123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581 |
- /*
- * Copyright 2016 Broadcom
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License, version 2, as
- * published by the Free Software Foundation (the "GPL").
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License version 2 (GPLv2) for more details.
- *
- * You should have received a copy of the GNU General Public License
- * version 2 (GPLv2) along with this source code.
- */
- #include <linux/debugfs.h>
- #include "cipher.h"
- #include "util.h"
- /* offset of SPU_OFIFO_CTRL register */
- #define SPU_OFIFO_CTRL 0x40
- #define SPU_FIFO_WATERMARK 0x1FF
- /**
- * spu_sg_at_offset() - Find the scatterlist entry at a given distance from the
- * start of a scatterlist.
- * @sg: [in] Start of a scatterlist
- * @skip: [in] Distance from the start of the scatterlist, in bytes
- * @sge: [out] Scatterlist entry at skip bytes from start
- * @sge_offset: [out] Number of bytes from start of sge buffer to get to
- * requested distance.
- *
- * Return: 0 if entry found at requested distance
- * < 0 otherwise
- */
- int spu_sg_at_offset(struct scatterlist *sg, unsigned int skip,
- struct scatterlist **sge, unsigned int *sge_offset)
- {
- /* byte index from start of sg to the end of the previous entry */
- unsigned int index = 0;
- /* byte index from start of sg to the end of the current entry */
- unsigned int next_index;
- next_index = sg->length;
- while (next_index <= skip) {
- sg = sg_next(sg);
- index = next_index;
- if (!sg)
- return -EINVAL;
- next_index += sg->length;
- }
- *sge_offset = skip - index;
- *sge = sg;
- return 0;
- }
- /* Copy len bytes of sg data, starting at offset skip, to a dest buffer */
- void sg_copy_part_to_buf(struct scatterlist *src, u8 *dest,
- unsigned int len, unsigned int skip)
- {
- size_t copied;
- unsigned int nents = sg_nents(src);
- copied = sg_pcopy_to_buffer(src, nents, dest, len, skip);
- if (copied != len) {
- flow_log("%s copied %u bytes of %u requested. ",
- __func__, (u32)copied, len);
- flow_log("sg with %u entries and skip %u\n", nents, skip);
- }
- }
- /*
- * Copy data into a scatterlist starting at a specified offset in the
- * scatterlist. Specifically, copy len bytes of data in the buffer src
- * into the scatterlist dest, starting skip bytes into the scatterlist.
- */
- void sg_copy_part_from_buf(struct scatterlist *dest, u8 *src,
- unsigned int len, unsigned int skip)
- {
- size_t copied;
- unsigned int nents = sg_nents(dest);
- copied = sg_pcopy_from_buffer(dest, nents, src, len, skip);
- if (copied != len) {
- flow_log("%s copied %u bytes of %u requested. ",
- __func__, (u32)copied, len);
- flow_log("sg with %u entries and skip %u\n", nents, skip);
- }
- }
- /**
- * spu_sg_count() - Determine number of elements in scatterlist to provide a
- * specified number of bytes.
- * @sg_list: scatterlist to examine
- * @skip: index of starting point
- * @nbytes: consider elements of scatterlist until reaching this number of
- * bytes
- *
- * Return: the number of sg entries contributing to nbytes of data
- */
- int spu_sg_count(struct scatterlist *sg_list, unsigned int skip, int nbytes)
- {
- struct scatterlist *sg;
- int sg_nents = 0;
- unsigned int offset;
- if (!sg_list)
- return 0;
- if (spu_sg_at_offset(sg_list, skip, &sg, &offset) < 0)
- return 0;
- while (sg && (nbytes > 0)) {
- sg_nents++;
- nbytes -= (sg->length - offset);
- offset = 0;
- sg = sg_next(sg);
- }
- return sg_nents;
- }
- /**
- * spu_msg_sg_add() - Copy scatterlist entries from one sg to another, up to a
- * given length.
- * @to_sg: scatterlist to copy to
- * @from_sg: scatterlist to copy from
- * @from_skip: number of bytes to skip in from_sg. Non-zero when previous
- * request included part of the buffer in entry in from_sg.
- * Assumes from_skip < from_sg->length.
- * @from_nents number of entries in from_sg
- * @length number of bytes to copy. may reach this limit before exhausting
- * from_sg.
- *
- * Copies the entries themselves, not the data in the entries. Assumes to_sg has
- * enough entries. Does not limit the size of an individual buffer in to_sg.
- *
- * to_sg, from_sg, skip are all updated to end of copy
- *
- * Return: Number of bytes copied
- */
- u32 spu_msg_sg_add(struct scatterlist **to_sg,
- struct scatterlist **from_sg, u32 *from_skip,
- u8 from_nents, u32 length)
- {
- struct scatterlist *sg; /* an entry in from_sg */
- struct scatterlist *to = *to_sg;
- struct scatterlist *from = *from_sg;
- u32 skip = *from_skip;
- u32 offset;
- int i;
- u32 entry_len = 0;
- u32 frag_len = 0; /* length of entry added to to_sg */
- u32 copied = 0; /* number of bytes copied so far */
- if (length == 0)
- return 0;
- for_each_sg(from, sg, from_nents, i) {
- /* number of bytes in this from entry not yet used */
- entry_len = sg->length - skip;
- frag_len = min(entry_len, length - copied);
- offset = sg->offset + skip;
- if (frag_len)
- sg_set_page(to++, sg_page(sg), frag_len, offset);
- copied += frag_len;
- if (copied == entry_len) {
- /* used up all of from entry */
- skip = 0; /* start at beginning of next entry */
- }
- if (copied == length)
- break;
- }
- *to_sg = to;
- *from_sg = sg;
- if (frag_len < entry_len)
- *from_skip = skip + frag_len;
- else
- *from_skip = 0;
- return copied;
- }
- void add_to_ctr(u8 *ctr_pos, unsigned int increment)
- {
- __be64 *high_be = (__be64 *)ctr_pos;
- __be64 *low_be = high_be + 1;
- u64 orig_low = __be64_to_cpu(*low_be);
- u64 new_low = orig_low + (u64)increment;
- *low_be = __cpu_to_be64(new_low);
- if (new_low < orig_low)
- /* there was a carry from the low 8 bytes */
- *high_be = __cpu_to_be64(__be64_to_cpu(*high_be) + 1);
- }
- struct sdesc {
- struct shash_desc shash;
- char ctx[];
- };
- /* do a synchronous decrypt operation */
- int do_decrypt(char *alg_name,
- void *key_ptr, unsigned int key_len,
- void *iv_ptr, void *src_ptr, void *dst_ptr,
- unsigned int block_len)
- {
- struct scatterlist sg_in[1], sg_out[1];
- struct crypto_blkcipher *tfm =
- crypto_alloc_blkcipher(alg_name, 0, CRYPTO_ALG_ASYNC);
- struct blkcipher_desc desc = {.tfm = tfm, .flags = 0 };
- int ret = 0;
- void *iv;
- int ivsize;
- flow_log("%s() name:%s block_len:%u\n", __func__, alg_name, block_len);
- if (IS_ERR(tfm))
- return PTR_ERR(tfm);
- crypto_blkcipher_setkey((void *)tfm, key_ptr, key_len);
- sg_init_table(sg_in, 1);
- sg_set_buf(sg_in, src_ptr, block_len);
- sg_init_table(sg_out, 1);
- sg_set_buf(sg_out, dst_ptr, block_len);
- iv = crypto_blkcipher_crt(tfm)->iv;
- ivsize = crypto_blkcipher_ivsize(tfm);
- memcpy(iv, iv_ptr, ivsize);
- ret = crypto_blkcipher_decrypt(&desc, sg_out, sg_in, block_len);
- crypto_free_blkcipher(tfm);
- if (ret < 0)
- pr_err("aes_decrypt failed %d\n", ret);
- return ret;
- }
- /**
- * do_shash() - Do a synchronous hash operation in software
- * @name: The name of the hash algorithm
- * @result: Buffer where digest is to be written
- * @data1: First part of data to hash. May be NULL.
- * @data1_len: Length of data1, in bytes
- * @data2: Second part of data to hash. May be NULL.
- * @data2_len: Length of data2, in bytes
- * @key: Key (if keyed hash)
- * @key_len: Length of key, in bytes (or 0 if non-keyed hash)
- *
- * Note that the crypto API will not select this driver's own transform because
- * this driver only registers asynchronous algos.
- *
- * Return: 0 if hash successfully stored in result
- * < 0 otherwise
- */
- int do_shash(unsigned char *name, unsigned char *result,
- const u8 *data1, unsigned int data1_len,
- const u8 *data2, unsigned int data2_len,
- const u8 *key, unsigned int key_len)
- {
- int rc;
- unsigned int size;
- struct crypto_shash *hash;
- struct sdesc *sdesc;
- hash = crypto_alloc_shash(name, 0, 0);
- if (IS_ERR(hash)) {
- rc = PTR_ERR(hash);
- pr_err("%s: Crypto %s allocation error %d\n", __func__, name, rc);
- return rc;
- }
- size = sizeof(struct shash_desc) + crypto_shash_descsize(hash);
- sdesc = kmalloc(size, GFP_KERNEL);
- if (!sdesc) {
- rc = -ENOMEM;
- goto do_shash_err;
- }
- sdesc->shash.tfm = hash;
- sdesc->shash.flags = 0x0;
- if (key_len > 0) {
- rc = crypto_shash_setkey(hash, key, key_len);
- if (rc) {
- pr_err("%s: Could not setkey %s shash\n", __func__, name);
- goto do_shash_err;
- }
- }
- rc = crypto_shash_init(&sdesc->shash);
- if (rc) {
- pr_err("%s: Could not init %s shash\n", __func__, name);
- goto do_shash_err;
- }
- rc = crypto_shash_update(&sdesc->shash, data1, data1_len);
- if (rc) {
- pr_err("%s: Could not update1\n", __func__);
- goto do_shash_err;
- }
- if (data2 && data2_len) {
- rc = crypto_shash_update(&sdesc->shash, data2, data2_len);
- if (rc) {
- pr_err("%s: Could not update2\n", __func__);
- goto do_shash_err;
- }
- }
- rc = crypto_shash_final(&sdesc->shash, result);
- if (rc)
- pr_err("%s: Could not generate %s hash\n", __func__, name);
- do_shash_err:
- crypto_free_shash(hash);
- kfree(sdesc);
- return rc;
- }
- /* Dump len bytes of a scatterlist starting at skip bytes into the sg */
- void __dump_sg(struct scatterlist *sg, unsigned int skip, unsigned int len)
- {
- u8 dbuf[16];
- unsigned int idx = skip;
- unsigned int num_out = 0; /* number of bytes dumped so far */
- unsigned int count;
- if (packet_debug_logging) {
- while (num_out < len) {
- count = (len - num_out > 16) ? 16 : len - num_out;
- sg_copy_part_to_buf(sg, dbuf, count, idx);
- num_out += count;
- print_hex_dump(KERN_ALERT, " sg: ", DUMP_PREFIX_NONE,
- 4, 1, dbuf, count, false);
- idx += 16;
- }
- }
- if (debug_logging_sleep)
- msleep(debug_logging_sleep);
- }
- /* Returns the name for a given cipher alg/mode */
- char *spu_alg_name(enum spu_cipher_alg alg, enum spu_cipher_mode mode)
- {
- switch (alg) {
- case CIPHER_ALG_RC4:
- return "rc4";
- case CIPHER_ALG_AES:
- switch (mode) {
- case CIPHER_MODE_CBC:
- return "cbc(aes)";
- case CIPHER_MODE_ECB:
- return "ecb(aes)";
- case CIPHER_MODE_OFB:
- return "ofb(aes)";
- case CIPHER_MODE_CFB:
- return "cfb(aes)";
- case CIPHER_MODE_CTR:
- return "ctr(aes)";
- case CIPHER_MODE_XTS:
- return "xts(aes)";
- case CIPHER_MODE_GCM:
- return "gcm(aes)";
- default:
- return "aes";
- }
- break;
- case CIPHER_ALG_DES:
- switch (mode) {
- case CIPHER_MODE_CBC:
- return "cbc(des)";
- case CIPHER_MODE_ECB:
- return "ecb(des)";
- case CIPHER_MODE_CTR:
- return "ctr(des)";
- default:
- return "des";
- }
- break;
- case CIPHER_ALG_3DES:
- switch (mode) {
- case CIPHER_MODE_CBC:
- return "cbc(des3_ede)";
- case CIPHER_MODE_ECB:
- return "ecb(des3_ede)";
- case CIPHER_MODE_CTR:
- return "ctr(des3_ede)";
- default:
- return "3des";
- }
- break;
- default:
- return "other";
- }
- }
- static ssize_t spu_debugfs_read(struct file *filp, char __user *ubuf,
- size_t count, loff_t *offp)
- {
- struct device_private *ipriv;
- char *buf;
- ssize_t ret, out_offset, out_count;
- int i;
- u32 fifo_len;
- u32 spu_ofifo_ctrl;
- u32 alg;
- u32 mode;
- u32 op_cnt;
- out_count = 2048;
- buf = kmalloc(out_count, GFP_KERNEL);
- if (!buf)
- return -ENOMEM;
- ipriv = filp->private_data;
- out_offset = 0;
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Number of SPUs.........%u\n",
- ipriv->spu.num_spu);
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Current sessions.......%u\n",
- atomic_read(&ipriv->session_count));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Session count..........%u\n",
- atomic_read(&ipriv->stream_count));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Cipher setkey..........%u\n",
- atomic_read(&ipriv->setkey_cnt[SPU_OP_CIPHER]));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Cipher Ops.............%u\n",
- atomic_read(&ipriv->op_counts[SPU_OP_CIPHER]));
- for (alg = 0; alg < CIPHER_ALG_LAST; alg++) {
- for (mode = 0; mode < CIPHER_MODE_LAST; mode++) {
- op_cnt = atomic_read(&ipriv->cipher_cnt[alg][mode]);
- if (op_cnt) {
- out_offset += snprintf(buf + out_offset,
- out_count - out_offset,
- " %-13s%11u\n",
- spu_alg_name(alg, mode), op_cnt);
- }
- }
- }
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Hash Ops...............%u\n",
- atomic_read(&ipriv->op_counts[SPU_OP_HASH]));
- for (alg = 0; alg < HASH_ALG_LAST; alg++) {
- op_cnt = atomic_read(&ipriv->hash_cnt[alg]);
- if (op_cnt) {
- out_offset += snprintf(buf + out_offset,
- out_count - out_offset,
- " %-13s%11u\n",
- hash_alg_name[alg], op_cnt);
- }
- }
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "HMAC setkey............%u\n",
- atomic_read(&ipriv->setkey_cnt[SPU_OP_HMAC]));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "HMAC Ops...............%u\n",
- atomic_read(&ipriv->op_counts[SPU_OP_HMAC]));
- for (alg = 0; alg < HASH_ALG_LAST; alg++) {
- op_cnt = atomic_read(&ipriv->hmac_cnt[alg]);
- if (op_cnt) {
- out_offset += snprintf(buf + out_offset,
- out_count - out_offset,
- " %-13s%11u\n",
- hash_alg_name[alg], op_cnt);
- }
- }
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "AEAD setkey............%u\n",
- atomic_read(&ipriv->setkey_cnt[SPU_OP_AEAD]));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "AEAD Ops...............%u\n",
- atomic_read(&ipriv->op_counts[SPU_OP_AEAD]));
- for (alg = 0; alg < AEAD_TYPE_LAST; alg++) {
- op_cnt = atomic_read(&ipriv->aead_cnt[alg]);
- if (op_cnt) {
- out_offset += snprintf(buf + out_offset,
- out_count - out_offset,
- " %-13s%11u\n",
- aead_alg_name[alg], op_cnt);
- }
- }
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Bytes of req data......%llu\n",
- (u64)atomic64_read(&ipriv->bytes_out));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Bytes of resp data.....%llu\n",
- (u64)atomic64_read(&ipriv->bytes_in));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Mailbox full...........%u\n",
- atomic_read(&ipriv->mb_no_spc));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Mailbox send failures..%u\n",
- atomic_read(&ipriv->mb_send_fail));
- out_offset += snprintf(buf + out_offset, out_count - out_offset,
- "Check ICV errors.......%u\n",
- atomic_read(&ipriv->bad_icv));
- if (ipriv->spu.spu_type == SPU_TYPE_SPUM)
- for (i = 0; i < ipriv->spu.num_spu; i++) {
- spu_ofifo_ctrl = ioread32(ipriv->spu.reg_vbase[i] +
- SPU_OFIFO_CTRL);
- fifo_len = spu_ofifo_ctrl & SPU_FIFO_WATERMARK;
- out_offset += snprintf(buf + out_offset,
- out_count - out_offset,
- "SPU %d output FIFO high water.....%u\n",
- i, fifo_len);
- }
- if (out_offset > out_count)
- out_offset = out_count;
- ret = simple_read_from_buffer(ubuf, count, offp, buf, out_offset);
- kfree(buf);
- return ret;
- }
- static const struct file_operations spu_debugfs_stats = {
- .owner = THIS_MODULE,
- .open = simple_open,
- .read = spu_debugfs_read,
- };
- /*
- * Create the debug FS directories. If the top-level directory has not yet
- * been created, create it now. Create a stats file in this directory for
- * a SPU.
- */
- void spu_setup_debugfs(void)
- {
- if (!debugfs_initialized())
- return;
- if (!iproc_priv.debugfs_dir)
- iproc_priv.debugfs_dir = debugfs_create_dir(KBUILD_MODNAME,
- NULL);
- if (!iproc_priv.debugfs_stats)
- /* Create file with permissions S_IRUSR */
- debugfs_create_file("stats", 0400, iproc_priv.debugfs_dir,
- &iproc_priv, &spu_debugfs_stats);
- }
- void spu_free_debugfs(void)
- {
- debugfs_remove_recursive(iproc_priv.debugfs_dir);
- iproc_priv.debugfs_dir = NULL;
- }
- /**
- * format_value_ccm() - Format a value into a buffer, using a specified number
- * of bytes (i.e. maybe writing value X into a 4 byte
- * buffer, or maybe into a 12 byte buffer), as per the
- * SPU CCM spec.
- *
- * @val: value to write (up to max of unsigned int)
- * @buf: (pointer to) buffer to write the value
- * @len: number of bytes to use (0 to 255)
- *
- */
- void format_value_ccm(unsigned int val, u8 *buf, u8 len)
- {
- int i;
- /* First clear full output buffer */
- memset(buf, 0, len);
- /* Then, starting from right side, fill in with data */
- for (i = 0; i < len; i++) {
- buf[len - i - 1] = (val >> (8 * i)) & 0xff;
- if (i >= 3)
- break; /* Only handle up to 32 bits of 'val' */
- }
- }
|