1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * bio-integrity.c - bio data integrity extensions
4 *
5 * Copyright (C) 2007, 2008, 2009 Oracle Corporation
6 * Written by: Martin K. Petersen <martin.petersen@oracle.com>
7 */
8
9 #include <linux/blk-integrity.h>
10 #include <linux/t10-pi.h>
11 #include "blk.h"
12
13 struct bio_integrity_alloc {
14 struct bio_integrity_payload bip;
15 struct bio_vec bvecs[];
16 };
17
18 static mempool_t integrity_buf_pool;
19
bi_offload_capable(struct blk_integrity * bi)20 static bool bi_offload_capable(struct blk_integrity *bi)
21 {
22 return bi->metadata_size == bi->pi_tuple_size;
23 }
24
__bio_integrity_action(struct bio * bio)25 unsigned int __bio_integrity_action(struct bio *bio)
26 {
27 struct blk_integrity *bi = blk_get_integrity(bio->bi_bdev->bd_disk);
28
29 if (WARN_ON_ONCE(bio_has_crypt_ctx(bio)))
30 return 0;
31
32 switch (bio_op(bio)) {
33 case REQ_OP_READ:
34 if (bi->flags & BLK_INTEGRITY_NOVERIFY) {
35 if (bi_offload_capable(bi))
36 return 0;
37 return BI_ACT_BUFFER;
38 }
39 return BI_ACT_BUFFER | BI_ACT_CHECK;
40 case REQ_OP_WRITE:
41 /*
42 * Flush masquerading as write?
43 */
44 if (!bio_sectors(bio))
45 return 0;
46
47 /*
48 * Zero the memory allocated to not leak uninitialized kernel
49 * memory to disk for non-integrity metadata where nothing else
50 * initializes the memory.
51 */
52 if (bi->flags & BLK_INTEGRITY_NOGENERATE) {
53 if (bi_offload_capable(bi))
54 return 0;
55 return BI_ACT_BUFFER | BI_ACT_ZERO;
56 }
57
58 if (bi->metadata_size > bi->pi_tuple_size)
59 return BI_ACT_BUFFER | BI_ACT_CHECK | BI_ACT_ZERO;
60 return BI_ACT_BUFFER | BI_ACT_CHECK;
61 default:
62 return 0;
63 }
64 }
65 EXPORT_SYMBOL_GPL(__bio_integrity_action);
66
bio_integrity_alloc_buf(struct bio * bio,bool zero_buffer)67 void bio_integrity_alloc_buf(struct bio *bio, bool zero_buffer)
68 {
69 struct blk_integrity *bi = blk_get_integrity(bio->bi_bdev->bd_disk);
70 struct bio_integrity_payload *bip = bio_integrity(bio);
71 unsigned int len = bio_integrity_bytes(bi, bio_sectors(bio));
72 gfp_t gfp = GFP_NOIO | (zero_buffer ? __GFP_ZERO : 0);
73 void *buf;
74
75 buf = kmalloc(len, (gfp & ~__GFP_DIRECT_RECLAIM) |
76 __GFP_NOMEMALLOC | __GFP_NORETRY | __GFP_NOWARN);
77 if (unlikely(!buf)) {
78 struct page *page;
79
80 page = mempool_alloc(&integrity_buf_pool, GFP_NOFS);
81 if (zero_buffer)
82 memset(page_address(page), 0, len);
83 bvec_set_page(&bip->bip_vec[0], page, len, 0);
84 bip->bip_flags |= BIP_MEMPOOL;
85 } else {
86 bvec_set_page(&bip->bip_vec[0], virt_to_page(buf), len,
87 offset_in_page(buf));
88 }
89
90 bip->bip_vcnt = 1;
91 bip->bip_iter.bi_size = len;
92 }
93
bio_integrity_free_buf(struct bio_integrity_payload * bip)94 void bio_integrity_free_buf(struct bio_integrity_payload *bip)
95 {
96 struct bio_vec *bv = &bip->bip_vec[0];
97
98 if (bip->bip_flags & BIP_MEMPOOL)
99 mempool_free(bv->bv_page, &integrity_buf_pool);
100 else
101 kfree(bvec_virt(bv));
102 }
103
bio_integrity_setup_default(struct bio * bio)104 void bio_integrity_setup_default(struct bio *bio)
105 {
106 struct blk_integrity *bi = blk_get_integrity(bio->bi_bdev->bd_disk);
107 struct bio_integrity_payload *bip = bio_integrity(bio);
108
109 bip_set_seed(bip, bio->bi_iter.bi_sector);
110
111 if (bi->csum_type) {
112 bip->bip_flags |= BIP_CHECK_GUARD;
113 if (bi->csum_type == BLK_INTEGRITY_CSUM_IP)
114 bip->bip_flags |= BIP_IP_CHECKSUM;
115 }
116 if (bi->flags & BLK_INTEGRITY_REF_TAG)
117 bip->bip_flags |= BIP_CHECK_REFTAG;
118 }
119
120 /**
121 * bio_integrity_free - Free bio integrity payload
122 * @bio: bio containing bip to be freed
123 *
124 * Description: Free the integrity portion of a bio.
125 */
bio_integrity_free(struct bio * bio)126 void bio_integrity_free(struct bio *bio)
127 {
128 kfree(bio_integrity(bio));
129 bio->bi_integrity = NULL;
130 bio->bi_opf &= ~REQ_INTEGRITY;
131 }
132
bio_integrity_init(struct bio * bio,struct bio_integrity_payload * bip,struct bio_vec * bvecs,unsigned int nr_vecs)133 void bio_integrity_init(struct bio *bio, struct bio_integrity_payload *bip,
134 struct bio_vec *bvecs, unsigned int nr_vecs)
135 {
136 memset(bip, 0, sizeof(*bip));
137 bip->bip_max_vcnt = nr_vecs;
138 if (nr_vecs)
139 bip->bip_vec = bvecs;
140
141 bio->bi_integrity = bip;
142 bio->bi_opf |= REQ_INTEGRITY;
143 }
144
145 /**
146 * bio_integrity_alloc - Allocate integrity payload and attach it to bio
147 * @bio: bio to attach integrity metadata to
148 * @gfp_mask: Memory allocation mask
149 * @nr_vecs: Number of integrity metadata scatter-gather elements
150 *
151 * Description: This function prepares a bio for attaching integrity
152 * metadata. nr_vecs specifies the maximum number of pages containing
153 * integrity metadata that can be attached.
154 */
bio_integrity_alloc(struct bio * bio,gfp_t gfp_mask,unsigned int nr_vecs)155 struct bio_integrity_payload *bio_integrity_alloc(struct bio *bio,
156 gfp_t gfp_mask,
157 unsigned int nr_vecs)
158 {
159 struct bio_integrity_alloc *bia;
160
161 if (WARN_ON_ONCE(bio_has_crypt_ctx(bio)))
162 return ERR_PTR(-EOPNOTSUPP);
163
164 bia = kmalloc_flex(*bia, bvecs, nr_vecs, gfp_mask);
165 if (unlikely(!bia))
166 return ERR_PTR(-ENOMEM);
167 bio_integrity_init(bio, &bia->bip, bia->bvecs, nr_vecs);
168 return &bia->bip;
169 }
170 EXPORT_SYMBOL(bio_integrity_alloc);
171
bio_integrity_unpin_bvec(struct bio_vec * bv,int nr_vecs)172 static void bio_integrity_unpin_bvec(struct bio_vec *bv, int nr_vecs)
173 {
174 int i;
175
176 for (i = 0; i < nr_vecs; i++)
177 unpin_user_page(bv[i].bv_page);
178 }
179
bio_integrity_uncopy_user(struct bio_integrity_payload * bip)180 static void bio_integrity_uncopy_user(struct bio_integrity_payload *bip)
181 {
182 unsigned short orig_nr_vecs = bip->bip_max_vcnt - 1;
183 struct bio_vec *orig_bvecs = &bip->bip_vec[1];
184 struct bio_vec *bounce_bvec = &bip->bip_vec[0];
185 size_t bytes = bounce_bvec->bv_len;
186 struct iov_iter orig_iter;
187 int ret;
188
189 iov_iter_bvec(&orig_iter, ITER_DEST, orig_bvecs, orig_nr_vecs, bytes);
190 ret = copy_to_iter(bvec_virt(bounce_bvec), bytes, &orig_iter);
191 WARN_ON_ONCE(ret != bytes);
192
193 bio_integrity_unpin_bvec(orig_bvecs, orig_nr_vecs);
194 }
195
196 /**
197 * bio_integrity_unmap_user - Unmap user integrity payload
198 * @bio: bio containing bip to be unmapped
199 *
200 * Unmap the user mapped integrity portion of a bio.
201 */
bio_integrity_unmap_user(struct bio * bio)202 void bio_integrity_unmap_user(struct bio *bio)
203 {
204 struct bio_integrity_payload *bip = bio_integrity(bio);
205
206 if (bip->bip_flags & BIP_COPY_USER) {
207 if (bio_data_dir(bio) == READ)
208 bio_integrity_uncopy_user(bip);
209 kfree(bvec_virt(bip->bip_vec));
210 return;
211 }
212
213 bio_integrity_unpin_bvec(bip->bip_vec, bip->bip_max_vcnt);
214 }
215
216 /**
217 * bio_integrity_add_page - Attach integrity metadata
218 * @bio: bio to update
219 * @page: page containing integrity metadata
220 * @len: number of bytes of integrity metadata in page
221 * @offset: start offset within page
222 *
223 * Description: Attach a page containing integrity metadata to bio.
224 */
bio_integrity_add_page(struct bio * bio,struct page * page,unsigned int len,unsigned int offset)225 int bio_integrity_add_page(struct bio *bio, struct page *page,
226 unsigned int len, unsigned int offset)
227 {
228 struct request_queue *q = bdev_get_queue(bio->bi_bdev);
229 struct bio_integrity_payload *bip = bio_integrity(bio);
230
231 if (bip->bip_vcnt > 0) {
232 struct bio_vec *bv = &bip->bip_vec[bip->bip_vcnt - 1];
233
234 if (!zone_device_pages_compatible(bv->bv_page, page))
235 return 0;
236 if (zone_device_pages_have_same_pgmap(bv->bv_page, page) &&
237 bvec_try_merge_hw_page(q, bv, page, len, offset)) {
238 bip->bip_iter.bi_size += len;
239 return len;
240 }
241
242 if (bip->bip_vcnt >=
243 min(bip->bip_max_vcnt, queue_max_integrity_segments(q)))
244 return 0;
245
246 /*
247 * If the queue doesn't support SG gaps and adding this segment
248 * would create a gap, disallow it.
249 */
250 if (bvec_gap_to_prev(&q->limits, bv, offset))
251 return 0;
252 }
253
254 bvec_set_page(&bip->bip_vec[bip->bip_vcnt], page, len, offset);
255 bip->bip_vcnt++;
256 bip->bip_iter.bi_size += len;
257
258 return len;
259 }
260 EXPORT_SYMBOL(bio_integrity_add_page);
261
bio_integrity_copy_user(struct bio * bio,struct bio_vec * bvec,int nr_vecs,unsigned int len)262 static int bio_integrity_copy_user(struct bio *bio, struct bio_vec *bvec,
263 int nr_vecs, unsigned int len)
264 {
265 bool write = op_is_write(bio_op(bio));
266 struct bio_integrity_payload *bip;
267 struct iov_iter iter;
268 void *buf;
269 int ret;
270
271 buf = kmalloc(len, GFP_KERNEL);
272 if (!buf)
273 return -ENOMEM;
274
275 if (write) {
276 iov_iter_bvec(&iter, ITER_SOURCE, bvec, nr_vecs, len);
277 if (!copy_from_iter_full(buf, len, &iter)) {
278 ret = -EFAULT;
279 goto free_buf;
280 }
281
282 bip = bio_integrity_alloc(bio, GFP_KERNEL, 1);
283 } else {
284 memset(buf, 0, len);
285
286 /*
287 * We need to preserve the original bvec and the number of vecs
288 * in it for completion handling
289 */
290 bip = bio_integrity_alloc(bio, GFP_KERNEL, nr_vecs + 1);
291 }
292
293 if (IS_ERR(bip)) {
294 ret = PTR_ERR(bip);
295 goto free_buf;
296 }
297
298 if (write)
299 bio_integrity_unpin_bvec(bvec, nr_vecs);
300 else
301 memcpy(&bip->bip_vec[1], bvec, nr_vecs * sizeof(*bvec));
302
303 ret = bio_integrity_add_page(bio, virt_to_page(buf), len,
304 offset_in_page(buf));
305 if (ret != len) {
306 ret = -ENOMEM;
307 goto free_bip;
308 }
309
310 bip->bip_flags |= BIP_COPY_USER;
311 bip->bip_vcnt = nr_vecs;
312 return 0;
313 free_bip:
314 bio_integrity_free(bio);
315 free_buf:
316 kfree(buf);
317 return ret;
318 }
319
bio_integrity_init_user(struct bio * bio,struct bio_vec * bvec,int nr_vecs,unsigned int len)320 static int bio_integrity_init_user(struct bio *bio, struct bio_vec *bvec,
321 int nr_vecs, unsigned int len)
322 {
323 struct bio_integrity_payload *bip;
324
325 bip = bio_integrity_alloc(bio, GFP_KERNEL, nr_vecs);
326 if (IS_ERR(bip))
327 return PTR_ERR(bip);
328
329 memcpy(bip->bip_vec, bvec, nr_vecs * sizeof(*bvec));
330 bip->bip_iter.bi_size = len;
331 bip->bip_vcnt = nr_vecs;
332 return 0;
333 }
334
bvec_from_pages(struct bio_vec * bvec,struct page ** pages,int nr_vecs,ssize_t bytes,ssize_t offset,bool * is_p2p)335 static unsigned int bvec_from_pages(struct bio_vec *bvec, struct page **pages,
336 int nr_vecs, ssize_t bytes, ssize_t offset,
337 bool *is_p2p)
338 {
339 unsigned int nr_bvecs = 0;
340 int i, j;
341
342 for (i = 0; i < nr_vecs; i = j) {
343 size_t size = min_t(size_t, bytes, PAGE_SIZE - offset);
344 struct folio *folio = page_folio(pages[i]);
345
346 bytes -= size;
347 for (j = i + 1; j < nr_vecs; j++) {
348 size_t next = min_t(size_t, PAGE_SIZE, bytes);
349
350 if (page_folio(pages[j]) != folio ||
351 pages[j] != pages[j - 1] + 1)
352 break;
353 unpin_user_page(pages[j]);
354 size += next;
355 bytes -= next;
356 }
357
358 if (is_pci_p2pdma_page(pages[i]))
359 *is_p2p = true;
360
361 bvec_set_page(&bvec[nr_bvecs], pages[i], size, offset);
362 offset = 0;
363 nr_bvecs++;
364 }
365
366 return nr_bvecs;
367 }
368
bio_integrity_map_user(struct bio * bio,struct iov_iter * iter)369 int bio_integrity_map_user(struct bio *bio, struct iov_iter *iter)
370 {
371 struct request_queue *q = bdev_get_queue(bio->bi_bdev);
372 struct page *stack_pages[UIO_FASTIOV], **pages = stack_pages;
373 struct bio_vec stack_vec[UIO_FASTIOV], *bvec = stack_vec;
374 iov_iter_extraction_t extraction_flags = 0;
375 size_t offset, bytes = iter->count;
376 bool copy, is_p2p = false;
377 unsigned int nr_bvecs;
378 int ret, nr_vecs;
379
380 if (bio_integrity(bio))
381 return -EINVAL;
382 if (bytes >> SECTOR_SHIFT > queue_max_hw_sectors(q))
383 return -E2BIG;
384
385 nr_vecs = iov_iter_npages(iter, BIO_MAX_VECS + 1);
386 if (nr_vecs > BIO_MAX_VECS)
387 return -E2BIG;
388 if (nr_vecs > UIO_FASTIOV) {
389 bvec = kzalloc_objs(*bvec, nr_vecs);
390 if (!bvec)
391 return -ENOMEM;
392 pages = NULL;
393 }
394
395 copy = iov_iter_alignment(iter) &
396 blk_lim_dma_alignment_and_pad(&q->limits);
397
398 if (blk_queue_pci_p2pdma(q))
399 extraction_flags |= ITER_ALLOW_P2PDMA;
400
401 ret = iov_iter_extract_pages(iter, &pages, bytes, nr_vecs,
402 extraction_flags, &offset);
403 if (unlikely(ret < 0))
404 goto free_bvec;
405
406 nr_bvecs = bvec_from_pages(bvec, pages, nr_vecs, bytes, offset,
407 &is_p2p);
408 if (pages != stack_pages)
409 kvfree(pages);
410 if (nr_bvecs > queue_max_integrity_segments(q))
411 copy = true;
412 if (is_p2p)
413 bio->bi_opf |= REQ_NOMERGE;
414
415 if (copy)
416 ret = bio_integrity_copy_user(bio, bvec, nr_bvecs, bytes);
417 else
418 ret = bio_integrity_init_user(bio, bvec, nr_bvecs, bytes);
419 if (ret)
420 goto release_pages;
421 if (bvec != stack_vec)
422 kfree(bvec);
423
424 return 0;
425
426 release_pages:
427 bio_integrity_unpin_bvec(bvec, nr_bvecs);
428 free_bvec:
429 if (bvec != stack_vec)
430 kfree(bvec);
431 return ret;
432 }
433
bio_uio_meta_to_bip(struct bio * bio,struct uio_meta * meta)434 static void bio_uio_meta_to_bip(struct bio *bio, struct uio_meta *meta)
435 {
436 struct bio_integrity_payload *bip = bio_integrity(bio);
437
438 if (meta->flags & IO_INTEGRITY_CHK_GUARD)
439 bip->bip_flags |= BIP_CHECK_GUARD;
440 if (meta->flags & IO_INTEGRITY_CHK_APPTAG)
441 bip->bip_flags |= BIP_CHECK_APPTAG;
442 if (meta->flags & IO_INTEGRITY_CHK_REFTAG)
443 bip->bip_flags |= BIP_CHECK_REFTAG;
444
445 bip->app_tag = meta->app_tag;
446 }
447
bio_integrity_map_iter(struct bio * bio,struct uio_meta * meta)448 int bio_integrity_map_iter(struct bio *bio, struct uio_meta *meta)
449 {
450 struct blk_integrity *bi = blk_get_integrity(bio->bi_bdev->bd_disk);
451 unsigned int integrity_bytes;
452 int ret;
453 struct iov_iter it;
454
455 if (!bi)
456 return -EINVAL;
457 /*
458 * original meta iterator can be bigger.
459 * process integrity info corresponding to current data buffer only.
460 */
461 it = meta->iter;
462 integrity_bytes = bio_integrity_bytes(bi, bio_sectors(bio));
463 if (it.count < integrity_bytes)
464 return -EINVAL;
465
466 /* should fit into two bytes */
467 BUILD_BUG_ON(IO_INTEGRITY_VALID_FLAGS >= (1 << 16));
468
469 if (meta->flags && (meta->flags & ~IO_INTEGRITY_VALID_FLAGS))
470 return -EINVAL;
471
472 it.count = integrity_bytes;
473 ret = bio_integrity_map_user(bio, &it);
474 if (!ret) {
475 bio_uio_meta_to_bip(bio, meta);
476 bip_set_seed(bio_integrity(bio), meta->seed);
477 iov_iter_advance(&meta->iter, integrity_bytes);
478 meta->seed += bio_integrity_intervals(bi, bio_sectors(bio));
479 }
480 return ret;
481 }
482
483 /**
484 * bio_integrity_advance - Advance integrity vector
485 * @bio: bio whose integrity vector to update
486 * @bytes_done: number of data bytes that have been completed
487 *
488 * Description: This function calculates how many integrity bytes the
489 * number of completed data bytes correspond to and advances the
490 * integrity vector accordingly.
491 */
bio_integrity_advance(struct bio * bio,unsigned int bytes_done)492 void bio_integrity_advance(struct bio *bio, unsigned int bytes_done)
493 {
494 struct bio_integrity_payload *bip = bio_integrity(bio);
495 struct blk_integrity *bi = blk_get_integrity(bio->bi_bdev->bd_disk);
496 unsigned bytes = bio_integrity_bytes(bi, bytes_done >> 9);
497
498 bip->bip_iter.bi_sector += bio_integrity_intervals(bi, bytes_done >> 9);
499 bvec_iter_advance(bip->bip_vec, &bip->bip_iter, bytes);
500 }
501
502 /**
503 * bio_integrity_trim - Trim integrity vector
504 * @bio: bio whose integrity vector to update
505 *
506 * Description: Used to trim the integrity vector in a cloned bio.
507 */
bio_integrity_trim(struct bio * bio)508 void bio_integrity_trim(struct bio *bio)
509 {
510 struct bio_integrity_payload *bip = bio_integrity(bio);
511 struct blk_integrity *bi = blk_get_integrity(bio->bi_bdev->bd_disk);
512
513 bip->bip_iter.bi_size = bio_integrity_bytes(bi, bio_sectors(bio));
514 }
515 EXPORT_SYMBOL(bio_integrity_trim);
516
517 /**
518 * bio_integrity_clone - Callback for cloning bios with integrity metadata
519 * @bio: New bio
520 * @bio_src: Original bio
521 * @gfp_mask: Memory allocation mask
522 *
523 * Description: Called to allocate a bip when cloning a bio
524 */
bio_integrity_clone(struct bio * bio,struct bio * bio_src,gfp_t gfp_mask)525 int bio_integrity_clone(struct bio *bio, struct bio *bio_src,
526 gfp_t gfp_mask)
527 {
528 struct bio_integrity_payload *bip_src = bio_integrity(bio_src);
529 struct bio_integrity_payload *bip;
530
531 BUG_ON(bip_src == NULL);
532
533 bip = bio_integrity_alloc(bio, gfp_mask, 0);
534 if (IS_ERR(bip))
535 return PTR_ERR(bip);
536
537 bip->bip_vec = bip_src->bip_vec;
538 bip->bip_iter = bip_src->bip_iter;
539 bip->bip_flags = bip_src->bip_flags & BIP_CLONE_FLAGS;
540 bip->app_tag = bip_src->app_tag;
541
542 return 0;
543 }
544
bio_integrity_initfn(void)545 static int __init bio_integrity_initfn(void)
546 {
547 if (mempool_init_page_pool(&integrity_buf_pool, BIO_POOL_SIZE,
548 get_order(BLK_INTEGRITY_MAX_SIZE)))
549 panic("bio: can't create integrity buf pool\n");
550 return 0;
551 }
552 subsys_initcall(bio_integrity_initfn);
553