lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2b9c6ef7-16ee-4174-a87f-63c611657872@intel.com>
Date: Mon, 13 Oct 2025 13:53:47 +0300
From: Adrian Hunter <adrian.hunter@...el.com>
To: Md Sadre Alam <quic_mdalam@...cinc.com>, <quic_asutoshd@...cinc.com>,
	<ulf.hansson@...aro.org>, <linux-mmc@...r.kernel.org>,
	<linux-kernel@...r.kernel.org>, <linux-arm-msm@...r.kernel.org>,
	<quic_varada@...cinc.com>
Subject: Re: [PATCH] mmc: sdhci-msm: Enable ICE support for non-cmdq eMMC
 devices

On 13/10/2025 12:09, Md Sadre Alam wrote:
> Hi,
> 
> On 10/9/2025 5:59 PM, Adrian Hunter wrote:
>> On 08/10/2025 14:07, Md Sadre Alam wrote:
>>> Enable Inline Crypto Engine (ICE) support for eMMC devices that don't
>>> use command queuing (CQE). This allows hardware-accelerated encryption
>>> and decryption for standard eMMC operations without command queuing.
>>>
>>> The changes include:
>>> - Add non-cmdq crypto register definitions
>>> - Implement crypto configuration callback for non-cmdq operations
>>> - Initialize ICE hardware during host setup for non-cmdq devices
>>> - Integrate crypto configuration into the main request path
>>>
>>> This enables non-cmdq eMMC devices to benefit from hardware crypto
>>> acceleration, improving performance for encrypted storage operations
>>> while maintaining compatibility with existing cmdq crypto support.
>>>
>>> Signed-off-by: Md Sadre Alam <quic_mdalam@...cinc.com>
>>> ---
>>>   drivers/mmc/host/cqhci.h     |  4 ++
>>>   drivers/mmc/host/sdhci-msm.c | 74 +++++++++++++++++++++++++++++++++++-
>>>   drivers/mmc/host/sdhci.c     | 20 ++++++++++
>>>   drivers/mmc/host/sdhci.h     |  2 +
>>>   4 files changed, 99 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/drivers/mmc/host/cqhci.h b/drivers/mmc/host/cqhci.h
>>> index ce189a1866b9..9bf236e27675 100644
>>> --- a/drivers/mmc/host/cqhci.h
>>> +++ b/drivers/mmc/host/cqhci.h
>>> @@ -119,6 +119,10 @@
>>>   /* command response argument */
>>>   #define CQHCI_CRA            0x5C
>>>   +/* non command queue crypto enable register*/
>>> +#define NONCQ_CRYPTO_PARM        0x70
>>> +#define NONCQ_CRYPTO_DUN        0x74
>>
>> Since cqhci is not using these, they might be better in sdhci-msm.c
> Ok
>>
>>> +
>>>   /* crypto capabilities */
>>>   #define CQHCI_CCAP            0x100
>>>   #define CQHCI_CRYPTOCAP            0x104
>>> diff --git a/drivers/mmc/host/sdhci-msm.c b/drivers/mmc/host/sdhci-msm.c
>>> index 4e5edbf2fc9b..2204c6abb3fe 100644
>>> --- a/drivers/mmc/host/sdhci-msm.c
>>> +++ b/drivers/mmc/host/sdhci-msm.c
>>> @@ -157,6 +157,23 @@
>>>   #define CQHCI_VENDOR_CFG1    0xA00
>>>   #define CQHCI_VENDOR_DIS_RST_ON_CQ_EN    (0x3 << 13)
>>>   +#define DISABLE_CRYPTO            BIT(15)
>>> +#define CRYPTO_GENERAL_ENABLE        BIT(1)
>>> +#define HC_VENDOR_SPECIFIC_FUNC4    0x260
>>> +#define ICE_HCI_SUPPORT            BIT(28)
>>> +
>>> +/* SDHCI MSM ICE CTRL Info register offset */
>>> +enum {
>>> +    OFFSET_SDHCI_MSM_ICE_HCI_PARAM_CCI    = 0,
>>> +    OFFSET_SDHCI_MSM_ICE_HCI_PARAM_CE    = 8,
>>> +};
>>> +
>>> +/* SDHCI MSM ICE CTRL Info register masks */
>>> +enum {
>>> +    MASK_SDHCI_MSM_ICE_HCI_PARAM_CE        = 0x1,
>>> +    MASK_SDHCI_MSM_ICE_HCI_PARAM_CCI    = 0xff
>>> +};
>>
>> Preferably use GENMASK() and FIELD_PREP()
> Ok
>>
>>> +
>>>   struct sdhci_msm_offset {
>>>       u32 core_hc_mode;
>>>       u32 core_mci_data_cnt;
>>> @@ -1882,9 +1899,47 @@ static void sdhci_msm_set_clock(struct sdhci_host *host, unsigned int clock)
>>>    * Inline Crypto Engine (ICE) support                                        *
>>>    *                                                                           *
>>>   \*****************************************************************************/
>>> -
>>
>> Unnecessary to delete this line
> Ok
>>
>>>   #ifdef CONFIG_MMC_CRYPTO
>>>   +static int sdhci_msm_ice_cfg(struct sdhci_host *host, struct mmc_request *mrq,
>>> +                 u32 slot)
>>> +{
>>> +    struct sdhci_pltfm_host *pltfm_host = sdhci_priv(host);
>>> +    struct sdhci_msm_host *msm_host = sdhci_pltfm_priv(pltfm_host);
>>> +    struct mmc_host *mmc = msm_host->mmc;
>>> +    struct cqhci_host *cq_host = mmc->cqe_private;
>>> +    unsigned int crypto_params = 0;
>>> +    int key_index = 0;
>>> +    bool bypass = true;
>>> +    u64 dun = 0;
>>> +
>>> +    if (!mrq || !cq_host)
>>> +        return -EINVAL;
>>
>> It should not be possible to get here if (!mrq || !cq_host)
> Ok, will remove it in next revision.
>>
>>> +
>>> +    if (mrq->crypto_ctx) {
>>> +        dun = mrq->crypto_ctx->bc_dun[0];
>>> +        bypass = false;
>>> +        key_index = mrq->crypto_key_slot;
>>> +    }
>>> +
>>> +    /* Configure ICE bypass mode */
>>> +    crypto_params |= ((!bypass) & MASK_SDHCI_MSM_ICE_HCI_PARAM_CE)
>>> +             << OFFSET_SDHCI_MSM_ICE_HCI_PARAM_CE;
>>> +    /* Configure Crypto Configure Index (CCI) */
>>> +    crypto_params |= (key_index & MASK_SDHCI_MSM_ICE_HCI_PARAM_CCI)
>>> +             << OFFSET_SDHCI_MSM_ICE_HCI_PARAM_CCI;
>>> +
>>> +    cqhci_writel(cq_host, crypto_params, NONCQ_CRYPTO_PARM);
>>> +
>>> +    if (mrq->crypto_ctx)
>>> +        cqhci_writel(cq_host, lower_32_bits(dun), NONCQ_CRYPTO_DUN);
>>> +
>>> +    /* Ensure crypto configuration is written before proceeding */
>>> +    wmb();
>>> +
>>> +    return 0;
>>> +}
>>> +
>>>   static const struct blk_crypto_ll_ops sdhci_msm_crypto_ops; /* forward decl */
>>>     static int sdhci_msm_ice_init(struct sdhci_msm_host *msm_host,
>>> @@ -2131,6 +2186,8 @@ static int sdhci_msm_cqe_add_host(struct sdhci_host *host,
>>>       struct cqhci_host *cq_host;
>>>       bool dma64;
>>>       u32 cqcfg;
>>> +    u32 config;
>>> +    u32 ice_cap;
>>>       int ret;
>>>         /*
>>> @@ -2185,6 +2242,18 @@ static int sdhci_msm_cqe_add_host(struct sdhci_host *host,
>>>       if (ret)
>>>           goto cleanup;
>>>   +    /* Initialize ICE for non-CMDQ eMMC devices */
>>> +    config = sdhci_readl(host, HC_VENDOR_SPECIFIC_FUNC4);
>>> +    config &= ~DISABLE_CRYPTO;
>>> +    sdhci_writel(host, config, HC_VENDOR_SPECIFIC_FUNC4);
>>> +    ice_cap = cqhci_readl(cq_host, CQHCI_CAP);
>>> +    if (ice_cap & ICE_HCI_SUPPORT) {
>>> +        config = cqhci_readl(cq_host, CQHCI_CFG);
>>> +        config |= CRYPTO_GENERAL_ENABLE;
>>> +        cqhci_writel(cq_host, config, CQHCI_CFG);
>>> +    }
>>> +    sdhci_msm_ice_enable(msm_host);
>>> +
>>>       dev_info(&pdev->dev, "%s: CQE init: success\n",
>>>               mmc_hostname(host->mmc));
>>>       return ret;
>>> @@ -2450,6 +2519,9 @@ static const struct of_device_id sdhci_msm_dt_match[] = {
>>>   MODULE_DEVICE_TABLE(of, sdhci_msm_dt_match);
>>>     static const struct sdhci_ops sdhci_msm_ops = {
>>> +#ifdef CONFIG_MMC_CRYPTO
>>> +    .crypto_engine_cfg = sdhci_msm_ice_cfg,
>>> +#endif
>>>       .reset = sdhci_and_cqhci_reset,
>>>       .set_clock = sdhci_msm_set_clock,
>>>       .get_min_clock = sdhci_msm_get_min_clock,
>>> diff --git a/drivers/mmc/host/sdhci.c b/drivers/mmc/host/sdhci.c
>>> index ac7e11f37af7..2d636a8ee452 100644
>>> --- a/drivers/mmc/host/sdhci.c
>>> +++ b/drivers/mmc/host/sdhci.c
>>> @@ -2202,6 +2202,21 @@ void sdhci_set_power_and_bus_voltage(struct sdhci_host *host,
>>>   }
>>>   EXPORT_SYMBOL_GPL(sdhci_set_power_and_bus_voltage);
>>>   +static int sdhci_crypto_cfg(struct sdhci_host *host, struct mmc_request *mrq,
>>> +                u32 slot)
>>> +{
>>> +    int err = 0;
>>> +
>>> +    if (host->ops->crypto_engine_cfg) {
>>> +        err = host->ops->crypto_engine_cfg(host, mrq, slot);
>>> +        if (err)
>>> +            pr_err("%s: failed to configure crypto: %d\n",
>>> +                   mmc_hostname(host->mmc), err);
>>> +    }
>>> +
>>> +    return err;
>>> +}
>>> +
>>>   /*****************************************************************************\
>>>    *                                                                           *
>>>    * MMC callbacks                                                             *
>>> @@ -2227,6 +2242,11 @@ void sdhci_request(struct mmc_host *mmc, struct mmc_request *mrq)
>>>         cmd = sdhci_manual_cmd23(host, mrq) ? mrq->sbc : mrq->cmd;
>>>   +    if (mmc->caps2 & MMC_CAP2_CRYPTO) {
>>> +        if (sdhci_crypto_cfg(host, mrq, 0))
>>> +            goto out_finish;
>>> +    }
>>
>> It would be preferable to hook the >request() callback e.g.
>>
>>     host->mmc_host_ops.request = sdhci_msm_request;
>>
>> void sdhci_msm_request(struct mmc_host *mmc, struct mmc_request *mrq)
>> {
>>     if (mmc->caps2 & MMC_CAP2_CRYPTO) {
>>         etc
>>     }
>>
>>     sdhci_request(mmc, mrq);
>> }
> Thanks for the suggestion. I Will update the patch to override the mmc_host_ops.request callback in sdhci-msm.c via a platform-specific wrapper (sdhci_msm_request). Since mmc->ops is a const pointer, I Will clone the existing ops into a local copy 

Can just update the sdhci ops directly:

	host->mmc_host_ops.request = sdhci_msm_request;

(msm_mmc_ops) and replaced only the request field. This preserves all platform-specific callbacks like enable_sdio_irq and avoids probe failures. The change in probe function.
> 
> #ifdef CONFIG_MMC_CRYPTO
>     memcpy(&msm_host->msm_mmc_ops, msm_host->mmc->ops, sizeof(struct
>         mmc_host_ops));
>         msm_host->msm_mmc_ops.request = sdhci_msm_request;
>         msm_host->mmc->ops = &msm_host->msm_mmc_ops;
> #endif
> 
> 
> Thanks,
> Alam.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ