 rtfrqmin; /* frequency count min. limit register */
#define RTFRQMAX_DISABLE (1 << 20)
union {
u32 rtfrqmax; /* PRGM=1: freq. count max. limit register */
u32 rtfrqcnt; /* PRGM=0: freq. count register */
};
u32 rsvd1[40];
#define RDSTA_SKVT 0x80000000
#define RDSTA_SKVN 0x40000000
#define RDSTA_IF0 0x00000001
#define RDSTA_IF1 0x00000002
#define RDSTA_IFMASK (RDSTA_IF1 | RDSTA_IF0)
u32 rdsta;
u32 rsvd2[15];
};
/*
* caam_ctrl - basic core configuration
* starts base + 0x0000 padded out to 0x1000
*/
#define KEK_KEY_SIZE 8
#define TKEK_KEY_SIZE 8
#define TDSK_KEY_SIZE 8
#define DECO_RESET 1 /* Use with DECO reset/availability regs */
#define DECO_RESET_0 (DECO_RESET << 0)
#define DECO_RESET_1 (DECO_RESET << 1)
#define DECO_RESET_2 (DECO_RESET << 2)
#define DECO_RESET_3 (DECO_RESET << 3)
#define DECO_RESET_4 (DECO_RESET << 4)
struct caam_ctrl {
/* Basic Configuration Section 000-01f */
/* Read/Writable */
u32 rsvd1;
u32 mcr; /* MCFG Master Config Register */
u32 rsvd2;
u32 scfgr; /* SCFGR, Security Config Register */
/* Bus Access Configuration Section 010-11f */
/* Read/Writable */
struct masterid jr_mid[4]; /* JRxLIODNR - JobR LIODN setup */
u32 rsvd3[11];
u32 jrstart; /* JRSTART - Job Ring Start Register */
struct masterid rtic_mid[4]; /* RTICxLIODNR - RTIC LIODN setup */
u32 rsvd4[5];
u32 deco_rsr; /* DECORSR - Deco Request Source */
u32 rsvd11;
u32 deco_rq; /* DECORR - DECO Request */
struct masterid deco_mid[16]; /* DECOxLIODNR - 1 per DECO */
/* DECO Availability/Reset Section 120-3ff */
u32 deco_avail; /* DAR - DECO availability */
u32 deco_reset; /* DRR - DECO reset */
u32 rsvd6[182];
/* Key Encryption/Decryption Configuration 400-5ff */
/* Read/Writable only while in Non-secure mode */
u32 kek[KEK_KEY_SIZE]; /* JDKEKR - Key Encryption Key */
u32 tkek[TKEK_KEY_SIZE]; /* TDKEKR - Trusted Desc KEK */
u32 tdsk[TDSK_KEY_SIZE]; /* TDSKR - Trusted Desc Signing Key */
u32 rsvd7[32];
u64 sknonce; /* SKNR - Secure Key Nonce */
u32 rsvd8[70];
/* RNG Test/Verification/Debug Access 600-7ff */
/* (Useful in Test/Debug modes only...) */
union {
struct rngtst rtst[2];
struct rng4tst r4tst[2];
};
u32 rsvd9[416];
/* Version registers - introduced with era 10 e80-eff */
struct version_regs vreg;
/* Performance Monitor f00-fff */
struct caam_perfmon perfmon;
};
/*
* Controller master config register defs
*/
#define MCFGR_SWRESET 0x80000000 /* software reset */
#define MCFGR_WDENABLE 0x40000000 /* DECO watchdog enable */
#define MCFGR_WDFAIL 0x20000000 /* DECO watchdog force-fail */
#define MCFGR_DMA_RESET 0x10000000
#define MCFGR_LONG_PTR 0x00010000 /* Use >32-bit desc addressing */
#define SCFGR_RDBENABLE 0x00000400
#define SCFGR_VIRT_EN 0x00008000
#define DECORR_RQD0ENABLE 0x00000001 /* Enable DECO0 for direct access */
#define DECORSR_JR0 0x00000001 /* JR to supply TZ, SDID, ICID */
#define DECORSR_VALID 0x80000000
#define DECORR_DEN0 0x00010000 /* DECO0 available for access*/
/* AXI read cache control */
#define MCFGR_ARCACHE_SHIFT 12
#define MCFGR_ARCACHE_MASK (0xf << MCFGR_ARCACHE_SHIFT)
#define MCFGR_ARCACHE_BUFF (0x1 << MCFGR_ARCACHE_SHIFT)
#define MCFGR_ARCACHE_CACH (0x2 << MCFGR_ARCACHE_SHIFT)
#define MCFGR_ARCACHE_RALL (0x4 << MCFGR_ARCACHE_SHIFT)
/* AXI write cache control */
#define MCFGR_AWCACHE_SHIFT 8
#define MCFGR_AWCACHE_MASK (0xf << MCFGR_AWCACHE_SHIFT)
#define MCFGR_AWCACHE_BUFF (0x1 << MCFGR_AWCACHE_SHIFT)
#define MCFGR_AWCACHE_CACH (0x2 << MCFGR_AWCACHE_SHIFT)
#define MCFGR_AWCACHE_WALL (0x8 << MCFGR_AWCACHE_SHIFT)
/* AXI pipeline depth */
#define MCFGR_AXIPIPE_SHIFT 4
#define MCFGR_AXIPIPE_MASK (0xf << MCFGR_AXIPIPE_SHIFT)
#define MCFGR_AXIPRI 0x00000008 /* Assert AXI priority sideband */
#define MCFGR_LARGE_BURST 0x00000004 /* 128/256-byte burst size */
#define MCFGR_BURST_64 0x00000001 /* 64-byte burst size */
/* JRSTART register offsets */
#define JRSTART_JR0_START 0x00000001 /* Start Job ring 0 */
#define JRSTART_JR1_START 0x00000002 /* Start Job ring 1 */
#define JRSTART_JR2_START 0x00000004 /* Start Job ring 2 */
#define JRSTART_JR3_START 0x00000008 /* Start Job ring 3 */
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
/* Secure Memory Configuration - if you have it */
/* Secure Memory Register Offset from JR Base Reg*/
#define SM_V1_OFFSET 0x0f4
#define SM_V2_OFFSET 0xa00
/* Minimum SM Version ID requiring v2 SM register mapping */
#define SMVID_V2 0x20105
struct caam_secure_mem_v1 {
u32 sm_cmd; /* SMCJRx - Secure memory command */
u32 rsvd1;
u32 sm_status; /* SMCSJRx - Secure memory status */
u32 rsvd2;
u32 sm_perm; /* SMAPJRx - Secure memory access perms */
u32 sm_group2; /* SMAP2JRx - Secure memory access group 2 */
u32 sm_group1; /* SMAP1JRx - Secure memory access group 1 */
};
struct caam_secure_mem_v2 {
u32 sm_perm; /* SMAPJRx - Secure memory access perms */
u32 sm_group2; /* SMAP2JRx - Secure memory access group 2 */
u32 sm_group1; /* SMAP1JRx - Secure memory access group 1 */
u32 rsvd1[118];
u32 sm_cmd; /* SMCJRx - Secure memory command */
u32 rsvd2;
u32 sm_status; /* SMCSJRx - Secure memory status */
};
/*
* caam_job_ring - direct job ring setup
* 1-4 possible per instantiation, base + 1000/2000/3000/4000
* Padded out to 0x1000
*/
struct caam_job_ring {
/* Input ring */
u64 inpring_base; /* IRBAx - Input desc ring baseaddr */
u32 rsvd1;
u32 inpring_size; /* IRSx - Input ring size */
u32 rsvd2;
u32 inpring_avail; /* IRSAx - Input ring room remaining */
u32 rsvd3;
u32 inpring_jobadd; /* IRJAx - Input ring jobs added */
/* Output Ring */
u64 outring_base; /* ORBAx - Output status ring base addr */
u32 rsvd4;
u32 outring_size; /* ORSx - Output ring size */
u32 rsvd5;
u32 outring_rmvd; /* ORJRx - Output ring jobs removed */
u32 rsvd6;
u32 outring_used; /* ORSFx - Output ring slots full */
/* Status/Configuration */
u32 rsvd7;
u32 jroutstatus; /* JRSTAx - JobR output status */
u32 rsvd8;
u32 jrintstatus; /* JRINTx - JobR interrupt status */
u32 rconfig_hi; /* JRxCFG - Ring configuration */
u32 rconfig_lo;
/* Indices. CAAM maintains as "heads" of each queue */
u32 rsvd9;
u32 inp_rdidx; /* IRRIx - Input ring read index */
u32 rsvd10;
u32 out_wtidx; /* ORWIx - Output ring write index */
/* Command/control */
u32 rsvd11;
u32 jrcommand; /* JRCRx - JobR command */
u32 rsvd12[900];
/* Version registers - introduced with era 10 e80-eff */
struct version_regs vreg;
/* Performance Monitor f00-fff */
struct caam_perfmon perfmon;
};
#define JR_RINGSIZE_MASK 0x03ff
/*
* jrstatus - Job Ring Output Status
* All values in lo word
* Also note, same values written out as status through QI
* in the command/status field of a frame descriptor
*/
#define JRSTA_SSRC_SHIFT 28
#define JRSTA_SSRC_MASK 0xf0000000
#define JRSTA_SSRC_NONE 0x00000000
#define JRSTA_SSRC_CCB_ERROR 0x20000000
#define JRSTA_SSRC_JUMP_HALT_USER 0x30000000
#define JRSTA_SSRC_DECO 0x40000000
#define JRSTA_SSRC_QI 0x50000000
#define JRSTA_SSRC_JRERROR 0x60000000
#define JRSTA_SSRC_JUMP_HALT_CC 0x70000000
#define JRSTA_DECOERR_JUMP 0x08000000
#define JRSTA_DECOERR_INDEX_SHIFT 8
#define JRSTA_DECOERR_INDEX_MASK 0xff00
#define JRSTA_DECOERR_ERROR_MASK 0x00ff
#define JRSTA_DECOERR_NONE 0x00
#define JRSTA_DECOERR_LINKLEN 0x01
#define JRSTA_DECOERR_LINKPTR 0x02
#define JRSTA_DECOERR_JRCTRL 0x03
#define JRSTA_DECOERR_DESCCMD 0x04
#define JRSTA_DECOERR_ORDER 0x05
#define JRSTA_DECOERR_KEYCMD 0x06
#define JRSTA_DECOERR_LOADCMD 0x07
#define JRSTA_DECOERR_STORECMD 0x08
#define JRSTA_DECOERR_OPCMD 0x09
#define JRSTA_DECOERR_FIFOLDCMD 0x0a
#define JRSTA_DECOERR_FIFOSTCMD 0x0b
#define JRSTA_DECOERR_MOVECMD 0x0c
#define JRSTA_DECOERR_JUMPCMD 0x0d
#define JRSTA_DECOERR_MATHCMD 0x0e
#define JRSTA_DECOERR_SHASHCMD 0x0f
#define JRSTA_DECOERR_SEQCMD 0x10
#define JRSTA_DECOERR_DECOINTERNAL 0x11
#define JRSTA_DECOERR_SHDESCHDR 0x12
#define JRSTA_DECOERR_HDRLEN 0x13
#define JRSTA_DECOERR_BURSTER 0x14
#define JRSTA_DECOERR_DESCSIGNATURE 0x15
#define JRSTA_DECOERR_DMA 0x16
#define JRSTA_DECOERR_BURSTFIFO 0x17
#define JRSTA_DECOERR_JRRESET 0x1a
#define JRSTA_DECOERR_JOBFAIL 0x1b
#define JRSTA_DECOERR_DNRERR 0x80
#define JRSTA_DECOERR_UNDEFPCL 0x81
#define JRSTA_DECOERR_PDBERR 0x82
#define JRSTA_DECOERR_ANRPLY_LATE 0x83
#define JRSTA_DECOERR_ANRPLY_REPLAY 0x84
#define JRSTA_DECOERR_SEQOVF 0x85
#define JRSTA_DECOERR_INVSIGN 0x86
#define JRSTA_DECOERR_DSASIGN 0x87
#define JRSTA_QIERR_ERROR_MASK 0x00ff
#define JRSTA_CCBERR_JUMP 0x08000000
#define JRSTA_CCBERR_INDEX_MASK 0xff00
#define JRSTA_CCBERR_INDEX_SHIFT 8
#define JRSTA_CCBERR_CHAID_MASK 0x00f0
#define JRSTA_CCBERR_CHAID_SHIFT 4
#define JRSTA_CCBERR_ERRID_MASK 0x000f
#define JRSTA_CCBERR_CHAID_AES (0x01 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_DES (0x02 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_ARC4 (0x03 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_MD (0x04 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_RNG (0x05 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_SNOW (0x06 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_KASUMI (0x07 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_PK (0x08 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_CHAID_CRC (0x09 << JRSTA_CCBERR_CHAID_SHIFT)
#define JRSTA_CCBERR_ERRID_NONE 0x00
#define JRSTA_CCBERR_ERRID_MODE 0x01
#define JRSTA_CCBERR_ERRID_DATASIZ 0x02
#define JRSTA_CCBERR_ERRID_KEYSIZ 0x03
#define JRSTA_CCBERR_ERRID_PKAMEMSZ 0x04
#define JRSTA_CCBERR_ERRID_PKBMEMSZ 0x05
#define JRSTA_CCBERR_ERRID_SEQUENCE 0x06
#define JRSTA_CCBERR_ERRID_PKDIVZRO 0x07
#define JRSTA_CCBERR_ERRID_PKMODEVN 0x08
#define JRSTA_CCBERR_ERRID_KEYPARIT 0x09
#define JRSTA_CCBERR_ERRID_ICVCHK 0x0a
#define JRSTA_CCBERR_ERRID_HARDWARE 0x0b
#define JRSTA_CCBERR_ERRID_CCMAAD 0x0c
#define JRSTA_CCBERR_ERRID_INVCHA 0x0f
#define JRINT_ERR_INDEX_MASK 0x3fff0000
#define JRINT_ERR_INDEX_SHIFT 16
#define JRINT_ERR_TYPE_MASK 0xf00
#define JRINT_ERR_TYPE_SHIFT 8
#define JRINT_ERR_HALT_MASK 0xc
#define JRINT_ERR_HALT_SHIFT 2
#define JRINT_ERR_HALT_INPROGRESS 0x4
#define JRINT_ERR_HALT_COMPLETE 0x8
#define JRINT_JR_ERROR 0x02
#define JRINT_JR_INT 0x01
#define JRINT_ERR_TYPE_WRITE 1
#define JRINT_ERR_TYPE_BAD_INPADDR 3
#define JRINT_ERR_TYPE_BAD_OUTADDR 4
#define JRINT_ERR_TYPE_INV_INPWRT 5
#define JRINT_ERR_TYPE_INV_OUTWRT 6
#define JRINT_ERR_TYPE_RESET 7
#define JRINT_ERR_TYPE_REMOVE_OFL 8
#define JRINT_ERR_TYPE_ADD_OFL 9
#define JRCFG_SOE 0x04
#define JRCFG_ICEN 0x02
#define JRCFG_IMSK 0x01
#define JRCFG_ICDCT_SHIFT 8
#define JRCFG_ICTT_SHIFT 16
#define JRCR_RESET 0x01
MLKU-25-3 crypto: caam - add Secure Memory support This is a squash of the following i.MX BSP commits (rel_imx_4.19.35_1.1.0_rc2) 1. ae8175a3f1be ("MLK-9710-10 Add CCM defs for FIFO_STORE instruction") 2. 9512280d066b ("MLK-9769-11 Add SM register defs, and expanded driver-private storage.") 3. a9dc44de8150 ("MLK-9769-10 Add Blob command bitdefs.") 4. 8f6a17b41917 ("ENGR00289885 [iMX6Q] Add Secure Memory and SECVIO support.") 5. c7d4f9db1077 ("MLK-9710-11 Add internal key cover and external blob export/import to prototype SM-API") 6. 568e449edfca ("MLK-9710-12 Adapt sm_test as a black-key handling example") 7. f42f12d9cb19 ("MLK-9710-13 Correct size in BLOB_OVERHEAD definition") 8. 022fc2b33f57 ("MLK-9710-14 Un-pad cache sizes for blob export/import") 9. 8d3e8c3c4dc1 ("MLK-9710-15 Correct size of padded key buffers") 10. 997fb2ff88ec ("MLK-9710-5 Unregister Secure Memory platform device upon shutdown") 11. 5316249198ee ("MLK-10897-1 ARM: imx7d: Add CAAM support for i.mx7d") 12. 07566f42a4ec ("MLK-11103 Missing register in Secure memory configuration v1") 13. 3004636304e1 ("MLK-12302 caam: Secure Memory platform device creation crashes") 14. 0e6ed5a819f7 ("MLK-13779 crypto: caam - initialize kslock spinlock") 15. b1254b6b5f52 ("Add missing NULL checks in CAAM sm") 16. 61f57509bc9a ("MLK-17992: caam: sm: Fix compilation warnings") 17. 41cf3d4c580c ("MLK-15473-1: crypto: caam: Add CAAM driver support for iMX8 soc family") 18. bb8742481209 ("MLK-17253-1: crypto: caam: Fix computation of SM pages addresses") 19. 308796dfae3b ("MLK-17253-2: crypto: caam: Use correct memory function for Secure Memory") 20. ba2cb6b5fb10 ("MLK-17732-2: SM store: Support iMX8QX and iMX8QM") 21. de710d376af6 ("MLK-17674-1: sm_store remove CONFIG_OF") 22. cfcae647434e ("MLK-17674-2: CAAM SM : get base address from device tree") 23. f49ebbd5eefa ("MLK-17992: caam: sm: Fix compilation warnings") 24. 345ead4338b9 ("MLK-17841: crypto: caam: Correct bugs in Secure Memory") 25. c17811f3fffc ("MLK-18082: crypto: caam: sm: Fix encap/decap function to handle errors") 26. 41bcba1d4c9b ("MLK-18082: crypto: caam: sm: Fix descriptor running functions") 27. b7385ab94784 ("MLK-20204: drivers: crypto: caam: sm: Remove deadcode") 28. 1d749430cb63 ("MLK-20204: drivers: crypto: caam: sm: test: Dealloc keyslot properly") 29. 6a5c2d9d358f ("crypto: caam - lower SM test verbosity") 30. 1a6bc92c0c87 ("MLK-21617: crypto: caam - update SM test error handling") Signed-off-by: Dan Douglass <dan.douglass@nxp.com> Signed-off-by: Victoria Milhoan <vicki.milhoan@freescale.com> Signed-off-by: Steve Cornelius <steve.cornelius@nxp.com> Signed-off-by: Octavian Purdila <octavian.purdila@nxp.com> Signed-off-by: Radu Solea <radu.solea@nxp.com> Signed-off-by: Franck LENORMAND <franck.lenormand@nxp.com> Signed-off-by: Aymen Sghaier <aymen.sghaier@nxp.com> Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> that have been reworked: 4. -make SM depend on JR -enable SM, SECVIO only on i.MX SoCs -fix resource leak - add off_node_put() where needed Split commit in three: 1 - SNVS/SECVIO driver 2 - Secure Memory driver 3 - DT changes 11. Clock handling dropped - logic already upstream. 17. Keep only Secure Memory related changes. Changes related to page 0 registers have been added previously. Other changes are dropped. 21. Always use first jr in ctrlpriv->jr[] array to access registers in page 0 (aliased in jr page), irrespective of SCU presence. Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
2013-07-23 21:47:32 -06:00
/* secure memory command */
#define SMC_PAGE_SHIFT 16
#define SMC_PAGE_MASK (0xffff << SMC_PAGE_SHIFT)
#define SMC_PART_SHIFT 8
#define SMC_PART_MASK (0x0f << SMC_PART_SHIFT)
#define SMC_CMD_SHIFT 0
#define SMC_CMD_MASK (0x0f << SMC_CMD_SHIFT)
#define SMC_CMD_ALLOC_PAGE 0x01 /* allocate page to this partition */
#define SMC_CMD_DEALLOC_PAGE 0x02 /* deallocate page from partition */
#define SMC_CMD_DEALLOC_PART 0x03 /* deallocate partition */
#define SMC_CMD_PAGE_INQUIRY 0x05 /* find partition associate with page */
/* secure memory (command) status */
#define SMCS_PAGE_SHIFT 16
#define SMCS_PAGE_MASK (0x0fff << SMCS_PAGE_SHIFT)
#define SMCS_CMDERR_SHIFT 14
#define SMCS_CMDERR_MASK (3 << SMCS_CMDERR_SHIFT)
#define SMCS_ALCERR_SHIFT 12
#define SMCS_ALCERR_MASK (3 << SMCS_ALCERR_SHIFT)
#define SMCS_PGOWN_SHIFT 6
#define SMCS_PGWON_MASK (3 << SMCS_PGOWN_SHIFT)
#define SMCS_PART_SHIFT 0
#define SMCS_PART_MASK (0xf << SMCS_PART_SHIFT)
#define SMCS_CMDERR_NONE 0
#define SMCS_CMDERR_INCOMP 1 /* Command not yet complete */
#define SMCS_CMDERR_SECFAIL 2 /* Security failure occurred */
#define SMCS_CMDERR_OVERFLOW 3 /* Command overflow */
#define SMCS_ALCERR_NONE 0
#define SMCS_ALCERR_PSPERR 1 /* Partion marked PSP (dealloc only) */
#define SMCS_ALCERR_PAGEAVAIL 2 /* Page not available */
#define SMCS_ALCERR_PARTOWN 3 /* Partition ownership error */
#define SMCS_PGOWN_AVAIL 0 /* Page is available */
#define SMCS_PGOWN_NOEXIST 1 /* Page initializing or nonexistent */
#define SMCS_PGOWN_NOOWN 2 /* Page owned by another processor */
#define SMCS_PGOWN_OWNED 3 /* Page belongs to this processor */
/* secure memory access permissions */
#define SMCS_PERM_KEYMOD_SHIFT 16
#define SMCA_PERM_KEYMOD_MASK (0xff << SMCS_PERM_KEYMOD_SHIFT)
#define SMCA_PERM_CSP_ZERO 0x8000 /* Zero when deallocated or released */
#define SMCA_PERM_PSP_LOCK 0x4000 /* Part./pages can't be deallocated */
#define SMCA_PERM_PERM_LOCK 0x2000 /* Lock permissions */
#define SMCA_PERM_GRP_LOCK 0x1000 /* Lock access groups */
#define SMCA_PERM_RINGID_SHIFT 10
#define SMCA_PERM_RINGID_MASK (3 << SMCA_PERM_RINGID_SHIFT)
#define SMCA_PERM_G2_BLOB 0x0080 /* Group 2 blob import/export */
#define SMCA_PERM_G2_WRITE 0x0020 /* Group 2 write */
#define SMCA_PERM_G2_READ 0x0010 /* Group 2 read */
#define SMCA_PERM_G1_BLOB 0x0008 /* Group 1... */
#define SMCA_PERM_G1_WRITE 0x0002
#define SMCA_PERM_G1_READ 0x0001
/*
* caam_assurance - Assurance Controller View
* base + 0x6000 padded out to 0x1000
*/
struct rtic_element {
u64 address;
u32 rsvd;
u32 length;
};
struct rtic_block {
struct rtic_element element[2];
};
struct rtic_memhash {
u32 memhash_be[32];
u32 memhash_le[32];
};
struct caam_assurance {
/* Status/Command/Watchdog */
u32 rsvd1;
u32 status; /* RSTA - Status */
u32 rsvd2;
u32 cmd; /* RCMD - Command */
u32 rsvd3;
u32 ctrl; /* RCTL - Control */
u32 rsvd4;
u32 throttle; /* RTHR - Throttle */
u32 rsvd5[2];
u64 watchdog; /* RWDOG - Watchdog Timer */
u32 rsvd6;
u32 rend; /* REND - Endian corrections */
u32 rsvd7[50];
/* Block access/configuration @ 100/110/120/130 */
struct rtic_block memblk[4]; /* Memory Blocks A-D */
u32 rsvd8[32];
/* Block hashes @ 200/300/400/500 */
struct rtic_memhash hash[4]; /* Block hash values A-D */
u32 rsvd_3[640];
};
/*
* caam_queue_if - QI configuration and control
* starts base + 0x7000, padded out to 0x1000 long
*/
struct caam_queue_if {
u32 qi_control_hi; /* QICTL - QI Control */
u32 qi_control_lo;
u32 rsvd1;
u32 qi_status; /* QISTA - QI Status */
u32 qi_deq_cfg_hi; /* QIDQC - QI Dequeue Configuration */
u32 qi_deq_cfg_lo;
u32 qi_enq_cfg_hi; /* QISEQC - QI Enqueue Command */
u32 qi_enq_cfg_lo;
u32 rsvd2[1016];
};
/* QI control bits - low word */
#define QICTL_DQEN 0x01 /* Enable frame pop */
#define QICTL_STOP 0x02 /* Stop dequeue/enqueue */
#define QICTL_SOE 0x04 /* Stop on error */
/* QI control bits - high word */
#define QICTL_MBSI 0x01
#define QICTL_MHWSI 0x02
#define QICTL_MWSI 0x04
#define QICTL_MDWSI 0x08
#define QICTL_CBSI 0x10 /* CtrlDataByteSwapInput */
#define QICTL_CHWSI 0x20 /* CtrlDataHalfSwapInput */
#define QICTL_CWSI 0x40 /* CtrlDataWordSwapInput */
#define QICTL_CDWSI 0x80 /* CtrlDataDWordSwapInput */
#define QICTL_MBSO 0x0100
#define QICTL_MHWSO 0x0200
#define QICTL_MWSO 0x0400
#define QICTL_MDWSO 0x0800
#define QICTL_CBSO 0x1000 /* CtrlDataByteSwapOutput */
#define QICTL_CHWSO 0x2000 /* CtrlDataHalfSwapOutput */
#define QICTL_CWSO 0x4000 /* CtrlDataWordSwapOutput */
#define QICTL_CDWSO 0x8000 /* CtrlDataDWordSwapOutput */
#define QICTL_DMBS 0x010000
#define QICTL_EPO 0x020000
/* QI status bits */
#define QISTA_PHRDERR 0x01 /* PreHeader Read Error */
#define QISTA_CFRDERR 0x02 /* Compound Frame Read Error */
#define QISTA_OFWRERR 0x04 /* Output Frame Read Error */
#define QISTA_BPDERR 0x08 /* Buffer Pool Depleted */
#define QISTA_BTSERR 0x10 /* Buffer Undersize */
#define QISTA_CFWRERR 0x20 /* Compound Frame Write Err */
#define QISTA_STOPD 0x80000000 /* QI Stopped (see QICTL) */
/* deco_sg_table - DECO view of scatter/gather table */
struct deco_sg_table {
u64 addr; /* Segment Address */
u32 elen; /* E, F bits + 30-bit length */
u32 bpid_offset; /* Buffer Pool ID + 16-bit length */
};
/*
* caam_deco - descriptor controller - CHA cluster block
*
* Only accessible when direct DECO access is turned on
* (done in DECORR, via MID programmed in DECOxMID
*
* 5 typical, base + 0x8000/9000/a000/b000
* Padded out to 0x1000 long
*/
struct caam_deco {
u32 rsvd1;
u32 cls1_mode; /* CxC1MR - Class 1 Mode */
u32 rsvd2;
u32 cls1_keysize; /* CxC1KSR - Class 1 Key Size */
u32 cls1_datasize_hi; /* CxC1DSR - Class 1 Data Size */
u32 cls1_datasize_lo;
u32 rsvd3;
u32 cls1_icvsize; /* CxC1ICVSR - Class 1 ICV size */
u32 rsvd4[5];
u32 cha_ctrl; /* CCTLR - CHA control */
u32 rsvd5;
u32 irq_crtl; /* CxCIRQ - CCB interrupt done/error/clear */
u32 rsvd6;
u32 clr_written; /* CxCWR - Clear-Written */
u32 ccb_status_hi; /* CxCSTA - CCB Status/Error */
u32 ccb_status_lo;
u32 rsvd7[3];
u32 aad_size; /* CxAADSZR - Current AAD Size */
u32 rsvd8;
u32 cls1_iv_size; /* CxC1IVSZR - Current Class 1 IV Size */
u32 rsvd9[7];
u32 pkha_a_size; /* PKASZRx - Size of PKHA A */
u32 rsvd10;
u32 pkha_b_size; /* PKBSZRx - Size of PKHA B */
u32 rsvd11;
u32 pkha_n_size; /* PKNSZRx - Size of PKHA N */
u32 rsvd12;
u32 pkha_e_size; /* PKESZRx - Size of PKHA E */
u32 rsvd13[24];
u32 cls1_ctx[16]; /* CxC1CTXR - Class 1 Context @100 */
u32 rsvd14[48];
u32 cls1_key[8]; /* CxC1KEYR - Class 1 Key @200 */
u32 rsvd15[121];
u32 cls2_mode; /* CxC2MR - Class 2 Mode */
u32 rsvd16;
u32 cls2_keysize; /* CxX2KSR - Class 2 Key Size */
u32 cls2_datasize_hi; /* CxC2DSR - Class 2 Data Size */
u32 cls2_datasize_lo;
u32 rsvd17;
u32 cls2_icvsize; /* CxC2ICVSZR - Class 2 ICV Size */
u32 rsvd18[56];
u32 cls2_ctx[18]; /* CxC2CTXR - Class 2 Context @500 */
u32 rsvd19[46];
u32 cls2_key[32]; /* CxC2KEYR - Class2 Key @600 */
u32 rsvd20[84];
u32 inp_infofifo_hi; /* CxIFIFO - Input Info FIFO @7d0 */
u32 inp_infofifo_lo;
u32 rsvd21[2];
u64 inp_datafifo; /* CxDFIFO - Input Data FIFO */
u32 rsvd22[2];
u64 out_datafifo; /* CxOFIFO - Output Data FIFO */
u32 rsvd23[2];
u32 jr_ctl_hi; /* CxJRR - JobR Control Register @800 */
u32 jr_ctl_lo;
u64 jr_descaddr; /* CxDADR - JobR Descriptor Address */
#define DECO_OP_STATUS_HI_ERR_MASK 0xF00000FF
u32 op_status_hi; /* DxOPSTA - DECO Operation Status */
u32 op_status_lo;
u32 rsvd24[2];
u32 liodn; /* DxLSR - DECO LIODN Status - non-seq */
u32 td_liodn; /* DxLSR - DECO LIODN Status - trustdesc */
u32 rsvd26[6];
u64 math[4]; /* DxMTH - Math register */
u32 rsvd27[8];
struct deco_sg_table gthr_tbl[4]; /* DxGTR - Gather Tables */
u32 rsvd28[16];
struct deco_sg_table sctr_tbl[4]; /* DxSTR - Scatter Tables */
u32 rsvd29[48];
u32 descbuf[64]; /* DxDESB - Descriptor buffer */
u32 rscvd30[193];
#define DESC_DBG_DECO_STAT_VALID 0x80000000
#define DESC_DBG_DECO_STAT_MASK 0x00F00000
#define DESC_DBG_DECO_STAT_SHIFT 20
u32 desc_dbg; /* DxDDR - DECO Debug Register */
u32 rsvd31[13];
#define DESC_DER_DECO_STAT_MASK 0x000F0000
#define DESC_DER_DECO_STAT_SHIFT 16
u32 dbg_exec; /* DxDER - DECO Debug Exec Register */
u32 rsvd32[112];
};
#define DECO_STAT_HOST_ERR 0xD
#define DECO_JQCR_WHL 0x20000000
#define DECO_JQCR_FOUR 0x10000000
#define JR_BLOCK_NUMBER 1
#define ASSURE_BLOCK_NUMBER 6
#define QI_BLOCK_NUMBER 7
#define DECO_BLOCK_NUMBER 8
#define PG_SIZE_4K 0x1000
#define PG_SIZE_64K 0x10000
#endif /* REGS_H */