zcrypt_cex4.c 19.9 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2
/*
3
 *  Copyright IBM Corp. 2012, 2019
4 5 6 7 8 9 10 11 12
 *  Author(s): Holger Dengler <hd@linux.vnet.ibm.com>
 */

#include <linux/module.h>
#include <linux/slab.h>
#include <linux/init.h>
#include <linux/err.h>
#include <linux/atomic.h>
#include <linux/uaccess.h>
13
#include <linux/mod_devicetable.h>
14 15 16 17 18 19 20

#include "ap_bus.h"
#include "zcrypt_api.h"
#include "zcrypt_msgtype6.h"
#include "zcrypt_msgtype50.h"
#include "zcrypt_error.h"
#include "zcrypt_cex4.h"
21
#include "zcrypt_ccamisc.h"
22
#include "zcrypt_ep11misc.h"
23 24 25 26 27 28 29 30 31 32 33

#define CEX4A_MIN_MOD_SIZE	  1	/*    8 bits	*/
#define CEX4A_MAX_MOD_SIZE_2K	256	/* 2048 bits	*/
#define CEX4A_MAX_MOD_SIZE_4K	512	/* 4096 bits	*/

#define CEX4C_MIN_MOD_SIZE	 16	/*  256 bits	*/
#define CEX4C_MAX_MOD_SIZE	512	/* 4096 bits	*/

#define CEX4A_MAX_MESSAGE_SIZE	MSGTYPE50_CRB3_MAX_MSG_SIZE
#define CEX4C_MAX_MESSAGE_SIZE	MSGTYPE06_MAX_MSG_SIZE

34 35 36 37 38
/* Waiting time for requests to be processed.
 * Currently there are some types of request which are not deterministic.
 * But the maximum time limit managed by the stomper code is set to 60sec.
 * Hence we have to wait at least that time period.
 */
39
#define CEX4_CLEANUP_TIME	(900*HZ)
40 41

MODULE_AUTHOR("IBM Corporation");
42 43
MODULE_DESCRIPTION("CEX4/CEX5/CEX6/CEX7 Cryptographic Card device driver, " \
		   "Copyright IBM Corp. 2019");
44 45
MODULE_LICENSE("GPL");

46 47 48 49 50
static struct ap_device_id zcrypt_cex4_card_ids[] = {
	{ .dev_type = AP_DEVICE_TYPE_CEX4,
	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
	{ .dev_type = AP_DEVICE_TYPE_CEX5,
	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
51 52
	{ .dev_type = AP_DEVICE_TYPE_CEX6,
	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
53 54
	{ .dev_type = AP_DEVICE_TYPE_CEX7,
	  .match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
55 56 57 58
	{ /* end of list */ },
};

MODULE_DEVICE_TABLE(ap, zcrypt_cex4_card_ids);
59

60 61 62 63 64
static struct ap_device_id zcrypt_cex4_queue_ids[] = {
	{ .dev_type = AP_DEVICE_TYPE_CEX4,
	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
	{ .dev_type = AP_DEVICE_TYPE_CEX5,
	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
65 66
	{ .dev_type = AP_DEVICE_TYPE_CEX6,
	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
67 68
	{ .dev_type = AP_DEVICE_TYPE_CEX7,
	  .match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
69
	{ /* end of list */ },
70 71
};

72 73
MODULE_DEVICE_TABLE(ap, zcrypt_cex4_queue_ids);

74
/*
75
 * CCA card additional device attributes
76
 */
77 78 79
static ssize_t cca_serialnr_show(struct device *dev,
				 struct device_attribute *attr,
				 char *buf)
80 81 82 83 84 85 86 87 88 89
{
	struct cca_info ci;
	struct ap_card *ac = to_ap_card(dev);
	struct zcrypt_card *zc = ac->private;

	memset(&ci, 0, sizeof(ci));

	if (ap_domain_index >= 0)
		cca_get_info(ac->id, ap_domain_index, &ci, zc->online);

90
	return scnprintf(buf, PAGE_SIZE, "%s\n", ci.serial);
91
}
92 93 94

static struct device_attribute dev_attr_cca_serialnr =
	__ATTR(serialnr, 0444, cca_serialnr_show, NULL);
95 96

static struct attribute *cca_card_attrs[] = {
97
	&dev_attr_cca_serialnr.attr,
98 99 100
	NULL,
};

101
static const struct attribute_group cca_card_attr_grp = {
102 103 104
	.attrs = cca_card_attrs,
};

105 106 107 108 109 110
 /*
  * CCA queue additional device attributes
  */
static ssize_t cca_mkvps_show(struct device *dev,
			      struct device_attribute *attr,
			      char *buf)
111 112 113 114 115 116 117 118 119 120 121 122 123
{
	int n = 0;
	struct cca_info ci;
	struct zcrypt_queue *zq = to_ap_queue(dev)->private;
	static const char * const cao_state[] = { "invalid", "valid" };
	static const char * const new_state[] = { "empty", "partial", "full" };

	memset(&ci, 0, sizeof(ci));

	cca_get_info(AP_QID_CARD(zq->queue->qid),
		     AP_QID_QUEUE(zq->queue->qid),
		     &ci, zq->online);

124
	if (ci.new_aes_mk_state >= '1' && ci.new_aes_mk_state <= '3')
125
		n = scnprintf(buf, PAGE_SIZE, "AES NEW: %s 0x%016llx\n",
126 127
			      new_state[ci.new_aes_mk_state - '1'],
			      ci.new_aes_mkvp);
128
	else
129
		n = scnprintf(buf, PAGE_SIZE, "AES NEW: - -\n");
130

131
	if (ci.cur_aes_mk_state >= '1' && ci.cur_aes_mk_state <= '2')
132 133
		n += scnprintf(buf + n, PAGE_SIZE - n,
			       "AES CUR: %s 0x%016llx\n",
134 135
			       cao_state[ci.cur_aes_mk_state - '1'],
			       ci.cur_aes_mkvp);
136
	else
137
		n += scnprintf(buf + n, PAGE_SIZE - n, "AES CUR: - -\n");
138

139
	if (ci.old_aes_mk_state >= '1' && ci.old_aes_mk_state <= '2')
140 141
		n += scnprintf(buf + n, PAGE_SIZE - n,
			       "AES OLD: %s 0x%016llx\n",
142 143
			       cao_state[ci.old_aes_mk_state - '1'],
			       ci.old_aes_mkvp);
144
	else
145
		n += scnprintf(buf + n, PAGE_SIZE - n, "AES OLD: - -\n");
146

147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170
	if (ci.new_apka_mk_state >= '1' && ci.new_apka_mk_state <= '3')
		n += scnprintf(buf + n, PAGE_SIZE - n,
			       "APKA NEW: %s 0x%016llx\n",
			       new_state[ci.new_apka_mk_state - '1'],
			       ci.new_apka_mkvp);
	else
		n += scnprintf(buf + n, PAGE_SIZE - n, "APKA NEW: - -\n");

	if (ci.cur_apka_mk_state >= '1' && ci.cur_apka_mk_state <= '2')
		n += scnprintf(buf + n, PAGE_SIZE - n,
			       "APKA CUR: %s 0x%016llx\n",
			       cao_state[ci.cur_apka_mk_state - '1'],
			       ci.cur_apka_mkvp);
	else
		n += scnprintf(buf + n, PAGE_SIZE - n, "APKA CUR: - -\n");

	if (ci.old_apka_mk_state >= '1' && ci.old_apka_mk_state <= '2')
		n += scnprintf(buf + n, PAGE_SIZE - n,
			       "APKA OLD: %s 0x%016llx\n",
			       cao_state[ci.old_apka_mk_state - '1'],
			       ci.old_apka_mkvp);
	else
		n += scnprintf(buf + n, PAGE_SIZE - n, "APKA OLD: - -\n");

171 172
	return n;
}
173 174 175

static struct device_attribute dev_attr_cca_mkvps =
	__ATTR(mkvps, 0444, cca_mkvps_show, NULL);
176 177

static struct attribute *cca_queue_attrs[] = {
178
	&dev_attr_cca_mkvps.attr,
179 180 181
	NULL,
};

182
static const struct attribute_group cca_queue_attr_grp = {
183 184 185
	.attrs = cca_queue_attrs,
};

186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201
/*
 * EP11 card additional device attributes
 */
static ssize_t ep11_api_ordinalnr_show(struct device *dev,
				       struct device_attribute *attr,
				       char *buf)
{
	struct ep11_card_info ci;
	struct ap_card *ac = to_ap_card(dev);
	struct zcrypt_card *zc = ac->private;

	memset(&ci, 0, sizeof(ci));

	ep11_get_card_info(ac->id, &ci, zc->online);

	if (ci.API_ord_nr > 0)
202
		return scnprintf(buf, PAGE_SIZE, "%u\n", ci.API_ord_nr);
203
	else
204
		return scnprintf(buf, PAGE_SIZE, "\n");
205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222
}

static struct device_attribute dev_attr_ep11_api_ordinalnr =
	__ATTR(API_ordinalnr, 0444, ep11_api_ordinalnr_show, NULL);

static ssize_t ep11_fw_version_show(struct device *dev,
				    struct device_attribute *attr,
				    char *buf)
{
	struct ep11_card_info ci;
	struct ap_card *ac = to_ap_card(dev);
	struct zcrypt_card *zc = ac->private;

	memset(&ci, 0, sizeof(ci));

	ep11_get_card_info(ac->id, &ci, zc->online);

	if (ci.FW_version > 0)
223 224 225
		return scnprintf(buf, PAGE_SIZE, "%d.%d\n",
				 (int)(ci.FW_version >> 8),
				 (int)(ci.FW_version & 0xFF));
226
	else
227
		return scnprintf(buf, PAGE_SIZE, "\n");
228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245
}

static struct device_attribute dev_attr_ep11_fw_version =
	__ATTR(FW_version, 0444, ep11_fw_version_show, NULL);

static ssize_t ep11_serialnr_show(struct device *dev,
				  struct device_attribute *attr,
				  char *buf)
{
	struct ep11_card_info ci;
	struct ap_card *ac = to_ap_card(dev);
	struct zcrypt_card *zc = ac->private;

	memset(&ci, 0, sizeof(ci));

	ep11_get_card_info(ac->id, &ci, zc->online);

	if (ci.serial[0])
246
		return scnprintf(buf, PAGE_SIZE, "%16.16s\n", ci.serial);
247
	else
248
		return scnprintf(buf, PAGE_SIZE, "\n");
249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279
}

static struct device_attribute dev_attr_ep11_serialnr =
	__ATTR(serialnr, 0444, ep11_serialnr_show, NULL);

static const struct {
	int	    mode_bit;
	const char *mode_txt;
} ep11_op_modes[] = {
	{ 0, "FIPS2009" },
	{ 1, "BSI2009" },
	{ 2, "FIPS2011" },
	{ 3, "BSI2011" },
	{ 6, "BSICC2017" },
	{ 0, NULL }
};

static ssize_t ep11_card_op_modes_show(struct device *dev,
				       struct device_attribute *attr,
				       char *buf)
{
	int i, n = 0;
	struct ep11_card_info ci;
	struct ap_card *ac = to_ap_card(dev);
	struct zcrypt_card *zc = ac->private;

	memset(&ci, 0, sizeof(ci));

	ep11_get_card_info(ac->id, &ci, zc->online);

	for (i = 0; ep11_op_modes[i].mode_txt; i++) {
280
		if (ci.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
281 282
			if (n > 0)
				buf[n++] = ' ';
283 284
			n += scnprintf(buf + n, PAGE_SIZE - n,
				       "%s", ep11_op_modes[i].mode_txt);
285 286
		}
	}
287
	n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329

	return n;
}

static struct device_attribute dev_attr_ep11_card_op_modes =
	__ATTR(op_modes, 0444, ep11_card_op_modes_show, NULL);

static struct attribute *ep11_card_attrs[] = {
	&dev_attr_ep11_api_ordinalnr.attr,
	&dev_attr_ep11_fw_version.attr,
	&dev_attr_ep11_serialnr.attr,
	&dev_attr_ep11_card_op_modes.attr,
	NULL,
};

static const struct attribute_group ep11_card_attr_grp = {
	.attrs = ep11_card_attrs,
};

/*
 * EP11 queue additional device attributes
 */

static ssize_t ep11_mkvps_show(struct device *dev,
			       struct device_attribute *attr,
			       char *buf)
{
	int n = 0;
	struct ep11_domain_info di;
	struct zcrypt_queue *zq = to_ap_queue(dev)->private;
	static const char * const cwk_state[] = { "invalid", "valid" };
	static const char * const nwk_state[] = { "empty", "uncommitted",
						  "committed" };

	memset(&di, 0, sizeof(di));

	if (zq->online)
		ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
				     AP_QID_QUEUE(zq->queue->qid),
				     &di);

	if (di.cur_wk_state == '0') {
330 331
		n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s -\n",
			      cwk_state[di.cur_wk_state - '0']);
332
	} else if (di.cur_wk_state == '1') {
333 334
		n = scnprintf(buf, PAGE_SIZE, "WK CUR: %s 0x",
			      cwk_state[di.cur_wk_state - '0']);
335 336
		bin2hex(buf + n, di.cur_wkvp, sizeof(di.cur_wkvp));
		n += 2 * sizeof(di.cur_wkvp);
337
		n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
338
	} else
339
		n = scnprintf(buf, PAGE_SIZE, "WK CUR: - -\n");
340 341

	if (di.new_wk_state == '0') {
342 343
		n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s -\n",
			       nwk_state[di.new_wk_state - '0']);
344
	} else if (di.new_wk_state >= '1' && di.new_wk_state <= '2') {
345 346
		n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: %s 0x",
			       nwk_state[di.new_wk_state - '0']);
347 348
		bin2hex(buf + n, di.new_wkvp, sizeof(di.new_wkvp));
		n += 2 * sizeof(di.new_wkvp);
349
		n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
350
	} else
351
		n += scnprintf(buf + n, PAGE_SIZE - n, "WK NEW: - -\n");
352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374

	return n;
}

static struct device_attribute dev_attr_ep11_mkvps =
	__ATTR(mkvps, 0444, ep11_mkvps_show, NULL);

static ssize_t ep11_queue_op_modes_show(struct device *dev,
					struct device_attribute *attr,
					char *buf)
{
	int i, n = 0;
	struct ep11_domain_info di;
	struct zcrypt_queue *zq = to_ap_queue(dev)->private;

	memset(&di, 0, sizeof(di));

	if (zq->online)
		ep11_get_domain_info(AP_QID_CARD(zq->queue->qid),
				     AP_QID_QUEUE(zq->queue->qid),
				     &di);

	for (i = 0; ep11_op_modes[i].mode_txt; i++) {
375
		if (di.op_mode & (1ULL << ep11_op_modes[i].mode_bit)) {
376 377
			if (n > 0)
				buf[n++] = ' ';
378 379
			n += scnprintf(buf + n, PAGE_SIZE - n,
				       "%s", ep11_op_modes[i].mode_txt);
380 381
		}
	}
382
	n += scnprintf(buf + n, PAGE_SIZE - n, "\n");
383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399

	return n;
}

static struct device_attribute dev_attr_ep11_queue_op_modes =
	__ATTR(op_modes, 0444, ep11_queue_op_modes_show, NULL);

static struct attribute *ep11_queue_attrs[] = {
	&dev_attr_ep11_mkvps.attr,
	&dev_attr_ep11_queue_op_modes.attr,
	NULL,
};

static const struct attribute_group ep11_queue_attr_grp = {
	.attrs = ep11_queue_attrs,
};

400
/**
401
 * Probe function for CEX4/CEX5/CEX6/CEX7 card device. It always
402 403
 * accepts the AP device since the bus_match already checked
 * the hardware type.
404 405
 * @ap_dev: pointer to the AP device.
 */
406
static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
407
{
408 409 410 411
	/*
	 * Normalized speed ratings per crypto adapter
	 * MEX_1k, MEX_2k, MEX_4k, CRT_1k, CRT_2k, CRT_4k, RNG, SECKEY
	 */
412
	static const int CEX4A_SPEED_IDX[NUM_OPS] = {
413
		 14,  19, 249, 42, 228, 1458, 0, 0};
414
	static const int CEX5A_SPEED_IDX[NUM_OPS] = {
415
		  8,   9,  20, 18,  66,	 458, 0, 0};
416
	static const int CEX6A_SPEED_IDX[NUM_OPS] = {
417
		  6,   9,  20, 17,  65,	 438, 0, 0};
418
	static const int CEX7A_SPEED_IDX[NUM_OPS] = {
419
		  6,   8,  17, 15,  54,	 362, 0, 0};
420

421
	static const int CEX4C_SPEED_IDX[NUM_OPS] = {
422
		 59,  69, 308, 83, 278, 2204, 209, 40};
423
	static const int CEX5C_SPEED_IDX[] = {
424
		 24,  31,  50, 37,  90,	 479,  27, 10};
425
	static const int CEX6C_SPEED_IDX[NUM_OPS] = {
426
		 16,  20,  32, 27,  77,	 455,  24,  9};
427
	static const int CEX7C_SPEED_IDX[NUM_OPS] = {
428
		 14,  16,  26, 23,  64,	 376,  23,  8};
429

430
	static const int CEX4P_SPEED_IDX[NUM_OPS] = {
431
		  0,   0,   0,	 0,   0,   0,	0,  50};
432
	static const int CEX5P_SPEED_IDX[NUM_OPS] = {
433
		  0,   0,   0,	 0,   0,   0,	0,  10};
434
	static const int CEX6P_SPEED_IDX[NUM_OPS] = {
435
		  0,   0,   0,	 0,   0,   0,	0,   9};
436
	static const int CEX7P_SPEED_IDX[NUM_OPS] = {
437
		  0,   0,   0,	 0,   0,   0,	0,   8};
438 439 440

	struct ap_card *ac = to_ap_card(&ap_dev->device);
	struct zcrypt_card *zc;
441 442
	int rc = 0;

443 444 445 446 447 448 449 450 451
	zc = zcrypt_card_alloc();
	if (!zc)
		return -ENOMEM;
	zc->card = ac;
	ac->private = zc;
	if (ap_test_bit(&ac->functions, AP_FUNC_ACCEL)) {
		if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
			zc->type_string = "CEX4A";
			zc->user_space_type = ZCRYPT_CEX4;
452
			zc->speed_rating = CEX4A_SPEED_IDX;
453
		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
454 455
			zc->type_string = "CEX5A";
			zc->user_space_type = ZCRYPT_CEX5;
456
			zc->speed_rating = CEX5A_SPEED_IDX;
457
		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
458 459
			zc->type_string = "CEX6A";
			zc->user_space_type = ZCRYPT_CEX6;
460
			zc->speed_rating = CEX6A_SPEED_IDX;
461 462 463 464 465 466
		} else {
			zc->type_string = "CEX7A";
			/* wrong user space type, just for compatibility
			 * with the ZCRYPT_STATUS_MASK ioctl.
			 */
			zc->user_space_type = ZCRYPT_CEX6;
467
			zc->speed_rating = CEX7A_SPEED_IDX;
468
		}
469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
		zc->min_mod_size = CEX4A_MIN_MOD_SIZE;
		if (ap_test_bit(&ac->functions, AP_FUNC_MEX4K) &&
		    ap_test_bit(&ac->functions, AP_FUNC_CRT4K)) {
			zc->max_mod_size = CEX4A_MAX_MOD_SIZE_4K;
			zc->max_exp_bit_length =
				CEX4A_MAX_MOD_SIZE_4K;
		} else {
			zc->max_mod_size = CEX4A_MAX_MOD_SIZE_2K;
			zc->max_exp_bit_length =
				CEX4A_MAX_MOD_SIZE_2K;
		}
	} else if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) {
		if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
			zc->type_string = "CEX4C";
			/* wrong user space type, must be CEX4
			 * just keep it for cca compatibility
			 */
			zc->user_space_type = ZCRYPT_CEX3C;
487
			zc->speed_rating = CEX4C_SPEED_IDX;
488
		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
489 490 491 492 493
			zc->type_string = "CEX5C";
			/* wrong user space type, must be CEX5
			 * just keep it for cca compatibility
			 */
			zc->user_space_type = ZCRYPT_CEX3C;
494
			zc->speed_rating = CEX5C_SPEED_IDX;
495
		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
496 497 498 499 500
			zc->type_string = "CEX6C";
			/* wrong user space type, must be CEX6
			 * just keep it for cca compatibility
			 */
			zc->user_space_type = ZCRYPT_CEX3C;
501
			zc->speed_rating = CEX6C_SPEED_IDX;
502 503 504 505 506 507
		} else {
			zc->type_string = "CEX7C";
			/* wrong user space type, must be CEX7
			 * just keep it for cca compatibility
			 */
			zc->user_space_type = ZCRYPT_CEX3C;
508
			zc->speed_rating = CEX7C_SPEED_IDX;
509 510 511 512 513 514 515 516
		}
		zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
		zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
		zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
	} else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) {
		if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX4) {
			zc->type_string = "CEX4P";
			zc->user_space_type = ZCRYPT_CEX4;
517
			zc->speed_rating = CEX4P_SPEED_IDX;
518
		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX5) {
519 520
			zc->type_string = "CEX5P";
			zc->user_space_type = ZCRYPT_CEX5;
521
			zc->speed_rating = CEX5P_SPEED_IDX;
522
		} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
523 524
			zc->type_string = "CEX6P";
			zc->user_space_type = ZCRYPT_CEX6;
525
			zc->speed_rating = CEX6P_SPEED_IDX;
526 527 528 529 530 531
		} else {
			zc->type_string = "CEX7P";
			/* wrong user space type, just for compatibility
			 * with the ZCRYPT_STATUS_MASK ioctl.
			 */
			zc->user_space_type = ZCRYPT_CEX6;
532
			zc->speed_rating = CEX7P_SPEED_IDX;
533 534 535 536 537 538
		}
		zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
		zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
		zc->max_exp_bit_length = CEX4C_MAX_MOD_SIZE;
	} else {
		zcrypt_card_free(zc);
539
		return -ENODEV;
540 541 542 543
	}
	zc->online = 1;

	rc = zcrypt_card_register(zc);
544
	if (rc) {
545 546
		ac->private = NULL;
		zcrypt_card_free(zc);
547
		return rc;
548
	}
549

550 551
	if (ap_test_bit(&ac->functions, AP_FUNC_COPRO)) {
		rc = sysfs_create_group(&ap_dev->device.kobj,
552
					&cca_card_attr_grp);
553
		if (rc) {
554
			zcrypt_card_unregister(zc);
555 556 557
			ac->private = NULL;
			zcrypt_card_free(zc);
		}
558 559 560
	} else if (ap_test_bit(&ac->functions, AP_FUNC_EP11)) {
		rc = sysfs_create_group(&ap_dev->device.kobj,
					&ep11_card_attr_grp);
561
		if (rc) {
562
			zcrypt_card_unregister(zc);
563 564 565
			ac->private = NULL;
			zcrypt_card_free(zc);
		}
566 567
	}

568 569 570 571
	return rc;
}

/**
572 573
 * This is called to remove the CEX4/CEX5/CEX6/CEX7 card driver
 * information if an AP card device is removed.
574
 */
575
static void zcrypt_cex4_card_remove(struct ap_device *ap_dev)
576
{
577 578
	struct ap_card *ac = to_ap_card(&ap_dev->device);
	struct zcrypt_card *zc = ac->private;
579

580
	if (ap_test_bit(&ac->functions, AP_FUNC_COPRO))
581 582 583
		sysfs_remove_group(&ap_dev->device.kobj, &cca_card_attr_grp);
	else if (ap_test_bit(&ac->functions, AP_FUNC_EP11))
		sysfs_remove_group(&ap_dev->device.kobj, &ep11_card_attr_grp);
584 585 586 587 588 589 590 591
	if (zc)
		zcrypt_card_unregister(zc);
}

static struct ap_driver zcrypt_cex4_card_driver = {
	.probe = zcrypt_cex4_card_probe,
	.remove = zcrypt_cex4_card_remove,
	.ids = zcrypt_cex4_card_ids,
592
	.flags = AP_DRIVER_FLAG_DEFAULT,
593 594 595
};

/**
596
 * Probe function for CEX4/CEX5/CEX6/CEX7 queue device. It always
597 598
 * accepts the AP device since the bus_match already checked
 * the hardware type.
599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626
 * @ap_dev: pointer to the AP device.
 */
static int zcrypt_cex4_queue_probe(struct ap_device *ap_dev)
{
	struct ap_queue *aq = to_ap_queue(&ap_dev->device);
	struct zcrypt_queue *zq;
	int rc;

	if (ap_test_bit(&aq->card->functions, AP_FUNC_ACCEL)) {
		zq = zcrypt_queue_alloc(CEX4A_MAX_MESSAGE_SIZE);
		if (!zq)
			return -ENOMEM;
		zq->ops = zcrypt_msgtype(MSGTYPE50_NAME,
					 MSGTYPE50_VARIANT_DEFAULT);
	} else if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) {
		zq = zcrypt_queue_alloc(CEX4C_MAX_MESSAGE_SIZE);
		if (!zq)
			return -ENOMEM;
		zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
					 MSGTYPE06_VARIANT_DEFAULT);
	} else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) {
		zq = zcrypt_queue_alloc(CEX4C_MAX_MESSAGE_SIZE);
		if (!zq)
			return -ENOMEM;
		zq->ops = zcrypt_msgtype(MSGTYPE06_NAME,
					 MSGTYPE06_VARIANT_EP11);
	} else {
		return -ENODEV;
627
	}
628

629 630 631
	zq->queue = aq;
	zq->online = 1;
	atomic_set(&zq->load, 0);
632
	ap_queue_init_state(aq);
633
	ap_queue_init_reply(aq, &zq->reply);
634
	aq->request_timeout = CEX4_CLEANUP_TIME;
635 636 637 638 639
	aq->private = zq;
	rc = zcrypt_queue_register(zq);
	if (rc) {
		aq->private = NULL;
		zcrypt_queue_free(zq);
640
		return rc;
641 642 643 644
	}

	if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO)) {
		rc = sysfs_create_group(&ap_dev->device.kobj,
645
					&cca_queue_attr_grp);
646
		if (rc) {
647
			zcrypt_queue_unregister(zq);
648 649 650
			aq->private = NULL;
			zcrypt_queue_free(zq);
		}
651 652 653
	} else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11)) {
		rc = sysfs_create_group(&ap_dev->device.kobj,
					&ep11_queue_attr_grp);
654
		if (rc) {
655
			zcrypt_queue_unregister(zq);
656 657 658
			aq->private = NULL;
			zcrypt_queue_free(zq);
		}
659 660 661
	}

	return rc;
662 663
}

664
/**
665
 * This is called to remove the CEX4/CEX5/CEX6/CEX7 queue driver
666
 * information if an AP queue device is removed.
667 668 669 670 671 672
 */
static void zcrypt_cex4_queue_remove(struct ap_device *ap_dev)
{
	struct ap_queue *aq = to_ap_queue(&ap_dev->device);
	struct zcrypt_queue *zq = aq->private;

673
	if (ap_test_bit(&aq->card->functions, AP_FUNC_COPRO))
674 675 676
		sysfs_remove_group(&ap_dev->device.kobj, &cca_queue_attr_grp);
	else if (ap_test_bit(&aq->card->functions, AP_FUNC_EP11))
		sysfs_remove_group(&ap_dev->device.kobj, &ep11_queue_attr_grp);
677 678 679 680 681 682 683 684
	if (zq)
		zcrypt_queue_unregister(zq);
}

static struct ap_driver zcrypt_cex4_queue_driver = {
	.probe = zcrypt_cex4_queue_probe,
	.remove = zcrypt_cex4_queue_remove,
	.ids = zcrypt_cex4_queue_ids,
685
	.flags = AP_DRIVER_FLAG_DEFAULT,
686 687
};

688 689
int __init zcrypt_cex4_init(void)
{
690 691 692 693 694 695 696 697 698 699 700 701 702
	int rc;

	rc = ap_driver_register(&zcrypt_cex4_card_driver,
				THIS_MODULE, "cex4card");
	if (rc)
		return rc;

	rc = ap_driver_register(&zcrypt_cex4_queue_driver,
				THIS_MODULE, "cex4queue");
	if (rc)
		ap_driver_unregister(&zcrypt_cex4_card_driver);

	return rc;
703 704 705 706
}

void __exit zcrypt_cex4_exit(void)
{
707 708
	ap_driver_unregister(&zcrypt_cex4_queue_driver);
	ap_driver_unregister(&zcrypt_cex4_card_driver);
709 710 711 712
}

module_init(zcrypt_cex4_init);
module_exit(zcrypt_cex4_exit);