From: "Alim Akhtar" <alim.akhtar@samsung.com>
To: "'Eric Biggers'" <ebiggers@kernel.org>, <linux-scsi@vger.kernel.org>
Cc: linux-samsung-soc@vger.kernel.org, linux-fscrypt@vger.kernel.org,
"'Avri Altman'" <avri.altman@wdc.com>,
"'Bart\ Van Assche'" <bvanassche@acm.org>,
"'Martin K . Petersen'" <martin.petersen@oracle.com>,
"'Peter Griffin'" <peter.griffin@linaro.org>,
"'André Draszik'" <andre.draszik@linaro.org>,
"'William McVicker'" <willmcvicker@google.com>
Subject: RE: [PATCH v3 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
Date: Wed, 10 Jul 2024 13:12:36 +0530 [thread overview]
Message-ID: <018501dad29c$bcd7ee90$3687cbb0$@samsung.com> (raw)
In-Reply-To: <20240708235330.103590-4-ebiggers@kernel.org>
> -----Original Message-----
> From: Eric Biggers <ebiggers@kernel.org>
> Sent: Tuesday, July 9, 2024 5:23 AM
> To: linux-scsi@vger.kernel.org
> Cc: linux-samsung-soc@vger.kernel.org; linux-fscrypt@vger.kernel.org; Alim
> Akhtar <alim.akhtar@samsung.com>; Avri Altman <avri.altman@wdc.com>;
> Bart Van Assche <bvanassche@acm.org>; Martin K . Petersen
> <martin.petersen@oracle.com>; Peter Griffin <peter.griffin@linaro.org>;
> André Draszik <andre.draszik@linaro.org>; William McVicker
> <willmcvicker@google.com>
> Subject: [PATCH v3 3/6] scsi: ufs: core: Add
> UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE
>
> From: Eric Biggers <ebiggers@google.com>
>
> Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE which tells the UFS core to
> not use the crypto enable bit defined by the UFS specification. This is
> needed to support inline encryption on the "Exynos" UFS controller.
>
> Reviewed-by: Bart Van Assche <bvanassche@acm.org>
> Reviewed-by: Peter Griffin <peter.griffin@linaro.org>
> Signed-off-by: Eric Biggers <ebiggers@google.com>
> ---
Reviewed-by: Alim Akhtar <alim.akhtar@samsung.com>
> drivers/ufs/core/ufshcd-crypto.c | 8 ++++++++
> include/ufs/ufshcd.h | 7 +++++++
> 2 files changed, 15 insertions(+)
>
> diff --git a/drivers/ufs/core/ufshcd-crypto.c b/drivers/ufs/core/ufshcd-
> crypto.c
> index b4980fd91cee..a714dad82cd1 100644
> --- a/drivers/ufs/core/ufshcd-crypto.c
> +++ b/drivers/ufs/core/ufshcd-crypto.c
> @@ -108,17 +108,25 @@ static int ufshcd_crypto_keyslot_evict(struct
> blk_crypto_profile *profile,
> union ufs_crypto_cfg_entry cfg = {};
>
> return ufshcd_program_key(hba, &cfg, slot); }
>
> +/*
> + * Reprogram the keyslots if needed, and return true if
> +CRYPTO_GENERAL_ENABLE
> + * should be used in the host controller initialization sequence.
> + */
> bool ufshcd_crypto_enable(struct ufs_hba *hba) {
> if (!(hba->caps & UFSHCD_CAP_CRYPTO))
> return false;
>
> /* Reset might clear all keys, so reprogram all the keys. */
> blk_crypto_reprogram_all_keys(&hba->crypto_profile);
> +
> + if (hba->quirks & UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE)
> + return false;
> +
> return true;
> }
>
> static const struct blk_crypto_ll_ops ufshcd_crypto_ops = {
> .keyslot_program = ufshcd_crypto_keyslot_program,
> diff --git a/include/ufs/ufshcd.h b/include/ufs/ufshcd.h index
> b354a7eee478..4b7ad23a4420 100644
> --- a/include/ufs/ufshcd.h
> +++ b/include/ufs/ufshcd.h
> @@ -650,10 +650,17 @@ enum ufshcd_quirks {
> * nonstandard way and/or needs to override blk_crypto_ll_ops. If
> * enabled, the standard code won't initialize the blk_crypto_profile;
> * ufs_hba_variant_ops::init() must do it instead.
> */
> UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE = 1 << 22,
> +
> + /*
> + * This quirk needs to be enabled if the host controller supports inline
> + * encryption but does not support the CRYPTO_GENERAL_ENABLE
> bit, i.e.
> + * host controller initialization fails if that bit is set.
> + */
> + UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE = 1 << 23,
> };
>
> enum ufshcd_caps {
> /* Allow dynamic clk gating */
> UFSHCD_CAP_CLK_GATING = 1 << 0,
> --
> 2.45.2
next prev parent reply other threads:[~2024-07-10 7:42 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-07-08 23:53 [PATCH v3 0/6] Basic inline encryption support for ufs-exynos Eric Biggers
2024-07-08 23:53 ` [PATCH v3 1/6] scsi: ufs: core: Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE Eric Biggers
2024-07-10 6:06 ` Alim Akhtar
2024-07-08 23:53 ` [PATCH v3 2/6] scsi: ufs: core: fold ufshcd_clear_keyslot() into its caller Eric Biggers
2024-07-10 6:22 ` Alim Akhtar
2024-07-08 23:53 ` [PATCH v3 3/6] scsi: ufs: core: Add UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE Eric Biggers
2024-07-10 7:42 ` Alim Akhtar [this message]
2024-07-08 23:53 ` [PATCH v3 4/6] scsi: ufs: core: Add fill_crypto_prdt variant op Eric Biggers
2024-07-10 8:12 ` Alim Akhtar
2024-07-08 23:53 ` [PATCH v3 5/6] scsi: ufs: core: Add UFSHCD_QUIRK_KEYS_IN_PRDT Eric Biggers
2024-07-10 8:16 ` Alim Akhtar
2024-07-08 23:53 ` [PATCH v3 6/6] scsi: ufs: exynos: Add support for Flash Memory Protector (FMP) Eric Biggers
2024-07-09 11:17 ` Peter Griffin
2024-07-09 18:14 ` Eric Biggers
2024-07-10 14:40 ` Peter Griffin
2024-07-10 9:04 ` Alim Akhtar
2024-07-11 2:35 ` [PATCH v3 0/6] Basic inline encryption support for ufs-exynos Martin K. Petersen
2024-07-16 2:29 ` Martin K. Petersen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='018501dad29c$bcd7ee90$3687cbb0$@samsung.com' \
--to=alim.akhtar@samsung.com \
--cc=andre.draszik@linaro.org \
--cc=avri.altman@wdc.com \
--cc=bvanassche@acm.org \
--cc=ebiggers@kernel.org \
--cc=linux-fscrypt@vger.kernel.org \
--cc=linux-samsung-soc@vger.kernel.org \
--cc=linux-scsi@vger.kernel.org \
--cc=martin.petersen@oracle.com \
--cc=peter.griffin@linaro.org \
--cc=willmcvicker@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox