162306a36Sopenharmony_ci/*
262306a36Sopenharmony_ci * This file is subject to the terms and conditions of the GNU General Public
362306a36Sopenharmony_ci * License. See the file "COPYING" in the main directory of this archive
462306a36Sopenharmony_ci * for more details.
562306a36Sopenharmony_ci *
662306a36Sopenharmony_ci * Copyright (C) 2004-2012 Cavium Networks
762306a36Sopenharmony_ci */
862306a36Sopenharmony_ci
962306a36Sopenharmony_ci#include <asm/cop2.h>
1062306a36Sopenharmony_ci#include <linux/export.h>
1162306a36Sopenharmony_ci#include <linux/interrupt.h>
1262306a36Sopenharmony_ci#include <linux/sched/task_stack.h>
1362306a36Sopenharmony_ci
1462306a36Sopenharmony_ci#include "octeon-crypto.h"
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_ci/**
1762306a36Sopenharmony_ci * Enable access to Octeon's COP2 crypto hardware for kernel use. Wrap any
1862306a36Sopenharmony_ci * crypto operations in calls to octeon_crypto_enable/disable in order to make
1962306a36Sopenharmony_ci * sure the state of COP2 isn't corrupted if userspace is also performing
2062306a36Sopenharmony_ci * hardware crypto operations. Allocate the state parameter on the stack.
2162306a36Sopenharmony_ci * Returns with preemption disabled.
2262306a36Sopenharmony_ci *
2362306a36Sopenharmony_ci * @state: Pointer to state structure to store current COP2 state in.
2462306a36Sopenharmony_ci *
2562306a36Sopenharmony_ci * Returns: Flags to be passed to octeon_crypto_disable()
2662306a36Sopenharmony_ci */
2762306a36Sopenharmony_ciunsigned long octeon_crypto_enable(struct octeon_cop2_state *state)
2862306a36Sopenharmony_ci{
2962306a36Sopenharmony_ci	int status;
3062306a36Sopenharmony_ci	unsigned long flags;
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_ci	preempt_disable();
3362306a36Sopenharmony_ci	local_irq_save(flags);
3462306a36Sopenharmony_ci	status = read_c0_status();
3562306a36Sopenharmony_ci	write_c0_status(status | ST0_CU2);
3662306a36Sopenharmony_ci	if (KSTK_STATUS(current) & ST0_CU2) {
3762306a36Sopenharmony_ci		octeon_cop2_save(&(current->thread.cp2));
3862306a36Sopenharmony_ci		KSTK_STATUS(current) &= ~ST0_CU2;
3962306a36Sopenharmony_ci		status &= ~ST0_CU2;
4062306a36Sopenharmony_ci	} else if (status & ST0_CU2) {
4162306a36Sopenharmony_ci		octeon_cop2_save(state);
4262306a36Sopenharmony_ci	}
4362306a36Sopenharmony_ci	local_irq_restore(flags);
4462306a36Sopenharmony_ci	return status & ST0_CU2;
4562306a36Sopenharmony_ci}
4662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(octeon_crypto_enable);
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci/**
4962306a36Sopenharmony_ci * Disable access to Octeon's COP2 crypto hardware in the kernel. This must be
5062306a36Sopenharmony_ci * called after an octeon_crypto_enable() before any context switch or return to
5162306a36Sopenharmony_ci * userspace.
5262306a36Sopenharmony_ci *
5362306a36Sopenharmony_ci * @state:	Pointer to COP2 state to restore
5462306a36Sopenharmony_ci * @flags:	Return value from octeon_crypto_enable()
5562306a36Sopenharmony_ci */
5662306a36Sopenharmony_civoid octeon_crypto_disable(struct octeon_cop2_state *state,
5762306a36Sopenharmony_ci			   unsigned long crypto_flags)
5862306a36Sopenharmony_ci{
5962306a36Sopenharmony_ci	unsigned long flags;
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	local_irq_save(flags);
6262306a36Sopenharmony_ci	if (crypto_flags & ST0_CU2)
6362306a36Sopenharmony_ci		octeon_cop2_restore(state);
6462306a36Sopenharmony_ci	else
6562306a36Sopenharmony_ci		write_c0_status(read_c0_status() & ~ST0_CU2);
6662306a36Sopenharmony_ci	local_irq_restore(flags);
6762306a36Sopenharmony_ci	preempt_enable();
6862306a36Sopenharmony_ci}
6962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(octeon_crypto_disable);
70