Merge tag 's390-5.4-2' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux
Pull more s390 updates from Vasily Gorbik: - Fix three kasan findings - Add PERF_EVENT_IOC_PERIOD ioctl support - Add Crypto Express7S support and extend sysfs attributes for pkey - Minor common I/O layer documentation corrections * tag 's390-5.4-2' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux: s390/cio: exclude subchannels with no parent from pseudo check s390/cio: avoid calling strlen on null pointer s390/topology: avoid firing events before kobjs are created s390/cpumf: Remove mixed white space s390/cpum_sf: Support ioctl PERF_EVENT_IOC_PERIOD s390/zcrypt: CEX7S exploitation support s390/cio: fix intparm documentation s390/pkey: Add sysfs attributes to emit AES CIPHER key blobs
This commit is contained in:
@@ -372,7 +372,7 @@ int ccwgroup_create_dev(struct device *parent, struct ccwgroup_driver *gdrv,
|
||||
goto error;
|
||||
}
|
||||
/* Check for trailing stuff. */
|
||||
if (i == num_devices && strlen(buf) > 0) {
|
||||
if (i == num_devices && buf && strlen(buf) > 0) {
|
||||
rc = -EINVAL;
|
||||
goto error;
|
||||
}
|
||||
|
@@ -1388,6 +1388,8 @@ device_initcall(cio_settle_init);
|
||||
|
||||
int sch_is_pseudo_sch(struct subchannel *sch)
|
||||
{
|
||||
if (!sch->dev.parent)
|
||||
return 0;
|
||||
return sch == to_css(sch->dev.parent)->pseudo_subchannel;
|
||||
}
|
||||
|
||||
|
@@ -124,9 +124,7 @@ EXPORT_SYMBOL(ccw_device_is_multipath);
|
||||
/**
|
||||
* ccw_device_clear() - terminate I/O request processing
|
||||
* @cdev: target ccw device
|
||||
* @intparm: interruption parameter; value is only used if no I/O is
|
||||
* outstanding, otherwise the intparm associated with the I/O request
|
||||
* is returned
|
||||
* @intparm: interruption parameter to be returned upon conclusion of csch
|
||||
*
|
||||
* ccw_device_clear() calls csch on @cdev's subchannel.
|
||||
* Returns:
|
||||
@@ -179,6 +177,9 @@ int ccw_device_clear(struct ccw_device *cdev, unsigned long intparm)
|
||||
* completed during the time specified by @expires. If a timeout occurs, the
|
||||
* channel program is terminated via xsch, hsch or csch, and the device's
|
||||
* interrupt handler will be called with an irb containing ERR_PTR(-%ETIMEDOUT).
|
||||
* The interruption handler will echo back the @intparm specified here, unless
|
||||
* another interruption parameter is specified by a subsequent invocation of
|
||||
* ccw_device_halt() or ccw_device_clear().
|
||||
* Returns:
|
||||
* %0, if the operation was successful;
|
||||
* -%EBUSY, if the device is busy, or status pending;
|
||||
@@ -256,6 +257,9 @@ int ccw_device_start_timeout_key(struct ccw_device *cdev, struct ccw1 *cpa,
|
||||
* Start a S/390 channel program. When the interrupt arrives, the
|
||||
* IRQ handler is called, either immediately, delayed (dev-end missing,
|
||||
* or sense required) or never (no IRQ handler registered).
|
||||
* The interruption handler will echo back the @intparm specified here, unless
|
||||
* another interruption parameter is specified by a subsequent invocation of
|
||||
* ccw_device_halt() or ccw_device_clear().
|
||||
* Returns:
|
||||
* %0, if the operation was successful;
|
||||
* -%EBUSY, if the device is busy, or status pending;
|
||||
@@ -287,6 +291,9 @@ int ccw_device_start_key(struct ccw_device *cdev, struct ccw1 *cpa,
|
||||
* Start a S/390 channel program. When the interrupt arrives, the
|
||||
* IRQ handler is called, either immediately, delayed (dev-end missing,
|
||||
* or sense required) or never (no IRQ handler registered).
|
||||
* The interruption handler will echo back the @intparm specified here, unless
|
||||
* another interruption parameter is specified by a subsequent invocation of
|
||||
* ccw_device_halt() or ccw_device_clear().
|
||||
* Returns:
|
||||
* %0, if the operation was successful;
|
||||
* -%EBUSY, if the device is busy, or status pending;
|
||||
@@ -322,6 +329,9 @@ int ccw_device_start(struct ccw_device *cdev, struct ccw1 *cpa,
|
||||
* completed during the time specified by @expires. If a timeout occurs, the
|
||||
* channel program is terminated via xsch, hsch or csch, and the device's
|
||||
* interrupt handler will be called with an irb containing ERR_PTR(-%ETIMEDOUT).
|
||||
* The interruption handler will echo back the @intparm specified here, unless
|
||||
* another interruption parameter is specified by a subsequent invocation of
|
||||
* ccw_device_halt() or ccw_device_clear().
|
||||
* Returns:
|
||||
* %0, if the operation was successful;
|
||||
* -%EBUSY, if the device is busy, or status pending;
|
||||
@@ -343,11 +353,12 @@ int ccw_device_start_timeout(struct ccw_device *cdev, struct ccw1 *cpa,
|
||||
/**
|
||||
* ccw_device_halt() - halt I/O request processing
|
||||
* @cdev: target ccw device
|
||||
* @intparm: interruption parameter; value is only used if no I/O is
|
||||
* outstanding, otherwise the intparm associated with the I/O request
|
||||
* is returned
|
||||
* @intparm: interruption parameter to be returned upon conclusion of hsch
|
||||
*
|
||||
* ccw_device_halt() calls hsch on @cdev's subchannel.
|
||||
* The interruption handler will echo back the @intparm specified here, unless
|
||||
* another interruption parameter is specified by a subsequent invocation of
|
||||
* ccw_device_clear().
|
||||
* Returns:
|
||||
* %0 on success,
|
||||
* -%ENODEV on device not operational,
|
||||
|
@@ -1322,24 +1322,24 @@ static int ap_get_compatible_type(ap_qid_t qid, int rawtype, unsigned int func)
|
||||
/* < CEX2A is not supported */
|
||||
if (rawtype < AP_DEVICE_TYPE_CEX2A)
|
||||
return 0;
|
||||
/* up to CEX6 known and fully supported */
|
||||
if (rawtype <= AP_DEVICE_TYPE_CEX6)
|
||||
/* up to CEX7 known and fully supported */
|
||||
if (rawtype <= AP_DEVICE_TYPE_CEX7)
|
||||
return rawtype;
|
||||
/*
|
||||
* unknown new type > CEX6, check for compatibility
|
||||
* unknown new type > CEX7, check for compatibility
|
||||
* to the highest known and supported type which is
|
||||
* currently CEX6 with the help of the QACT function.
|
||||
* currently CEX7 with the help of the QACT function.
|
||||
*/
|
||||
if (ap_qact_available()) {
|
||||
struct ap_queue_status status;
|
||||
union ap_qact_ap_info apinfo = {0};
|
||||
|
||||
apinfo.mode = (func >> 26) & 0x07;
|
||||
apinfo.cat = AP_DEVICE_TYPE_CEX6;
|
||||
apinfo.cat = AP_DEVICE_TYPE_CEX7;
|
||||
status = ap_qact(qid, 0, &apinfo);
|
||||
if (status.response_code == AP_RESPONSE_NORMAL
|
||||
&& apinfo.cat >= AP_DEVICE_TYPE_CEX2A
|
||||
&& apinfo.cat <= AP_DEVICE_TYPE_CEX6)
|
||||
&& apinfo.cat <= AP_DEVICE_TYPE_CEX7)
|
||||
comp_type = apinfo.cat;
|
||||
}
|
||||
if (!comp_type)
|
||||
|
@@ -1,6 +1,6 @@
|
||||
/* SPDX-License-Identifier: GPL-2.0+ */
|
||||
/*
|
||||
* Copyright IBM Corp. 2006, 2012
|
||||
* Copyright IBM Corp. 2006, 2019
|
||||
* Author(s): Cornelia Huck <cornelia.huck@de.ibm.com>
|
||||
* Martin Schwidefsky <schwidefsky@de.ibm.com>
|
||||
* Ralph Wuerthner <rwuerthn@de.ibm.com>
|
||||
@@ -63,6 +63,7 @@ static inline int ap_test_bit(unsigned int *ptr, unsigned int nr)
|
||||
#define AP_DEVICE_TYPE_CEX4 10
|
||||
#define AP_DEVICE_TYPE_CEX5 11
|
||||
#define AP_DEVICE_TYPE_CEX6 12
|
||||
#define AP_DEVICE_TYPE_CEX7 13
|
||||
|
||||
/*
|
||||
* Known function facilities
|
||||
|
@@ -1363,9 +1363,122 @@ static struct attribute_group ccadata_attr_group = {
|
||||
.bin_attrs = ccadata_attrs,
|
||||
};
|
||||
|
||||
#define CCACIPHERTOKENSIZE (sizeof(struct cipherkeytoken) + 80)
|
||||
|
||||
/*
|
||||
* Sysfs attribute read function for all secure key ccacipher binary attributes.
|
||||
* The implementation can not deal with partial reads, because a new random
|
||||
* secure key blob is generated with each read. In case of partial reads
|
||||
* (i.e. off != 0 or count < key blob size) -EINVAL is returned.
|
||||
*/
|
||||
static ssize_t pkey_ccacipher_aes_attr_read(enum pkey_key_size keybits,
|
||||
bool is_xts, char *buf, loff_t off,
|
||||
size_t count)
|
||||
{
|
||||
size_t keysize;
|
||||
int rc;
|
||||
|
||||
if (off != 0 || count < CCACIPHERTOKENSIZE)
|
||||
return -EINVAL;
|
||||
if (is_xts)
|
||||
if (count < 2 * CCACIPHERTOKENSIZE)
|
||||
return -EINVAL;
|
||||
|
||||
keysize = CCACIPHERTOKENSIZE;
|
||||
rc = cca_gencipherkey(-1, -1, keybits, 0, buf, &keysize);
|
||||
if (rc)
|
||||
return rc;
|
||||
memset(buf + keysize, 0, CCACIPHERTOKENSIZE - keysize);
|
||||
|
||||
if (is_xts) {
|
||||
keysize = CCACIPHERTOKENSIZE;
|
||||
rc = cca_gencipherkey(-1, -1, keybits, 0,
|
||||
buf + CCACIPHERTOKENSIZE, &keysize);
|
||||
if (rc)
|
||||
return rc;
|
||||
memset(buf + CCACIPHERTOKENSIZE + keysize, 0,
|
||||
CCACIPHERTOKENSIZE - keysize);
|
||||
|
||||
return 2 * CCACIPHERTOKENSIZE;
|
||||
}
|
||||
|
||||
return CCACIPHERTOKENSIZE;
|
||||
}
|
||||
|
||||
static ssize_t ccacipher_aes_128_read(struct file *filp,
|
||||
struct kobject *kobj,
|
||||
struct bin_attribute *attr,
|
||||
char *buf, loff_t off,
|
||||
size_t count)
|
||||
{
|
||||
return pkey_ccacipher_aes_attr_read(PKEY_SIZE_AES_128, false, buf,
|
||||
off, count);
|
||||
}
|
||||
|
||||
static ssize_t ccacipher_aes_192_read(struct file *filp,
|
||||
struct kobject *kobj,
|
||||
struct bin_attribute *attr,
|
||||
char *buf, loff_t off,
|
||||
size_t count)
|
||||
{
|
||||
return pkey_ccacipher_aes_attr_read(PKEY_SIZE_AES_192, false, buf,
|
||||
off, count);
|
||||
}
|
||||
|
||||
static ssize_t ccacipher_aes_256_read(struct file *filp,
|
||||
struct kobject *kobj,
|
||||
struct bin_attribute *attr,
|
||||
char *buf, loff_t off,
|
||||
size_t count)
|
||||
{
|
||||
return pkey_ccacipher_aes_attr_read(PKEY_SIZE_AES_256, false, buf,
|
||||
off, count);
|
||||
}
|
||||
|
||||
static ssize_t ccacipher_aes_128_xts_read(struct file *filp,
|
||||
struct kobject *kobj,
|
||||
struct bin_attribute *attr,
|
||||
char *buf, loff_t off,
|
||||
size_t count)
|
||||
{
|
||||
return pkey_ccacipher_aes_attr_read(PKEY_SIZE_AES_128, true, buf,
|
||||
off, count);
|
||||
}
|
||||
|
||||
static ssize_t ccacipher_aes_256_xts_read(struct file *filp,
|
||||
struct kobject *kobj,
|
||||
struct bin_attribute *attr,
|
||||
char *buf, loff_t off,
|
||||
size_t count)
|
||||
{
|
||||
return pkey_ccacipher_aes_attr_read(PKEY_SIZE_AES_256, true, buf,
|
||||
off, count);
|
||||
}
|
||||
|
||||
static BIN_ATTR_RO(ccacipher_aes_128, CCACIPHERTOKENSIZE);
|
||||
static BIN_ATTR_RO(ccacipher_aes_192, CCACIPHERTOKENSIZE);
|
||||
static BIN_ATTR_RO(ccacipher_aes_256, CCACIPHERTOKENSIZE);
|
||||
static BIN_ATTR_RO(ccacipher_aes_128_xts, 2 * CCACIPHERTOKENSIZE);
|
||||
static BIN_ATTR_RO(ccacipher_aes_256_xts, 2 * CCACIPHERTOKENSIZE);
|
||||
|
||||
static struct bin_attribute *ccacipher_attrs[] = {
|
||||
&bin_attr_ccacipher_aes_128,
|
||||
&bin_attr_ccacipher_aes_192,
|
||||
&bin_attr_ccacipher_aes_256,
|
||||
&bin_attr_ccacipher_aes_128_xts,
|
||||
&bin_attr_ccacipher_aes_256_xts,
|
||||
NULL
|
||||
};
|
||||
|
||||
static struct attribute_group ccacipher_attr_group = {
|
||||
.name = "ccacipher",
|
||||
.bin_attrs = ccacipher_attrs,
|
||||
};
|
||||
|
||||
static const struct attribute_group *pkey_attr_groups[] = {
|
||||
&protkey_attr_group,
|
||||
&ccadata_attr_group,
|
||||
&ccacipher_attr_group,
|
||||
NULL,
|
||||
};
|
||||
|
||||
|
@@ -36,6 +36,8 @@ static struct ap_device_id ap_queue_ids[] = {
|
||||
.match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
|
||||
{ .dev_type = AP_DEVICE_TYPE_CEX6,
|
||||
.match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
|
||||
{ .dev_type = AP_DEVICE_TYPE_CEX7,
|
||||
.match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
|
||||
{ /* end of sibling */ },
|
||||
};
|
||||
|
||||
|
@@ -1,6 +1,6 @@
|
||||
/* SPDX-License-Identifier: GPL-2.0+ */
|
||||
/*
|
||||
* Copyright IBM Corp. 2001, 2018
|
||||
* Copyright IBM Corp. 2001, 2019
|
||||
* Author(s): Robert Burroughs
|
||||
* Eric Rossman (edrossma@us.ibm.com)
|
||||
* Cornelia Huck <cornelia.huck@de.ibm.com>
|
||||
@@ -29,6 +29,7 @@
|
||||
#define ZCRYPT_CEX4 10
|
||||
#define ZCRYPT_CEX5 11
|
||||
#define ZCRYPT_CEX6 12
|
||||
#define ZCRYPT_CEX7 13
|
||||
|
||||
/**
|
||||
* Large random numbers are pulled in 4096 byte chunks from the crypto cards
|
||||
|
@@ -1,6 +1,6 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
/*
|
||||
* Copyright IBM Corp. 2012
|
||||
* Copyright IBM Corp. 2012, 2019
|
||||
* Author(s): Holger Dengler <hd@linux.vnet.ibm.com>
|
||||
*/
|
||||
|
||||
@@ -38,8 +38,8 @@
|
||||
#define CEX4_CLEANUP_TIME (900*HZ)
|
||||
|
||||
MODULE_AUTHOR("IBM Corporation");
|
||||
MODULE_DESCRIPTION("CEX4/CEX5/CEX6 Cryptographic Card device driver, " \
|
||||
"Copyright IBM Corp. 2018");
|
||||
MODULE_DESCRIPTION("CEX4/CEX5/CEX6/CEX7 Cryptographic Card device driver, " \
|
||||
"Copyright IBM Corp. 2019");
|
||||
MODULE_LICENSE("GPL");
|
||||
|
||||
static struct ap_device_id zcrypt_cex4_card_ids[] = {
|
||||
@@ -49,6 +49,8 @@ static struct ap_device_id zcrypt_cex4_card_ids[] = {
|
||||
.match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
|
||||
{ .dev_type = AP_DEVICE_TYPE_CEX6,
|
||||
.match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
|
||||
{ .dev_type = AP_DEVICE_TYPE_CEX7,
|
||||
.match_flags = AP_DEVICE_ID_MATCH_CARD_TYPE },
|
||||
{ /* end of list */ },
|
||||
};
|
||||
|
||||
@@ -61,6 +63,8 @@ static struct ap_device_id zcrypt_cex4_queue_ids[] = {
|
||||
.match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
|
||||
{ .dev_type = AP_DEVICE_TYPE_CEX6,
|
||||
.match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
|
||||
{ .dev_type = AP_DEVICE_TYPE_CEX7,
|
||||
.match_flags = AP_DEVICE_ID_MATCH_QUEUE_TYPE },
|
||||
{ /* end of list */ },
|
||||
};
|
||||
|
||||
@@ -146,7 +150,7 @@ static const struct attribute_group cca_queue_attr_group = {
|
||||
};
|
||||
|
||||
/**
|
||||
* Probe function for CEX4/CEX5/CEX6 card device. It always
|
||||
* Probe function for CEX4/CEX5/CEX6/CEX7 card device. It always
|
||||
* accepts the AP device since the bus_match already checked
|
||||
* the hardware type.
|
||||
* @ap_dev: pointer to the AP device.
|
||||
@@ -158,25 +162,31 @@ static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
|
||||
* MEX_1k, MEX_2k, MEX_4k, CRT_1k, CRT_2k, CRT_4k, RNG, SECKEY
|
||||
*/
|
||||
static const int CEX4A_SPEED_IDX[] = {
|
||||
14, 19, 249, 42, 228, 1458, 0, 0};
|
||||
14, 19, 249, 42, 228, 1458, 0, 0};
|
||||
static const int CEX5A_SPEED_IDX[] = {
|
||||
8, 9, 20, 18, 66, 458, 0, 0};
|
||||
8, 9, 20, 18, 66, 458, 0, 0};
|
||||
static const int CEX6A_SPEED_IDX[] = {
|
||||
6, 9, 20, 17, 65, 438, 0, 0};
|
||||
6, 9, 20, 17, 65, 438, 0, 0};
|
||||
static const int CEX7A_SPEED_IDX[] = {
|
||||
6, 8, 17, 15, 54, 362, 0, 0};
|
||||
|
||||
static const int CEX4C_SPEED_IDX[] = {
|
||||
59, 69, 308, 83, 278, 2204, 209, 40};
|
||||
static const int CEX5C_SPEED_IDX[] = {
|
||||
24, 31, 50, 37, 90, 479, 27, 10};
|
||||
24, 31, 50, 37, 90, 479, 27, 10};
|
||||
static const int CEX6C_SPEED_IDX[] = {
|
||||
16, 20, 32, 27, 77, 455, 23, 9};
|
||||
16, 20, 32, 27, 77, 455, 24, 9};
|
||||
static const int CEX7C_SPEED_IDX[] = {
|
||||
14, 16, 26, 23, 64, 376, 23, 8};
|
||||
|
||||
static const int CEX4P_SPEED_IDX[] = {
|
||||
224, 313, 3560, 359, 605, 2827, 0, 50};
|
||||
0, 0, 0, 0, 0, 0, 0, 50};
|
||||
static const int CEX5P_SPEED_IDX[] = {
|
||||
63, 84, 156, 83, 142, 533, 0, 10};
|
||||
0, 0, 0, 0, 0, 0, 0, 10};
|
||||
static const int CEX6P_SPEED_IDX[] = {
|
||||
55, 70, 121, 73, 129, 522, 0, 9};
|
||||
0, 0, 0, 0, 0, 0, 0, 9};
|
||||
static const int CEX7P_SPEED_IDX[] = {
|
||||
0, 0, 0, 0, 0, 0, 0, 8};
|
||||
|
||||
struct ap_card *ac = to_ap_card(&ap_dev->device);
|
||||
struct zcrypt_card *zc;
|
||||
@@ -198,11 +208,19 @@ static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
|
||||
zc->user_space_type = ZCRYPT_CEX5;
|
||||
memcpy(zc->speed_rating, CEX5A_SPEED_IDX,
|
||||
sizeof(CEX5A_SPEED_IDX));
|
||||
} else {
|
||||
} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
|
||||
zc->type_string = "CEX6A";
|
||||
zc->user_space_type = ZCRYPT_CEX6;
|
||||
memcpy(zc->speed_rating, CEX6A_SPEED_IDX,
|
||||
sizeof(CEX6A_SPEED_IDX));
|
||||
} else {
|
||||
zc->type_string = "CEX7A";
|
||||
/* wrong user space type, just for compatibility
|
||||
* with the ZCRYPT_STATUS_MASK ioctl.
|
||||
*/
|
||||
zc->user_space_type = ZCRYPT_CEX6;
|
||||
memcpy(zc->speed_rating, CEX7A_SPEED_IDX,
|
||||
sizeof(CEX7A_SPEED_IDX));
|
||||
}
|
||||
zc->min_mod_size = CEX4A_MIN_MOD_SIZE;
|
||||
if (ap_test_bit(&ac->functions, AP_FUNC_MEX4K) &&
|
||||
@@ -232,7 +250,7 @@ static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
|
||||
zc->user_space_type = ZCRYPT_CEX3C;
|
||||
memcpy(zc->speed_rating, CEX5C_SPEED_IDX,
|
||||
sizeof(CEX5C_SPEED_IDX));
|
||||
} else {
|
||||
} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
|
||||
zc->type_string = "CEX6C";
|
||||
/* wrong user space type, must be CEX6
|
||||
* just keep it for cca compatibility
|
||||
@@ -240,6 +258,14 @@ static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
|
||||
zc->user_space_type = ZCRYPT_CEX3C;
|
||||
memcpy(zc->speed_rating, CEX6C_SPEED_IDX,
|
||||
sizeof(CEX6C_SPEED_IDX));
|
||||
} else {
|
||||
zc->type_string = "CEX7C";
|
||||
/* wrong user space type, must be CEX7
|
||||
* just keep it for cca compatibility
|
||||
*/
|
||||
zc->user_space_type = ZCRYPT_CEX3C;
|
||||
memcpy(zc->speed_rating, CEX7C_SPEED_IDX,
|
||||
sizeof(CEX7C_SPEED_IDX));
|
||||
}
|
||||
zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
|
||||
zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
|
||||
@@ -255,11 +281,19 @@ static int zcrypt_cex4_card_probe(struct ap_device *ap_dev)
|
||||
zc->user_space_type = ZCRYPT_CEX5;
|
||||
memcpy(zc->speed_rating, CEX5P_SPEED_IDX,
|
||||
sizeof(CEX5P_SPEED_IDX));
|
||||
} else {
|
||||
} else if (ac->ap_dev.device_type == AP_DEVICE_TYPE_CEX6) {
|
||||
zc->type_string = "CEX6P";
|
||||
zc->user_space_type = ZCRYPT_CEX6;
|
||||
memcpy(zc->speed_rating, CEX6P_SPEED_IDX,
|
||||
sizeof(CEX6P_SPEED_IDX));
|
||||
} else {
|
||||
zc->type_string = "CEX7P";
|
||||
/* wrong user space type, just for compatibility
|
||||
* with the ZCRYPT_STATUS_MASK ioctl.
|
||||
*/
|
||||
zc->user_space_type = ZCRYPT_CEX6;
|
||||
memcpy(zc->speed_rating, CEX7P_SPEED_IDX,
|
||||
sizeof(CEX7P_SPEED_IDX));
|
||||
}
|
||||
zc->min_mod_size = CEX4C_MIN_MOD_SIZE;
|
||||
zc->max_mod_size = CEX4C_MAX_MOD_SIZE;
|
||||
@@ -289,8 +323,8 @@ out:
|
||||
}
|
||||
|
||||
/**
|
||||
* This is called to remove the CEX4/CEX5/CEX6 card driver information
|
||||
* if an AP card device is removed.
|
||||
* This is called to remove the CEX4/CEX5/CEX6/CEX7 card driver
|
||||
* information if an AP card device is removed.
|
||||
*/
|
||||
static void zcrypt_cex4_card_remove(struct ap_device *ap_dev)
|
||||
{
|
||||
@@ -311,7 +345,7 @@ static struct ap_driver zcrypt_cex4_card_driver = {
|
||||
};
|
||||
|
||||
/**
|
||||
* Probe function for CEX4/CEX5/CEX6 queue device. It always
|
||||
* Probe function for CEX4/CEX5/CEX6/CEX7 queue device. It always
|
||||
* accepts the AP device since the bus_match already checked
|
||||
* the hardware type.
|
||||
* @ap_dev: pointer to the AP device.
|
||||
@@ -369,7 +403,7 @@ out:
|
||||
}
|
||||
|
||||
/**
|
||||
* This is called to remove the CEX4/CEX5/CEX6 queue driver
|
||||
* This is called to remove the CEX4/CEX5/CEX6/CEX7 queue driver
|
||||
* information if an AP queue device is removed.
|
||||
*/
|
||||
static void zcrypt_cex4_queue_remove(struct ap_device *ap_dev)
|
||||
|
Reference in New Issue
Block a user