| // SPDX-License-Identifier: GPL-2.0 |
| /* |
| * Copyright 2021 Google LLC |
| * |
| * sysfs support for blk-crypto. This file contains the code which exports the |
| * crypto capabilities of devices via /sys/block/$disk/queue/crypto/. |
| */ |
| |
| #include <linux/blk-crypto-profile.h> |
| |
| #include "blk-crypto-internal.h" |
| |
| struct blk_crypto_kobj { |
| struct kobject kobj; |
| struct blk_crypto_profile *profile; |
| }; |
| |
| struct blk_crypto_attr { |
| struct attribute attr; |
| ssize_t (*show)(struct blk_crypto_profile *profile, |
| struct blk_crypto_attr *attr, char *page); |
| }; |
| |
| static struct blk_crypto_profile *kobj_to_crypto_profile(struct kobject *kobj) |
| { |
| return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; |
| } |
| |
| static struct blk_crypto_attr *attr_to_crypto_attr(struct attribute *attr) |
| { |
| return container_of(attr, struct blk_crypto_attr, attr); |
| } |
| |
| static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, |
| struct blk_crypto_attr *attr, char *page) |
| { |
| return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); |
| } |
| |
| static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, |
| struct blk_crypto_attr *attr, char *page) |
| { |
| return sysfs_emit(page, "%u\n", profile->num_slots); |
| } |
| |
| #define BLK_CRYPTO_RO_ATTR(_name) \ |
| static struct blk_crypto_attr _name##_attr = __ATTR_RO(_name) |
| |
| BLK_CRYPTO_RO_ATTR(max_dun_bits); |
| BLK_CRYPTO_RO_ATTR(num_keyslots); |
| |
| static struct attribute *blk_crypto_attrs[] = { |
| &max_dun_bits_attr.attr, |
| &num_keyslots_attr.attr, |
| NULL, |
| }; |
| |
| static const struct attribute_group blk_crypto_attr_group = { |
| .attrs = blk_crypto_attrs, |
| }; |
| |
| /* |
| * The encryption mode attributes. To avoid hard-coding the list of encryption |
| * modes, these are initialized at boot time by blk_crypto_sysfs_init(). |
| */ |
| static struct blk_crypto_attr __blk_crypto_mode_attrs[BLK_ENCRYPTION_MODE_MAX]; |
| static struct attribute *blk_crypto_mode_attrs[BLK_ENCRYPTION_MODE_MAX + 1]; |
| |
| static umode_t blk_crypto_mode_is_visible(struct kobject *kobj, |
| struct attribute *attr, int n) |
| { |
| struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); |
| struct blk_crypto_attr *a = attr_to_crypto_attr(attr); |
| int mode_num = a - __blk_crypto_mode_attrs; |
| |
| if (profile->modes_supported[mode_num]) |
| return 0444; |
| return 0; |
| } |
| |
| static ssize_t blk_crypto_mode_show(struct blk_crypto_profile *profile, |
| struct blk_crypto_attr *attr, char *page) |
| { |
| int mode_num = attr - __blk_crypto_mode_attrs; |
| |
| return sysfs_emit(page, "0x%x\n", profile->modes_supported[mode_num]); |
| } |
| |
| static const struct attribute_group blk_crypto_modes_attr_group = { |
| .name = "modes", |
| .attrs = blk_crypto_mode_attrs, |
| .is_visible = blk_crypto_mode_is_visible, |
| }; |
| |
| static const struct attribute_group *blk_crypto_attr_groups[] = { |
| &blk_crypto_attr_group, |
| &blk_crypto_modes_attr_group, |
| NULL, |
| }; |
| |
| static ssize_t blk_crypto_attr_show(struct kobject *kobj, |
| struct attribute *attr, char *page) |
| { |
| struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); |
| struct blk_crypto_attr *a = attr_to_crypto_attr(attr); |
| |
| return a->show(profile, a, page); |
| } |
| |
| static const struct sysfs_ops blk_crypto_attr_ops = { |
| .show = blk_crypto_attr_show, |
| }; |
| |
| static void blk_crypto_release(struct kobject *kobj) |
| { |
| kfree(container_of(kobj, struct blk_crypto_kobj, kobj)); |
| } |
| |
| static struct kobj_type blk_crypto_ktype = { |
| .default_groups = blk_crypto_attr_groups, |
| .sysfs_ops = &blk_crypto_attr_ops, |
| .release = blk_crypto_release, |
| }; |
| |
| /* |
| * If the request_queue has a blk_crypto_profile, create the "crypto" |
| * subdirectory in sysfs (/sys/block/$disk/queue/crypto/). |
| */ |
| int blk_crypto_sysfs_register(struct gendisk *disk) |
| { |
| struct request_queue *q = disk->queue; |
| struct blk_crypto_kobj *obj; |
| int err; |
| |
| if (!q->crypto_profile) |
| return 0; |
| |
| obj = kzalloc(sizeof(*obj), GFP_KERNEL); |
| if (!obj) |
| return -ENOMEM; |
| obj->profile = q->crypto_profile; |
| |
| err = kobject_init_and_add(&obj->kobj, &blk_crypto_ktype, |
| &disk->queue_kobj, "crypto"); |
| if (err) { |
| kobject_put(&obj->kobj); |
| return err; |
| } |
| q->crypto_kobject = &obj->kobj; |
| return 0; |
| } |
| |
| void blk_crypto_sysfs_unregister(struct gendisk *disk) |
| { |
| kobject_put(disk->queue->crypto_kobject); |
| } |
| |
| static int __init blk_crypto_sysfs_init(void) |
| { |
| int i; |
| |
| BUILD_BUG_ON(BLK_ENCRYPTION_MODE_INVALID != 0); |
| for (i = 1; i < BLK_ENCRYPTION_MODE_MAX; i++) { |
| struct blk_crypto_attr *attr = &__blk_crypto_mode_attrs[i]; |
| |
| attr->attr.name = blk_crypto_modes[i].name; |
| attr->attr.mode = 0444; |
| attr->show = blk_crypto_mode_show; |
| blk_crypto_mode_attrs[i - 1] = &attr->attr; |
| } |
| return 0; |
| } |
| subsys_initcall(blk_crypto_sysfs_init); |