]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/crypto/caam/error.c
Merge branch 'for-linus' of git://git.samba.org/sfrench/cifs-2.6
[mirror_ubuntu-artful-kernel.git] / drivers / crypto / caam / error.c
CommitLineData
8e8ec596
KP
1/*
2 * CAAM Error Reporting
3 *
4 * Copyright 2009-2011 Freescale Semiconductor, Inc.
5 */
6
7#include "compat.h"
8#include "regs.h"
9#include "intern.h"
10#include "desc.h"
11#include "jr.h"
12#include "error.h"
13
14#define SPRINTFCAT(str, format, param, max_alloc) \
15{ \
16 char *tmp; \
17 \
18 tmp = kmalloc(sizeof(format) + max_alloc, GFP_ATOMIC); \
19 sprintf(tmp, format, param); \
20 strcat(str, tmp); \
21 kfree(tmp); \
22}
23
24static void report_jump_idx(u32 status, char *outstr)
25{
26 u8 idx = (status & JRSTA_DECOERR_INDEX_MASK) >>
27 JRSTA_DECOERR_INDEX_SHIFT;
28
29 if (status & JRSTA_DECOERR_JUMP)
30 strcat(outstr, "jump tgt desc idx ");
31 else
32 strcat(outstr, "desc idx ");
33
34 SPRINTFCAT(outstr, "%d: ", idx, sizeof("255"));
35}
36
37static void report_ccb_status(u32 status, char *outstr)
38{
96aef9a8 39 static const char * const cha_id_list[] = {
8e8ec596
KP
40 "",
41 "AES",
281922a1 42 "DES",
8e8ec596 43 "ARC4",
281922a1 44 "MDHA",
8e8ec596
KP
45 "RNG",
46 "SNOW f8",
281922a1
KP
47 "Kasumi f8/9",
48 "PKHA",
49 "CRCA",
8e8ec596 50 "SNOW f9",
281922a1
KP
51 "ZUCE",
52 "ZUCA",
8e8ec596 53 };
96aef9a8 54 static const char * const err_id_list[] = {
281922a1 55 "No error.",
8e8ec596
KP
56 "Mode error.",
57 "Data size error.",
58 "Key size error.",
59 "PKHA A memory size error.",
60 "PKHA B memory size error.",
61 "Data arrived out of sequence error.",
62 "PKHA divide-by-zero error.",
63 "PKHA modulus even error.",
64 "DES key parity error.",
65 "ICV check failed.",
66 "Hardware error.",
67 "Unsupported CCM AAD size.",
68 "Class 1 CHA is not reset",
69 "Invalid CHA combination was selected",
70 "Invalid CHA selected.",
71 };
96aef9a8 72 static const char * const rng_err_id_list[] = {
281922a1
KP
73 "",
74 "",
75 "",
76 "Instantiate",
77 "Not instantiated",
78 "Test instantiate",
79 "Prediction resistance",
281922a1
KP
80 "Prediction resistance and test request",
81 "Uninstantiate",
281922a1
KP
82 "Secure key generation",
83 };
8e8ec596
KP
84 u8 cha_id = (status & JRSTA_CCBERR_CHAID_MASK) >>
85 JRSTA_CCBERR_CHAID_SHIFT;
86 u8 err_id = status & JRSTA_CCBERR_ERRID_MASK;
87
88 report_jump_idx(status, outstr);
89
6d00376a 90 if (cha_id < ARRAY_SIZE(cha_id_list)) {
8e8ec596
KP
91 SPRINTFCAT(outstr, "%s: ", cha_id_list[cha_id],
92 strlen(cha_id_list[cha_id]));
93 } else {
94 SPRINTFCAT(outstr, "unidentified cha_id value 0x%02x: ",
95 cha_id, sizeof("ff"));
96 }
97
281922a1
KP
98 if ((cha_id << JRSTA_CCBERR_CHAID_SHIFT) == JRSTA_CCBERR_CHAID_RNG &&
99 err_id < ARRAY_SIZE(rng_err_id_list) &&
100 strlen(rng_err_id_list[err_id])) {
101 /* RNG-only error */
102 SPRINTFCAT(outstr, "%s", rng_err_id_list[err_id],
103 strlen(rng_err_id_list[err_id]));
104 } else if (err_id < ARRAY_SIZE(err_id_list)) {
8e8ec596
KP
105 SPRINTFCAT(outstr, "%s", err_id_list[err_id],
106 strlen(err_id_list[err_id]));
107 } else {
108 SPRINTFCAT(outstr, "unidentified err_id value 0x%02x",
109 err_id, sizeof("ff"));
110 }
111}
112
113static void report_jump_status(u32 status, char *outstr)
114{
115 SPRINTFCAT(outstr, "%s() not implemented", __func__, sizeof(__func__));
116}
117
118static void report_deco_status(u32 status, char *outstr)
119{
96aef9a8 120 static const struct {
8e8ec596
KP
121 u8 value;
122 char *error_text;
123 } desc_error_list[] = {
281922a1 124 { 0x00, "No error." },
8e8ec596
KP
125 { 0x01, "SGT Length Error. The descriptor is trying to read "
126 "more data than is contained in the SGT table." },
281922a1 127 { 0x02, "SGT Null Entry Error." },
8e8ec596
KP
128 { 0x03, "Job Ring Control Error. There is a bad value in the "
129 "Job Ring Control register." },
130 { 0x04, "Invalid Descriptor Command. The Descriptor Command "
131 "field is invalid." },
132 { 0x05, "Reserved." },
133 { 0x06, "Invalid KEY Command" },
134 { 0x07, "Invalid LOAD Command" },
135 { 0x08, "Invalid STORE Command" },
136 { 0x09, "Invalid OPERATION Command" },
137 { 0x0A, "Invalid FIFO LOAD Command" },
138 { 0x0B, "Invalid FIFO STORE Command" },
281922a1 139 { 0x0C, "Invalid MOVE/MOVE_LEN Command" },
8e8ec596
KP
140 { 0x0D, "Invalid JUMP Command. A nonlocal JUMP Command is "
141 "invalid because the target is not a Job Header "
142 "Command, or the jump is from a Trusted Descriptor to "
143 "a Job Descriptor, or because the target Descriptor "
144 "contains a Shared Descriptor." },
145 { 0x0E, "Invalid MATH Command" },
146 { 0x0F, "Invalid SIGNATURE Command" },
147 { 0x10, "Invalid Sequence Command. A SEQ IN PTR OR SEQ OUT PTR "
148 "Command is invalid or a SEQ KEY, SEQ LOAD, SEQ FIFO "
149 "LOAD, or SEQ FIFO STORE decremented the input or "
150 "output sequence length below 0. This error may result "
151 "if a built-in PROTOCOL Command has encountered a "
152 "malformed PDU." },
153 { 0x11, "Skip data type invalid. The type must be 0xE or 0xF."},
154 { 0x12, "Shared Descriptor Header Error" },
155 { 0x13, "Header Error. Invalid length or parity, or certain "
156 "other problems." },
157 { 0x14, "Burster Error. Burster has gotten to an illegal "
158 "state" },
159 { 0x15, "Context Register Length Error. The descriptor is "
160 "trying to read or write past the end of the Context "
161 "Register. A SEQ LOAD or SEQ STORE with the VLF bit "
162 "set was executed with too large a length in the "
163 "variable length register (VSOL for SEQ STORE or VSIL "
164 "for SEQ LOAD)." },
165 { 0x16, "DMA Error" },
166 { 0x17, "Reserved." },
167 { 0x1A, "Job failed due to JR reset" },
168 { 0x1B, "Job failed due to Fail Mode" },
169 { 0x1C, "DECO Watchdog timer timeout error" },
170 { 0x1D, "DECO tried to copy a key from another DECO but the "
171 "other DECO's Key Registers were locked" },
172 { 0x1E, "DECO attempted to copy data from a DECO that had an "
173 "unmasked Descriptor error" },
174 { 0x1F, "LIODN error. DECO was trying to share from itself or "
175 "from another DECO but the two Non-SEQ LIODN values "
176 "didn't match or the 'shared from' DECO's Descriptor "
177 "required that the SEQ LIODNs be the same and they "
178 "aren't." },
179 { 0x20, "DECO has completed a reset initiated via the DRR "
180 "register" },
181 { 0x21, "Nonce error. When using EKT (CCM) key encryption "
182 "option in the FIFO STORE Command, the Nonce counter "
183 "reached its maximum value and this encryption mode "
184 "can no longer be used." },
185 { 0x22, "Meta data is too large (> 511 bytes) for TLS decap "
186 "(input frame; block ciphers) and IPsec decap (output "
187 "frame, when doing the next header byte update) and "
188 "DCRC (output frame)." },
281922a1
KP
189 { 0x23, "Read Input Frame error" },
190 { 0x24, "JDKEK, TDKEK or TDSK not loaded error" },
8e8ec596
KP
191 { 0x80, "DNR (do not run) error" },
192 { 0x81, "undefined protocol command" },
193 { 0x82, "invalid setting in PDB" },
194 { 0x83, "Anti-replay LATE error" },
195 { 0x84, "Anti-replay REPLAY error" },
196 { 0x85, "Sequence number overflow" },
197 { 0x86, "Sigver invalid signature" },
198 { 0x87, "DSA Sign Illegal test descriptor" },
199 { 0x88, "Protocol Format Error - A protocol has seen an error "
200 "in the format of data received. When running RSA, "
201 "this means that formatting with random padding was "
202 "used, and did not follow the form: 0x00, 0x02, 8-to-N "
203 "bytes of non-zero pad, 0x00, F data." },
204 { 0x89, "Protocol Size Error - A protocol has seen an error in "
205 "size. When running RSA, pdb size N < (size of F) when "
206 "no formatting is used; or pdb size N < (F + 11) when "
207 "formatting is used." },
208 { 0xC1, "Blob Command error: Undefined mode" },
209 { 0xC2, "Blob Command error: Secure Memory Blob mode error" },
210 { 0xC4, "Blob Command error: Black Blob key or input size "
211 "error" },
212 { 0xC5, "Blob Command error: Invalid key destination" },
213 { 0xC8, "Blob Command error: Trusted/Secure mode error" },
214 { 0xF0, "IPsec TTL or hop limit field either came in as 0, "
215 "or was decremented to 0" },
216 { 0xF1, "3GPP HFN matches or exceeds the Threshold" },
217 };
218 u8 desc_error = status & JRSTA_DECOERR_ERROR_MASK;
219 int i;
220
221 report_jump_idx(status, outstr);
222
6d00376a 223 for (i = 0; i < ARRAY_SIZE(desc_error_list); i++)
8e8ec596
KP
224 if (desc_error_list[i].value == desc_error)
225 break;
226
6d00376a 227 if (i != ARRAY_SIZE(desc_error_list) && desc_error_list[i].error_text) {
8e8ec596
KP
228 SPRINTFCAT(outstr, "%s", desc_error_list[i].error_text,
229 strlen(desc_error_list[i].error_text));
230 } else {
231 SPRINTFCAT(outstr, "unidentified error value 0x%02x",
232 desc_error, sizeof("ff"));
233 }
234}
235
236static void report_jr_status(u32 status, char *outstr)
237{
238 SPRINTFCAT(outstr, "%s() not implemented", __func__, sizeof(__func__));
239}
240
241static void report_cond_code_status(u32 status, char *outstr)
242{
243 SPRINTFCAT(outstr, "%s() not implemented", __func__, sizeof(__func__));
244}
245
246char *caam_jr_strstatus(char *outstr, u32 status)
247{
96aef9a8 248 static const struct stat_src {
8e8ec596
KP
249 void (*report_ssed)(u32 status, char *outstr);
250 char *error;
251 } status_src[] = {
252 { NULL, "No error" },
253 { NULL, NULL },
254 { report_ccb_status, "CCB" },
255 { report_jump_status, "Jump" },
256 { report_deco_status, "DECO" },
257 { NULL, NULL },
258 { report_jr_status, "Job Ring" },
259 { report_cond_code_status, "Condition Code" },
260 };
261 u32 ssrc = status >> JRSTA_SSRC_SHIFT;
262
263 sprintf(outstr, "%s: ", status_src[ssrc].error);
264
265 if (status_src[ssrc].report_ssed)
266 status_src[ssrc].report_ssed(status, outstr);
267
268 return outstr;
269}
270EXPORT_SYMBOL(caam_jr_strstatus);