From: Eric Biggers <ebigg...@google.com>

Add UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE which lets UFS host drivers
initialize the blk_crypto_profile themselves rather than have it be
initialized by ufshcd-core according to the UFSHCI standard.  This is
needed to support inline encryption on the "Exynos" UFS controller which
has a nonstandard interface.

Reviewed-by: Bart Van Assche <bvanass...@acm.org>
Reviewed-by: Peter Griffin <peter.grif...@linaro.org>
Signed-off-by: Eric Biggers <ebigg...@google.com>
---
 drivers/ufs/core/ufshcd-crypto.c | 10 +++++++---
 include/ufs/ufshcd.h             |  9 +++++++++
 2 files changed, 16 insertions(+), 3 deletions(-)

diff --git a/drivers/ufs/core/ufshcd-crypto.c b/drivers/ufs/core/ufshcd-crypto.c
index f2c4422cab86..debc925ae439 100644
--- a/drivers/ufs/core/ufshcd-crypto.c
+++ b/drivers/ufs/core/ufshcd-crypto.c
@@ -157,10 +157,13 @@ int ufshcd_hba_init_crypto_capabilities(struct ufs_hba 
*hba)
 {
        int cap_idx;
        int err = 0;
        enum blk_crypto_mode_num blk_mode_num;
 
+       if (hba->quirks & UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE)
+               return 0;
+
        /*
         * Don't use crypto if either the hardware doesn't advertise the
         * standard crypto capability bit *or* if the vendor specific driver
         * hasn't advertised that crypto is supported.
         */
@@ -226,13 +229,14 @@ void ufshcd_init_crypto(struct ufs_hba *hba)
        int slot;
 
        if (!(hba->caps & UFSHCD_CAP_CRYPTO))
                return;
 
-       /* Clear all keyslots - the number of keyslots is (CFGC + 1) */
-       for (slot = 0; slot < hba->crypto_capabilities.config_count + 1; slot++)
-               ufshcd_clear_keyslot(hba, slot);
+       /* Clear all keyslots. */
+       for (slot = 0; slot < hba->crypto_profile.num_slots; slot++)
+               hba->crypto_profile.ll_ops.keyslot_evict(&hba->crypto_profile,
+                                                        NULL, slot);
 }
 
 void ufshcd_crypto_register(struct ufs_hba *hba, struct request_queue *q)
 {
        if (hba->caps & UFSHCD_CAP_CRYPTO)
diff --git a/include/ufs/ufshcd.h b/include/ufs/ufshcd.h
index bad88bd91995..b354a7eee478 100644
--- a/include/ufs/ufshcd.h
+++ b/include/ufs/ufshcd.h
@@ -641,10 +641,19 @@ enum ufshcd_quirks {
        /*
         * Some host does not implement SQ Run Time Command (SQRTC) register
         * thus need this quirk to skip related flow.
         */
        UFSHCD_QUIRK_MCQ_BROKEN_RTC                     = 1 << 21,
+
+       /*
+        * This quirk needs to be enabled if the host controller supports inline
+        * encryption but it needs to initialize the crypto capabilities in a
+        * nonstandard way and/or needs to override blk_crypto_ll_ops.  If
+        * enabled, the standard code won't initialize the blk_crypto_profile;
+        * ufs_hba_variant_ops::init() must do it instead.
+        */
+       UFSHCD_QUIRK_CUSTOM_CRYPTO_PROFILE              = 1 << 22,
 };
 
 enum ufshcd_caps {
        /* Allow dynamic clk gating */
        UFSHCD_CAP_CLK_GATING                           = 1 << 0,
-- 
2.45.2


Reply via email to