On Thu, Dec 17, 2020 at 05:21:32PM +0800, Peng.Zhou wrote: > > On Wed, 2020-11-25 at 17:03 +0800, Stanley Chu wrote: > > Hi Eric, > > > > On Mon, 2020-11-23 at 18:01 -0800, Eric Biggers wrote: > > > Hi Adrian, > > > > > > On Mon, Nov 23, 2020 at 09:04:12AM +0200, Adrian Hunter wrote: > > > > On 20/11/20 9:44 pm, Eric Biggers wrote: > > > > > Hi Adrian, > > > > > > > > > > On Fri, Nov 20, 2020 at 09:29:59PM +0200, Adrian Hunter wrote: > > > > >> I haven't had a chance to look at it properly, but I do have a couple of > > > > >> dumb questions. How do you ensure the host controller is not runtime > > > > >> suspended when the key is programmed? > > > > > > > > > > This is handled by the block layer, in block/keyslot-manager.c. It ensures that > > > > > the device is resumed before calling blk_ksm_ll_ops::keyslot_program() or > > > > > blk_ksm_ll_ops::keyslot_evict(). See blk_ksm_hw_enter(). > > > > > > > > Cool, although cqhci is doing a lazy kind of resume, so maybe not be enabled > > > > when a key is programmed? Would that be a problem? > > > > > > > > > > > > > >> Are the keys lost when the host controller is reset, and then how do you know > > > > >> the host controller does not get reset after the key is programmed but before > > > > >> the I/O is submitted? > > > > > > > > > > As with UFS, keys might be lost when the host controller is reset, so we're > > > > > reprogramming all the keys when that happens. See patch 1: > > > > > > > > > > mmc_set_initial_state() > > > > > mmc_crypto_set_initial_state() > > > > > blk_ksm_reprogram_all_keys() > > > > > > > > > > (That's the intent, at least. For MMC, I'm not sure if resets were properly > > > > > covered by the testing I've done so far. But the code looks right to me.) > > > > > > > > After reset, cqhci will not necessarily be enabled at this point. Is that OK? > > > > > > The hardware that I have (sdm630) appears to allow programming and evicting keys > > > even while CQHCI_CFG.CQHCI_ENABLE is clear, i.e. even when the CQE is "off". > > > I tested it using the patch below. > > > > > > The eMMC specification isn't clear about this point. But I'm thinking that the > > > crypto configuration registers (the keyslots) are probably supposed to work like > > > most of the other CQHCI registers, which can be written to while CQHCI_ENABLE is > > > clear. Then setting CQHCI_ENABLE just enables the ability to actually issue > > > requests. Likewise, setting CQHCI_CRYPTO_GENERAL_ENABLE just allows using > > > crypto in requests; it isn't needed to write to the crypto configurations. > > > > > > For what it's worth, UFS crypto (which has been supported by upstream since > > > v5.9) works similarly. Keys can be programmed while the UFS host is powered on, > > > even before it's "enabled". > > > > > > But maybe someone interpreted the eMMC specification differently. Hopefully > > > Mediatek can give some insight into how they implemented it, and test this > > > patchset on their hardware too. > > > > MediaTek CQHCI also works in this way. > > > > Complete test is on-going now and we will update the results as soon as > > possible. > > > > Thanks, > > Stanley Chu > > > > > > > > Here's the patch I used to verify that sdm630 allows programming and evicting > > > keys even while the CQE is off: > > > > > > diff --git a/drivers/mmc/core/block.c b/drivers/mmc/core/block.c > > > index eaf2f1074326..eb2d88d0b3ba 100644 > > > --- a/drivers/mmc/core/block.c > > > +++ b/drivers/mmc/core/block.c > > > @@ -1406,6 +1406,9 @@ static void mmc_blk_cqe_complete_rq(struct mmc_queue *mq, struct request *req) > > > > > > mmc_cqe_check_busy(mq); > > > > > > + if (mmc_tot_in_flight(mq) == 0 && host->cqe_on) > > > + host->cqe_ops->cqe_off(host); > > > + > > > spin_unlock_irqrestore(&mq->lock, flags); > > > > > > if (!mq->cqe_busy) > > > diff --git a/drivers/mmc/host/sdhci-msm.c b/drivers/mmc/host/sdhci-msm.c > > > index 6ce21414d510..70d8dbc6515f 100644 > > > --- a/drivers/mmc/host/sdhci-msm.c > > > +++ b/drivers/mmc/host/sdhci-msm.c > > > @@ -1971,6 +1971,12 @@ static int sdhci_msm_program_key(struct cqhci_host *cq_host, > > > int i; > > > int err; > > > > > > + if (!cq_host->mmc->cqe_on) { > > > + pr_info("@@@ cqe is off for %s slot %d\n", > > > + (cfg->config_enable & CQHCI_CRYPTO_CONFIGURATION_ENABLE) ? > > > + "program" : "evict", slot); > > > + } > > > + > > > if (!(cfg->config_enable & CQHCI_CRYPTO_CONFIGURATION_ENABLE)) > > > return qcom_scm_ice_invalidate_key(slot); > > > > > > Hi Eric, > > I also have a question about reprogramming keys scenarios, if some SoC > vensors' eMMC host will power down or something else like that keys will > be lost after runtime suspend, that means we must do reprogramming keys > in runtime resume, right? Do you think that we should add it in > cqhci-core layer(such as __cqhci_enable()) or every SoC vendor's host > driver resume path? > The keys should only be lost on reset, not on runtime suspend. So I believe the code I've proposed is sufficient. - Eric