From patchwork Tue May 2 22:33:40 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gary R Hook X-Patchwork-Id: 9708633 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 5BE3960349 for ; Tue, 2 May 2017 22:33:54 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3F708206AC for ; Tue, 2 May 2017 22:33:54 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 32215285EC; Tue, 2 May 2017 22:33:54 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D0248206AC for ; Tue, 2 May 2017 22:33:52 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751410AbdEBWdv (ORCPT ); Tue, 2 May 2017 18:33:51 -0400 Received: from mail-cys01nam02on0077.outbound.protection.outlook.com ([104.47.37.77]:8000 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751327AbdEBWdt (ORCPT ); Tue, 2 May 2017 18:33:49 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=nCC36yB+jRJctjTjaIc95T66VdNdYNJhYXWtd3jXkUk=; b=vKN9V/FvY/gpdimagSzaUYRFGULjwkfkNwu2z88oSXlh5qVZCAmfgl1E7iUquWMaWDdV4bU099MU24GppU2uQOc6h13tcMxCKEozDZFmkQjlUVkOQgrtnutrWVu6pHl/1+764ZKIQ8GGqneTiZUHXRilhE1KZnofV8tWNmRgoHI= Authentication-Results: amd.com; dkim=none (message not signed) header.d=none;amd.com; dmarc=none action=none header.from=amd.com; Received: from taos.amd.com (165.204.77.1) by DM5PR12MB1322.namprd12.prod.outlook.com (10.168.238.9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1061.12; Tue, 2 May 2017 22:33:46 +0000 Subject: [PATCH V2] crypto: ccp - Add debugfs entries for CCP information From: Gary R Hook To: CC: , , Date: Tue, 2 May 2017 17:33:40 -0500 Message-ID: <20170502223220.6039.25937.stgit@taos.amd.com> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: BN6PR03CA0044.namprd03.prod.outlook.com (10.175.124.30) To DM5PR12MB1322.namprd12.prod.outlook.com (10.168.238.9) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: bfe73f64-4d78-4d0c-59dc-08d491ab4c85 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(201703131423075)(201703031133081); SRVR:DM5PR12MB1322; X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1322; 3:ni4wf+dIVgY8YrXS3tBbY9FvifyKVq/O2JsD9Cf3QcKrtUkUVXrwtQmnzZvCyD7MED7uhRzx5oTJd239OVxlwLPU10H5iFrrKUM8QkVcGfMuxBfoBCDGTmWPMv7zdc1zCr7LmSZcpS95GJ8QhUWaTT5MBYo4Ne3bz6N5A/BevE+7qBkRFFNMQ34BTRG2wSX6Tm1a9ItLly6ELi0igstc2ES6jStekIa4DF58OxTeM2OUBCh5elaJJWNHkJMMO4XZ6MutttSMpxr24v3MXRkrW3WAaoOKGs9ZmsL+w1hmxxONrRsroSi7fm09OL06EdBSetDv74E33uKq/6cg8Ry5LPODCkj8ELDQRClM9OX34RM=; 25:WmIGsheHkZCWNV4MunC7ShiNhgxxTJbR4cL8cuzFywTLi+WgFkZlz5zVUymtibcrYzbW/osElD9iFD8tQRtOML7kziK/j836d7u+yNCql6CPVe2C6OrgQV9fsvGCKmAd5IWcewpjx50oBuyMEuebFBii/VO4KyWK5TX+lqeQBaHXA/lSFe3IfQLc3QkxiZBr/+xfn1uPh3xMU7e54bz6oYq5526P0UyEHfl3RWD9MJWlP9gKDYNN1GPYtFaJzMFkwlcTEMmmSbCCD600kuRvCEoj7RHfefnA/gsMK9fhxzZExsb04ta9WFEdgRS78VjSDbjVZG2zmnQLMk1AX4uq+LPJ+DQ3VACM60eOzPMQOBbYvKeNypM0/OM76ppgMKKORoIy2AVhBLVbVDN+wZAoTO8hJj8XoorISVQKBmZFV9sny89/s+GdrknL4sv6TB3J X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1322; 31:Qg5rDgS55LPr8ggrYndMflTAlbtNYSpJKrd8zQqVfWSmRNskgbnvqiRfOhGEFiDEs9SHj103fj7aGL9afvKuxzSIvBbcS30+0HDMNPYrQMwwykEHQIZ7jghlvvrP8is1dJQUvFalUNoUpuCsIJ0+zjw8kQscHGhsj+NNy6MN3+WXRjFN7ue8UGhA8CUT4XBULUF1/9JgytC1qR6BZz7E4AOF5n6Te/S9YGQLNtksiYY=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041248)(20161123558100)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123562025)(20161123560025)(6072148); SRVR:DM5PR12MB1322; BCL:0; PCL:0; RULEID:; SRVR:DM5PR12MB1322; X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1322; 4:J4aH37XOYbz1nLj2ciCKAbTRmGxUk2i3dNIYjUfs8y+FnKvrump9ApvxoAUd5OJ9NbtxORVRtfjndtNYt4RhF/0EZ+qYDf6tMCwNhkp62bQ8MexhxL8uOqrsEvSyA3QCuKW6mYHpM0KY9LV6Ds3CJxdL9i4W7p2AGDqyJwKQu6sv+zLxQFmKGKhbY6ObifHER/z9FpAbHOR+pyAy4Z4ntECGSbBPNRl9BYNvYzpDltcp0TrST8Gkc+XtGAYUbNaTDC9MDk2eEk5moHCSpyErJ7vSddvzgmUMorYmvZpAkEPDz3Zs/adhCqBaZWDQNFLL6yzBzuGV2VakDm9MxcKQCuD2T4Wsf0wIG4KU1duHvugNvP09Vf4W4SWC7ljC7D7CLbAAumVecYMj5zkcupSByiKFewJL2ecli62Tz5xR/9ge3P93gQIf2YZbuR02lJxwamcAugPTqLSJL6jmr6wuYnw4U4AEIadHUbMpwSeRU0pcmOUEFKxLwj2XkcjgL7JKFuFVudg0ylEqnMnP62F+3/NPjMeSyrQejZf82a56MBmZoAytFkTuN/SOPKiaEtYVbkdtzBpY7FZV0K/R4dOgUUadj5O6pOeNr9JyoCZzpFnkWvfMZghjOulhdohIjR/obpJERTVX8qeK9UhViXIJBkt6SPfw+J1FZzFOyDd1J6zcFu4BfsQjK7DeEfn8ubZdqyM/kqVNlzvjwfhulD7UMlyE5kHptWeVOSG2ylnuJtmwZ7v8AWPBhc6GnpuRj2IBixz600s08s35NQdYASysHGoyZ0xJLHjN3A60P607gA1gbndr2r8B3DT0Gw5sep0QiNJfTEbAcB705iIiPIxF3w== X-Forefront-PRVS: 02951C14DC X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39850400002)(39410400002)(39860400002)(39400400002)(39840400002)(2906002)(50466002)(7736002)(189998001)(53936002)(110136004)(103116003)(38730400002)(1076002)(4326008)(47776003)(305945005)(42186005)(53416004)(4001350100001)(83506001)(6666003)(8676002)(25786009)(54906002)(97746001)(23676002)(54356999)(81166006)(50986999)(2351001)(575784001)(478600001)(86362001)(5660300001)(6916009)(33646002)(6116002)(66066001)(3846002)(230700001)(71626007); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR12MB1322; H:taos.amd.com; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjEyTUIxMzIyOzIzOmhPU0FzQWZEYi81YWtzY1kwNFBJZUVsK2s4?= =?utf-8?B?OVlUSTJpMTJESjNING5tdVVZZ1RnaFhLT1ozWjBtaC84WVNPWHJrWHZlSzl2?= =?utf-8?B?TnhPR1l0K0RwODNlaFI2VWJXdGVNTkpWRHdCV0VaZmtzdG5ZNlFhZFlLRHp0?= =?utf-8?B?dkxhYTQ3cE8yblI5ZklIVFU4Q29wVlZPcVhCM1FIVVpqZFN3T1R6QTQwcFVx?= =?utf-8?B?RUxXSURYQUlWemw1SUJnbEcwdUVuWHVjYUNFbGlTTkZaeFltL0R3R01pMEl1?= =?utf-8?B?K3NJbXVDUzNLSy9WbCt3aW5MQk51TWNXckNkZ1FKVVpwNU9oak01WU81eThq?= =?utf-8?B?S2RWTjRBRk5lMmxtM21VU2JxTDNRb1ZZSEpNNFhKSGhhMWsxY21HQXRReHQr?= =?utf-8?B?TzJNUjY5eE5kWElPWWZjRmEzZ0VLb2tGelkwMVZYbllQM1FMOG9ndlgrVUtl?= =?utf-8?B?aTY0QjJ0NSt4UjRTV2lkd1pIcVJ4ZWZ5b0VJQkphZDlNaWsyYThVb1RwZWYw?= =?utf-8?B?by81cXZpOGpwZ3QvczJTeGZRUHljZG8ya0lEb3AxVUdzY3ZqV2F6Z0dvTWxN?= =?utf-8?B?cjl0VWNCZ0xFQzEzOFNSbDhVZXdnc3RmWUoyZHRIZkV5T3psMCtjUmhBdVVK?= =?utf-8?B?b0hrYnp4M0VYMzNrUmh0enltSnZlU3VWYTR2Zm5KZnJoWkUxRmJsZ2FiL3N5?= =?utf-8?B?L3ZUazNwT2xRbEVZNWtNaG5NKzlid1pjdmZZcDk5RWFzWFpCbmpiaGNobkZN?= =?utf-8?B?SG9kcHUrMm1GTE16bGFEQ2N1SmtjeCtEQTRuc1lYbnk1aUIrcnV2aS9TbGJs?= =?utf-8?B?eUpBNjkzcy9VbmJOc2kweXVORzN1UnJwMEo3eDAvUGJQZjFSeURlY21pV1lQ?= =?utf-8?B?NDRCY1BHdUZHT29qUWN1WTRiODdoWk15MGk2Ti9HVU5tUS9VNmcrVmZCZWlG?= =?utf-8?B?bk0rQjdhS3pSYlJPdlVSSjBKdnFjOG5KeWVyZ1k2cUsrSWptRllrSDZXdGty?= =?utf-8?B?d2lDTkdrY3IvNGNEbHF3aVYyMnU5R3o2TTFrUyszUWQ2VDkvcEcyZFFqTXJ4?= =?utf-8?B?WGc0MmpHNUR5bElOVnRMcjZCTk9mWWhxS3M0RGxZQ3hKOFNORFFxTnd6UWow?= =?utf-8?B?WVpBYWVPS0IwZVFhTDA3STEvTkZpL05rc0RmYUFDaXhqWXpwR2ViNFBZaEF1?= =?utf-8?B?NmZhNnkzaWFvdVpMMHBwZlNra2RRL1JuL3k2Q3p0YjhJYUh2VE4xWDIzVUdZ?= =?utf-8?B?T2JzR2dPNmZPYkkyU0FURDJhQnpTOG9Ka281KzFuTnBDSU5MWGh1YWsrYThq?= =?utf-8?B?OTVQUjdHbzRaSk5zOGFzd1VpSCt2RE5QZG5nNHBFdDBoVHQ5OGdubkZsZWtL?= =?utf-8?B?SnVyRFhyc3Z3L2RZRjAzejRqWWtzVFpYR0g5Y2JZdldSWCs3c296NkJSMkww?= =?utf-8?B?V1hUL2pPVjl0ZDJCanAvclV6M2xia3BnS2ZzOW5oZFgyZURLYzNVcDV6TVlT?= =?utf-8?Q?S9OXHI0/MqePIRUke8IIEuf58=3D?= X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1322; 6: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; 5:LbdWlFmV/iFJHJmixTwlSYjHU+tawjoJAXoC11MVBDicJmHoE1ZrxoKXRy3UkaJc5b+MOfhJcjpWym/8dOK+kR1yZHf1M/5uC0UlSfBrbA/nGPTJORVHD7IzNo6XnWS2aUch95CjTNGnSsNrqlh5CQ==; 24:/8xH+R3v151UkoGhjOf9oBz9f54La5jvk3yORc5BMhjoP3U2DwBBxTlJP2yKIpaLLMXlVvEjH8iYZYBng1X4aF6qrKE4+aED/jXbJA/jeDo= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DM5PR12MB1322; 7:BRnCydC4tu7WVq+reqRF006eQSx57lcY0Dva0LUBn5Io+Hg5uAiIyQHzgOLs1kZmteAQpXJe4+rhkk/srrpNVmTyfCm7MVxu3AjhCqpOVCHwZO7p5w4JnX6a8gkNbXualfDz3g6kfGBV+Q7WP68TYkjAjycEt1Bw9/VLIjnSSdOpIfPzlKKA5OzhFLBg3Vt2ygn9vmNuP4G9fwWu/tmrgG4sj6jIWQLkrOjXXVyO2AemLWalDgcAkzzLvUPRR2Wx/zGaNt74463i7L2WHWZDiNILWYUInK63VWBmArqZOnfFwUNbD2zk96tVNdohW4AnShbWWLbxqvKJywMEJ8jW5g==; 20:JVmZlwv7ciR4fDnhSdzjibrgFmJvBAB/g44Xjm60OSy6h+vTRElGTLcHAU1IhsZMi4HJbfhjUUwpq2Q96VZzs9qdtP1yuIUdY/ccQBbp5HTD4h4kLLNPlMbdBYWJXKFJY/It911tT4396eZX2Y9Y4n5cmJ/EntRz8Af3VnHRpAXxgNmENM4tnJp3KdCT5R2TnN/asyFKt+SKe+endkwTxqKTk9FwQ3qR4oPbUMoICpjO+uDUb5bRPXIsfs3Grqlj X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 May 2017 22:33:46.8679 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1322 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Expose some data about the configuration and operation of the CCP through debugfs entries: device name, capabilities, configuration, statistics. Allow the user to reset the counters to zero by writing (any value) to the 'stats' file. This can be done per queue or per device. Changes from V1: - Correct polarity of test when destroying devices at module unload Signed-off-by: Gary R Hook --- drivers/crypto/ccp/Makefile | 3 drivers/crypto/ccp/ccp-debugfs.c | 345 ++++++++++++++++++++++++++++++++++++++ drivers/crypto/ccp/ccp-dev-v5.c | 28 +++ drivers/crypto/ccp/ccp-dev.c | 2 drivers/crypto/ccp/ccp-dev.h | 20 ++ 5 files changed, 395 insertions(+), 3 deletions(-) create mode 100644 drivers/crypto/ccp/ccp-debugfs.c diff --git a/drivers/crypto/ccp/Makefile b/drivers/crypto/ccp/Makefile index 60919a3ec53b..59493fd3a751 100644 --- a/drivers/crypto/ccp/Makefile +++ b/drivers/crypto/ccp/Makefile @@ -4,7 +4,8 @@ ccp-objs := ccp-dev.o \ ccp-dev-v3.o \ ccp-dev-v5.o \ ccp-platform.o \ - ccp-dmaengine.o + ccp-dmaengine.o \ + ccp-debugfs.o ccp-$(CONFIG_PCI) += ccp-pci.o obj-$(CONFIG_CRYPTO_DEV_CCP_CRYPTO) += ccp-crypto.o diff --git a/drivers/crypto/ccp/ccp-debugfs.c b/drivers/crypto/ccp/ccp-debugfs.c new file mode 100644 index 000000000000..6d86693b117f --- /dev/null +++ b/drivers/crypto/ccp/ccp-debugfs.c @@ -0,0 +1,345 @@ +/* + * AMD Cryptographic Coprocessor (CCP) driver + * + * Copyright (C) 2017 Advanced Micro Devices, Inc. + * + * Author: Gary R Hook + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. + */ + +#include +#include + +#include "ccp-dev.h" + +/* DebugFS helpers */ +#define OBUFP (obuf + oboff) +#define OBUFLEN 512 +#define OBUFSPC (OBUFLEN - oboff) +#define OSCNPRINTF(fmt, ...) \ + scnprintf(OBUFP, OBUFSPC, fmt, ## __VA_ARGS__) + +#define BUFLEN 63 + +#define RI_VERSION_NUM 0x0000003F +#define RI_AES_PRESENT 0x00000040 +#define RI_3DES_PRESENT 0x00000080 +#define RI_SHA_PRESENT 0x00000100 +#define RI_RSA_PRESENT 0x00000200 +#define RI_ECC_PRESENT 0x00000400 +#define RI_ZDE_PRESENT 0x00000800 +#define RI_ZCE_PRESENT 0x00001000 +#define RI_TRNG_PRESENT 0x00002000 +#define RI_ELFC_PRESENT 0x00004000 +#define RI_ELFC_SHIFT 14 +#define RI_NUM_VQM 0x00078000 +#define RI_NVQM_SHIFT 15 +#define RI_NVQM(r) (((r) * RI_NUM_VQM) >> RI_NVQM_SHIFT) +#define RI_LSB_ENTRIES 0x0FF80000 +#define RI_NLSB_SHIFT 19 +#define RI_NLSB(r) (((r) * RI_LSB_ENTRIES) >> RI_NLSB_SHIFT) + +static ssize_t ccp5_debugfs_info_read(struct file *filp, char __user *ubuf, + size_t count, loff_t *offp) +{ + struct ccp_device *ccp = filp->private_data; + unsigned int oboff = 0; + unsigned int regval; + ssize_t ret; + char *obuf; + + if (!ccp) + return 0; + + obuf = kmalloc(OBUFLEN, GFP_KERNEL); + if (!obuf) + return -ENOMEM; + + oboff += OSCNPRINTF("Device name: %s\n", ccp->name); + oboff += OSCNPRINTF(" RNG name: %s\n", ccp->rngname); + oboff += OSCNPRINTF(" # Queues: %d\n", ccp->cmd_q_count); + oboff += OSCNPRINTF(" # Cmds: %d\n", ccp->cmd_count); + + regval = ioread32(ccp->io_regs + CMD5_PSP_CCP_VERSION); + oboff += OSCNPRINTF(" Version: %d\n", regval & RI_VERSION_NUM); + oboff += OSCNPRINTF(" Engines:"); + if (regval & RI_AES_PRESENT) + oboff += OSCNPRINTF(" AES"); + if (regval & RI_3DES_PRESENT) + oboff += OSCNPRINTF(" 3DES"); + if (regval & RI_SHA_PRESENT) + oboff += OSCNPRINTF(" SHA"); + if (regval & RI_RSA_PRESENT) + oboff += OSCNPRINTF(" RSA"); + if (regval & RI_ECC_PRESENT) + oboff += OSCNPRINTF(" ECC"); + if (regval & RI_ZDE_PRESENT) + oboff += OSCNPRINTF(" ZDE"); + if (regval & RI_ZCE_PRESENT) + oboff += OSCNPRINTF(" ZCE"); + if (regval & RI_TRNG_PRESENT) + oboff += OSCNPRINTF(" TRNG"); + oboff += OSCNPRINTF("\n"); + oboff += OSCNPRINTF(" Queues: %d\n", + (regval & RI_NUM_VQM) >> RI_NVQM_SHIFT); + oboff += OSCNPRINTF("LSB Entries: %d\n", + (regval & RI_LSB_ENTRIES) >> RI_NLSB_SHIFT); + + ret = simple_read_from_buffer(ubuf, count, offp, obuf, oboff); + kfree(obuf); + + return ret; +} + +/* Return a formatted buffer containing the current + * statistics across all queues for a CCP. + */ +static ssize_t ccp5_debugfs_stats_read(struct file *filp, char __user *ubuf, + size_t count, loff_t *offp) +{ + struct ccp_device *ccp = filp->private_data; + unsigned long total_xts_aes_ops = 0; + unsigned long total_3des_ops = 0; + unsigned long total_aes_ops = 0; + unsigned long total_sha_ops = 0; + unsigned long total_rsa_ops = 0; + unsigned long total_ecc_ops = 0; + unsigned long total_pt_ops = 0; + unsigned long total_ops = 0; + unsigned int oboff = 0; + ssize_t ret = 0; + unsigned int i; + char *obuf; + + for (i = 0; i < ccp->cmd_q_count; i++) { + struct ccp_cmd_queue *cmd_q = &ccp->cmd_q[i]; + + total_ops += cmd_q->total_ops; + total_aes_ops += cmd_q->total_aes_ops; + total_xts_aes_ops += cmd_q->total_xts_aes_ops; + total_3des_ops += cmd_q->total_3des_ops; + total_sha_ops += cmd_q->total_sha_ops; + total_rsa_ops += cmd_q->total_rsa_ops; + total_pt_ops += cmd_q->total_pt_ops; + total_ecc_ops += cmd_q->total_ecc_ops; + } + + obuf = kmalloc(OBUFLEN, GFP_KERNEL); + if (!obuf) + return -ENOMEM; + + oboff += OSCNPRINTF("Total Interrupts Handled: %ld\n", + ccp->total_interrupts); + oboff += OSCNPRINTF(" Total Operations: %ld\n", + total_ops); + oboff += OSCNPRINTF(" AES: %ld\n", + total_aes_ops); + oboff += OSCNPRINTF(" XTS AES: %ld\n", + total_xts_aes_ops); + oboff += OSCNPRINTF(" SHA: %ld\n", + total_3des_ops); + oboff += OSCNPRINTF(" SHA: %ld\n", + total_sha_ops); + oboff += OSCNPRINTF(" RSA: %ld\n", + total_rsa_ops); + oboff += OSCNPRINTF(" Pass-Thru: %ld\n", + total_pt_ops); + oboff += OSCNPRINTF(" ECC: %ld\n", + total_ecc_ops); + + ret = simple_read_from_buffer(ubuf, count, offp, obuf, oboff); + kfree(obuf); + + return ret; +} + +/* Reset the counters in a queue + */ +static void ccp5_debugfs_reset_queue_stats(struct ccp_cmd_queue *cmd_q) +{ + cmd_q->total_ops = 0L; + cmd_q->total_aes_ops = 0L; + cmd_q->total_xts_aes_ops = 0L; + cmd_q->total_3des_ops = 0L; + cmd_q->total_sha_ops = 0L; + cmd_q->total_rsa_ops = 0L; + cmd_q->total_pt_ops = 0L; + cmd_q->total_ecc_ops = 0L; +} + +/* A value was written to the stats variable, which + * should be used to reset the queue counters across + * that device. + */ +static ssize_t ccp5_debugfs_stats_write(struct file *filp, + const char __user *ubuf, + size_t count, loff_t *offp) +{ + struct ccp_device *ccp = filp->private_data; + int i; + + for (i = 0; i < ccp->cmd_q_count; i++) + ccp5_debugfs_reset_queue_stats(&ccp->cmd_q[i]); + ccp->total_interrupts = 0L; + + return count; +} + +/* Return a formatted buffer containing the current information + * for that queue + */ +static ssize_t ccp5_debugfs_queue_read(struct file *filp, char __user *ubuf, + size_t count, loff_t *offp) +{ + struct ccp_cmd_queue *cmd_q = filp->private_data; + unsigned int oboff = 0; + unsigned int regval; + ssize_t ret; + char *obuf; + + if (!cmd_q) + return 0; + + obuf = kmalloc(OBUFLEN, GFP_KERNEL); + if (!obuf) + return -ENOMEM; + + oboff += OSCNPRINTF(" Total Queue Operations: %ld\n", + cmd_q->total_ops); + oboff += OSCNPRINTF(" AES: %ld\n", + cmd_q->total_aes_ops); + oboff += OSCNPRINTF(" XTS AES: %ld\n", + cmd_q->total_xts_aes_ops); + oboff += OSCNPRINTF(" SHA: %ld\n", + cmd_q->total_3des_ops); + oboff += OSCNPRINTF(" SHA: %ld\n", + cmd_q->total_sha_ops); + oboff += OSCNPRINTF(" RSA: %ld\n", + cmd_q->total_rsa_ops); + oboff += OSCNPRINTF(" Pass-Thru: %ld\n", + cmd_q->total_pt_ops); + oboff += OSCNPRINTF(" ECC: %ld\n", + cmd_q->total_ecc_ops); + + regval = ioread32(cmd_q->reg_int_enable); + oboff += OSCNPRINTF(" Enabled Interrupts:"); + if (regval & INT_EMPTY_QUEUE) + oboff += OSCNPRINTF(" EMPTY"); + if (regval & INT_QUEUE_STOPPED) + oboff += OSCNPRINTF(" STOPPED"); + if (regval & INT_ERROR) + oboff += OSCNPRINTF(" ERROR"); + if (regval & INT_COMPLETION) + oboff += OSCNPRINTF(" COMPLETION"); + oboff += OSCNPRINTF("\n"); + + ret = simple_read_from_buffer(ubuf, count, offp, obuf, oboff); + kfree(obuf); + + return ret; +} + +/* A value was written to the stats variable for a + * queue. Reset the queue counters to this value. + */ +static ssize_t ccp5_debugfs_queue_write(struct file *filp, + const char __user *ubuf, + size_t count, loff_t *offp) +{ + struct ccp_cmd_queue *cmd_q = filp->private_data; + + ccp5_debugfs_reset_queue_stats(cmd_q); + + return count; +} + +static const struct file_operations ccp_debugfs_info_ops = { + .owner = THIS_MODULE, + .open = simple_open, + .read = ccp5_debugfs_info_read, + .write = NULL, +}; + +static const struct file_operations ccp_debugfs_queue_ops = { + .owner = THIS_MODULE, + .open = simple_open, + .read = ccp5_debugfs_queue_read, + .write = ccp5_debugfs_queue_write, +}; + +static const struct file_operations ccp_debugfs_stats_ops = { + .owner = THIS_MODULE, + .open = simple_open, + .read = ccp5_debugfs_stats_read, + .write = ccp5_debugfs_stats_write, +}; + +static struct dentry *ccp_debugfs_dir; +static DEFINE_RWLOCK(ccp_debugfs_lock); + +#define MAX_NAME_LEN 20 + +void ccp5_debugfs_setup(struct ccp_device *ccp) +{ + struct ccp_cmd_queue *cmd_q; + char name[MAX_NAME_LEN + 1]; + struct dentry *debugfs_info; + struct dentry *debugfs_stats; + struct dentry *debugfs_q_instance; + struct dentry *debugfs_q_stats; + unsigned long flags; + int i; + + if (!debugfs_initialized()) + return; + + write_lock_irqsave(&ccp_debugfs_lock, flags); + if (!ccp_debugfs_dir) { + ccp_debugfs_dir = debugfs_create_dir(KBUILD_MODNAME, NULL); + if (!ccp_debugfs_dir) + return; + } + write_unlock_irqrestore(&ccp_debugfs_lock, flags); + + ccp->debugfs_instance = debugfs_create_dir(ccp->name, ccp_debugfs_dir); + if (!ccp->debugfs_instance) + return; + + debugfs_info = debugfs_create_file("info", 0400, + ccp->debugfs_instance, ccp, + &ccp_debugfs_info_ops); + if (!debugfs_info) + return; + + debugfs_stats = debugfs_create_file("stats", 0600, + ccp->debugfs_instance, ccp, + &ccp_debugfs_stats_ops); + if (!debugfs_stats) + return; + + for (i = 0; i < ccp->cmd_q_count; i++) { + cmd_q = &ccp->cmd_q[i]; + + snprintf(name, MAX_NAME_LEN - 1, "q%d", cmd_q->id); + + debugfs_q_instance = + debugfs_create_dir(name, ccp->debugfs_instance); + if (!debugfs_q_instance) + return; + + debugfs_q_stats = + debugfs_create_file("stats", 0600, + debugfs_q_instance, cmd_q, + &ccp_debugfs_queue_ops); + if (!debugfs_q_stats) + return; + } +} + +void ccp5_debugfs_destroy(void) +{ + debugfs_remove_recursive(ccp_debugfs_dir); +} diff --git a/drivers/crypto/ccp/ccp-dev-v5.c b/drivers/crypto/ccp/ccp-dev-v5.c index ccbe32d5dd1c..b10d2d2075cb 100644 --- a/drivers/crypto/ccp/ccp-dev-v5.c +++ b/drivers/crypto/ccp/ccp-dev-v5.c @@ -14,6 +14,7 @@ #include #include #include +#include #include #include #include @@ -231,6 +232,8 @@ static int ccp5_do_cmd(struct ccp5_desc *desc, int i; int ret = 0; + cmd_q->total_ops++; + if (CCP5_CMD_SOC(desc)) { CCP5_CMD_IOC(desc) = 1; CCP5_CMD_SOC(desc) = 0; @@ -282,6 +285,8 @@ static int ccp5_perform_aes(struct ccp_op *op) union ccp_function function; u32 key_addr = op->sb_key * LSB_ITEM_SIZE; + op->cmd_q->total_aes_ops++; + /* Zero out all the fields of the command desc */ memset(&desc, 0, Q_DESC_SIZE); @@ -325,6 +330,8 @@ static int ccp5_perform_xts_aes(struct ccp_op *op) union ccp_function function; u32 key_addr = op->sb_key * LSB_ITEM_SIZE; + op->cmd_q->total_xts_aes_ops++; + /* Zero out all the fields of the command desc */ memset(&desc, 0, Q_DESC_SIZE); @@ -364,6 +371,8 @@ static int ccp5_perform_sha(struct ccp_op *op) struct ccp5_desc desc; union ccp_function function; + op->cmd_q->total_sha_ops++; + /* Zero out all the fields of the command desc */ memset(&desc, 0, Q_DESC_SIZE); @@ -404,6 +413,8 @@ static int ccp5_perform_des3(struct ccp_op *op) union ccp_function function; u32 key_addr = op->sb_key * LSB_ITEM_SIZE; + op->cmd_q->total_3des_ops++; + /* Zero out all the fields of the command desc */ memset(&desc, 0, sizeof(struct ccp5_desc)); @@ -444,6 +455,8 @@ static int ccp5_perform_rsa(struct ccp_op *op) struct ccp5_desc desc; union ccp_function function; + op->cmd_q->total_rsa_ops++; + /* Zero out all the fields of the command desc */ memset(&desc, 0, Q_DESC_SIZE); @@ -487,6 +500,8 @@ static int ccp5_perform_passthru(struct ccp_op *op) struct ccp_dma_info *daddr = &op->dst.u.dma; + op->cmd_q->total_pt_ops++; + memset(&desc, 0, Q_DESC_SIZE); CCP5_CMD_ENGINE(&desc) = CCP_ENGINE_PASSTHRU; @@ -543,6 +558,8 @@ static int ccp5_perform_ecc(struct ccp_op *op) struct ccp5_desc desc; union ccp_function function; + op->cmd_q->total_ecc_ops++; + /* Zero out all the fields of the command desc */ memset(&desc, 0, Q_DESC_SIZE); @@ -592,7 +609,6 @@ static int ccp_find_lsb_regions(struct ccp_cmd_queue *cmd_q, u64 status) return queues ? 0 : -EINVAL; } - static int ccp_find_and_assign_lsb_to_q(struct ccp_device *ccp, int lsb_cnt, int n_lsbs, unsigned long *lsb_pub) @@ -757,6 +773,7 @@ static irqreturn_t ccp5_irq_handler(int irq, void *data) struct ccp_device *ccp = dev_get_drvdata(dev); ccp5_disable_queue_interrupts(ccp); + ccp->total_interrupts++; if (ccp->use_tasklet) tasklet_schedule(&ccp->irq_tasklet); else @@ -956,6 +973,9 @@ static int ccp5_init(struct ccp_device *ccp) if (ret) goto e_hwrng; + /* Set up debugfs entries */ + ccp5_debugfs_setup(ccp); + return 0; e_hwrng: @@ -992,6 +1012,12 @@ static void ccp5_destroy(struct ccp_device *ccp) /* Remove this device from the list of available units first */ ccp_del_device(ccp); + /* We're in the process of tearing down the entire driver; + * when all the devices are gone clean up debugfs + */ + if (ccp_present()) + ccp5_debugfs_destroy(); + /* Disable and clear interrupts */ ccp5_disable_queue_interrupts(ccp); for (i = 0; i < ccp->cmd_q_count; i++) { diff --git a/drivers/crypto/ccp/ccp-dev.c b/drivers/crypto/ccp/ccp-dev.c index b7504562715c..2506b5025700 100644 --- a/drivers/crypto/ccp/ccp-dev.c +++ b/drivers/crypto/ccp/ccp-dev.c @@ -33,7 +33,7 @@ MODULE_AUTHOR("Tom Lendacky "); MODULE_AUTHOR("Gary R Hook "); MODULE_LICENSE("GPL"); -MODULE_VERSION("1.0.0"); +MODULE_VERSION("1.1.0"); MODULE_DESCRIPTION("AMD Cryptographic Coprocessor driver"); struct ccp_tasklet_data { diff --git a/drivers/crypto/ccp/ccp-dev.h b/drivers/crypto/ccp/ccp-dev.h index 0cb09d0feeaf..a70154ac7405 100644 --- a/drivers/crypto/ccp/ccp-dev.h +++ b/drivers/crypto/ccp/ccp-dev.h @@ -70,6 +70,7 @@ #define LSB_PUBLIC_MASK_HI_OFFSET 0x1C #define LSB_PRIVATE_MASK_LO_OFFSET 0x20 #define LSB_PRIVATE_MASK_HI_OFFSET 0x24 +#define CMD5_PSP_CCP_VERSION 0x100 #define CMD5_Q_CONTROL_BASE 0x0000 #define CMD5_Q_TAIL_LO_BASE 0x0004 @@ -322,6 +323,16 @@ struct ccp_cmd_queue { /* Interrupt wait queue */ wait_queue_head_t int_queue; unsigned int int_rcvd; + + /* Per-queue Statistics */ + unsigned long total_ops; + unsigned long total_aes_ops; + unsigned long total_xts_aes_ops; + unsigned long total_3des_ops; + unsigned long total_sha_ops; + unsigned long total_rsa_ops; + unsigned long total_pt_ops; + unsigned long total_ecc_ops; } ____cacheline_aligned; struct ccp_device { @@ -419,6 +430,12 @@ struct ccp_device { /* DMA caching attribute support */ unsigned int axcache; + + /* Device Statistics */ + unsigned long total_interrupts; + + /* DebugFS info */ + struct dentry *debugfs_instance; }; enum ccp_memtype { @@ -632,6 +649,9 @@ struct ccp5_desc { int ccp_dmaengine_register(struct ccp_device *ccp); void ccp_dmaengine_unregister(struct ccp_device *ccp); +void ccp5_debugfs_setup(struct ccp_device *ccp); +void ccp5_debugfs_destroy(void); + /* Structure for computation functions that are device-specific */ struct ccp_actions { int (*aes)(struct ccp_op *);