ANDROID: scsi: ufs: add vendor hook to override key reprogramming
Some hardware has a way to restore all keyslots at once that is significantly faster than restoring each keyslot individually, as is done by blk_ksm_reprogram_all_keys(). Add a hook "android_rvh_ufs_reprogram_all_keys" that allows overriding the restoration of all keyslots after UFS reset. This may sleep, so this must be a "restricted" Android vendor hook rather than a regular one. Note that currently this functionality can't be upstreamed, as support for the hardware that needs it would need to be upstreamed first. Bug: 162257402 Bug: 181905172 Change-Id: I0b25393a5131941f085892560e08a64e63cd1369 Signed-off-by: Eric Biggers <ebiggers@google.com>
This commit is contained in:
@@ -213,6 +213,7 @@ EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_filemap_fault_cache_page);
|
|||||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_enable_thermal_genl_check);
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_enable_thermal_genl_check);
|
||||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_thermal_pm_notify_suspend);
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_thermal_pm_notify_suspend);
|
||||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_fill_prdt);
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_fill_prdt);
|
||||||
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_ufs_reprogram_all_keys);
|
||||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_prepare_command);
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_prepare_command);
|
||||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_update_sysfs);
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_update_sysfs);
|
||||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_send_command);
|
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_ufs_send_command);
|
||||||
|
@@ -6,6 +6,9 @@
|
|||||||
#include "ufshcd.h"
|
#include "ufshcd.h"
|
||||||
#include "ufshcd-crypto.h"
|
#include "ufshcd-crypto.h"
|
||||||
|
|
||||||
|
#undef CREATE_TRACE_POINTS
|
||||||
|
#include <trace/hooks/ufshcd.h>
|
||||||
|
|
||||||
/* Blk-crypto modes supported by UFS crypto */
|
/* Blk-crypto modes supported by UFS crypto */
|
||||||
static const struct ufs_crypto_alg_entry {
|
static const struct ufs_crypto_alg_entry {
|
||||||
enum ufs_crypto_alg ufs_alg;
|
enum ufs_crypto_alg ufs_alg;
|
||||||
@@ -120,8 +123,13 @@ bool ufshcd_crypto_enable(struct ufs_hba *hba)
|
|||||||
return false;
|
return false;
|
||||||
|
|
||||||
/* Reset might clear all keys, so reprogram all the keys. */
|
/* Reset might clear all keys, so reprogram all the keys. */
|
||||||
if (hba->ksm.num_slots)
|
if (hba->ksm.num_slots) {
|
||||||
blk_ksm_reprogram_all_keys(&hba->ksm);
|
int err = -EOPNOTSUPP;
|
||||||
|
|
||||||
|
trace_android_rvh_ufs_reprogram_all_keys(hba, &err);
|
||||||
|
if (err == -EOPNOTSUPP)
|
||||||
|
blk_ksm_reprogram_all_keys(&hba->ksm);
|
||||||
|
}
|
||||||
|
|
||||||
if (hba->quirks & UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE)
|
if (hba->quirks & UFSHCD_QUIRK_BROKEN_CRYPTO_ENABLE)
|
||||||
return false;
|
return false;
|
||||||
|
@@ -19,6 +19,10 @@ DECLARE_HOOK(android_vh_ufs_fill_prdt,
|
|||||||
unsigned int segments, int *err),
|
unsigned int segments, int *err),
|
||||||
TP_ARGS(hba, lrbp, segments, err));
|
TP_ARGS(hba, lrbp, segments, err));
|
||||||
|
|
||||||
|
DECLARE_RESTRICTED_HOOK(android_rvh_ufs_reprogram_all_keys,
|
||||||
|
TP_PROTO(struct ufs_hba *hba, int *err),
|
||||||
|
TP_ARGS(hba, err), 1);
|
||||||
|
|
||||||
DECLARE_HOOK(android_vh_ufs_prepare_command,
|
DECLARE_HOOK(android_vh_ufs_prepare_command,
|
||||||
TP_PROTO(struct ufs_hba *hba, struct request *rq,
|
TP_PROTO(struct ufs_hba *hba, struct request *rq,
|
||||||
struct ufshcd_lrb *lrbp, int *err),
|
struct ufshcd_lrb *lrbp, int *err),
|
||||||
|
Reference in New Issue
Block a user