162306a36Sopenharmony_ci/* 262306a36Sopenharmony_ci * This file is subject to the terms and conditions of the GNU General Public 362306a36Sopenharmony_ci * License. See the file "COPYING" in the main directory of this archive 462306a36Sopenharmony_ci * for more details. 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Copyright (C) 2004-2012 Cavium Networks 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci 962306a36Sopenharmony_ci#include <asm/cop2.h> 1062306a36Sopenharmony_ci#include <linux/export.h> 1162306a36Sopenharmony_ci#include <linux/interrupt.h> 1262306a36Sopenharmony_ci#include <linux/sched/task_stack.h> 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci#include "octeon-crypto.h" 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci/** 1762306a36Sopenharmony_ci * Enable access to Octeon's COP2 crypto hardware for kernel use. Wrap any 1862306a36Sopenharmony_ci * crypto operations in calls to octeon_crypto_enable/disable in order to make 1962306a36Sopenharmony_ci * sure the state of COP2 isn't corrupted if userspace is also performing 2062306a36Sopenharmony_ci * hardware crypto operations. Allocate the state parameter on the stack. 2162306a36Sopenharmony_ci * Returns with preemption disabled. 2262306a36Sopenharmony_ci * 2362306a36Sopenharmony_ci * @state: Pointer to state structure to store current COP2 state in. 2462306a36Sopenharmony_ci * 2562306a36Sopenharmony_ci * Returns: Flags to be passed to octeon_crypto_disable() 2662306a36Sopenharmony_ci */ 2762306a36Sopenharmony_ciunsigned long octeon_crypto_enable(struct octeon_cop2_state *state) 2862306a36Sopenharmony_ci{ 2962306a36Sopenharmony_ci int status; 3062306a36Sopenharmony_ci unsigned long flags; 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_ci preempt_disable(); 3362306a36Sopenharmony_ci local_irq_save(flags); 3462306a36Sopenharmony_ci status = read_c0_status(); 3562306a36Sopenharmony_ci write_c0_status(status | ST0_CU2); 3662306a36Sopenharmony_ci if (KSTK_STATUS(current) & ST0_CU2) { 3762306a36Sopenharmony_ci octeon_cop2_save(&(current->thread.cp2)); 3862306a36Sopenharmony_ci KSTK_STATUS(current) &= ~ST0_CU2; 3962306a36Sopenharmony_ci status &= ~ST0_CU2; 4062306a36Sopenharmony_ci } else if (status & ST0_CU2) { 4162306a36Sopenharmony_ci octeon_cop2_save(state); 4262306a36Sopenharmony_ci } 4362306a36Sopenharmony_ci local_irq_restore(flags); 4462306a36Sopenharmony_ci return status & ST0_CU2; 4562306a36Sopenharmony_ci} 4662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(octeon_crypto_enable); 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci/** 4962306a36Sopenharmony_ci * Disable access to Octeon's COP2 crypto hardware in the kernel. This must be 5062306a36Sopenharmony_ci * called after an octeon_crypto_enable() before any context switch or return to 5162306a36Sopenharmony_ci * userspace. 5262306a36Sopenharmony_ci * 5362306a36Sopenharmony_ci * @state: Pointer to COP2 state to restore 5462306a36Sopenharmony_ci * @flags: Return value from octeon_crypto_enable() 5562306a36Sopenharmony_ci */ 5662306a36Sopenharmony_civoid octeon_crypto_disable(struct octeon_cop2_state *state, 5762306a36Sopenharmony_ci unsigned long crypto_flags) 5862306a36Sopenharmony_ci{ 5962306a36Sopenharmony_ci unsigned long flags; 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci local_irq_save(flags); 6262306a36Sopenharmony_ci if (crypto_flags & ST0_CU2) 6362306a36Sopenharmony_ci octeon_cop2_restore(state); 6462306a36Sopenharmony_ci else 6562306a36Sopenharmony_ci write_c0_status(read_c0_status() & ~ST0_CU2); 6662306a36Sopenharmony_ci local_irq_restore(flags); 6762306a36Sopenharmony_ci preempt_enable(); 6862306a36Sopenharmony_ci} 6962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(octeon_crypto_disable); 70