[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250209155040.gnkf6xuhhzp5jnrw@thinkpad>
Date: Sun, 9 Feb 2025 21:20:40 +0530
From: Manivannan Sadhasivam <manivannan.sadhasivam@...aro.org>
To: Eric Biggers <ebiggers@...nel.org>
Cc: linux-block@...r.kernel.org, Jens Axboe <axboe@...nel.dk>,
Bartosz Golaszewski <brgl@...ev.pl>,
Gaurav Kashyap <quic_gaurkash@...cinc.com>,
linux-fscrypt@...r.kernel.org, linux-mmc@...r.kernel.org,
linux-scsi@...r.kernel.org, linux-arm-msm@...r.kernel.org,
linux-kernel@...r.kernel.org,
Bjorn Andersson <andersson@...nel.org>,
Konrad Dybcio <konradybcio@...nel.org>,
Dmitry Baryshkov <dmitry.baryshkov@...aro.org>
Subject: Re: [PATCH v11 5/7] soc: qcom: ice: make qcom_ice_program_key() take
struct blk_crypto_key
On Mon, Feb 03, 2025 at 10:00:39PM -0800, Eric Biggers wrote:
> From: Eric Biggers <ebiggers@...gle.com>
>
> qcom_ice_program_key() currently accepts the key as an array of bytes,
> algorithm ID, key size enum, and data unit size. However both callers
> have a struct blk_crypto_key which contains all that information. Thus
> they both have similar code that converts the blk_crypto_key into the
> form that qcom_ice_program_key() wants. Once wrapped key support is
> added, the key type would need to be added to the arguments too.
>
> Therefore, this patch changes qcom_ice_program_key() to take in all this
> information as a struct blk_crypto_key directly. The calling code is
> updated accordingly. This ends up being much simpler, and it makes the
> key type be passed down automatically once wrapped key support is added.
>
> Based on a patch by Gaurav Kashyap <quic_gaurkash@...cinc.com> that
> replaced the byte array argument only. This patch makes the
> blk_crypto_key replace other arguments like the algorithm ID too,
> ensuring that there remains only one source of truth.
>
> Signed-off-by: Eric Biggers <ebiggers@...gle.com>
For ufs-qcom:
Acked-by: Manivannan Sadhasivam <manivannan.sadhasivam@...aro.org>
- Mani
> ---
> drivers/mmc/host/sdhci-msm.c | 11 +----------
> drivers/soc/qcom/ice.c | 23 ++++++++++++-----------
> drivers/ufs/host/ufs-qcom.c | 11 +----------
> include/soc/qcom/ice.h | 22 +++-------------------
> 4 files changed, 17 insertions(+), 50 deletions(-)
>
> diff --git a/drivers/mmc/host/sdhci-msm.c b/drivers/mmc/host/sdhci-msm.c
> index 3c383bce4928f..2c926f566d053 100644
> --- a/drivers/mmc/host/sdhci-msm.c
> +++ b/drivers/mmc/host/sdhci-msm.c
> @@ -1960,20 +1960,11 @@ static int sdhci_msm_ice_keyslot_program(struct blk_crypto_profile *profile,
> unsigned int slot)
> {
> struct sdhci_msm_host *msm_host =
> sdhci_msm_host_from_crypto_profile(profile);
>
> - /* Only AES-256-XTS has been tested so far. */
> - if (key->crypto_cfg.crypto_mode != BLK_ENCRYPTION_MODE_AES_256_XTS)
> - return -EOPNOTSUPP;
> -
> - return qcom_ice_program_key(msm_host->ice,
> - QCOM_ICE_CRYPTO_ALG_AES_XTS,
> - QCOM_ICE_CRYPTO_KEY_SIZE_256,
> - key->bytes,
> - key->crypto_cfg.data_unit_size / 512,
> - slot);
> + return qcom_ice_program_key(msm_host->ice, slot, key);
> }
>
> static int sdhci_msm_ice_keyslot_evict(struct blk_crypto_profile *profile,
> const struct blk_crypto_key *key,
> unsigned int slot)
> diff --git a/drivers/soc/qcom/ice.c b/drivers/soc/qcom/ice.c
> index 393d2d1d275f1..78780fd508f0b 100644
> --- a/drivers/soc/qcom/ice.c
> +++ b/drivers/soc/qcom/ice.c
> @@ -159,41 +159,42 @@ int qcom_ice_suspend(struct qcom_ice *ice)
>
> return 0;
> }
> EXPORT_SYMBOL_GPL(qcom_ice_suspend);
>
> -int qcom_ice_program_key(struct qcom_ice *ice,
> - u8 algorithm_id, u8 key_size,
> - const u8 crypto_key[], u8 data_unit_size,
> - int slot)
> +int qcom_ice_program_key(struct qcom_ice *ice, unsigned int slot,
> + const struct blk_crypto_key *blk_key)
> {
> struct device *dev = ice->dev;
> union {
> u8 bytes[AES_256_XTS_KEY_SIZE];
> u32 words[AES_256_XTS_KEY_SIZE / sizeof(u32)];
> } key;
> int i;
> int err;
>
> /* Only AES-256-XTS has been tested so far. */
> - if (algorithm_id != QCOM_ICE_CRYPTO_ALG_AES_XTS ||
> - key_size != QCOM_ICE_CRYPTO_KEY_SIZE_256) {
> - dev_err_ratelimited(dev,
> - "Unhandled crypto capability; algorithm_id=%d, key_size=%d\n",
> - algorithm_id, key_size);
> + if (blk_key->crypto_cfg.crypto_mode !=
> + BLK_ENCRYPTION_MODE_AES_256_XTS) {
> + dev_err_ratelimited(dev, "Unsupported crypto mode: %d\n",
> + blk_key->crypto_cfg.crypto_mode);
> return -EINVAL;
> }
>
> - memcpy(key.bytes, crypto_key, AES_256_XTS_KEY_SIZE);
> + if (blk_key->size != AES_256_XTS_KEY_SIZE) {
> + dev_err_ratelimited(dev, "Incorrect key size\n");
> + return -EINVAL;
> + }
> + memcpy(key.bytes, blk_key->bytes, AES_256_XTS_KEY_SIZE);
>
> /* The SCM call requires that the key words are encoded in big endian */
> for (i = 0; i < ARRAY_SIZE(key.words); i++)
> __cpu_to_be32s(&key.words[i]);
>
> err = qcom_scm_ice_set_key(slot, key.bytes, AES_256_XTS_KEY_SIZE,
> QCOM_SCM_ICE_CIPHER_AES_256_XTS,
> - data_unit_size);
> + blk_key->crypto_cfg.data_unit_size / 512);
>
> memzero_explicit(&key, sizeof(key));
>
> return err;
> }
> diff --git a/drivers/ufs/host/ufs-qcom.c b/drivers/ufs/host/ufs-qcom.c
> index c3f0aa81ff983..9330022e98eec 100644
> --- a/drivers/ufs/host/ufs-qcom.c
> +++ b/drivers/ufs/host/ufs-qcom.c
> @@ -193,21 +193,12 @@ static int ufs_qcom_ice_keyslot_program(struct blk_crypto_profile *profile,
> {
> struct ufs_hba *hba = ufs_hba_from_crypto_profile(profile);
> struct ufs_qcom_host *host = ufshcd_get_variant(hba);
> int err;
>
> - /* Only AES-256-XTS has been tested so far. */
> - if (key->crypto_cfg.crypto_mode != BLK_ENCRYPTION_MODE_AES_256_XTS)
> - return -EOPNOTSUPP;
> -
> ufshcd_hold(hba);
> - err = qcom_ice_program_key(host->ice,
> - QCOM_ICE_CRYPTO_ALG_AES_XTS,
> - QCOM_ICE_CRYPTO_KEY_SIZE_256,
> - key->bytes,
> - key->crypto_cfg.data_unit_size / 512,
> - slot);
> + err = qcom_ice_program_key(host->ice, slot, key);
> ufshcd_release(hba);
> return err;
> }
>
> static int ufs_qcom_ice_keyslot_evict(struct blk_crypto_profile *profile,
> diff --git a/include/soc/qcom/ice.h b/include/soc/qcom/ice.h
> index 5870a94599a25..4cecc7f088b4b 100644
> --- a/include/soc/qcom/ice.h
> +++ b/include/soc/qcom/ice.h
> @@ -4,34 +4,18 @@
> */
>
> #ifndef __QCOM_ICE_H__
> #define __QCOM_ICE_H__
>
> +#include <linux/blk-crypto.h>
> #include <linux/types.h>
>
> struct qcom_ice;
>
> -enum qcom_ice_crypto_key_size {
> - QCOM_ICE_CRYPTO_KEY_SIZE_INVALID = 0x0,
> - QCOM_ICE_CRYPTO_KEY_SIZE_128 = 0x1,
> - QCOM_ICE_CRYPTO_KEY_SIZE_192 = 0x2,
> - QCOM_ICE_CRYPTO_KEY_SIZE_256 = 0x3,
> - QCOM_ICE_CRYPTO_KEY_SIZE_512 = 0x4,
> -};
> -
> -enum qcom_ice_crypto_alg {
> - QCOM_ICE_CRYPTO_ALG_AES_XTS = 0x0,
> - QCOM_ICE_CRYPTO_ALG_BITLOCKER_AES_CBC = 0x1,
> - QCOM_ICE_CRYPTO_ALG_AES_ECB = 0x2,
> - QCOM_ICE_CRYPTO_ALG_ESSIV_AES_CBC = 0x3,
> -};
> -
> int qcom_ice_enable(struct qcom_ice *ice);
> int qcom_ice_resume(struct qcom_ice *ice);
> int qcom_ice_suspend(struct qcom_ice *ice);
> -int qcom_ice_program_key(struct qcom_ice *ice,
> - u8 algorithm_id, u8 key_size,
> - const u8 crypto_key[], u8 data_unit_size,
> - int slot);
> +int qcom_ice_program_key(struct qcom_ice *ice, unsigned int slot,
> + const struct blk_crypto_key *blk_key);
> int qcom_ice_evict_key(struct qcom_ice *ice, int slot);
> struct qcom_ice *of_qcom_ice_get(struct device *dev);
> #endif /* __QCOM_ICE_H__ */
> --
> 2.48.1
>
--
மணிவண்ணன் சதாசிவம்
Powered by blists - more mailing lists